What's New

This section outlines the new features and enhancements that are available in this release.
uim203
UIM_new_features
UIM 20.3.3 (March 2021)
This section outlines the new features and enhancements that are available in UIM 20.3.3.
  • Metrics Palette Enhancements
  • Removing CABI Dependency (Native Operator Console)
  • Availability of Report Scheduler
  • Packages Signed with GPG-Enabled Keys
  • Secure Transmission of Certificates
  • Ability to Change the Password
  • Alarm Console Enhancements
  • Asynchronous Distribution of Probes
  • Creating New Custom Dashboard Views
  • Data Maintenance Stored Procedures Enhancement
  • discovery_server Enhancement
  • Group Management Enhancements
  • Group View and Alarm View Optimization
  • Improved Implementation of the Alarm Policy and MCS ACL Permissions
  • Monitoring Configuration Service (MCS) Enhancements
  • Persist Maintenance Schedules in the nas Probe
  • Deprecating the ace Probe
  • Platform Support
For more information, see the UIM 20.3.3 article.
OC 20.3. 2 Patch (December 2020)
This section outlines the enhancements that are available in the OC 20.3.2 patch:
  • Enhanced Group Management
  • Enhanced Monitoring Configuration Service (MCS) UI
  • Enhanced Session Management
  • View List of Maintenance Schedules for Devices
For more information, see the OC 20.3.2 Patch article.
UIM 20.3.1 (November 2020)
This section outlines the new features and enhancements that are available in the UIM 20.3.1 patch.
  • Service Level Management
  • SLA Reports
  • Access Admin Console in OC
  • Alarm Policy Enhancement
  • Copy MCS Profiles
  • Delete a Device Using OC
  • Deprecated Portlets
  • Enable Read-Only Access to MCS Profiles
  • Enhanced Telemetry for PLA Model
  • Manage Discrepancies Between Expected and Existing MCS Configurations
  • UIM Perl SDK Supports TLS 1.2
For more information about the new features, enhancements, resolved issues, and known issues, see the UIM 20.3.1 article.
UIM 20.3.0 (September 2020)
This section outlines the new features and enhancements that are available in the UIM 20.3.0 release.
Zero Flash UIM
UIM 20.3.0 has removed the dependency on Adobe® Flash® Player. This release now provides an enhanced web-based user interface for both Operator and Administrator personas.
The enhanced user interface provides ease of use for both operators and administrators, like providing modern context-aware observability engagement layer for infrastructure management.
With the removal of Adobe Flash, the Unified management portal (UMP) that contained flash-based portlets has been deprecated. The Operator Console (OC) and Admin Console interfaces are now web-based.
Operator Console Enhancements
With UIM 20.3.0, the enhanced Operator Console supports most of the UMP functionality to meet the needs of the Operator and Administrator personas for infrastructure management.
Highlights of the newly added and enhanced features in the OC are as follows:
  • View, manage, and act on alarms using the alarm console.
  • Use the enhanced inventory management in the context of groups and devices, along with maintenance scheduling.
  • View and compare performance metrics using the enhanced metric viewer.
  • Use the integrated discovery wizard for quick onboarding of computers and devices.
  • Use the setup wizard for the agent monitoring configuration.
  • Use the multiple viewing and contextual navigation options for groups and devices.
  • Use the context-aware maintenance scheduling to temporarily suppress the alarms during the maintenance windows.
  • Continue managing accounts, users, and access control lists (ACLs) for tenancy needs.
For more information, see Operator Console.
CABI Integration in UIM 20.3.0
In UIM 20.3.0, bundled CABI supports the JasperSoft Server version 7.5, offering wider platform coverage and performance improvements. Bundled CABI supports fresh installation and upgrades. Upgrades are supported from the CABI version 3.4 (or later) based on the JasperSoft Server upgrade paths. JasperSoft Server 7.5 supports direct upgrades from JasperSoft Server 6.4.3 onwards.
cabi_external continues to support
Unified CABI with JasperSoft Server 7.1.1 integration
, which is the same as in UIM 20.1.0.
For-Each Functionality
The For-Each functionality supports the bulk deployment of the profiles at a group level. Using the For-Each feature, you can now create profiles for all the devices at the group level.
For more information, see For-Each.
Auditing in UIM Interfaces
You can now monitor the administrative activities that are performed in UIM through the Operator Console or related APIs. These activities include creating, updating, or deleting device groups and policies. The information that is related to these activities (for example, actions performed, date, time, and change details) is captured for the auditing purposes.
For more information, see Auditing in UIM Interfaces.
Custom Dashboard Enhancements
The dashboard designer includes the following enhancements:
  • Allow users to select targets in the list views.
  • View the dashboard entry.
  • Use the
    Edit Column
    option to modify the record information.
  • Export the table and list grids in the CSV format.
    For more information, see Add a Dashboard Widget.
  • The following unused legacy ACL permissions are removed from the dashboard designer:
    • Dashboard Design
    • Dashboard Download
    • Dashboard Publish
    • Dashboard Upload
    For more information, see ACL Permissions List.
White Labeling in Operator Console
This release provides a new login screen in the Operator Console along with the white labeling functionality. This functionality lets you customize the Operator Console screens, including the login pages. UIM allows user-specific branding and logo on the Operator Console. The customization includes updating the product title, product logo, and footer text for all the UI screens of the Operator Console. You can also add organization-specific text and hyperlinks on the login screen.
For more information, see White Labeling in Operator Console.
UIM API Enhancements
UIM 20.3.0 comes with an enriched UIM API catalog. The enhancements are included in the following APIs:
  • Alarm policy APIs
  • Import or export profile APIs
  • Bulk profile import or export APIs
  • Maintenance mode APIs
These APIs provide more capabilities to perform multiple operations; for example, alarm policy-related operations and import (or export) profiles. The information in the error messages is also updated to provide more comprehensive content. Additionally, the changes that are related to request, response, parameters, and content types are available in a user-friendly Swagger documentation.
For more information, see UIM APIs in the probes documentation.
Export and Import Alarm Policies
With UIM 20.3.0, you can export and import the alarm policies using the enhanced policy management API.
For more information, see Export/Import Alarm Policies.
Bulk Profile Import
In this release, the bulk profile import supports import of one or more profiles from multiple groups to multiple groups.
For more information, see Bulk Profile import functionality.
Alarm Policy Management in High Availability (HA) Mode
UIM 20.3.0 provides the alarm policy management in the High Availability (HA) mode. This functionality lets you configure the policy_management_ws probe to process the policies on only one node when the probe is deployed on multiple wasp nodes. If the policy-processing wasp node goes down, another node starts processing the policies automatically. This configuration can also be done manually.
New APIs Added in Monitoring Configuration Service (MCS)
UIM 20.3.0 adds new REST APIs in Monitoring Configuration Service (MCS). These APIs provide more capabilities to the users for performing operations at the device and group levels.
For more information, see Rest API in the probes documentation.
Addressing the ACL Permission Vulnerability
This release of UIM addresses the ACL permission-related vulnerability for the UIM/robot installation path. In previous releases, the UIM/robot installation path was inheriting the ACLs from its parent folder. If the parent folder had weak ACLs, it was making the installation vulnerable to attacks. Now, with an enhanced security mechanism, this vulnerability is no longer applicable.
To resolve this issue, the robot.cfg file includes the following configuration parameters:
  • reset_folder_acls: This parameter resets the folder ACLs. If the value is set to yes, the controller resets the ACLs of the Nimsoft installation folder (including its subfolders and files) during the startup. After the completion of this operation, the value of the parameter changes to no. The default value is yes. If you do not provide any value, the value is considered as yes.
  • copy_acls_from_programfiles: This parameter lets you specify whether you want to copy the same ACLs that are applied to the system folder: Program Files (x86) or Program Files. If the value is set to yes, the controller takes the ACLs from the Program Files (x86) or Program Files folder. If the value is no, then a standard set of ACLs (with write access only to Administrators and SYSTEM) are applied, irrespective of whether it is a standard install path or a non-standard path. The Administrators and SYSTEM group will have full control. The Users group will have read and execute access. The default value is yes.
The standard path examples are Program Files (x86) and Program Files. The non-standard path examples are C:\ and C:\My Path.
Addressing Admin Console and Operator Console Vulnerabilities
This release of UIM addresses vulnerabilities in Admin Console and Operator Console. Outdated UI libraries in Admin Console have been upgraded to fix the vulnerabilities. Many outdated third-party libraries have also been upgraded to fix the Operator Console vulnerabilities. This release also addresses the security vulnerabilities in the Operator Console. Some of the major vulnerabilities that are fixed in this release are as follows:
  • 3.1.2 RED-14-007635-002: Information disclosure through detailed error messages
  • 3.1.3 RED-14-007635-003: Insecure Content Security Policy configuration
  • 3.1.4 RED-14-007635-004: Version information disclosure
Probes and Packages
To review the list of the probes and packages that are installed as part of the 20.3.0 deployment, see Probes and Packages.
Resolved Issues
For a complete list of issues that have been resolved in this release, see Resolved Issues.
Known Issues
To view the list of known issues that are applicable for this release, see Known Issues.
Third-Party Software Agreements
To review the list of third-party software agreements (TPSRs) that are applicable for this release, see Third-Party Software Agreements.
UIM 20.3.0 Installation Considerations
To help you quickly get started with UIM 20.3.0, review the following considerations. The UIM 20.3.0 release supports both fresh and upgrade installations.
  • With fresh installation, it supports only non-secure installation.
  • With upgrade installation, it supports both secure and non-secure installations.
The following are a few supported upgrade scenarios:
  • For upgrade from UIM Server 20.1.0 to UIM Server 20.3.0
    • If 20.1.0 is a non-secure environment, you can upgrade to 20.3.0 secure or non-secure environment.
  • For upgrade from UIM Server 9.2.0 to UIM Server 20.3.0
    • If 9.2.0 is a secure environment, you can upgrade only to 20.3 secure environment.
    • If 9.2.0 is a non-secure environment, you can upgrade to 20.3.0 secure or non-secure environment.
If you do not want to upgrade to the secure version of the packages currently, you can delete them from your archive. This deletion helps you avoid situations where you inadvertently use the secure version instead of the non-secure one. If you need the secure versions at a later stage, you can recover them from the uimserverpackages.zip file that is downloaded as part of the 20.3.0 package.