Skip to content

Release notes

Release notes
  • Version: 6.1.0
  • Build number: 16701
  • Release date: 2025-03-19 (general availability)
  • Server version: nanitor-6.1.0.13405-16701-master
  • Agent version: nanitor-6.1.0.13405-16701-master
  • Collector version: nanitor-6.1.0.13405-16701-master

Welcome to Nanitor v6.1.0!

Nanitor v6.1.0 introduces NHS CyberAlerts support, enhanced asset tracking (including HID devices), improved software inventory with comprehensive OS tracking, and detailed asset check‑in information—coupled with key performance, filtering, and UI enhancements across vulnerability management. This release is designed to boost scalability, visibility, and security, ensuring that large environments can efficiently manage assets, vulnerabilities, and security alerts.

For organizations, Managed Security Service Providers (MSSPs), and partners supporting UK NHS Trusts, this update delivers new ways to track and prioritize vulnerabilities, streamline asset management, and drive operational efficiency. With faster page loads and refined interfaces, your security teams can access critical insights and respond to threats with greater confidence.


Highlights

NHS CyberAlerts Integration

Helping UK NHS Trust organizations and partners comply with NHS security advisories

Nanitor now supports NHS CyberAlerts, allowing organizations and security partners to filter, track, and generate reports on NHS-mandated vulnerability advisories. This simplifies compliance and ensures that teams can quickly assess which vulnerabilities require action based on NHS CyberAlert classifications.

Key benefits:

  • Better compliance support – Easily identify vulnerabilities associated with NHS CyberAlerts.

  • Streamlined reporting – Generate NHS-specific vulnerability reports for compliance tracking.

  • Improved risk prioritization – NHS CyberAlert references are integrated in the vulnerability database and filtering options.

How to use it:

NHS CyberAlerts information is accessible both on Issue list pages and also the Known Vulnerabilities page (under Inventory).

  • Enable the "NHS CyberAlerts" column on the Known Vulnerabilities page. This can be done by clicking "Customize columns" under the Customize view menu and picking the NHS CyberAlerts column.
Known Vulnerabilities - NHS CyberAlerts
Example of the NHS CyberAlerts column (sortable) in Known Vulnerabilities page.

The process is exactly the same on the Issue List page.

  • Both pages have filtering options available under "More", to filter on vulnerability issues with a connection to any NHS CyberAlerts or to a specific one.
Filtering options for NHS CyberAlerts
Vulnerabilities can be filtered on NHS CyberAlerts.
  • More information is shown for a given vulnerability on the Issue Details page, including detailed alert descriptions:
CyberAlerts info in issue detail
Example of the NHS CyberAlerts in vulnerability Issue Detail.

The alerts often contain very useful information about how the vulnerability is being exploited and by whom.


Enhanced Software Inventory OS Tracking

Expanding OS visibility across all monitored assets

Nanitor now adds operating system details to the software inventory for every monitored asset – not just those sourced from the agent. This improvement offers a comprehensive view of operating systems in your environment, aiding vulnerability matching and overall inventory accuracy.

Key benefits:

  • Comprehensive OS data – Track operating systems for all assets, regardless of source.

  • Enhanced vulnerability detection – Better correlation of OS information with vulnerability data.

How to use it:

  • Navigate to the Software Inventory view to see the updated OS details for all monitored assets. Note that this information will be updated on the first checkin for each asset after the upgrade.

  • Filter on "Type" and select "OS".

Software Inventory filtered on OS
Software Inventory now including OS for collector-monitored assets.

Expanded Asset Tracking with Human Interface Device (HID) Support

Improving visibility of employee-assigned peripherals

Nanitor now supports tracking Human Interface Devices (HID) such as monitors, keyboards, etc. This allows organizations to manage a more granular IT asset inventory and directly link peripherals to employees.

Key benefits:

  • Improved asset management – Associate peripheral devices directly with users.

  • Enhanced visibility – Maintain a detailed inventory of hardware across your organization.

  • Streamlined operations – Better manage hardware lifecycle and allocation with clear tracking.

How to use it:

  • Navigate to Assets Inventory, click "+Add new asset" (upper-right corner action), and then click "Add unmonitored asset".

  • Fill in the hostname with something descriptive and select the new "HID" asset type. In the case of a HID asset, the hostname is more of a name than a real hostname, since many HID devices don't have a resolvable hostname or a network connection.

Adding a HID asset
Adding a HID asset.
  • Assign devices to individual employees through asset fields and use for tracking (as an example use case).
Example of HID device assigned to an employee via identity
Example of HID device assigned to an employee via identity

Asset Detail Enhancements

Detailed check‑in information for improved asset monitoring

A new Asset Detail view now provides comprehensive check‑in data. An info icon adjacent to "Last Activity" displays a popup with detailed check‑in information for various types—such as heartbeat, system info, vulnerability scans, and more.

Key benefits:

  • Enhanced visibility – Access detailed check‑in timestamps and summaries for each asset.

  • Faster troubleshooting – Access detailed check‑in data to diagnose issues.

How to use it:

  • Click on an asset to view its details (Asset Details).

  • Hover over the info icon beside "Last Activity" to see comprehensive check‑in information.

Detailed info about timing for different checkin types
Detailed info about timestamps for latest checkins

Improvements

Advanced Filtering Options

New granular filters have been added for OS names, domain roles (for Windows), and additional asset attributes. These options allow for precise asset segmentation and improve searchability within both the asset list and inventory graph.

macOS 15 Firewall Check Compatibility

Firewall check routines have been updated to support macOS 15, ensuring reliable operation with the latest OS requirements.

Graph Visualization Enhancements

The inventory graph now features richer node icons, improved grouping by asset labels, and dynamic re-layout capabilities for enhanced clarity and usability.

UI and Feed Definitions Enhancements

Modal dialogs, tooltips, and layout refinements have been standardized, and feed definitions now display key timestamps in Organization Management → Product Version. Additionally, the Activity Log now captures Jira issue creation events for better traceability.


Bug Fixes and Performance Enhancements

  • Query Optimizations: Improved the performance of software inventory and known vulnerabilities pages through query and index enhancements.

  • Vendor Alias Consistency: Fixed issues with inconsistent vendor alias creation to ensure accurate software inventory mapping.

  • EKS Vulnerability Check-In: Resolved large message size errors during EKS vulnerability check-ins by optimizing payload processing.

  • Bulk Device Archiving: Corrected an issue where archiving multiple devices only archived a single device.

  • NSQ Processing: Addressed NSQ transaction lock errors to prevent prolonged row locks during software processing.

  • Agent Signup OS Matching: Ensured that assets are assigned an operating system immediately upon signup, rather than on first checkin, and improved matching of agent signups to assets that already exist in the system.

  • CSV Export Update: Updated software inventory CSV export to include asset hostnames for enhanced compliance reporting.

  • System API Import Handling: Improved error handling in System API imports to show clearer messages when errors occur.


Thank you for using Nanitor! Your feedback is invaluable as we continue to enhance the platform. For detailed documentation and support, visit the Nanitor User Guide or the Nanitor Knowledgebase.