Secure Endpoint 10.1 release notes
This topic describes the software updates included in Secure Endpoint 10.1. In addition to the specific changes detailed here, each release also includes broader system enhancements designed to strengthen security, optimize performance, and enhance overall stability.
To view the software updates that apply to the Secure Endpoint Agent, see the Secure Endpoint Agent release notes - Version 10.1 hotfixes.
Depending on the Absolute product licenses associated with your account, some of the following features, enhancements, and fixes may not be available to you.
Features and enhancements
To limit the impact of a bad actor, a misconfiguration, or human error, System Administrators can now set a maximum total number of actions that can be submitted per day for an account.
Each supported device action has its own setting, which is set to the following value recommended by Absolute, but this value can be customized:
| Device action | Daily threshold default value |
|---|---|
|
Delete File |
500 |
|
Freeze |
500 |
|
Remove Freeze |
100,000 |
| Run Playbook | 500 |
| Run Script | 20,000 |
|
Send Message |
100,000 |
| Unenroll Device | 100,000 |
|
Wipe |
500 |
All settings are enabled by default, with the exception of the Remove freeze action.
The daily threshold applies to actions submitted in the console, the Absolute API, or by an Action rule.
After the daily threshold is reached, new requests can't be submitted unless the user's user role is granted the new Account Threshold Configurations permission, and they choose to override the threshold.
- The following enhancements have been added to user-initiated playbooks:
- A banner now shows in Device Details when a user-initiated playbook has been requested for the device. The device's Playbook passcode can be viewed in the banner.
In Action History, you can now track the progress of Run Playbook requests for user-initiated playbooks. The device's Playbook passcode is also shown.
Status updates are available on the following console pages:
Device Details > Actions
History > Action Requests
History > Actions
- When a Run Playbook request for a user-initiated playbook has been processed on a device, one of the following events is now logged to Event History:
- Playbook failed
- Playbook completed
- When a new Run Playbook request causes a pending user-initiated playbook to be replaced by a new user-initiated playbook, a Playbook replaced event is now logged to Event History.
- The following enhancements related to device eligibility have been added:
When adding the Playbooks > Status column to a device report, you can now also add a Playbook > Status details column. This column contains additional information to help you troubleshoot devices with a Playbooks status of Not supported or Not enabled. Learn more
Status details are also shown on a device's Details > Summary page. To view the details in a tooltip, hover over the
icon in the Playbooks field.- When viewing a policy group in the Policies > Policy Groups area, a
icon now shows next to the Playbooks policy when any of the policy group's devices are not eligible to run playbooks. You can click the icon to view a report that includes the Playbooks > Status and Playbook > Status details report columns. Learn more - If Secure Endpoint Agent version 10.0.0.2 or lower is assigned to a policy group, you can no longer activate the policy group's Playbooks policy (activation slider is grayed out), because the policy group's devices are not eligible to run playbooks.
To help troubleshoot ineligible devices, you can now add the following report columns to any device report:
Boot Info >
- Boot Order Locked
- Microsoft 3rd Party UEFI CA
- Secure Boot
- TPM >
- Activated
- Enabled
- Owned
- Spec Version
- When submitting a Run Playbook request, a warning banner now shows on the Run playbook dialog if Secure Boot is disabled on one or more devices.
- If a Run Playbook request is in progress on a device when the device's Playbooks policy is deactivated, a Playbook canceled event is now logged to Event History.
- When submitting a Run Playbook request for a playbook that contains multiple actions, you can now change the execution order of the actions. Drag and drop actions to change their sequence in the list. Learn more
- Dual approval limits are now supported for Run Playbook actions.
Installer files uploaded during Application Resilience policy configuration are now automatically scanned for malware at the time of upload and on a weekly basis. If the scan detects a potential threat, administrators are notified and can approve or delete the file. Unaddressed threats are automatically deleted after seven days. This enhancement helps ensure files are safe before they are used in policies or deployed to devices. Learn more
Programmatic token rotation allows you to replace your API tokens before they expire without the need for manual intervention in the Absolute console. When this option is enabled in a token's settings, you can use integration scripts or direct API calls to programmatically manage the token's lifecycle via the Absolute API. Learn more
The following endpoints have been added to the Absolute API to support programmatic token rotation:
-
GET /v3/configurations/tokens/{tokenID}: Retrieve information about a token using its token ID
-
POST /v3/configurations/tokens/{tokenID}/rotate: Retire the current token using its token ID and create a new token to replace the retired token
The following events are now logged to Event History:
- Playbook replaced
- Playbook canceled
- Account-level daily threshold updated
- Over threshold action request approved
- Rule-triggered action hit the account threshold
- Installer file uploaded
- Installer file approved
- Installer file deleted
- Installer file scan succeeded
- Installer file scan not completed
- Installer file scan detected threats
- API token superseded
- API token disabled
- API token reactivated
If desired, you can create an Alert rule based on any of these new events.
To support the new features and enhancements introduced in this release, the following permission has been added:
- Account Threshold Configurations
This permission has been granted to the appropriate default roles. For example, System Administrators are granted Manage capabilities for this permission. To grant this permission to any custom roles you've created, update each role's permissions.
Improvements and fixes
| Feature/Area | Details |
|---|---|
| Absolute APIs |
|
| AI Assistant |
|
| API management |
|
| Applications |
|
| Application Resilience |
|
| Chromebook support |
|
| Device re-enrollment |
|
| HIstory > Events |
|
| License management |
|
| Mac support |
|
| Playbooks |
|
| User Management and permissions |
|
| Windows support |
|
| Wipe |
|




