Traverse 9.6.1 - 25 October 2021

Traverse 9.6.1 includes new features, enhancements, and bug fixes. See the topics below for details.

New Features

MFA Reset

MFA Reset enables Admins and Superadmins to reset the MFA cache on behalf of a specific user in the event that the MFA source device has been lost.

To perform an MFA reset, navigate to the Superuser> Global config> MFA Settings page> Reset MFA button. Once pressed, the next login will prompt the associated user to perform MFA configuration.

Note: You may not perform an MFA reset for users who are imported from a VSA integration.

Traverse Security

Password Reset on Next Login allows a Superuser or Admin to trigger a mandatory password change for a specific user. This can be accomplished by navigating through Administration> Departments> User Pane and selecting the "User must change password at the next logon" toggle.

Note: As apart of rolling out this feature it is required that all users must update their passwords. We apologize for any unforeseen inconvenience this may cause.

As apart of our continued efforts to make Traverse more secure, we have added more robust password validation with the following complexity requirements:

  • The minimum password length cannot be less than 16 characters.
  • Passwords must contain:
    • Upper case characters (A-Z - Latin alphabet)
    • Lower case characters (a-z - Latin alphabet)
    • Numeric characters (0-9)
    • Non-alphanumeric characters (!, $, #, %, etc.) - must be ASCII printable characters (extended characters are not supported).
Note:  You may not see a screen to change password for users who are imported from a VSA integration.


Mandatory Multi-factor Authentication in SaaS

Moving forward, all Traverse SaaS instances will have mandatory MFA enabled. In addition, Superusers of on-prem installations are also able to enable mandatory MFA by:

  • Navigating to the Superuser> Global config> MFA Settings page. Click the gear icon and enable the "All users are required to have MFA" toggle.

Content: Device Signatures

Added CPU/memory/DISK and mail disk usage tests for FortiMail.

Bug Fixes


The memory size allocation for all Traverse components have been audited and increased to accommodate recent 64-bit changes. 

For more information on Hardware Requirements, please refer to Traverse Minimum Requirements (Cloud) and System Requirements (On Premises) guides. 

Permissions/Security Model

  • Resolved an issue where admins were unable to edit department users.

Security Vulnerability

  • Resolved an issue where the users with Admin read-only permissions could not change their password at the next login.

UI Workflow/Usability

  • Resolved an issue where the device health history did not reflect accurately.
  • Resolved an issue where newly provisioned tests on a DGEx did not poll unless the DGEx components were restarted.


Have more questions?

Contact us

Was this article helpful?
0 out of 0 found this helpful

Provide feedback for the Documentation team!

Browse this section