Skip to main content

Release notes: SessionGuardian Admin Console Server

SG Admin Console Server 2.7.7

January 2026 

Version 2.7.7 is a security-focused patch release that includes critical security fixes and hardening improvements.

Security updates

Security patch release

  • Aggregates security fixes and hardening improvements delivered since 2.7.6

  • Updates security-related dependencies

  • Includes configuration hardening enhancements

  • No functional changes for end users

Upgrade information

Recommended for all 2.7.x environments
  • Safe in-place upgrade from any 2.7.x version

  • No schema changes

  • No breaking API changes

  • No changes required in client configuration or integrations

Upgrade path:
  • Direct upgrade from 2.7.6 to 2.7.7 supported

  • No downtime required for upgrade

SG Admin Console Server 2.7.6

January 2026 

This release adds flexible AWS-based log ingestion options for session event logs.

New features

Log ingestion enhancements

SessionGuardian now supports multiple AWS-based intermediate ingestion destinations for session event logs before they are written to OpenSearch. Choose the ingestion method that best fits your SIEM integration and custom processing requirements.

Supported ingestion destinations:

Destination

Configuration Parameter

Use Case

Amazon SQS 

sge.session-event.sqs-endpoint 

Use an SQS queue as a buffered intermediary for session events

Amazon Kinesis Data Streams 

sge.session-event.kinesis-data-stream-endpoint 

Stream events for near real-time processing, transformation, or enrichment

AWS Lambda 

sge.session-event.lambda-function-name 

Trigger custom Lambda functions for fully customized processing workflows

Amazon Kinesis Firehose 

Existing configuration

Continue using Kinesis Firehose as before

Important notes

Configuration requirements:
  • Configure only one ingestion destination at a time (SQS, Kinesis Data Streams, Lambda, or Firehose)

  • These are intermediate ingestion points that complement the existing Kinesis Firehose destination

  • OpenSearch remains the only supported data warehouse for session events

  • Your pipeline must deliver processed logs into OpenSearch for SessionGuardian to function correctly

Integration considerations:
  • New ingestion options provide flexibility for SIEM integration

  • Custom processing pipelines can now use AWS services that best fit your architecture

  • Existing Kinesis Firehose configurations continue to work without changes

SG Admin Console 2.7.5

November 2025 

This release focuses on security fixes, improved stability, and better log clarity across WebSocket session lifecycle management and agent logout handling.

Security Updates

  • Updated multiple dependencies to their latest stable versions to address security vulnerabilities.

  • All library patches updates are focused on security patches and vulnerability remediation.

Bug Fixes

Agent Logout Command Error

  • Fixed a WebSocket session error that caused excessive error logs in the SG Console.

  • Root cause: Logout commands attempted to send messages to WebSocket sessions that had already closed.

  • Added session state validation to prevent the system from sending logout commands to closed WebSocket sessions.

  • Impact:

    • Eliminates repeated IllegalStateException: The WebSocket session has been closed log errors.

    • No user-facing issues occurred, but unnecessary log noise has been significantly reduced.

    • Improves system monitoring and reduces alert fatigue.

Technical Improvements

  • Enhanced WebSocket session lifecycle management.

  • Improved error handling in agent logout messaging.

  • Cleaner application logs that improve operational visibility.

SG Admin Console 2.7.4

October 30, 2025 

This release improves stability, security, and accuracy across security groups, user management, and system integrations.

Security Group and Cache Management

  • Corrected cache clearing logic that caused EntityNotFoundException errors when the server did not fully clean the query cache.

  • Fixed an issue that removed auto-assigned user geolocation when you updated a user record without making changes.

  • Resolved a display problem where auto-assigned geolocation did not appear when a security group was assigned.

  • Fixed grouping logic during security group updates to prevent errors during user updates.

  • Added validation to prevent duplicate country assignments in security group configurations.

Screen Capture Configuration Fixes

  • The server no longer initializes screen capture components when the sge.escalated-alerts.screen-capture.enabled property is set to false.

  • The server now ignores image data from clients when screen capture is disabled.

  • The image capture option is now hidden in the alerts configuration when the feature is disabled.

User Management and Security Enhancements

Improved messages and behavior
  • Updated the unlock error message to clearly explain when a matching unregistered profile already exists.

  • Added a clear limit message for bulk user resets: you can reset up to 100 users per request.

    Security updates
    • Removed unused API endpoints related to shoulder surfing and configuration images.

    • Restricted access to photo retrieval endpoints for better data protection.

    Validation and consistency
    • Added a maximum limit of 100 users for all bulk user actions

    • Status code now properly returns 404 (instead of other codes) when user is not found in lock/unlock, support mode update, and delete operations.

    General fixes
    • Fixed a Null Pointer Exception (NPE) in audit trail processing during error cases.

    • Removed deprecated conditional OAuth annotations to reduce technical debt.

    AWS SDK Upgrades

    • Updated AWS S3 SDK to version 2.

    • Updated AWS SES SDK to version 2.

    SG Admin Console 2.7.2

    May 14, 2025 

    Enhancement
    • You can now export the user list and related data from the Admin Users page.

    Fix
    • Resolved security issues.

    SG Admin Console 2.7.1

    April 23, 2025 

    Fix
    • Resolved an issue where users were unexpectedly logged out of secure sessions after 10 minutes without error messages.

    SG Admin Console 2.7.0

    April 19, 2025 

    Improvements and fixes
    • Added support for SSO admin logins to the SG Admin Console using any OIDC-compliant identity provider, such as Microsoft Entra ID. Setup requires backend configuration by SecureAuth Support.

      sg_admin_console_login.png
    • Improved overall User Import feature with performance enhancements and bug fixes.

    • Upgraded the log system for better clarity and tracking; renamed Change History to Audit Trail. To learn more, see View and filter Audit Trail logs.

    • During profile photo registration, end users can select their preferred web camera from the list if more than one camera is available.

      sg_photo_registration_002.png

      Face in the screenshot is blurred for privacy reasons.

    • SG Desktop now defaults to the same camera selected during photo registration when users start a session.

    SG Admin Console 2.5.4

    November 27, 2024 

    Improvements 

    • Updated Server side logic to handle cases when the Database is down.

      When the Server experiences a database connection failure and the Client initiates a request to the start endpoint, the system will return a 503 Service Unavailable response with a 'Retry-After: 60' header.

      In cases where connection loss occurs during an active Client session, the system will respond with a 500 Internal Server Error status code.

    All other HTTP status codes remain unchanged:

    • 401 Unauthorized: Returned when user authentication fails (e.g., user account removed or credentials reset)

    • 403 Forbidden: Returned when Client access is restricted (e.g., IP restrictions, resource deletion during active session)

    SG Admin Console 2.5.3

    October 25, 2024 

    Improvements:

    • Changes in code response from Server to Client on registration check: Added more informative message on unsuccessful device registration

    • Performance improvement on Users page

    • Fixed library vulnerability

    Bug fixes:

    • Fixed floating bug on end user connection

    SG Admin Console 2.5.2

    September 12, 2024 

    Improvements:

    • Disable Service Based on IP Range field now accepts CIDR format for IP addresses

    • Security update: Password reset request after 90-day expiration is triggered only after all (username, password, MFA) values are validated.

    SG Admin Console 2.5.1

    August 12, 2024 

    Improvements:

    • Enabling Manage desktop screenshots (evidence) permissions now automatically enables View desktop screenshots (evidence) permission

    Bugs:

    • Error fixed: Service: Amazon S3; Status Code: 403; Error Code: 403 Forbidden

    SG Admin Console 2.5.0

    August 5, 2024 

    New features: 

    • Audit logs (Splunk) - please see Audit Trail documentation provided in Customer-SessionGuardian collaboration site on Sharepoint

    • Screenshot deletion (MVP)

    Improvements:

    • Password Requirements: tracking failed OTP rather than username/password combination only

    • Automated Log Out redirects Console users to login page

    • Customer Penetration Test Result: Critical Issue with snakeyaml

    Bugs:

    • Password related Admin unlock feature fix

    • Incorrect data format on Logs page

    Screenshot deletion (MVP)

    Screenshot Deletion feature allows an Admin user with the permissions to Manage desktop screenshots (evidence) to delete screenshots that are received along with Alerts on violations.

    In order to grant that permission to a Console User, make sure you tick the box for the role that Console user is assigned.

    2394456941.png

    In the scope of Screen capture access feature, we check who has access to view screenshots of the content that was on display during a violation. Those screenshots are included, if configured, in the Alerts.

    Following the same logic, when a console user wants to delete a screenshot, he/she must have the appropriate permission assigned. If so, on the screenshot preview page that user will see a button [Delete] which will trigger the image removal from the system.

    sg_release_notes_001.png

    When a user deletes a screenshot, he/she must confirm the action and then provide a reason (for audit purposes). In the scope of the MVP the action cannot be undone so the system warns the user about that.

    sg_release_notes_002.png
    sg_release_notes_003.png

    Once the image is removed, the user sees a success notification and the following message:

    2394489613.png

    All Screenshot deletion events are logged in Change History.

    sg_release_notes_004.png

    SG Admin Console 2.4.1

    June 19, 2024 

    New features: 

    • Password History Requirements

    • Camera Device Detection (Server side configuration)

    Improvements:

    • Updated and New Environment Variables

    • Screen Capture access through SG Console Permissions

    • Safe IP Range field validation

    • Set up trust relationship between SG and customer staging accounts on AWS

    Bugs:

    • SW Update configuration changes were not logged

    Password Security and History Requirements

    According to the requirements that were shared by a customer team, SessionGuardian team implemented the following features:

    • User Password Refreshed every 90 days;

    • A password history, minimum the last four passwords must be maintained to prevent reuse;

    • After a maximum of six unsuccessful password attempts the User ID shall be locked. The lockout duration shall last at least thirty minutes or less if an administrator enables the User ID again.

    sg_release_notes_009.png
    2394818114.png

    Camera Device Detection

    Camera Device Detection is a separate feature with its own parameters that can and should be configured separately from Mobile Device Detection.

    There are three parameters that affect and determine Camera detection performance:

    • Frequency - period of time during which the system checks for cameras

    • Protection Screen Timeout - delay of lock screen appearance once a camera is detected

    • Match confidence - level of confidence at which we show that a camera device is recognized

    sg_release_notes_011.png

    The same is applicable to User Profile and Security Group configurations:

    sg_release_notes_012.png
    sg_release_notes_013.png

    Screen Capture access through SG Console Permissions

    In case of Violation events, if configured, an alert is sent to a dedicated distribution list.

    Screen Capture feature allows to capture the content of the screen once the violation occurs and include the link to the image stored in thee customer's S3 in the email.

    2394523056.png

    The ability to view the captured contents of the screen depends directly on Permissions, specifically “View desktop screenshot (evidence)”.

    2393965493.png

    When the email is received, there is a link to the image that is stored in S3.

    sg_release_notes_014.png

    When the email recipient clicks the lick, we check whether the user is logged in to SG Console and has the View desktop screenshot (evidence) permission assigned. These two conditions must be met in order to view the image.

    Screen Capture Email Template configuration

    Please note the following steps to ensure a proper clickable link is included in the emails.

    Go to Alerts > find any Violation and a related template > Screen Capture file reference

    1. Copy or cut ‘${scref}’

    2. Delete ‘${scref}’ in template

    3. Select ‘Screen Capture file reference’

    4. Click on the Link icon in the toolbar template

    5. Paste ‘${scref}’

    6. Save Changes

    2394719233.png
    2394424072.png
    2394523062.png
    2394785076.png

    SG Admin Console 2.4.0

    New features: 

    • Additional Events for Webcam Blocking

    Improvements: 

    • SG Console Admin log in time out

    • Face Recognition Key (Mobile) not mandatory

    Webcam Covered Configuration on SG Console

    Webcam Covered Alerts

    Webcam Covered is an event that is triggered in cases when a user intentionally covers his/her webcamera with a hand, with an object, or with a webcamera shutter.

    This event is logged in the system and can also be configured for Alert notifications. In order to set up the email Alerts on Webcam Covered event, Escalated or Delayed ones, please do the following:

    1. Go to Console > Configurations;

    2. Go to Alerts,

    3. Ensure the Notifications toggle is on,

    4. Scroll down the Violations list (Events) to find Webcam Covered

      2394489625.png
      2394489631.png
    5. Per need, update the Subject field, tick the Screen Capture, configure Escalated or Delayed alerts.

    Please note, the email recipient is configured at the very beginning and can only have 1 email address.

    2394915798.png

    Webcam Covered Lock Screen

    If in case of Webcam Covered event you want the user’s screen to lock, you can configure the setting through the Console.

    1. Go to the Console > Configurations

    2. Go to Lock Screen Templates

    3. Locate Webcamera Covered menu item

    4. Ensure the Lock Screen toggle is on. Per need, upload an image and update the message to display when the screen gets locked.

      sg_release_notes_015.png

    Please note, this is a Global Configuration which will apply to all end users of the SG Desktop Service application.

    Improvements:

    • SG Console Admin log in time out

      The Admin Console users will not be automatically logged out only in case of continuous inactivity. If the Admin is active within the configured time period, he/she will not be logged out of the console.

    • Face Recognition Key (Mobile) not mandatory

      It is no longer required to input the Face Recognition Key (Mobile) value

      sg_release_notes_016.png

    SG Admin Console 2.3.1

    April 27, 2024 

    Bug fixes: 

    • Service-Server connection time out

    • Minor UI bugs in SG Console

    Configuration updates: 

    • Face Detection Threshold (from 3 to 2)

    • Validity Token (set to 15 min)

    • Phone Match Confidence (95%, but we recommend 98%)

    • Face Recognition Key configuration is now done in GUI (SG Console Configurations > Global Client)