<Past |
Future> |
13.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
14.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
15.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
16.x.x |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
Divest [1, 2, 4] |
Divest [1, 2, 4] |
Divest [1, 2, 4] |
Divest [1, 2, 4] |
Divest [1, 2, 4] |
Divest [1, 2, 4] |
Divest [1, 2, 4] |
Divest [1, 2, 4] |
17.x.x |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
Divest [1, 2, 4] |
Divest [1, 2, 4] |
Divest [1, 2, 4] |
Divest [1, 2, 4] |
18.x.x |
Unapproved |
Unapproved |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
19.x.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
Approved w/Constraints [1, 2, 4] |
20.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
21.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
22.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
23.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
24.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
| | [1] | Technology must remain patched and operated in accordance with Federal and Department security policies and guidelines in order to mitigate known and future security vulnerabilities. | | [2] | If free trialware is utilized, the software must be purchased or removed at the end of the trial period. | | [3] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISO (Information Security Officer) to ensure compliance with VA Handbook 6500. | | [4] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISO (Information Security Officer) to ensure compliance with VA Handbook 6500. |
|
Note: |
At the time of writing, version 24.5.0 is the most current version, released 05/03/2024. |