Skip to main content

Mondoo 11.40 is out!

Β· 3 min read
Tim Smith
Tim Smith
Mondoo Core Team

πŸ₯³ Mondoo 11.40 is out! This release introduces imported security findings from SentinelOne and CrowdStrike!​

Get this release: Installation Docs | Package Downloads | Docker Container


πŸŽ‰ NEW FEATURES​

Import findings from SentinelOne and CrowdStrike Falcon​

Unify your security findings with Mondoo! Stop wasting your time compiling and comparing data from multiple security tools and reconciling duplicate findings. Mondoo can now import data from SentinelOne and CrowdStrike Falcon so you can more easily assess your overall security posture.

Third-party integrations

With these integrations, you can take advantage of Mondoo's security visualization, prioritization, and ticketing capabilities. Consolidating the data in Mondoo Platform lets you understand your biggest risks and make the most impactful changes.

Mondoo includes SentinelOne and CrowdStrike data alongside findings from Mondoo's own scans, and deduplicates so you don't have to.

Third-party data on an asset

You get the benefit of multiple toolsβ€”eliminating security gapsβ€”without the management headache. Best of all, the Mondoo Console gives you a big-picture view of your entire attack surface.

🧹 IMPROVEMENTS​

Goodbye cases, hello tickets​

We love customer feedback and are grateful when we can make changes driven by our users. When we learned that the name of cases, our task tracking capability, wasn't clear to everyone, we acted. Cases are now Mondoo tickets.

Add a ticket from a finding

Ticketing still has all the same capabilities that have made this feature a game-changer for so many of our customers: seamless integration with your external issue tracking platform, remediation details in the ticket, and a user experience that saves you countless hours of work. All we changed is what we call them!

Create workspaces with Terraform​

Automate the creation of workspaces with the updated Mondoo Terraform provider 0.23. Learn more about the mondoo_workspace resource in the Mondoo Terraform provider documentation.

Resource updates​

gcp.project.gke.cluster​

  • New releaseChannel field

πŸ› BUG FIXES AND UPDATES​

  • Improve provider command-line help for gcp, k8s, network, os, terraform, vcd, vsphere.
  • Fix incorrect detection of Python packages when common Python directories aren't present.
  • Don't ignore the --regions flag when scanning using the aws provider.
  • Fix GCP labels missing from asset search box filtering and workspaces setup.
  • Handle permission denied messages when fetching the GCP resource's parent organization.
  • Fix a panic during GKE discovery due to handling of threadsPerCore field on GKE project nodePool config.
  • Fix failures in MQL using the .contains helper with dict type data.
  • Improve readability of risk factor icons in some result tables.

Mondoo 11.39 is out!

Β· 2 min read
Tim Smith
Tim Smith
Mondoo Core Team

πŸ₯³ Mondoo 11.39 is out! This release includes cases and search in workspaces, improved asset risk exposure, and more!​

Get this release: Installation Docs | Package Downloads | Docker Container


πŸŽ‰ NEW FEATURES​

Create cases in workspaces​

Turn prioritized findings into action: You can now create a case from within a workspace. Track cases in the workspaces where you created them, or in the parent space for consolidated management.

Cases within workspaces

Search for assets and findings in workspaces​

Quickly track down assets, CVEs, checks, or policies with the new global search within workspaces.

Search within workspaces

🧹 IMPROVEMENTS​

Risk insights on assets​

Quickly assess asset risks with the updated Risk Insights section, displaying total counts of high and critical findings and vulnerabilities. Click any section to drill down into particular findings to fix.

Asset page with risk insights

πŸ› BUG FIXES AND UPDATES​

  • Fix asset technology fields on VMware and OCI assets.
  • Add OCI to the list of technology values available for workspace creation.
  • Fix incorrect CVSS scores displayed in CVE page score boxes.
  • Ensure that positive risk factors display in green.
  • Display the save button on the security model settings tab even if the advanced settings aren't selected.
  • Update the workspaces selection filtering to move "Kind" under infrastructure.
  • Fix failures generating some exports.
  • Support certificate-based authentication for the Microsoft Defender integration.
  • Add the version number to the PCI DSS compliance framework to make it more clear which version is included.
  • Fix the application of risk factors on Debian-based systems.
  • Show correct timestamps for export and import integrations.
  • Fix missing asset titles in space and organization search.
  • Improve the display of Ansible-, Bash-, and PowerShell-based remediation steps for advisories.
  • Improve calculation of asset risk scores.
  • Display EPSS data for more CVEs.
  • Fix missing advisory remediation information when using workspaces.

Mondoo 11.38 is out!

Β· 3 min read
Tim Smith
Tim Smith
Mondoo Core Team

πŸ₯³ Mondoo 11.38 is out! This release includes improved workspaces filtering, new resources, and more!​

Get this release: Installation Docs | Package Downloads | Docker Container


πŸŽ‰ NEW FEATURES​

Create workspaces based on asset technology​

Design your perfect workspace without all the clicking! Now Mondoo can dynamically include assets in (or exclude assets from) workspaces based on their general technologies, such as cloud families (AWS, Azure, GCP...) or functions (network, infrastructure as code, operating systems...). This lets you target assets in a general group without selecting each individual platform.

For example, previously to create a workspace made up of all your GCP assets, you individually specified 11 platforms: BigQuery Dataset, Compute Firewall, Compute Image, and so on. Now it's as easy as selecting one technology: GCP!

Workspaces selection using platform

🧹 IMPROVEMENTS​

Quickly jump to integrations from an asset​

Quickly dive into integration configuration directly from scanned assets. A new link in each asset scan overview takes you to the integration that added the asset.

Integration link

Resource updates​

microsoft.application​

Query Microsoft 365 applications by ID or name:

microsoft.application(id: "2efd0330-112c-4971-ab20-eaa54c.....") { * }
microsoft.application(name: "nametest") { * }

terraform.plan​

  • New applyable field
  • New errored field
  • New variables field using the new terraform.plan.variable resource

πŸ› BUG FIXES AND UPDATES​

  • Include additional information on the query when cnquery or cnspec fails to compile a query.
  • Display policy names in check exceptions.
  • Display correct keyboard navigation tips in the workspaces asset selection filter menus.
  • Improve rendering of the workspace asset selection process.
  • Allow organization and space IDs to start with a number and be up to 50 characters long.
  • Update the "Ensure that 'Java version' is currently supported" check in the CIS Azure Foundations policy to support LTS releases of Java 17 and 11.
  • Stop the CIS GitLab Level 2 policy from applying to non-GitLab assets.
  • Improve error messages when data export integrations fail.
  • Ensure gcp.project.cloudRun.services fetches data from all available regions.
  • Fix failures fetching the traffic field in the gcp.project.cloudRun.services resource.
  • Improve the reliability of the CIS Azure Foundations policy's "Ensure IAM policies that allow full ":" administrative privileges are not attached" check.
  • Improve rendering of remediation steps in the Mondoo AWS Security policy.
  • Allow excluding users from the Mondoo Linux Security policy's "Ensure SSH Idle Timeout Interval is configured" check using a property.

Mondoo 11.37 is out!

Β· 3 min read
Tim Smith
Tim Smith
Mondoo Core Team

πŸ₯³ Mondoo 11.37 is out! This release includes workspace creation from tags/labels and Mondoo annotations, plus a whole lot more!​

Get this release: Installation Docs | Package Downloads | Docker Container


πŸŽ‰ NEW FEATURES​

Create workspaces from labels/tags and annotations​

Create the perfect workspace for exploring assets in your infrastructure with new filtering capabilities. Now you can create a workspace that includes or excludes all assets that match certain labels or tags, such as environment:production, or Mondoo annotations you set, such as priority:high.

Create a workspace of production cloud assets:

Workspaces selection using cloud tags

Create a workspace of assets you've annotated as high priority:

Workspaces selection using Mondoo annotations

🧹 IMPROVEMENTS​

Quickly find integrations​

Find the right integration with less scrolling. The Add Integration page now supports search based on integration categories in addition to integration names.

Integration filtering with a category

Improved asset overview information​

Dive into asset configuration with new first and last scan time data. Plus, now you can easily copy asset information: When you hover over any value, you see the option to copy the data to your clipboard.

Asset overview

Resource updates​

aws.iam.instanceProfile​

  • Deprecate createDate in favor of a new createdAt field

aws.iam.policy​

  • Deprecate createDate in favor of a new createdAt field

aws.iam.policyversion​

  • Deprecate createDate in favor of a new createdAt field

aws.iam.role​

  • Deprecate createDate in favor of a new createdAt field

aws.iam.user​

  • Deprecate createDate in favor of a new createdAt field

aws.iam.usercredentialreportentry​

  • Deprecate createDate in favor of a new createdAt field

gcp.project.storageservice.bucket​

  • New encryption field

macos.alf​

  • Support macOS Sequoia (15) assets

πŸ› BUG FIXES AND UPDATES​

  • Categorize Nmap assets as "Domains and Hosts" on the Assets page.
  • Fix an invalid reporting job error when running certain policies.
  • Fix display of score boxes on CVE and Advisory pages.
  • Show assets link on AWS integrations.
  • Allow creating workspaces with the asset kind value of "Virtual Machine".
  • Improve reliability of some CIS/BSI Windows policy checks on non-English systems.
  • Improve fetching available AWS regions.
  • Expand CVE and advisory detection on Windows 2025 hosts.
  • Fix user check failures on Windows when a domain user has not locally logged in.
  • Fix the risk rating order in the check overview tile on asset pages.
  • Update the EOL date for Amazon Linux 2023 to the extended June 30th, 2029 date.
  • Rework multiple checks in the CIS Azure Foundations policy to improve reliability and readability of output.
  • Fix incorrect form validation when setting up the Microsoft Defender for Cloud integration.
  • Improve links to documentation on integration pages.

Mondoo 11.36 is out!

Β· 6 min read
Tim Smith
Tim Smith
Mondoo Core Team

πŸ₯³ Mondoo 11.36 is out! This release includes ad hoc risk prioritization with workspaces!​

Get this release: Installation Docs | Package Downloads | Docker Container


πŸŽ‰ NEW FEATURES​

Zero in on exactly the assets you need with workspaces​

Do you find yourself repeatedly searching for the same groups of assets? Do you wish you could see a subgroup of assets in your space to compare them or measure progress on a certain project? Or maybe some assets just get in the way of what you want to focus on right now? What you need are workspaces!

Lists of workspaces

Workspaces are dynamic groups of assets in a space that you want to view and assess together. Unlike spaces, assets in a workspace are included based on queries. Best of all, an asset can be in as many workspaces as you want. Create a workspace that shows only assets with critical findings, another workspace that has all your Windows 2016 systems that still need to be upgraded, and another that includes all the systems owned by the front end team... whatever meets your specific business needs.

How might you use workspaces to solve problems?

Like many companies, Lunalectric has thousands of assets, but recently their CISO has been increasingly focused on their supply chain. To ensure GitHub and GitLab source code and CI/CD configuration meet best practices, let's create a workspace just for these SCM assets.

Creating a workspaces filter

We create a single asset selection that includes the GitHub and GitLab platforms. Asset selections can match on asset name, kind, platform, platform version, and risk rating with more options coming soon. We can even add as many additional conditions to the selection as we want to create complex queries like Windows systems with a critical risk rating that aren't Windows 2022 and have the word "luna" in the asset name.

Once our workspace is created, we can find it by selecting Workspaces in the left navigation menu or choosing it from the new workspaces top navigation drop-down menu.

Workspaces in the top navigation

Once in our new SCM Assets workspace, the layout feels similar to the existing Lunalectric spaces, only more focused on understanding risks and exploring assets. Our workspaces dashboard shows just our GitLab and GitHub assets, including the top misconfigurations we should start tackling. We can dive into policies, checks, CVES, or advisories to see more details... all the while remaining tightly focused on the task at hand.

Workspace dashboard

Even without diving deeper, the workspace dashboard's inventory overview is telling quite a story. GitLab assets are all passing checks, but GitHub assets, on the other hand, are all high risk.

GitHub assets

Armed with this quick insight, we have the information we need to let our CISO know about the current SCM risk and develop a remediation plan to secure these critical assets.

To learn how you can use workspaces to better organize assets and expose risks, read Plan Your Mondoo Organization and Workspaces in the Mondoo documentation.

Quick access to reports​

Quickly access compliance reports by selecting Reporting in the left navigation menu. Looking for more reports? Stay tuned for more updates in upcoming releases. If you're looking for something in particular, let us know at product@mondoo.com!

Quick access to reports

🧹 IMPROVEMENTS​

Optionally follow HTTP -> HTTPS redirects​

You now have additional control over how Mondoo scans HTTP hosts in the host provider. By default cnquery and cnspec no longer follow redirects from HTTP to HTTPS endpoints, so you can now inspect your HTTP configurations when you choose. If you prefer to follow redirects, use the new --follow-redirects flag.

Without the redirect you can inspect the original page and headers:

$ cnquery shell host http://mondoo.com

cnquery> http.get
http.get: http.get url=url id = http://mondoo.com statusCode=301
cnquery> http.get.body
http.get.body: ""

With redirects specified, you can follow all redirects to the final page users would see:

$ cnquery shell host --follow-redirects http://mondoo.com

cnquery> http.get
http.get: http.get url=url id = http://mondoo.com statusCode=200
cnquery> http.get.body
http.get.body: "<!DOCTYPE html><!-- Last Published: Fri Jan 10 2025 00:09:49 GMT+0000 (Coordinated Universal Time) --><html..."

Resource updates​

azure.subscriptions.defenderForContainers​

  • Expose Extensions values

azure.subscription.policy.assignment​

  • New parameters field

fstab​

  • Update options field to an array of options instead of a single string

k8s.node​

  • New kubeletPort field
  • New nodeInfo field
  • New created field

microsoft.applications​

  • Fetch all applications in large installations

Improved CIS benchmarks​

Sometimes the best changes are behind the scenes. This week we shipped all-new internal tooling to generate CIS benchmark policies in Mondoo Platform. These changes not only let us to bring you the latest and greatest policies more quickly in the futureβ€”they also enabled us to make a huge number of small improvements to existing policies:

  • New checks that were previously marked as requiring manual user validation
  • More clear and concise descriptions for each policy
  • Expanded check descriptions, including rationale behind the security concerns
  • New audit and remediation steps in many Linux distribution policies
  • Simplified MQL queries to improve readability
  • Additional platform version tags to improve searching for policies
  • Improved policy search results when searching for platform versions

πŸ› BUG FIXES AND UPDATES​

  • Display CVEs for Fedora 41 assets.
  • Fix a failure querying Microsoft 365 applications.
  • Correct the remediation steps in the BSI 'Ensure SSH Idle Timeout Interval is configured' check.
  • Add EOL dates for FreeBSD 14.2 and Alpine Linux 3.21.
  • Correct the EOL date for FreeBSD 14.1.
  • Update the Amazon Linux 2 EOL date, which has been extended to June 30, 2026.
  • Support EBS volume scanning of instances with LVM partitions.
  • Improve remediation step formatting in Mondoo VMware policies.
  • Open check remediation links in a new window or tab.
  • Fix an unknown-score-type error when comparing semver data in checks.
  • Fix display of GitHub provider help.
  • Don't reinstall some providers on each scan.
  • Fix errors using the Cloudflare provider.
  • Show the link to discovered assets on each integration page.
  • Add detection of the upcoming M4 MacBook Air/Pro models to asset overview information.
  • Add form validation to the Microsoft Defender for Cloud integration to ensure UIDs are correctly formatted.
  • Display platform icon for Nmap assets in affected asset tables.
  • Update Windows checks for the RestrictSendingNTLMTraffic registry entry to accept both Audit All and Deny All configurations.
  • Add a missing permission to the automated CLI Azure setup.
  • Show the platform in all cnspec scan results. Thanks for suggesting this, @DrackThor!

Mondoo 11.35 is out!

Β· 4 min read
Tim Smith
Tim Smith
Mondoo Core Team
Charles Johnson
Charles Johnson
Mondoo Core Team

πŸ₯³ Mondoo 11.35 is out! This release includes Microsoft Defender for Cloud findings in Mondoo, Nmap scanning, performance improvements, and more!​

Get this release: Installation Docs | Package Downloads | Docker Container


πŸŽ‰ NEW FEATURES​

Microsoft Defender for Cloud findings in Mondoo​

Mondoo now imports vulnerabilities discovered by Microsoft Defender for Cloud, so you can prioritize them alongside vulnerabilities discovered by Mondoo. Mondoo helps security teams quickly make sense of security findings regardless of where those findings originate, prioritize the most critical risks, and easily assign them to IT and DevOps with detailed remediation steps. This means that Mondoo significantly speeds up time to resolution and bolsters overall security posture.

Vulnerabilities discovered by Microsoft Defender for Cloud appear in the Mondoo console alongside those discovered by Mondoo’s own scans. Mondoo automatically enriches all vulnerabilities found by Microsoft Defender with additional risk data and remediation advice, and prioritizes them based on the actual risk posed in the environment.

Mondoo enriches the findings generated by Microsoft Defender for Cloud with severity, known exploit data, exploit prediction scoring, asset exposure, and business impact, to make sure your security teams are focused on resolving the most important problems.

Network security with Nmap scanning​

Nmap, short for Network Mapper, is a powerful and versatile open source tool used for network discovery and security auditing. Network administrators, security professionals, and penetration testers rely on Nmap to map out network structures, discover hosts, identify services, and detect vulnerabilities. Now you can integrate Nmap results with Mondoo findings using our new cnquery/cnspec Nmap provider.

Scan active IP address in a network:

nmap.network("192.168.178.0/24").hosts { name ports { * }  }
nmap.network.hosts: [
0: {
ports: [
0: {
service: "http"
version: ""
method: "probed"
state: "open"
protocol: "tcp"
port: 443
product: "FRITZ!Box http config"
}
1: {
service: "sip"
version: ""
method: "probed"
state: "open"
protocol: "tcp"
port: 5060
product: "AVM FRITZ!OS SIP"
}
]
name: "192.168.178.1"
}
1: {
ports: [
0: {
service: "rtsp"
version: "770.8.1"
method: "probed"
state: "open"
protocol: "tcp"
port: 5000
product: "AirTunes rtspd"
}
1: {
service: "rtsp"
version: "770.8.1"
method: "probed"
state: "open"
protocol: "tcp"
port: 7000
product: "AirTunes rtspd"
}
]
name: "192.168.178.25"
}
]

Scan a specific host IP:

nmap.network(target: "192.168.178.25").hosts { ports }
nmap.network.hosts: [
0: {
ports: [
0: nmap.port port=5000 service="rtsp"
1: nmap.port port=7000 service="rtsp"
]
}
]

🧹 IMPROVEMENTS​

Performance improvements​

No one wants to wait so we made Mondoo faster than ever.

  • 4x faster compliance report generation
  • 7x faster asset discovery during large scans
  • 20x faster GitHub repository discovery in large organizations
  • Reduced GitHub API call usage during organization scans

New checks in Mondoo DNS Security​

The Mondoo DNS Security policy now includes full descriptions and impact scores for each check. There are also new checks to ensure DNSSEC is enabled and no DNS wildcard entries exist.

Display remediated asset count on CVEs​

It's important to observe not just the current state of CVEs, but also the work you've done to resolve them. Remediated counts on CVE and advisory pages provide the full scope of information.

Remediated Assets

Expanded Terraform Provider Mondoo resources​

You can automate more of your Mondoo Platform configuration than ever with new resources in the Terraform Provider Mondoo. Thanks for these great contributions @mati007thm!

  • New mondoo_exception resource
  • New mondoo_integration_email resource
  • New mondoo_integration_gitlab resource
  • New mondoo_integration_jira resource
  • New mondoo_integration_msdefender resource
  • New mondoo_integration_zendesk resource

Resource updates​

aws.cloudfront.function​

  • Deprecate createdTime in favor of a new createdAt field

aws.dynamodb.table​

  • Deprecate createdTime in favor of a new createdAt field

aws.elb.loadbalancer​

  • Deprecate createdTime in favor of a new createdAt field

aws.rds.dbcluster​

  • Deprecate createdTime in favor of a new createdAt field

aws.rds.dbinstance​

  • Deprecate createdTime in favor of a new createdAt field

aws.s3.bucket​

  • Deprecate createdTime in favor of a new createdAt field

github.organization​

  • New totalPublicRepos field

πŸ› BUG FIXES AND UPDATES​

  • Fix affected assets lists not containing assets scanned by older custom policies.
  • Fix failures in the files.find resource with container image scans.
  • Improve display of VMware assets in the inventory overview.
  • Simplify the asset print view headers.
  • Rename "Sources" to "Learn More" on CVEs to better describe the purpose of the links.
  • Fix policy check metrics when exceptions are set.
  • Fix search for low security CVEs returning zero results in the vulnerability database.
  • Update CIS NTLM checks to also accept the "Deny All" setting.
  • Adjust scores in Windows policies to improve prioritization.
  • Ensure Kubernetes assets always contain asset overview information.

Mondoo 11.34 is out!

Β· 2 min read
Tim Smith
Tim Smith
Mondoo Core Team

πŸ₯³ Mondoo 11.34 is out! This release includes updated CIS macOS Sequoia benchmarks and more!​

Get this release: Installation Docs | Package Downloads | Docker Container


🧹 IMPROVEMENTS​

CIS macOS Sequoia benchmark 1.0​

Secure Apple's latest macOS release with an updated CIS benchmark. This policy has several new recommendations and improved queries compared to the preview release.

πŸ› BUG FIXES AND UPDATES​

  • Improve display of affected assets in the vulnerabilities overview page.
  • Improve default values displayed for Cloudflare R2 buckets.
  • Handle nil login values in the microsoft.user.auditlog resource.
  • Add more detailed command line help for the GitLab provider.
  • Fix failures with JSON exports if a duplicate key exists.
  • Fix failures in the Mondoo Linux Security Policy's auditd checks when scanning Ubuntu or Debian systems.
  • Fix failures running CIS VMware policy vulnerabilities checks.
  • Fix some checks showing as passed when they have failed.
  • Fix Kubernetes services displaying in multiple inventory page asset groups.
  • Improve the output and reliability of CIS macOS benchmarks.
  • Add descriptions, impacts, and remediation steps to each check in the Mondoo TLS Security policy.
  • Add an icon for ticket systems on the add integrations page.
  • Fix display of the last successful integration time.

Mondoo 11.33 is out!

Β· 2 min read
Tim Smith
Tim Smith
Mondoo Core Team

πŸ₯³ Mondoo 11.33 is out! This release includes Cloudflare asset inventory, expanded Entra ID inspection, and more!​

Get this release: Installation Docs | Package Downloads | Docker Container


πŸŽ‰ NEW FEATURES​

Explore Cloudflare services​

Dive deep into your Cloudflare infrastructure with a new Cloudflare provider for cnquery/cnspec. Use this provider to gather information on key Cloudflare services:

  • Accounts
  • Zones
  • DNS records
  • R2
  • Zero Trust apps
  • Streams
  • Videos
  • Workers
  • Pages

This example queries DNS zones:

cnquery run cloudflare -c "cloudflare.zones[1] { name dns { * } }"
cloudflare.zones[1]: {
name: "lunalectric.com"
dns: {
records: [
0: cloudflare.dns.record type="A" content="164.90.210.141" name="api.lunalectric.com"
1: cloudflare.dns.record type="A" content="142.93.110.9" name="console.lunalectric.com"
3: cloudflare.dns.record type="CNAME" content="console.lunalectric.com-pages.pages.dev" name="prod.lunalectric.com"
7: cloudflare.dns.record type="MX" content="mail.protonmail.com" name="lunalectric.com"
9: cloudflare.dns.record type="TXT" content="v=DMARC1; p=none; rua=mailto:e60948910ee34fe61be5a6bf2c3fb@dmarc-reports.cloudflare.net,mailto:dmark@lunalectric.com" name="_dmarc.lunalectric.com"
11: cloudflare.dns.record type="AAAA" content="100::" name="meet.lunalectric.com"
]
}
}

🧹 IMPROVEMENTS​

Resource updates​

aws.ecr.image​

  • New lastRecordedPullTime field
  • New pushedAt field
  • New sizeInBytes field

microsoft.user​

  • New creationType field
  • New identities field using the new microsoft.user.identity resource
  • New auditlog field using the new microsoft.user.auditlog resource

πŸ› BUG FIXES AND UPDATES​

  • Improve default output of the github.repository.adminCollaborators resource.
  • Improve default output of the github.organization.packages resource.
  • Fix macOS process resource executable values to align with the output from Linux systems.
  • Add the EOL date for Fedora 41 and update dates for 40 and 39 to match the latest published information from the Fedora Project.
  • Improve cleanup of inactive assets in large organizations.
  • Fix missing compliance check mappings for some frameworks.
  • Add the missing query Ensure permissions on /etc/group.old are configured to the CIS SUSE Linux Enterprise 11 Benchmark policy.
  • Improve the reliability of aggregate score generation on dashboards.
  • Add two checks to the CIS VMware ESXi 6.7 and 7.0 Benchmark policies:
    • Ensure port-level configuration overrides are disabled
    • Ensure Virtual Distributed Switch NetFlow traffic is sent to an authorized collector
  • Add an asset group for Kubernetes Namespace assets.

Mondoo 11.32 is out!

Β· 2 min read
Tim Smith
Tim Smith
Mondoo Core Team

πŸ₯³ Mondoo 11.32 is out! This release includes single-command Azure integration, expanded risk factor support, Windows LTSC/LTSB support, and more!​

Get this release: Installation Docs | Package Downloads | Docker Container


πŸŽ‰ NEW FEATURES​

Single-command Azure integration​

Integrate Mondoo and Azure with just a single command. No more worrying about setting up apps, configuring service principals, or generating certificates. Tell Mondoo what you'd like to scan in your Azure subscription and paste the command in CloudShell. Then kick back, relax, and let Mondoo do the heavy lifting.

Automated Azure integration setup

Detect EOL dates for Windows LTSC and LTSB releases​

Mondoo EOL detection support for Windows now includes the Microsoft Long Term Servicing Channel (LTSC) and Long Term Servicing Branch (LTSB) releases. No matter what release of Windows you use, Mondoo detects upcoming EOL dates.

🧹 IMPROVEMENTS​

Badges for new policies​

Too many cooks in the kitchen? Understand when you or your coworkers enable new policies in a space with a "New" badge on any policy enabled in the last 7 days.

New policy badge

Show risk factors on asset checks​

Understand risks that elevate security concerns on your assets with risk factors on asset checks tables.

Risk factor on asset check

πŸ› BUG FIXES AND UPDATES​

  • Improve cloud snapshot scanning to support devices with multiple block devices.
  • Improve performance of Windows SMBIOS discovery.
  • Fix Windows platform detection in local scans.
  • Improve performance of cloud detection on *nix systems. Thanks tomtrix!
  • Don't display assets without vulnerabilities on the vulnerability dashboard.
  • Display the platform for each asset in affected asset tables.
  • Update VMware EOL dates to use the new extended dates.
  • Fix an issue that prevented data exports of some checks.
  • Fix TLS checks in the CIS Azure Foundations benchmark policy to match additional variations of TLS 1.2 and 1.3.
  • Add Ensure error logging is enabled and set to the info logging level check to the CIS NGINX benchmark policy.
  • Fix failures in the Ensure discretionary access control permission modification events are collected check in Linux CIS benchmarks.
  • Improve usage of properties in the CIS NGINX benchmark policy.
  • Improve reliability of last successful scan time on integrations.
  • Add tool tips to asset counts on the spaces page.
  • Add tool tips to the exceptions counts on compliance pages.

Mondoo 11.31 is out!

Β· 4 min read
Tim Smith
Tim Smith
Mondoo Core Team

πŸ₯³ Mondoo 11.31 is out! This release includes asset inventory exploration, NGINX security, expanded risk detection, and more!​

Get this release: Installation Docs | Package Downloads | Docker Container


πŸŽ‰ NEW FEATURES​

Explore query packs results space-wide​

Understand the configuration of systems throughout your spaces with query packs. Query pack pages now expose results returned for each asset. Use Mondoo's two dozen out-of-the-box query packs to expose important configuration data such as running processes or available memory. If those query packs don't include quite what you need, write your own query packs to expose business-specific asset configuration data throughout your spaces.

Space-wide asset queries

New CIS NGINX benchmark policies​

Keep critical web servers, proxy servers, and load balancers secure with new CIS NGINX benchmarks. These six policies include 91 checks in total designed to ensure that NGINX is not only installed securely but configured to protect sensitive data from prying eyes.

NGINX policy page

Run Mondoo in Azure Cloud Shell​

Secure your Azure subscriptions without complex Azure credential configuration. Now Mondoo can install and run directly in Azure Cloud Shell: Simply paste the Workstation Quick Setup command in Azure Cloud Shell.

Azure CloudShell Installation

🧹 IMPROVEMENTS​

Priority findings on the spaces page​

Quickly understand the spaces that need your attention the most with a count of priority findings shown on the spaces page. The number of priority findings is the total of all critical and high findings on the space. Mondoo highlights them to help you to better prioritize your effort.

Spaces page tiles

Faster load times in compliance​

Track your compliance quicker than ever, with up to 10x faster load times in the Compliance Frameworks page.

Additional risk factors for FTP servers​

Prioritize the risks that matter the most with new risk factors for assets running vsftp, Pure-FTPd, and ProFTPD FTP servers.

New risk factors in Security Model configuration

Updated CIS Debian 11 Benchmark policy 2.0.0​

With 665 updates including new and improved checks, descriptions, and remediation steps, this updated policy keeps your Debian 11 systems secure against the latest threats.

Resource updates​

gitlab.project​

  • New emptyRepo field
  • New groupRunnersEnabled field
  • New jobsEnabled field
  • New sharedRunnersEnabled field

gitlab.project.approvalsetting​

  • New selectiveCodeOwnerRemovals field

gitlab.project.member​

  • New state field
  • New username field

πŸ› BUG FIXES AND UPDATES​

  • Improve the rendering of descriptions and remediation steps in the Mondoo Linux Security policy.
  • Move all service checks in the Mondoo Linux Security policy into a Sensitive Services chapter.
  • Expand the Mondoo Linux Security policy Ensure FTP servers are stopped and not enabled check to include Pure-FTPd and ProFTPD.
  • Expand the Mondoo Linux Security policy's Ensure IMAP and POP3 servers are stopped and not enabled check to include the Cyrus IMAP server.
  • Expand the Mondoo Linux Security policy's Ensure DNS server is stopped and not enabled, Ensure NIS server is stopped and not enabled, and Ensure talk server is stopped and not enabled checks to support Debian- and Ubuntu-based systems.
  • Add remediation steps for SLES/openSUSE to the Mondoo Linux Security policy.
  • Fix the Mondoo Linux Security policy's Ensure SSH Protocol is set to 2 check incorrectly running on Ubuntu 24.04 systems.
  • Fix the Mondoo Linux Security policy's Ensure mail transfer agent is configured for local-only mode incorrectly identifying the IPv6 loopback address.
  • Ensure that the remediation steps in the Mondoo Linux Security policy include service restarts where necessary.
  • Fix failing compliance reports in some spaces.
  • Fix some AWS and Azure platforms not displaying correctly in the inventory overview.
  • Fix the link to the CloudFormation template during AWS Serverless integration setup with non-us-east-1 regions.
  • Add support for searching for software, compliance frameworks, and compliance controls in a space.