Secure Endpoint 10.1 release notes
This topic describes the software updates included in Secure Endpoint 10.1. In addition to the specific changes detailed here, each release also includes broader system enhancements designed to strengthen security, optimize performance, and enhance overall stability.
To view the software updates that apply to the Secure Endpoint Agent, see the Secure Endpoint Agent release notes - Version 10.1.
Depending on the Absolute product licenses associated with your account, some of the following features, enhancements, and fixes may not be available to you.
- November updates
- Release 10.1
The following features, enhancements, improvements, and fixes were introduced in the November release of Secure Endpoint 10.1.
Features and enhancements
If your organization manages multiple client or site accounts, you can now simplify access to the Secure Endpoint Console by using a single set of credentials for all Absolute accounts through a pan-tenant login configuration. This setup is particularly useful for Managed Service Providers (MSPs) that support numerous clients, or for enterprises that maintain separate accounts for different business units, regions, or subsidiaries. Learn more
-
When submitting a Run Playbook request, the following playbooks are now available for selection:
-
Run script from file: remotely run a batch (.bat) or PowerShell (.ps1) script that is stored on a server or a file hosting service. The playbook provides an alternative to the existing Run script playbook.
-
Multi-operations: combine actions from the following playbooks into a single Run Playbook request:
-
Run script
-
File operations (add or delete)
-
Set/remove registry keys
-
-
-
When a device is provisioned or deprovisioned, or the Absolute Bootloader is updated, device users can now postpone each required restart for 8 hours (instead of 2). They can also postpone each restart up to 3 times.
Improvements and fixes
| Feature/Area | Details |
|---|---|
| Absolute APIs |
|
| AI Assistant |
|
| Applications |
|
| Application Resilience |
|
| Bulk device actions |
|
| Chromebook support |
|
| Custom Data |
|
| Dashboards |
|
| Device Details |
|
| Device re-enrollment |
|
| Endpoint Data Discovery |
|
| Full-disk encryption |
|
| History > Actions |
|
| History > Action Requests |
|
| History > Events |
|
| Language support |
|
| License management |
|
| Playbooks |
|
| Reports |
When creating a custom report from any device group, all the same filter and column options are now available as in the All Devices page. This update ensures device group reports have access to the full set of fields, making them consistent with standard device reports. |
| Rules |
|
| Settings |
|
| User Management and permissions |
|
The following features, enhancements, improvements, and fixes were introduced in Secure Endpoint 10.1.
Features and enhancements
To limit the impact of a bad actor, a misconfiguration, or human error, System Administrators can now set a maximum total number of actions that can be submitted per day for an account.
Each supported device action has its own setting, which is set to the following value recommended by Absolute, but this value can be customized:
| Device action | Daily threshold default value |
|---|---|
|
Delete File |
500 |
|
Freeze |
500 |
|
Remove Freeze |
100,000 |
| Run Playbook | 500 |
| Run Script | 20,000 |
|
Send Message |
100,000 |
| Unenroll Device | 100,000 |
|
Wipe |
500 |
All settings are enabled by default, with the exception of the Remove freeze action.
The daily threshold applies to actions submitted in the console, the Absolute API, or by an Action rule.
After the daily threshold is reached, new requests can't be submitted unless the user's user role is granted the new Account Threshold Configurations permission, and they choose to override the threshold.
- The following enhancements have been added to user-initiated playbooks:
- A banner now shows in Device Details when a user-initiated playbook has been requested for the device. The device's Playbook passcode can be viewed in the banner.
In Action History, you can now track the progress of Run Playbook requests for user-initiated playbooks. The device's Playbook passcode is also shown.
Status updates are available on the following console pages:
Device Details > Actions
History > Action Requests
History > Actions
- When a Run Playbook request for a user-initiated playbook has been processed on a device, one of the following events is now logged to Event History:
- Playbook failed
- Playbook completed
- When a new Run Playbook request causes a pending user-initiated playbook to be replaced by a new user-initiated playbook, a Playbook replaced event is now logged to Event History.
- The following enhancements related to device eligibility have been added:
When adding the Playbooks > Status column to a device report, you can now also add a Playbook > Status details column. This column contains additional information to help you troubleshoot devices with a Playbooks status of Not supported or Not enabled. Learn more
Status details are also shown on a device's Details > Summary page. To view the details in a tooltip, hover over the
icon in the Playbooks field.- When viewing a policy group in the Policies > Policy Groups area, a
icon now shows next to the Playbooks policy when any of the policy group's devices are not eligible to run playbooks. You can click the icon to view a report that includes the Playbooks > Status and Playbook > Status details report columns. Learn more - If Secure Endpoint Agent version 10.0.0.2 or lower is assigned to a policy group, you can no longer activate the policy group's Playbooks policy (activation slider is grayed out), because the policy group's devices are not eligible to run playbooks.
To help troubleshoot ineligible devices, you can now add the following report columns to any device report:
Boot Info >
- Boot Order Locked
- Microsoft 3rd Party UEFI CA
- Secure Boot
- TPM >
- Activated
- Enabled
- Owned
- Spec Version
- When submitting a Run Playbook request, a warning banner now shows on the Run playbook dialog if Secure Boot is disabled on one or more devices.
- If a Run Playbook request is in progress on a device when the device's Playbooks policy is deactivated, a Playbook canceled event is now logged to Event History.
- When submitting a Run Playbook request for a playbook that contains multiple actions, you can now change the execution order of the actions. Drag and drop actions to change their sequence in the list. Learn more
- Dual approval limits are now supported for Run Playbook actions.
Installer files uploaded during Application Resilience policy configuration are now automatically scanned for malware at the time of upload and on a weekly basis. If the scan detects a potential threat, administrators are notified and can approve or delete the file. Unaddressed threats are automatically deleted after seven days. This enhancement helps ensure files are safe before they are used in policies or deployed to devices. Learn more
Programmatic token rotation allows you to replace your API tokens before they expire without the need for manual intervention in the Absolute console. When this option is enabled in a token's settings, you can use integration scripts or direct API calls to programmatically manage the token's lifecycle via the Absolute API. Learn more
The following endpoints have been added to the Absolute API to support programmatic token rotation:
-
GET /v3/configurations/tokens/{tokenID}: Retrieve information about a token using its token ID
-
POST /v3/configurations/tokens/{tokenID}/rotate: Retire the current token using its token ID and create a new token to replace the retired token
The following events are now logged to Event History:
- Playbook replaced
- Playbook canceled
- Account-level daily threshold updated
- Over threshold action request approved
- Rule-triggered action hit the account threshold
- Installer file uploaded
- Installer file approved
- Installer file deleted
- Installer file scan succeeded
- Installer file scan not completed
- Installer file scan detected threats
- API token superseded
- API token disabled
- API token reactivated
If desired, you can create an Alert rule based on any of these new events.
To support the new features and enhancements introduced in this release, the following permission has been added:
- Account Threshold Configurations
This permission has been granted to the appropriate default roles. For example, System Administrators are granted Manage capabilities for this permission. To grant this permission to any custom roles you've created, update each role's permissions.
Improvements and fixes
| Feature/Area | Details |
|---|---|
| Absolute APIs |
|
| AI Assistant |
|
| API management |
|
| Applications |
|
| Application Resilience |
|
| Chromebook support |
|
| Device re-enrollment |
|
| History > Events |
|
| License management |
|
| Mac support |
|
| Playbooks |
|
| User Management and permissions |
|
| Windows support |
|
| Wipe |
|




