<Past |
Future> |
6.7 |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
7.0 |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
7.1.x |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
7.2.x |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
7.3.x |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
8.0.x |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
8.1.x |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
8.3.x |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
8.5.x |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
8.7.x |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Prohibited |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
8.7.2+ |
Divest [11, 17, 20, 21, 23] |
Divest [11, 17, 20, 21, 24, 25] |
Divest [11, 17, 20, 21, 24, 25] |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
9.0.x |
Divest [11, 17, 20, 21, 23] |
Divest [11, 17, 20, 21, 24, 25] |
Divest [11, 17, 20, 21, 24, 25] |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
9.1.x |
Approved w/Constraints [11, 17, 20, 21, 23] |
Divest [11, 17, 20, 21, 24, 25] |
Divest [11, 17, 20, 21, 24, 25] |
Divest [11, 17, 20, 21, 25, 26] |
Divest [25, 26, 27, 28, 29, 30] |
Divest [25, 26, 27, 28, 29, 30] |
Divest [25, 27, 28, 29, 30, 31] |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
9.2.x |
Unapproved |
Approved w/Constraints [11, 17, 20, 21, 24, 25] |
Approved w/Constraints [11, 17, 20, 21, 24, 25] |
Divest [11, 17, 20, 21, 25, 26] |
Divest [25, 26, 27, 28, 29, 30] |
Divest [25, 26, 27, 28, 29, 30] |
Divest [25, 27, 28, 29, 30, 31] |
Divest [25, 27, 29, 30, 31, 32] |
Divest [25, 27, 29, 30, 32, 33] |
Unapproved |
Unapproved |
Unapproved |
9.3.x |
Unapproved |
Unapproved |
Unapproved |
Approved w/Constraints [11, 17, 20, 21, 25, 26] |
Approved w/Constraints [25, 26, 27, 28, 29, 30] |
Approved w/Constraints [25, 26, 27, 28, 29, 30] |
Approved w/Constraints [25, 27, 28, 29, 30, 31] |
Approved w/Constraints [25, 27, 29, 30, 31, 32] |
Divest [25, 27, 29, 30, 32, 33] |
Divest [25, 27, 29, 30, 32, 33] |
Divest [25, 27, 29, 30, 32, 33] |
Divest [25, 27, 29, 30, 32, 33] |
9.4.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Approved w/Constraints [1, 25, 27, 28, 29, 30, 31] |
Approved w/Constraints [25, 27, 29, 30, 31, 32] |
Approved w/Constraints [25, 27, 29, 30, 32, 33] |
Approved w/Constraints [25, 27, 29, 30, 32, 33] |
Approved w/Constraints [25, 27, 29, 30, 32, 33] |
Approved w/Constraints [25, 27, 29, 30, 32, 33] |
9.5.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Approved w/Constraints [1, 25, 27, 29, 30, 32, 33] |
Approved w/Constraints [25, 27, 29, 30, 32, 33] |
Approved w/Constraints [25, 27, 29, 30, 32, 33] |
Approved w/Constraints [25, 27, 29, 30, 32, 33] |
| | [1] | This Technology is currently being evaluated, reviewed, and tested in controlled environments. Use of this technology is strictly controlled and not available for use within the general population. | | [2] | Several high NIST vulnerabilities have been identified for older versions. Only versions 6.7 and above are permitted for use. If PII/PHI/VA sensitive information is involved, FIPS 140-2 certified encryption must be used to encrypt data in transit and at rest per VA Handbook 6500 (Appendix F). If downloaded, this software should be obtained directly from the offering vendor`s site, not from public freeware repositories, to avoid possible addition of adware or malware. Freeware sites offer a trial version of this software for download which should be avoided. | | [3] | ` | | [4] | The product must only be operated in FIPS mode and remain patched in accordance with Federal and Department security and privacy policies and guidelines. | | [5] | As of April 23, 2015, per the Deputy CIO of Architecture, Strategy and Design (ASD), all technologies in use by the VA require an assessment by the VA Section 508 office. Section 508 of the Rehabilitation Act Amendments of 1998 is a federal law that sets the guidelines for technology accessibility. A VA Section 508 assessment of this technology has not been completed at the time of publication. Therefore, as of April 23, 2015 only users of this technology who have deployed the technology to the production environment, or have project design and implementation plans approved, may continue to operate this technology. In the case of a project that has implemented, or been approved for a specific site or number of users, and that project needs to expand operations to other sites or to an increased user base, it may do so as long as the project stays on the existing version of the technology that was approved or implemented as of April 22, 2015. Use of this technology in all other cases is prohibited.
| | [6] | The product must only be operated in FIPS mode. | | [7] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISO (Information Security Officer) to ensure compliance with VA Handbook 6500. | | [8] | Technology must remain patched and operated in accordance with Federal and Department security policies and guidelines in order to mitigate known and future security vulnerabilities. | | [9] | In cases where the technology is used for external connections, a full Enterprise Security Change Control Board (ESCCB) review is required in accordance VA Directive 6004 , VA Directive 6517, and VA Directive 6513. The local ISO can advise on the ESCCB review process. | | [10] | The product must only be operated in Federal Information Processing Standard (FIPS) mode.
If free trialware is utilized, the software must be purchased or removed at the end of the trial period. | | [11] | Users should check with their supervisor, Information Security Office (ISO) or local OIT representative for permission to download and use this software. Downloaded software must always be scanned for viruses prior to installation to prevent adware or malware. Freeware may only be downloaded directly from the primary site that the creator of the software has advertised for public download and user or development community engagement. Users should note, any attempt by the installation process to install any additional, unrelated software is not approved and the user should take the proper steps to decline those installations. | | [12] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISO (Information Security Officer) to ensure compliance with VA Handbook 6500. | | [13] | In cases where the technology is used for external connections, a full Enterprise Security Change Control Board (ESCCB) review is required in accordance VA Directive 6004 , VA Directive 6517, and VA Directive 6513. The local ISO can advise on the ESCCB review process. | | [14] | This product may only be used when Microfocus Reflection does not meet the requirements of the project.
If free trialware is utilized, the software must be purchased or removed at the end of the trial period.
The product must only be operated in Federal Information Processing Standard (FIPS) mode.
Users must consider alternative options rather than using this product because it is not a part of the VA baseline.
Users must disable Telnet services when using this product. Please see the Telnet TRM entry for more details. | | [15] | This product may only be used when Microfocus Reflection does not meet the requirements of the project.
If free trialware is utilized, the software must be purchased or removed at the end of the trial period.
The product must only be operated in Federal Information Processing Standard (FIPS) mode.
Users must consider alternative options rather than using this product because it is not a part of the VA baseline.
Users must disable Telnet services when using this product. Please see the Telnet TRM entry for more details. | | [16] | If free trialware is utilized, the software must be purchased or removed at the end of the trial period.
Users must not leverage TELNET functionality.
Because SecureCRT is not part of the official VA baseline of tools and does not have a VA security configuration guide, SecureCRT is only allowed to be used when other VA approved enterprise solutions will not meet requirements. Users should consider contacting the BCM Team (VA mail: VA IT BCM Intake) to create a VA security configuration guide so this can be approved for full use in VA. | | [17] | Due to National Institute of Standards and Technology (NIST) identified security vulnerabilities, extra vigilance should be applied to ensure the versions remain properly patched to mitigate known and future vulnerabilities. The local ISO can provide assistance in reviewing the NIST vulnerabilities. | | [18] | If free trialware is utilized, the software must be purchased or removed at the end of the trial period.
Security Engineering (SE) conducted a pre-assessment and security requirements verification of VanDyke SecureCRT. It is advised that if this product is used within the Department of Veterans Affairs (VA) that the following constraints be applied:
VanDyke has published information on using Microsoft Group Policy Objects (GPO’s) ADM/ADMX controls to disallow Automate Login located in the “Help Topics” section of the software. SecureCRT can use a password stored in a program specific .ini file and creates an entry for each session initiated. Usernames are listed in clear text and passwords are encrypted. Login credentials for target systems are reliant on Microsoft Active Directory login schema or target system local credentials. Password complexity is based upon domain Group Policy Object (GPO) settings of the target system. VanDyke provides an .adm template (Administrative Template) file that can be used with Microsoft Management Console (MMC) to configure FIPS mode in Windows client applications.
Per VAIQ 7615193, effective January 1, 2016 use of Telnet is no longer allowed within VA. All information system baselines will disable Telnet services. The TRM entry for Telnet has been updated to unapproved as of August 31, 2016, and it has been advised that the technology/standard has not been approved for use. It may only be used if a waiver signed by the Deputy CIO of ASD or designee based upon a recommendation from the STAT has been granted to a project.
The File Transfer Protocol (FTP) features of this software must not be used as the FTP protocol is prohibited for use on the VA network. (For further information see: VA Policy Memo VAIQ 7615193 on Prohibited Use of File Transfer Protocol (FTP) and Telnet Services) | | [19] | If free trialware is utilized, the software must be purchased or removed at the end of the trial period.
Per the Initial Product Review, users must abide by the following constraints:
- VanDyke has published information on using Microsoft Group Policy Objects (GPO’s) ADM/ADMX controls to disallow Automate Login located in the “Help Topics” section of the software. SecureCRT can use a password stored in a program specific .ini file and creates an entry for each session initiated. Usernames are listed in clear text and passwords are encrypted. Login credentials for target systems are reliant on Microsoft Active Directory login schema or target system local credentials. Password complexity is based upon domain Group Policy Object (GPO) settings of the target system. VanDyke provides an .adm template (Administrative Template) file that can be used with Microsoft Management Console (MMC) to configure FIPS mode in Windows client applications.
- Per VAIQ 7615193, effective January 1, 2016 use of Telnet is no longer allowed within VA. All information system baselines will disable Telnet services. The TRM entry for Telnet has been updated to unapproved as of August 31, 2016, and it has been advised that the technology/standard has not been approved for use. It may only be used if a waiver signed by the Deputy CIO of ASD or designee based upon a recommendation from the STAT has been granted to a project.
The File Transfer Protocol (FTP) features of this software must not be used as the FTP protocol is prohibited for use on the VA network. (For further information see: VA Policy Memo VAIQ 7615193 on Prohibited Use of File Transfer Protocol (FTP) and Telnet Services) | | [20] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISO (Information Security Officer) to ensure compliance with VA Handbook 6500. | | [21] | In cases where the technology is used for external connections, a full Enterprise Security Change Control Board (ESCCB) review is required in accordance VA Directive 6004 , VA Directive 6517, and VA Directive 6513. The local ISO can advise on the ESCCB review process. | | [22] | If free trialware is utilized, the software must be purchased or removed at the end of the trial period.
Per the Security Assessment Review, users must abide by the following constraints:
- VanDyke has published information on using Microsoft Group Policy Objects (GPO’s) ADM/ADMX controls to disallow Automate Login located in the “Help Topics” section of the software. SecureCRT can use a password stored in a program specific .ini file and creates an entry for each session initiated. Usernames are listed in clear text and passwords are encrypted. Login credentials for target systems are reliant on Microsoft Active Directory login schema or target system local credentials. Password complexity is based upon domain Group Policy Object (GPO) settings of the target system. VanDyke provides an .adm template (Administrative Template) file that can be used with Microsoft Management Console (MMC) to configure FIPS mode in Windows client applications.
- Per VAIQ 7615193, effective January 1, 2016 use of Telnet is no longer allowed within VA. All information system baselines will disable Telnet services. The TRM entry for Telnet has been updated to unapproved as of August 31, 2016, and it has been advised that the technology/standard has not been approved for use. It may only be used if a waiver signed by the Deputy CIO of ASD or designee based upon a recommendation from the STAT has been granted to a project.
The File Transfer Protocol (FTP) features of this software must not be used as the FTP protocol is prohibited for use on the VA network. (For further information see: VA Policy Memo VAIQ 7615193 on Prohibited Use of File Transfer Protocol (FTP) and Telnet Services) | | [23] | If free trialware is utilized, the software must be purchased or removed at the end of the trial period.
This technology must not utilize Ubuntu Server or Desktop resources.
Per the Security Assessment Review, users must abide by the following constraints:
- VanDyke has published information on using Microsoft Group Policy Objects (GPO’s) ADM/ADMX controls to disallow Automate Login located in the “Help Topics” section of the software. SecureCRT can use a password stored in a program specific .ini file and creates an entry for each session initiated. Usernames are listed in clear text and passwords are encrypted. Login credentials for target systems are reliant on Microsoft Active Directory login schema or target system local credentials. Password complexity is based upon domain Group Policy Object (GPO) settings of the target system. VanDyke provides an .adm template (Administrative Template) file that can be used with Microsoft Management Console (MMC) to configure FIPS mode in Windows client applications.
- Per VAIQ 7615193, effective January 1, 2016 use of Telnet is no longer allowed within VA. All information system baselines will disable Telnet services. The TRM entry for Telnet has been updated to unapproved as of August 31, 2016, and it has been advised that the technology/standard has not been approved for use. It may only be used if a waiver signed by the Deputy CIO of ASD or designee based upon a recommendation from the STAT has been granted to a project.
The File Transfer Protocol (FTP) features of this software must not be used as the FTP protocol is prohibited for use on the VA network. (For further information see: VA Policy Memo VAIQ 7615193 on Prohibited Use of File Transfer Protocol (FTP) and Telnet Services) | | [24] | If free trialware is utilized, the software must be purchased or removed at the end of the trial period.
The File Transfer Protocol (FTP) features of this software must not be used as the FTP protocol is prohibited for use on the VA network. (For further information see: VA Policy Memo VAIQ 7615193 on Prohibited Use of File Transfer Protocol (FTP) and Telnet Services)
Per the Initial Product Review, users must abide by the following constraints:
- VanDyke has published information on using Microsoft Group Policy Objects (GPO’s) ADM/ADMX controls to disallow Automate Login located in the “Help Topics” section of the software. SecureCRT can use a password stored in a program specific .ini file and creates an entry for each session initiated. Usernames are listed in clear text and passwords are encrypted. Login credentials for target systems are reliant on Microsoft Active Directory login schema or target system local credentials. Password complexity is based upon domain Group Policy Object (GPO) settings of the target system. VanDyke provides an .adm template (Administrative Template) file that can be used with Microsoft Management Console (MMC) to configure FIPS mode in Windows client applications.
- Per VAIQ 7615193, effective January 1, 2016 use of Telnet is no longer allowed within VA. All information system baselines will disable Telnet services. The TRM entry for Telnet has been updated to unapproved as of August 31, 2016, and it has been advised that the technology/standard has not been approved for use. It may only be used if a waiver signed by the Deputy CIO of ASD or designee based upon a recommendation from the STAT has been granted to a project.
System Owners and Administrators should verify they are using the latest version of SecureCRT as the certificates in older versions are in a historical status per the NIST 140-2 database.
- System Owners and Administrators should verify they are using the latest version of SecureCRT as the certificates in older versions are in a historical status per the NIST 140-2 database.
| | [25] | This technology has received one or more VA security bulletins that provide specific guidance on vulnerability patching and mitigation. It is the responsibility of VA system owners to ensure that the appropriate mitigations are taken to address all known and future discovered vulnerabilities with this product. See the Reference tab for more information on security bulletins related to this product. | | [26] | If free trialware is utilized, the software must be purchased or removed at the end of the trial period.
The File Transfer Protocol (FTP) features of this software must not be used as the FTP protocol is prohibited for use on the VA network. (For further information see: VA Policy Memo VAIQ 7615193 on Prohibited Use of File Transfer Protocol (FTP) and Telnet Services)
Per the Initial Product Review, users must abide by the following constraints:
This technology has the potential to use TELNET, an unapproved technology. Users should utilize alternate companion technologies while using this product.
- VanDyke has published information on using Microsoft Group Policy Objects (GPO’s) ADM/ADMX controls to disallow Automate Login located in the “Help Topics” section of the software. SecureCRT can use a password stored in a program specific .ini file and creates an entry for each session initiated. Usernames are listed in clear text and passwords are encrypted. Login credentials for target systems are reliant on Microsoft Active Directory login schema or target system local credentials. Password complexity is based upon domain Group Policy Object (GPO) settings of the target system. VanDyke provides an .adm template (Administrative Template) file that can be used with Microsoft Management Console (MMC) to configure FIPS mode in Windows client applications.
- Per VAIQ 7615193, effective January 1, 2016 use of Telnet is no longer allowed within VA. All information system baselines will disable Telnet
services. The TRM entry for Telnet has been updated to unapproved as of August 31, 2016, and it has been advised that the technology/standard has
not been approved for use. VA utilizes the risk-based decision process defined in the VA POA&M Management Guide and Accreditation Requirement Guide in accordance with VA Handbook 6500 - Risk Management Framework for VA Information Systems - Tier 3: VA Information Security Program. Please reach out to your ISSO, ISO and SS for pre-existing systems to enter a POA&M for the “TRM Unapproved technology”.
- System Owners and Administrators should verify they are using the latest version of SecureCRT as the certificates in older versions are in a historical status per the NIST 140-2 database.
| | [27] | Due to National Institute of Standards and Technology (NIST) identified security vulnerabilities, extra vigilance should be applied to ensure the versions remain properly patched to mitigate known and future vulnerabilities. The local ISSO (Information System Security Officer) can provide assistance in reviewing the NIST vulnerabilities. | | [28] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISSO (Information System Security Officer) to ensure compliance with VA Handbook 6500. | | [29] | In cases where the technology is used for external connections, a full Enterprise Security Change Control Board (ESCCB) review is required in accordance VA Directive 6004 , VA Directive 6517, and VA Directive 6513. The local ISSO (Information System Security Officer) can advise on the ESCCB review process. | | [30] | Users should check with their supervisor, Information System Security Officer (ISSO) or local OIT representative for permission to download and use this software. Downloaded software must always be scanned for viruses prior to installation to prevent adware or malware. Freeware may only be downloaded directly from the primary site that the creator of the software has advertised for public download and user or development community engagement. Users should note, any attempt by the installation process to install any additional, unrelated software is not approved and the user should take the proper steps to decline those installations. | | [31] | If free trialware is utilized, the software must be purchased or removed at the end of the trial period.
The File Transfer Protocol (FTP) features of this software must not be used as the FTP protocol is prohibited for use on the VA network. (For further information see: VA Policy Memo VAIQ 7615193 on Prohibited Use of File Transfer Protocol (FTP) and Telnet Services)
Per the Initial Product Review, users must abide by the following constraints:
This technology has the potential to use TELNET, an unapproved technology. Users should utilize alternate companion technologies while using this product.
- VanDyke has published information on using Microsoft Group Policy Objects (GPO’s) ADM/ADMX controls to disallow Automate Login located in the “Help Topics” section of the software. SecureCRT can use a password stored in a program specific .ini file and creates an entry for each session initiated. Usernames are listed in clear text and passwords are encrypted. Login credentials for target systems are reliant on Microsoft Active Directory login schema or target system local credentials. Password complexity is based upon domain Group Policy Object (GPO) settings of the target system. VanDyke provides an .adm template (Administrative Template) file that can be used with Microsoft Management Console (MMC) to configure FIPS mode in Windows client applications.
- Per VAIQ 7615193, effective January 1, 2016 use of Telnet is no longer allowed within VA. All information system baselines will disable Telnet
services. The TRM entry for Telnet has been updated to unapproved as of August 31, 2016, and it has been advised that the technology/standard has
not been approved for use. VA utilizes the risk-based decision process defined in the VA POA&M Management Guide and Accreditation Requirement Guide in accordance with VA Handbook 6500 - Risk Management Framework for VA Information Systems - Tier 3: VA Information Security Program. Please reach out to your ISSO, ISO and SS for pre-existing systems to enter a POA&M for the “TRM Unapproved technology”.
- System Owners and Administrators should verify they are using the latest version of SecureCRT as the certificates in older versions are in a historical status per the NIST 140-2 database.
| | [32] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISSO (Information System Security Officer) to ensure compliance with both VA Handbook 6500 and VA Directive 6500. | | [33] | If free trialware is utilized, the software must be purchased or removed at the end of the trial period.
The File Transfer Protocol (FTP) features of this software must not be used as the FTP protocol is prohibited for use on the VA network. (For further information see: VA Policy Memo VAIQ 7615193 on Prohibited Use of File Transfer Protocol (FTP) and Telnet Services)
Per the Initial Product Review, users must abide by the following constraints:
Users must not utilize TELNET as it is at the time of writing, unapproved in the TRM.
- VanDyke has published information on using Microsoft Group Policy Objects (GPO’s) ADM/ADMX controls to disallow Automate Login located in the “Help Topics” section of the software. SecureCRT can use a password stored in a program specific .ini file and creates an entry for each session initiated. Usernames are listed in clear text and passwords are encrypted. Login credentials for target systems are reliant on Microsoft Active Directory login schema or target system local credentials. Password complexity is based upon domain Group Policy Object (GPO) settings of the target system. VanDyke provides an .adm template (Administrative Template) file that can be used with Microsoft Management Console (MMC) to configure FIPS mode in Windows client applications.
- Per VAIQ 7615193, effective January 1, 2016 use of Telnet is no longer allowed within VA. All information system baselines will disable Telnet
services. The TRM entry for Telnet has been updated to unapproved as of August 31, 2016, and it has been advised that the technology/standard has
not been approved for use. VA utilizes the risk-based decision process defined in the VA POA&M Management Guide and Accreditation Requirement Guide in accordance with VA Handbook 6500 - Risk Management Framework for VA Information Systems - Tier 3: VA Information Security Program. Please reach out to your ISSO, ISO and SS for pre-existing systems to enter a POA&M for the “TRM Unapproved technology”.
- System Owners and Administrators should verify they are using the latest version of SecureCRT as the certificates in older versions are in a historical status per the NIST 140-2 database.
|
|
Note: |
At the time of writing, version 9.5.1 is the most current version, released 02/27/2024.
A standard configuration of this technology was developed by the DDE team. At the time of writing, the standard versions is 9.4.0. Version 9.5.0 is under testing and development for six weeks from 03/08/2024. |