iSecurity Command Release News

Version 20.00 (April 2026)

  • The COMMAND product allows running a command, subject to checks of filters for command parameters (including parts of qualified or multi-element parameters), current user, time, IP, etc.
  • The possibility to request that the command be run, and have to identify himself by MFA, has been added. This, in addition to authority by pin code, or a warning window.
  • Note that COMMAND can reject commands, and this will appear as an *ESCAPE message for the original command in the job log.

Version 19.17 (February 2026)

  • All known issues were resolved and incorporated into a new version to simplify installation and upgrade.

Version 19.16 (November 2025)

  • Release number updated due to changes in Firewall.

Version 19.02 (January 2024)

Fixes

  • Problem that caused locks on file SMZTMPA/GSGROPU, preventing updates to Firewall and Command.

Version 18.42 (October 2023)

  • Release number updated due to changes in Firewall.

Version 18.38 (May 2023)

  • Release number updated due to changes in Firewall.

Version 18.04 (June 2019)

New Features

  • Socket Exit Points added: It is now possible to secure the Socket Exit Points. There are 3 types of Socket Exit Points:

 

    • Socket Accept                SKTACP
    • Socket Connect             SKTCNT
    • Socket Listen                  SKTLSN

 

It is possible to specify condition by User Exit Point. See examples in SMZ8/GRSOURCE UPSKT* .

Rule specification screens will be provided during July 2019.

** Use extreme care when specifying rules for Socket exit points. These control your ability to connect to and from the system. If not carefully specified you may find yourself unable to connect to your system **

 

  • SQL Parser timeout was added: A timeout was added for parsing operations. If reached, the SQL statement is processed as per STRFW, 81, 2, “Action for SQL that cannot be parsed“. The possible options for Action for SQL that cannot be parsed are:

 

    • 1=Allow
    • 2=Allow+Extended log
    • 5=Reject
    • 6=Reject+Extended log

 

The extended log (known as ILOG) enables later checking of the SQL at Raz-Lee Security.