WatchGuard EDR Enhancements and Resolved Issues

Applies To: WatchGuard EDR

For more information about new features, go to the What's New in WatchGuard Endpoint Security PowerPoint. Friends & Family testing involves a small number of invited partners and helps us to validate a release, collect feedback, and uncover bugs ahead of general availability. To participate in Friends & Family testing, send an email to the Friends & Family mailbox.

Protection and Agent Versions for WatchGuard EDR 4.70.00

  • Windows protection: 8.00.26.0001
  • macOS protection: 3.08.00.0001
  • Linux protection: 3.08.00.0001
  • Android agent and protection: 3.13.6
  • iOS agent and protection: 2.02.03.0006
  • Windows agent: 1.25.02.0000
  • macOS agent: 1.17.01.0000
  • Linux agent: 1.17.00.0000

WatchGuard periodically updates Endpoint Security products and modules to provide enhancements and resolve reported issues. New versions roll out gradually to accounts. Some features and enhancements listed here might not be available to your account. When a new version is available, upgrade notifications appear as alerts in the upper-right corner of the management UI. If an upgrade is available, we recommend that you upgrade to the most recent version. If there is no alert in the management UI and you need to upgrade to the latest version of the product, contact your WatchGuard representative to request an upgrade. For more information, go to the Knowledge Base article: WatchGuard Endpoint Security Upgrade Schedule.

Latest Release

Release Date: 1 April 2026 (Aether 19)

New Features

Signals and Incidents

Incidents are now part of WatchGuard EDR. When the Endpoint Security software detects a potential threat, it converts detected security events to signals. To make threat identification and resolution easier, Endpoint Security automatically combines related signals into dynamic incidents. Endpoint Security incidents group signals that previously generated multiple alerts and are part of the same attack.

  • This release adds two new tiles on the Security dashboard: Incidents that Require Action and Incident Status. To open a filtered list of all incidents detected across the organization, click a tile.
  • For each Endpoint Security incident, you can view the list of signals, the incident graph, and high-level details. You can also review the entities of interest related to the incident.
  • You can add or remove and show, hide, or exclude signals.
  • When you select a signal, you can view a tree that shows the processes that generated it, and the MITRE techniques and tactics used. You can also review the signal details.
  • You can review specific details about the processes that generated signals.
  • This release includes a new list that shows all incidents detected by Endpoint Security across the organization. You can filter the list and generate scheduled reports.
  • The Detections section of Executive Reports now includes information about incidents: Incidents with Actions Required chart, Incident Status chart, and the Last Pending Incidents table.
  • The Incidents list includes two export options: Export and Export List and Details.
  • Malicious URLs detected are categorized as signals in incidents.
  • An alert message shows on the Security dashboard when there are critical incidents that require immediate review.
  • Incidents replace Indicators of Attack (IOAs) in the Endpoint Security management UI. IOA detections are now signals in the context of attacks. We have removed the Indicators of Attack dashboard and list, the IOA settings in My Alerts, IOA information in executive reports, and the recent IOA risk from the management UI. The RDP Attacks Settings and the Advanced IOA toggles remain in the management UI. Incidents in Endpoint Security are not the same as those in ThreatSync. Incidents in Endpoint Security are a group of signals generated from events on the endpoint, as well as Indicators of Attack.

Enhancements

  • In the Workstations and Servers security settings, Advanced Protection settings were split into separate sections to simplify configuration: Zero-Trust Application Service, Anti-exploit, and Network Attack Protection. Existing settings profiles automatically reflect the new organization.
  • We have updated the data retention policy for Endpoint Security products. This policy defines how long Endpoint Security data is retained on the cloud servers and available in the management UI. For more information on the data retention policy, go to this Knowledge Base article: New Data Retention Periods for Endpoint Security Solutions.
  • Patch details now include installation status tiles that show the number of successful installations, download errors, and installation errors. These tiles do not include data from before this release and show data from your network and from the broader WatchGuard community.
  • In a patch installation task, you can now configure required conditions that must be met for a patch to be installed. These conditions can include: time elapsed since the patch was released, minimum number of successful installations, maximum number of failed installations, and minimum number of days elapsed since the first successful installation. Each computer assigned the task must meet these conditions before the patch is installed.
  • This release includes improvements to the update process for Windows endpoints:
  • In Windows Pro editions, Endpoint Security updates no longer apply just before the computers restart, but also when you click Update and Restart or after the countdown in the restart message.
  • To minimize disruption, Endpoint Security checks whether the endpoint meets the requirements to update the protection software before it shows an update or restart message. If the conditions are not met, the update does not start and the relevant status shows in the management UI.
  • This release includes general improvements to protection and detection capabilities.
  • Endpoint Security no longer uses temporary files to identify fileless malware detections. It now generates an incident from real data generated by the processes involved in the detection.
  • By default, the Report Blocking to the Computer User setting is disabled.
  • In a Workstations and Servers settings profile, Advanced Protection settings were renamed to Zero-Trust Application Service.
  • In the Zero-Trust Application Service settings, the Audit operating mode for Windows computers is now renamed to Learning.
  • In Patch Management lists, Pending status was changed to Available status.

Resolved Issues

  • This release resolves an issue that caused unexpected restarts on Linux servers.
  • If you uninstall the WatchGuard Agent with the generic uninstaller and then do not restart the endpoint, custom branding can now be successfully applied.
  • When you restart an endpoint from the management UI, Windows computers no longer restart multiple times.
  • This release resolves an issue in Patch Management tasks where the restart option you configured in the maintenance window was not applied.
  • When Patch Management installs patches on Mac computers, app ownership is now correctly assigned.
  • You can now configure encryption passwords that include the dollar sign ($)for Mac computers.
  • This release resolves an issue that occurred when Patch Management showed new third-party patches for Mac computers.
  • You can now move more than 10,000 computers to an Active Directory group at one time.
  • This release resolves connection issues to knowledge servers.
  • This release resolves an issue that caused the Endpoint Security PSANHost.exe service to crash when the computer recovered from Sleep, Suspension, or Hibernation state.
  • This release resolves an issue that caused the security software to incorrectly handle detection IDs in certain contextual detections.
  • This release resolves an issue that affected security software updates because of the ELAM (Early Launch Anti-Malware) technology.
  • This release improves performance for computers with Advanced Indicators of Attack (IOAs) settings enabled.
  • This release resolves BSOD errors caused by:
  • Network interception drivers on VPN servers
  • NNSPRV.sys network interception driver
  • NNSHTTP.sys driver
  • Firewall errors
  • Device Control configured for removable drives in Block or Allow read access mode (not EDR)
  • This release resolves compatibility issues for dock stations with certain laptop models.

Previous Releases