IANN Monitor Release Notes – 6.4
This release introduces multiple enhancements across the IANN Monitor platform, improving user experience, system monitoring, and customization capabilities. Below are the key updates and improvements delivered in version 6.4.
Graph Resizing
Graph Drag & Drop
Remainder Alerts
Example:
[REMAINDER] CRITICAL: IANN URL heartbeat with filter – test1 – IANN
No Data Alerts
Dynamic Alert Messages
Weekly Report includes performance summaries and metrics over the past 7 days.
Monitored Data Points:
Real-Time Metrics:
Drag-and-Drop Headers
Dynamic Headers
Enable/Disable Columns
Sorting and Filtering:
Note:
After downloading a dashboard, it cannot be directly uploaded to the same environment.
To restore or move it within the same environment:
Enhancements have been introduced to improve the monitoring and management of Azure Service Principals and Service Accounts:
Real-time monitoring of PVC states (Bound / Not Bound) has been implemented to improve visibility and reliability of storage provisioning in OpenShift.
The IANN Monitor VM now supports up to 25 users concurrently, ensuring robust performance under moderate user load.
The following security vulnerabilities have been identified and fixed in this release:
S.No | Vulnerability Description | Fix |
---|---|---|
1 | Privilege Escalation via Local Storage Role Change | Local storage has been cleared. |
2 | No rate limiting on Forgot Password feature | CAPTCHA is added |
3 | Username and Password Enumeration via Brute Force | Daily Logging Limit (per user)
IP Blocking:
|
4 | UserID Enumeration on Forgot Password feature | CAPTCHA is added |
5 | Improper Access Control on Environment Switch | Access control has been implemented for environment switching. |
6 | Lack of Rate Limiting on Validate OTP Feature | Rate limiting has been implemented for OTP validation. If a user enters an invalid OTP more than 5 times, their IP address will be blocked for 10 minutes. |
7 | Business Logic Vulnerability in Session Management | Proper session expiration handling has been implemented. |
8 | IDOR discloses environment access names | Removed the total environments list from the local storage |
9 | No Input Validation during User Creation | Input validation has been added during user creation. Only alphanumeric characters, along with “@” and “.” (dot) symbols, are allowed. |
10 | Old Session remains active after logout | Sessions are now being validated. |
11 | Old Session remains active after password change | Sessions are now invalidated after a password change to enhance security. |
12 | Weak Password Policy | We have updated the password policy with the following requirements:
|
13 | Lack of Verification Email | During user creation, an activation email is now sent to the user for email verification. |
14 | Missing CSP (Content Security Policy) Headers | Security headers have been added to the application for enhanced security. |
15 | Excess Data Exposure | Have encrypted the data and system sensitive information using crypto JS |
16 | Concurrent Sessions Allowed | We now allow only a single active session per user’s credentials. If a user attempts to log in again with the same credentials while a session is already active, they will receive a pop-up prompting them to either close the previous session or cancel the current login attempt. |