<Past |
Future> |
6.0 (Windows) |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
6.1 (Windows) |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
6.2 (Windows) |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Divest [2, 3, 4, 5] |
Divest [2, 3, 4, 5] |
Approved w/Constraints [2, 3, 4, 5] |
Approved w/Constraints [2, 3, 4, 5] |
Divest [2, 4, 5] |
Divest [2, 4, 5] |
Unapproved |
Unapproved |
7.0.x (Windows) |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Approved w/Constraints [1, 2, 3, 4, 5] |
Approved w/Constraints [1, 2, 3, 4, 5] |
Approved w/Constraints [1, 2, 3, 4, 5] |
Approved w/Constraints [1, 2, 3, 4, 5] |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
7.1.0 (Windows) |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Approved w/Constraints [1, 2, 3, 4, 5] |
Approved w/Constraints [1, 2, 3, 4, 5] |
Approved w/Constraints [1, 2, 3, 4, 5] |
Approved w/Constraints [1, 2, 3, 4, 5] |
Approved w/Constraints [2, 4, 5] |
Approved w/Constraints [2, 4, 5] |
Approved w/Constraints [2, 4, 5] |
Approved w/Constraints [2, 4, 5] |
3.0.x (macOS) |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
4.0.x (macOS) |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Approved w/Constraints [2, 3, 4, 5] |
Approved w/Constraints [2, 3, 4, 5] |
Approved w/Constraints [2, 3, 4, 5] |
Approved w/Constraints [2, 3, 4, 5] |
Divest [2, 4, 5] |
Divest [2, 4, 5] |
Unapproved |
Unapproved |
2.0 (Linux) |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
3.0 (Linux) |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
4.0.x (Linux) |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Approved w/Constraints [2, 3, 4, 5] |
Approved w/Constraints [2, 3, 4, 5] |
Approved w/Constraints [2, 3, 4, 5] |
Approved w/Constraints [2, 3, 4, 5] |
Divest [2, 4, 5] |
Divest [2, 4, 5] |
Unapproved |
Unapproved |
7.2.2 (windows) |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
4.0.1 (macOS) |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
7.3.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
7.4.x (windows) |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
8.0.x (windows) |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
8.1.x (windows) |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
8.2.x (windows) |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
| | [1] | This Technology is currently being evaluated, reviewed, and tested in controlled environments. Use of this technology is strictly controlled and not available for use within the general population. | | [2] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISO (Information Security Officer) to ensure compliance with VA Handbook 6500. | | [3] | This Technology is currently being evaluated, reviewed, and tested in controlled environments. Use of this technology is strictly controlled and not available for use within the general population. Contact your local CIO office if more information is needed in regards to the use of this technology. | | [4] | Technology must remain patched and operated in accordance with Federal and Department security policies and guidelines in order to mitigate known and future security vulnerabilities. | | [5] | Due to potential information security risks, cloud based technologies may not be used without the approval of the Enterprise Cloud Solution Office (ECSO). This body is in part responsible for ensuring organizational information, Personally Identifiable Information (PII), Protected Health Information (PHI), and VA sensitive data are not compromised. (Ref: VA Directive 6004, VA Directive 6517, VA Directive 6513 and VA Directive 6102). |
|
Note: |
At the time of writing, version 8.2.0 is the most current version released. A standard configuration of this technology was developed by the DDE team. ActivClient has two standard versions: Enterprise and USAccess. At the time of writing, the standard versions are 8.1.1.24029 (Enterprise) and 7.4.0.40 (USAccess). Versions 8.2.0.2776 (Enterprise) and 8.1.1.24029 (USAccess) are under testing and development for two weeks from 06/06/2024. |