Skip to main content

Mondoo 11.41 is out!

ยท 3 min read
Tim Smith
Tim Smith
Mondoo Core Team

๐Ÿฅณ Mondoo 11.41 is out! This release includes RDS cluster support, improved asset navigation, new resources, and more!โ€‹

Get this release: Installation Docs | Package Downloads | Docker Container


๐Ÿงน IMPROVEMENTSโ€‹

AWS RDS Cluster supportโ€‹

AWS account scans now include automatic discovery of RDS clusters. Cluster assets appear on the Assets page in a new RDS Clusters group and each asset includes full inventory information.

RDS Cluster Scan

More view options for asset listsโ€‹

We've updated the Assets page to make finding and selecting the assets you care about easier than ever. Improved search results show just the asset groups that include results. A new empty state makes it more clear when no assets match your search. New group and list icons let you switch between views: organize by platform groups or display a single list so you can sort and select all assets of a certain asset group at once.

Asset selection

Resource updatesโ€‹

azure.subscription.cloudDefenderServiceโ€‹

  • New settingsMCAS, settingsWDATP, and settingsSentinel fields using the new azure.subscription.cloudDefenderService.settings resource

azure.subscription.cloudDefenderService.securityContactโ€‹

  • Deprecate alertNotifications in favor of the new notificationSources field

azure.subscription.webService.appsiteโ€‹

  • New ftp and scm fields using the new azure.subscription.webService.appsite.basicPublishingCredentialsPolicies resource

microsoftโ€‹

  • New users field using the new microsoft.users resource
  • New roles field using the new microsoft.roles resource

sshd.configโ€‹

  • New context field using the new file.context resource

๐Ÿ› BUG FIXES AND UPDATESโ€‹

  • Prefer the --token command line flag over the GITHUB_TOKEN environmental variable when both are present.
  • Display asset platforms in search results.
  • Preselect ticket email recipient values when only a single option exists in the drop down menu.
  • When a user selects "Create ticket," don't show the "All Assets" and "Selected Assets" options if there's only one asset.
  • Don't show policies or checks counts on third-party integration pages.
  • Show a friendly empty state when a filter on the Assets page returns no results.
  • Don't show empty asset groups when filtering on the Assets page.
  • Display a friendly error if an exception cannot be created.
  • Don't require new users in a private instance to activate the region.
  • Improve the reliability of AWS region fetching in low-privilege environments.
  • Fix risk factors settings in the security model configuration not applying in some cases.
  • Adjust score weighting for risk factors to better prioritize findings.
  • Don't zip one-file PDF reports so users can open them directly in the browser.
  • Improve the reliability of SBOM generation.
  • Fix the namespace of PURLs on Red Hat Enterprise Linux systems.
  • Improve the reliability of risk factor counts on finding pages.

Mondoo 11.40 is out!

ยท 3 min read
Tim Smith
Tim Smith
Mondoo Core Team

๐Ÿฅณ Mondoo 11.40 is out! This release introduces imported security findings from SentinelOne and CrowdStrike!โ€‹

Get this release: Installation Docs | Package Downloads | Docker Container


๐ŸŽ‰ NEW FEATURESโ€‹

Import findings from SentinelOne and CrowdStrike Falconโ€‹

Unify your security findings with Mondoo! Stop wasting your time compiling and comparing data from multiple security tools and reconciling duplicate findings. Mondoo can now import data from SentinelOne and CrowdStrike Falcon so you can more easily assess your overall security posture.

Third-party integrations

With these integrations, you can take advantage of Mondoo's security visualization, prioritization, and ticketing capabilities. Consolidating the data in Mondoo Platform lets you understand your biggest risks and make the most impactful changes.

Mondoo includes SentinelOne and CrowdStrike data alongside findings from Mondoo's own scans, and deduplicates so you don't have to.

Third-party data on an asset

You get the benefit of multiple toolsโ€”eliminating security gapsโ€”without the management headache. Best of all, the Mondoo Console gives you a big-picture view of your entire attack surface.

๐Ÿงน IMPROVEMENTSโ€‹

Goodbye cases, hello ticketsโ€‹

We love customer feedback and are grateful when we can make changes driven by our users. When we learned that the name of cases, our task tracking capability, wasn't clear to everyone, we acted. Cases are now Mondoo tickets.

Add a ticket from a finding

Ticketing still has all the same capabilities that have made this feature a game-changer for so many of our customers: seamless integration with your external issue tracking platform, remediation details in the ticket, and a user experience that saves you countless hours of work. All we changed is what we call them!

Create workspaces with Terraformโ€‹

Automate the creation of workspaces with the updated Mondoo Terraform provider 0.23. Learn more about the mondoo_workspace resource in the Mondoo Terraform provider documentation.

Resource updatesโ€‹

gcp.project.gke.clusterโ€‹

  • New releaseChannel field

๐Ÿ› BUG FIXES AND UPDATESโ€‹

  • Improve provider command-line help for gcp, k8s, network, os, terraform, vcd, vsphere.
  • Fix incorrect detection of Python packages when common Python directories aren't present.
  • Don't ignore the --regions flag when scanning using the aws provider.
  • Fix GCP labels missing from asset search box filtering and workspaces setup.
  • Handle permission denied messages when fetching the GCP resource's parent organization.
  • Fix a panic during GKE discovery due to handling of threadsPerCore field on GKE project nodePool config.
  • Fix failures in MQL using the .contains helper with dict type data.
  • Improve readability of risk factor icons in some result tables.
  • Only show failing priority findings on the spaces and workspaces page.
  • Improve the reliability of risk factors application on findings.

Mondoo 11.39 is out!

ยท 2 min read
Tim Smith
Tim Smith
Mondoo Core Team

๐Ÿฅณ Mondoo 11.39 is out! This release includes cases and search in workspaces, improved asset risk exposure, and more!โ€‹

Get this release: Installation Docs | Package Downloads | Docker Container


๐ŸŽ‰ NEW FEATURESโ€‹

Create cases in workspacesโ€‹

Turn prioritized findings into action: You can now create a case from within a workspace. Track cases in the workspaces where you created them, or in the parent space for consolidated management.

Cases within workspaces

Search for assets and findings in workspacesโ€‹

Quickly track down assets, CVEs, checks, or policies with the new global search within workspaces.

Search within workspaces

๐Ÿงน IMPROVEMENTSโ€‹

Risk insights on assetsโ€‹

Quickly assess asset risks with the updated Risk Insights section, displaying total counts of high and critical findings and vulnerabilities. Click any section to drill down into particular findings to fix.

Asset page with risk insights

๐Ÿ› BUG FIXES AND UPDATESโ€‹

  • Fix asset technology fields on VMware and OCI assets.
  • Add OCI to the list of technology values available for workspace creation.
  • Fix incorrect CVSS scores displayed in CVE page score boxes.
  • Ensure that positive risk factors display in green.
  • Display the save button on the security model settings tab even if the advanced settings aren't selected.
  • Update the workspaces selection filtering to move "Kind" under infrastructure.
  • Fix failures generating some exports.
  • Support certificate-based authentication for the Microsoft Defender integration.
  • Add the version number to the PCI DSS compliance framework to make it more clear which version is included.
  • Fix the application of risk factors on Debian-based systems.
  • Show correct timestamps for export and import integrations.
  • Fix missing asset titles in space and organization search.
  • Improve the display of Ansible-, Bash-, and PowerShell-based remediation steps for advisories.
  • Improve calculation of asset risk scores.
  • Display EPSS data for more CVEs.
  • Fix missing advisory remediation information when using workspaces.

Mondoo 11.38 is out!

ยท 3 min read
Tim Smith
Tim Smith
Mondoo Core Team

๐Ÿฅณ Mondoo 11.38 is out! This release includes improved workspaces filtering, new resources, and more!โ€‹

Get this release: Installation Docs | Package Downloads | Docker Container


๐ŸŽ‰ NEW FEATURESโ€‹

Create workspaces based on asset technologyโ€‹

Design your perfect workspace without all the clicking! Now Mondoo can dynamically include assets in (or exclude assets from) workspaces based on their general technologies, such as cloud families (AWS, Azure, GCP...) or functions (network, infrastructure as code, operating systems...). This lets you target assets in a general group without selecting each individual platform.

For example, previously to create a workspace made up of all your GCP assets, you individually specified 11 platforms: BigQuery Dataset, Compute Firewall, Compute Image, and so on. Now it's as easy as selecting one technology: GCP!

Workspaces selection using platform

๐Ÿงน IMPROVEMENTSโ€‹

Quickly jump to integrations from an assetโ€‹

Quickly dive into integration configuration directly from scanned assets. A new link in each asset scan overview takes you to the integration that added the asset.

Integration link

Resource updatesโ€‹

microsoft.applicationโ€‹

Query Microsoft 365 applications by ID or name:

microsoft.application(id: "2efd0330-112c-4971-ab20-eaa54c.....") { * }
microsoft.application(name: "nametest") { * }

terraform.planโ€‹

  • New applyable field
  • New errored field
  • New variables field using the new terraform.plan.variable resource

๐Ÿ› BUG FIXES AND UPDATESโ€‹

  • Include additional information on the query when cnquery or cnspec fails to compile a query.
  • Display policy names in check exceptions.
  • Display correct keyboard navigation tips in the workspaces asset selection filter menus.
  • Improve rendering of the workspace asset selection process.
  • Allow organization and space IDs to start with a number and be up to 50 characters long.
  • Update the "Ensure that 'Java version' is currently supported" check in the CIS Azure Foundations policy to support LTS releases of Java 17 and 11.
  • Stop the CIS GitLab Level 2 policy from applying to non-GitLab assets.
  • Improve error messages when data export integrations fail.
  • Ensure gcp.project.cloudRun.services fetches data from all available regions.
  • Fix failures fetching the traffic field in the gcp.project.cloudRun.services resource.
  • Improve the reliability of the CIS Azure Foundations policy's "Ensure IAM policies that allow full ":" administrative privileges are not attached" check.
  • Improve rendering of remediation steps in the Mondoo AWS Security policy.
  • Allow excluding users from the Mondoo Linux Security policy's "Ensure SSH Idle Timeout Interval is configured" check using a property.

Mondoo 11.37 is out!

ยท 3 min read
Tim Smith
Tim Smith
Mondoo Core Team

๐Ÿฅณ Mondoo 11.37 is out! This release includes workspace creation from tags/labels and Mondoo annotations, plus a whole lot more!โ€‹

Get this release: Installation Docs | Package Downloads | Docker Container


๐ŸŽ‰ NEW FEATURESโ€‹

Create workspaces from labels/tags and annotationsโ€‹

Create the perfect workspace for exploring assets in your infrastructure with new filtering capabilities. Now you can create a workspace that includes or excludes all assets that match certain labels or tags, such as environment:production, or Mondoo annotations you set, such as priority:high.

Create a workspace of production cloud assets:

Workspaces selection using cloud tags

Create a workspace of assets you've annotated as high priority:

Workspaces selection using Mondoo annotations

๐Ÿงน IMPROVEMENTSโ€‹

Quickly find integrationsโ€‹

Find the right integration with less scrolling. The Add Integration page now supports search based on integration categories in addition to integration names.

Integration filtering with a category

Improved asset overview informationโ€‹

Dive into asset configuration with new first and last scan time data. Plus, now you can easily copy asset information: When you hover over any value, you see the option to copy the data to your clipboard.

Asset overview

Resource updatesโ€‹

aws.iam.instanceProfileโ€‹

  • Deprecate createDate in favor of a new createdAt field

aws.iam.policyโ€‹

  • Deprecate createDate in favor of a new createdAt field

aws.iam.policyversionโ€‹

  • Deprecate createDate in favor of a new createdAt field

aws.iam.roleโ€‹

  • Deprecate createDate in favor of a new createdAt field

aws.iam.userโ€‹

  • Deprecate createDate in favor of a new createdAt field

aws.iam.usercredentialreportentryโ€‹

  • Deprecate createDate in favor of a new createdAt field

gcp.project.storageservice.bucketโ€‹

  • New encryption field

macos.alfโ€‹

  • Support macOS Sequoia (15) assets

๐Ÿ› BUG FIXES AND UPDATESโ€‹

  • Categorize Nmap assets as "Domains and Hosts" on the Assets page.
  • Fix an invalid reporting job error when running certain policies.
  • Fix display of score boxes on CVE and Advisory pages.
  • Show assets link on AWS integrations.
  • Allow creating workspaces with the asset kind value of "Virtual Machine".
  • Improve reliability of some CIS/BSI Windows policy checks on non-English systems.
  • Improve fetching available AWS regions.
  • Expand CVE and advisory detection on Windows 2025 hosts.
  • Fix user check failures on Windows when a domain user has not locally logged in.
  • Fix the risk rating order in the check overview tile on asset pages.
  • Update the EOL date for Amazon Linux 2023 to the extended June 30th, 2029 date.
  • Rework multiple checks in the CIS Azure Foundations policy to improve reliability and readability of output.
  • Fix incorrect form validation when setting up the Microsoft Defender for Cloud integration.
  • Improve links to documentation on integration pages.

Mondoo 11.36 is out!

ยท 6 min read
Tim Smith
Tim Smith
Mondoo Core Team

๐Ÿฅณ Mondoo 11.36 is out! This release includes ad hoc risk prioritization with workspaces!โ€‹

Get this release: Installation Docs | Package Downloads | Docker Container


๐ŸŽ‰ NEW FEATURESโ€‹

Zero in on exactly the assets you need with workspacesโ€‹

Do you find yourself repeatedly searching for the same groups of assets? Do you wish you could see a subgroup of assets in your space to compare them or measure progress on a certain project? Or maybe some assets just get in the way of what you want to focus on right now? What you need are workspaces!

Lists of workspaces

Workspaces are dynamic groups of assets in a space that you want to view and assess together. Unlike spaces, assets in a workspace are included based on queries. Best of all, an asset can be in as many workspaces as you want. Create a workspace that shows only assets with critical findings, another workspace that has all your Windows 2016 systems that still need to be upgraded, and another that includes all the systems owned by the front end team... whatever meets your specific business needs.

How might you use workspaces to solve problems?

Like many companies, Lunalectric has thousands of assets, but recently their CISO has been increasingly focused on their supply chain. To ensure GitHub and GitLab source code and CI/CD configuration meet best practices, let's create a workspace just for these SCM assets.

Creating a workspaces filter

We create a single asset selection that includes the GitHub and GitLab platforms. Asset selections can match on asset name, kind, platform, platform version, and risk rating with more options coming soon. We can even add as many additional conditions to the selection as we want to create complex queries like Windows systems with a critical risk rating that aren't Windows 2022 and have the word "luna" in the asset name.

Once our workspace is created, we can find it by selecting Workspaces in the left navigation menu or choosing it from the new workspaces top navigation drop-down menu.

Workspaces in the top navigation

Once in our new SCM Assets workspace, the layout feels similar to the existing Lunalectric spaces, only more focused on understanding risks and exploring assets. Our workspaces dashboard shows just our GitLab and GitHub assets, including the top misconfigurations we should start tackling. We can dive into policies, checks, CVES, or advisories to see more details... all the while remaining tightly focused on the task at hand.

Workspace dashboard

Even without diving deeper, the workspace dashboard's inventory overview is telling quite a story. GitLab assets are all passing checks, but GitHub assets, on the other hand, are all high risk.

GitHub assets

Armed with this quick insight, we have the information we need to let our CISO know about the current SCM risk and develop a remediation plan to secure these critical assets.

To learn how you can use workspaces to better organize assets and expose risks, read Plan Your Mondoo Organization and Workspaces in the Mondoo documentation.

Quick access to reportsโ€‹

Quickly access compliance reports by selecting Reporting in the left navigation menu. Looking for more reports? Stay tuned for more updates in upcoming releases. If you're looking for something in particular, let us know at product@mondoo.com!

Quick access to reports

๐Ÿงน IMPROVEMENTSโ€‹

Optionally follow HTTP -> HTTPS redirectsโ€‹

You now have additional control over how Mondoo scans HTTP hosts in the host provider. By default cnquery and cnspec no longer follow redirects from HTTP to HTTPS endpoints, so you can now inspect your HTTP configurations when you choose. If you prefer to follow redirects, use the new --follow-redirects flag.

Without the redirect you can inspect the original page and headers:

$ cnquery shell host http://mondoo.com

cnquery> http.get
http.get: http.get url=url id = http://mondoo.com statusCode=301
cnquery> http.get.body
http.get.body: ""

With redirects specified, you can follow all redirects to the final page users would see:

$ cnquery shell host --follow-redirects http://mondoo.com

cnquery> http.get
http.get: http.get url=url id = http://mondoo.com statusCode=200
cnquery> http.get.body
http.get.body: "<!DOCTYPE html><!-- Last Published: Fri Jan 10 2025 00:09:49 GMT+0000 (Coordinated Universal Time) --><html..."

Resource updatesโ€‹

azure.subscriptions.defenderForContainersโ€‹

  • Expose Extensions values

azure.subscription.policy.assignmentโ€‹

  • New parameters field

fstabโ€‹

  • Update options field to an array of options instead of a single string

k8s.nodeโ€‹

  • New kubeletPort field
  • New nodeInfo field
  • New created field

microsoft.applicationsโ€‹

  • Fetch all applications in large installations

Improved CIS benchmarksโ€‹

Sometimes the best changes are behind the scenes. This week we shipped all-new internal tooling to generate CIS benchmark policies in Mondoo Platform. These changes not only let us to bring you the latest and greatest policies more quickly in the futureโ€”they also enabled us to make a huge number of small improvements to existing policies:

  • New checks that were previously marked as requiring manual user validation
  • More clear and concise descriptions for each policy
  • Expanded check descriptions, including rationale behind the security concerns
  • New audit and remediation steps in many Linux distribution policies
  • Simplified MQL queries to improve readability
  • Additional platform version tags to improve searching for policies
  • Improved policy search results when searching for platform versions

๐Ÿ› BUG FIXES AND UPDATESโ€‹

  • Display CVEs for Fedora 41 assets.
  • Fix a failure querying Microsoft 365 applications.
  • Correct the remediation steps in the BSI 'Ensure SSH Idle Timeout Interval is configured' check.
  • Add EOL dates for FreeBSD 14.2 and Alpine Linux 3.21.
  • Correct the EOL date for FreeBSD 14.1.
  • Update the Amazon Linux 2 EOL date, which has been extended to June 30, 2026.
  • Support EBS volume scanning of instances with LVM partitions.
  • Improve remediation step formatting in Mondoo VMware policies.
  • Open check remediation links in a new window or tab.
  • Fix an unknown-score-type error when comparing semver data in checks.
  • Fix display of GitHub provider help.
  • Don't reinstall some providers on each scan.
  • Fix errors using the Cloudflare provider.
  • Show the link to discovered assets on each integration page.
  • Add detection of the upcoming M4 MacBook Air/Pro models to asset overview information.
  • Add form validation to the Microsoft Defender for Cloud integration to ensure UIDs are correctly formatted.
  • Display platform icon for Nmap assets in affected asset tables.
  • Update Windows checks for the RestrictSendingNTLMTraffic registry entry to accept both Audit All and Deny All configurations.
  • Add a missing permission to the automated CLI Azure setup.
  • Show the platform in all cnspec scan results. Thanks for suggesting this, @DrackThor!

Mondoo 11.35 is out!

ยท 4 min read
Tim Smith
Tim Smith
Mondoo Core Team
Charles Johnson
Charles Johnson
Mondoo Core Team

๐Ÿฅณ Mondoo 11.35 is out! This release includes Microsoft Defender for Cloud findings in Mondoo, Nmap scanning, performance improvements, and more!โ€‹

Get this release: Installation Docs | Package Downloads | Docker Container


๐ŸŽ‰ NEW FEATURESโ€‹

Microsoft Defender for Cloud findings in Mondooโ€‹

Mondoo now imports vulnerabilities discovered by Microsoft Defender for Cloud, so you can prioritize them alongside vulnerabilities discovered by Mondoo. Mondoo helps security teams quickly make sense of security findings regardless of where those findings originate, prioritize the most critical risks, and easily assign them to IT and DevOps with detailed remediation steps. This means that Mondoo significantly speeds up time to resolution and bolsters overall security posture.

Vulnerabilities discovered by Microsoft Defender for Cloud appear in the Mondoo console alongside those discovered by Mondooโ€™s own scans. Mondoo automatically enriches all vulnerabilities found by Microsoft Defender with additional risk data and remediation advice, and prioritizes them based on the actual risk posed in the environment.

Mondoo enriches the findings generated by Microsoft Defender for Cloud with severity, known exploit data, exploit prediction scoring, asset exposure, and business impact, to make sure your security teams are focused on resolving the most important problems.

Network security with Nmap scanningโ€‹

Nmap, short for Network Mapper, is a powerful and versatile open source tool used for network discovery and security auditing. Network administrators, security professionals, and penetration testers rely on Nmap to map out network structures, discover hosts, identify services, and detect vulnerabilities. Now you can integrate Nmap results with Mondoo findings using our new cnquery/cnspec Nmap provider.

Scan active IP address in a network:

nmap.network("192.168.178.0/24").hosts { name ports { * }  }
nmap.network.hosts: [
0: {
ports: [
0: {
service: "http"
version: ""
method: "probed"
state: "open"
protocol: "tcp"
port: 443
product: "FRITZ!Box http config"
}
1: {
service: "sip"
version: ""
method: "probed"
state: "open"
protocol: "tcp"
port: 5060
product: "AVM FRITZ!OS SIP"
}
]
name: "192.168.178.1"
}
1: {
ports: [
0: {
service: "rtsp"
version: "770.8.1"
method: "probed"
state: "open"
protocol: "tcp"
port: 5000
product: "AirTunes rtspd"
}
1: {
service: "rtsp"
version: "770.8.1"
method: "probed"
state: "open"
protocol: "tcp"
port: 7000
product: "AirTunes rtspd"
}
]
name: "192.168.178.25"
}
]

Scan a specific host IP:

nmap.network(target: "192.168.178.25").hosts { ports }
nmap.network.hosts: [
0: {
ports: [
0: nmap.port port=5000 service="rtsp"
1: nmap.port port=7000 service="rtsp"
]
}
]

๐Ÿงน IMPROVEMENTSโ€‹

Performance improvementsโ€‹

No one wants to wait so we made Mondoo faster than ever.

  • 4x faster compliance report generation
  • 7x faster asset discovery during large scans
  • 20x faster GitHub repository discovery in large organizations
  • Reduced GitHub API call usage during organization scans

New checks in Mondoo DNS Securityโ€‹

The Mondoo DNS Security policy now includes full descriptions and impact scores for each check. There are also new checks to ensure DNSSEC is enabled and no DNS wildcard entries exist.

Display remediated asset count on CVEsโ€‹

It's important to observe not just the current state of CVEs, but also the work you've done to resolve them. Remediated counts on CVE and advisory pages provide the full scope of information.

Remediated Assets

Expanded Terraform Provider Mondoo resourcesโ€‹

You can automate more of your Mondoo Platform configuration than ever with new resources in the Terraform Provider Mondoo. Thanks for these great contributions @mati007thm!

  • New mondoo_exception resource
  • New mondoo_integration_email resource
  • New mondoo_integration_gitlab resource
  • New mondoo_integration_jira resource
  • New mondoo_integration_msdefender resource
  • New mondoo_integration_zendesk resource

Resource updatesโ€‹

aws.cloudfront.functionโ€‹

  • Deprecate createdTime in favor of a new createdAt field

aws.dynamodb.tableโ€‹

  • Deprecate createdTime in favor of a new createdAt field

aws.elb.loadbalancerโ€‹

  • Deprecate createdTime in favor of a new createdAt field

aws.rds.dbclusterโ€‹

  • Deprecate createdTime in favor of a new createdAt field

aws.rds.dbinstanceโ€‹

  • Deprecate createdTime in favor of a new createdAt field

aws.s3.bucketโ€‹

  • Deprecate createdTime in favor of a new createdAt field

github.organizationโ€‹

  • New totalPublicRepos field

๐Ÿ› BUG FIXES AND UPDATESโ€‹

  • Fix affected assets lists not containing assets scanned by older custom policies.
  • Fix failures in the files.find resource with container image scans.
  • Improve display of VMware assets in the inventory overview.
  • Simplify the asset print view headers.
  • Rename "Sources" to "Learn More" on CVEs to better describe the purpose of the links.
  • Fix policy check metrics when exceptions are set.
  • Fix search for low security CVEs returning zero results in the vulnerability database.
  • Update CIS NTLM checks to also accept the "Deny All" setting.
  • Adjust scores in Windows policies to improve prioritization.
  • Ensure Kubernetes assets always contain asset overview information.

Mondoo 11.34 is out!

ยท 2 min read
Tim Smith
Tim Smith
Mondoo Core Team

๐Ÿฅณ Mondoo 11.34 is out! This release includes updated CIS macOS Sequoia benchmarks and more!โ€‹

Get this release: Installation Docs | Package Downloads | Docker Container


๐Ÿงน IMPROVEMENTSโ€‹

CIS macOS Sequoia benchmark 1.0โ€‹

Secure Apple's latest macOS release with an updated CIS benchmark. This policy has several new recommendations and improved queries compared to the preview release.

๐Ÿ› BUG FIXES AND UPDATESโ€‹

  • Improve display of affected assets in the vulnerabilities overview page.
  • Improve default values displayed for Cloudflare R2 buckets.
  • Handle nil login values in the microsoft.user.auditlog resource.
  • Add more detailed command line help for the GitLab provider.
  • Fix failures with JSON exports if a duplicate key exists.
  • Fix failures in the Mondoo Linux Security Policy's auditd checks when scanning Ubuntu or Debian systems.
  • Fix failures running CIS VMware policy vulnerabilities checks.
  • Fix some checks showing as passed when they have failed.
  • Fix Kubernetes services displaying in multiple inventory page asset groups.
  • Improve the output and reliability of CIS macOS benchmarks.
  • Add descriptions, impacts, and remediation steps to each check in the Mondoo TLS Security policy.
  • Add an icon for ticket systems on the add integrations page.
  • Fix display of the last successful integration time.

Mondoo 11.33 is out!

ยท 2 min read
Tim Smith
Tim Smith
Mondoo Core Team

๐Ÿฅณ Mondoo 11.33 is out! This release includes Cloudflare asset inventory, expanded Entra ID inspection, and more!โ€‹

Get this release: Installation Docs | Package Downloads | Docker Container


๐ŸŽ‰ NEW FEATURESโ€‹

Explore Cloudflare servicesโ€‹

Dive deep into your Cloudflare infrastructure with a new Cloudflare provider for cnquery/cnspec. Use this provider to gather information on key Cloudflare services:

  • Accounts
  • Zones
  • DNS records
  • R2
  • Zero Trust apps
  • Streams
  • Videos
  • Workers
  • Pages

This example queries DNS zones:

cnquery run cloudflare -c "cloudflare.zones[1] { name dns { * } }"
cloudflare.zones[1]: {
name: "lunalectric.com"
dns: {
records: [
0: cloudflare.dns.record type="A" content="164.90.210.141" name="api.lunalectric.com"
1: cloudflare.dns.record type="A" content="142.93.110.9" name="console.lunalectric.com"
3: cloudflare.dns.record type="CNAME" content="console.lunalectric.com-pages.pages.dev" name="prod.lunalectric.com"
7: cloudflare.dns.record type="MX" content="mail.protonmail.com" name="lunalectric.com"
9: cloudflare.dns.record type="TXT" content="v=DMARC1; p=none; rua=mailto:e60948910ee34fe61be5a6bf2c3fb@dmarc-reports.cloudflare.net,mailto:dmark@lunalectric.com" name="_dmarc.lunalectric.com"
11: cloudflare.dns.record type="AAAA" content="100::" name="meet.lunalectric.com"
]
}
}

๐Ÿงน IMPROVEMENTSโ€‹

Resource updatesโ€‹

aws.ecr.imageโ€‹

  • New lastRecordedPullTime field
  • New pushedAt field
  • New sizeInBytes field

microsoft.userโ€‹

  • New creationType field
  • New identities field using the new microsoft.user.identity resource
  • New auditlog field using the new microsoft.user.auditlog resource

๐Ÿ› BUG FIXES AND UPDATESโ€‹

  • Improve default output of the github.repository.adminCollaborators resource.
  • Improve default output of the github.organization.packages resource.
  • Fix macOS process resource executable values to align with the output from Linux systems.
  • Add the EOL date for Fedora 41 and update dates for 40 and 39 to match the latest published information from the Fedora Project.
  • Improve cleanup of inactive assets in large organizations.
  • Fix missing compliance check mappings for some frameworks.
  • Add the missing query Ensure permissions on /etc/group.old are configured to the CIS SUSE Linux Enterprise 11 Benchmark policy.
  • Improve the reliability of aggregate score generation on dashboards.
  • Add two checks to the CIS VMware ESXi 6.7 and 7.0 Benchmark policies:
    • Ensure port-level configuration overrides are disabled
    • Ensure Virtual Distributed Switch NetFlow traffic is sent to an authorized collector
  • Add an asset group for Kubernetes Namespace assets.

Mondoo 11.32 is out!

ยท 2 min read
Tim Smith
Tim Smith
Mondoo Core Team

๐Ÿฅณ Mondoo 11.32 is out! This release includes single-command Azure integration, expanded risk factor support, Windows LTSC/LTSB support, and more!โ€‹

Get this release: Installation Docs | Package Downloads | Docker Container


๐ŸŽ‰ NEW FEATURESโ€‹

Single-command Azure integrationโ€‹

Integrate Mondoo and Azure with just a single command. No more worrying about setting up apps, configuring service principals, or generating certificates. Tell Mondoo what you'd like to scan in your Azure subscription and paste the command in CloudShell. Then kick back, relax, and let Mondoo do the heavy lifting.

Automated Azure integration setup

Detect EOL dates for Windows LTSC and LTSB releasesโ€‹

Mondoo EOL detection support for Windows now includes the Microsoft Long Term Servicing Channel (LTSC) and Long Term Servicing Branch (LTSB) releases. No matter what release of Windows you use, Mondoo detects upcoming EOL dates.

๐Ÿงน IMPROVEMENTSโ€‹

Badges for new policiesโ€‹

Too many cooks in the kitchen? Understand when you or your coworkers enable new policies in a space with a "New" badge on any policy enabled in the last 7 days.

New policy badge

Show risk factors on asset checksโ€‹

Understand risks that elevate security concerns on your assets with risk factors on asset checks tables.

Risk factor on asset check

๐Ÿ› BUG FIXES AND UPDATESโ€‹

  • Improve cloud snapshot scanning to support devices with multiple block devices.
  • Improve performance of Windows SMBIOS discovery.
  • Fix Windows platform detection in local scans.
  • Improve performance of cloud detection on *nix systems. Thanks tomtrix!
  • Don't display assets without vulnerabilities on the vulnerability dashboard.
  • Display the platform for each asset in affected asset tables.
  • Update VMware EOL dates to use the new extended dates.
  • Fix an issue that prevented data exports of some checks.
  • Fix TLS checks in the CIS Azure Foundations benchmark policy to match additional variations of TLS 1.2 and 1.3.
  • Add Ensure error logging is enabled and set to the info logging level check to the CIS NGINX benchmark policy.
  • Fix failures in the Ensure discretionary access control permission modification events are collected check in Linux CIS benchmarks.
  • Improve usage of properties in the CIS NGINX benchmark policy.
  • Improve reliability of last successful scan time on integrations.
  • Add tool tips to asset counts on the spaces page.
  • Add tool tips to the exceptions counts on compliance pages.