Release
GOS 21.04
Version |
Lifecycle Status | Patch Level |
GOS 22.04 | Mature | 22.04.9 (2023-03-08) |
GOS 21.04 | End-of-Life | 21.04.25 (2023-03-06) |
Hardware Appliances | ||||||||||||||
GOS Version | Appliance Model | |||||||||||||
6500 | 6400 | 5400 | 5300 | 650 Rev. 1 | 650 Rev. 2 | 600 Rev. 1 | 600 Rev. 2 | 450 Rev. 1 | 450 Rev. 2 | 400 Rev. 1 | 400 Rev. 2 | 150 | 35 | |
GOS 21.04 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
GOS 22.04 |
✔✔ | ✔✔ | ✔✔ | ✔✔ | ✔✔ | ✔✔ | ✔✔ | ✔✔ | ✔✔ | ✔✔ | ✔✔ | ✔✔ | ✔✔ | ✔✔ |
Virtual Appliances | |||||||
GOS Version | Appliance Model | ||||||
EXA | PETA | TERA | DECA | CENO | 25V | ONE | |
GOS 21.04 | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
GOS 22.04 |
✔✔ | ✔✔ | ✔✔ | ✔✔ | ✔✔ | ✔✔ | ✔✔ |
✔✔ recommended | ✔ supported | ✘ not supported | ⭘ will be supported
Greenbone OS Lifecycle Phases
Greenbone OS Lifecycle Levels
2022-08-08: Greenbone OS 22.04
Current Patch Level: 22.04.9 (2023-03-08)
Lifecycle-Phase: Mature
22.04.9 (2023-03-08):
22.04.8 (2023-02-15):
22.04.7 (2023-01-26):
22.04.6 (2022-12-15):
22.04.5 (2022-12-01):
22.04.4 (2022-11-01):
22.04.3 (2022-10-06):
22.04.2 (2022-09-12):
22.04.1 (2022-08-19):
22.04.0 (2022-08-08):
Notus Scanner
With GOS 22.04, the new Notus Scanner is implemented. It scans after every regular scan, so no user interaction is necessary.
The Notus Scanner offers better performance due to less system resource consumption and thus, faster scanning.
When creating a scan configuration manually and the Notus Scanner is supposed to work, the VT Determine OS and list of installed packages via SSH login (OID: 1.3.6.1.4.1.25623.1.0.50282) must be activated.
The Notus Scanner replaces the logic of potentially all NASL-based local security checks (LSCs). A comparison of installed software on a host against a list of known vulnerable software is done instead of running a VT script for each LSC.
The regular OpenVAS Scanner loads each NASL LSC individually and executes it one by one for every host. A single known vulnerability is then compared to the installed software. This is repeated for all LSCs.
With the Notus Scanner, the list of installed software determined during a scan is directly compared to all known vulnerabilities. This eliminates the need to run the LSCs because the information about the known vulnerable software is collected in one single list and not distributed in individual NASL scripts.
Currently, Notus data exists for a limited number of LSC VT families. For the list of supported LSC VT families, please refer to the Greenbone Enterprise Appliance manual.
The setting Report vulnerabilities of inactive Linux kernel(s) separately in the VT Options for Local Security Checks is deprecated. However, the setting is still visible, but no longer functional.
Appliance Feature Set
With GOS 22.04, the feature set for some appliances is extended:
Virtual Appliances
With GOS 22.04, the virtual hard disk sizes for virtual appliances are changed.
The new sizes are:
The new sizes are only relevant for newly installed virtual appliances. Upgraded appliances keep their partition layout and thus, their required disk size.
HTTP Web Interface Access
With GOS 22.04, unencrypted HTTP access for the web interface is not supported anymore. HTTPS must be used instead.
A valid HTTPS certificate (either self-signed, or signed by a CA) must now be configured on the appliance to use the web interface.
Backups
Password for Remote Backup Repository
With GOS 22.04, it is possible to change the password of the remote backup repository. For this, the menu option Setup > Backup > Backup Password is added to the GOS administration menu. The menu option is only visible if the backup location is configured as remote.
Changing the backup password is recommended.
If multiple appliances use the same remote backup repository, it is recommended that each appliance uses its own unique backup password.
obnam
With GOS 20.08, the backend for managing backups in GOS was changed from obnam to restic. However, obnam remained available in GOS 20.08 and 21.04 as did the backups created with obnam in GOS 6 or earlier.
With GOS 22.04, obnam and all backups created with obnam are removed. Incremental backups created with GOS 6 and earlier will be removed due to incompatibility and to reclaim disk space.
If these old backups should be kept, a copy of the files must be made before upgrading to GOS 22.04. If there are any questions, contact the Greenbone Enterprise Support.
Mail Server
With GOS 22.04, a new option for enforcing the usage of SMTPS for e-mails sent by a Greenbone Enterprise Appliance is added.
For this, the GOS administration menu contains the new menu Setup > Mail > SMTP Enforce TLS.
Web Interface
Business Process Map
With GOS 22.04, the Business Process Map (BPM) functionality is removed from the web interface. Existing Business Process Maps will be deleted and will not be recoverable. If the information contained in a Business Process Map is to be saved, this must be done in GOS 21.04.
Task Setting Network Source Interface
With GOS 22.04, the task setting Network Source Interface is removed. If this setting was previously configured for a task, it will be ignored.
User Setting Interface Access
As the task setting Network Source Interface is removed with GOS 22.04, the user setting Interface Access is removed as well. If this setting was previously configured for a user, it will be ignored.
OVAL Definitions
With GOS 22.04, the OVAL definitions are removed from the SecInfo management in the web interface. The previous OVAL definitions were outdated and no longer served any purpose.
OSP Scanners
With GOS 22.04, the scanner type OSP Scanner is removed. It is no longer possible to create OSP scanners and select them to run scans.
This only affects the scanner type OSP Scanner, not the OSP protocol in general. The scanner type Greenbone Sensor will continue to use OSP.
Quality of Detection (QoD)
With GOS 22.04, the new quality of detection (QoD) level package_unreliable is implemented with a QoD of 30 %. It is used for authenticated package-based checks which are not always fully reliable for, e.g., Linux(oid) systems.
Greenbone Management Protocol (GMP)
The Greenbone Management Protocol (GMP) has been updated to version 22.04 and the API has been adjusted slightly. The usage of some commands has changed and several commands, elements and attributes have been deprecated. The complete reference guide and the list of changes are available here.
2021-04-30: Greenbone OS 21.04
Current Patch Level: 21.04.25 (2023-03-06)
Lifecycle-Phase: End-of-Life
21.04.25 (2023-03-06):
21.04.24 (2022-12-15):
21.04.23 (2022-10-06):
21.04.22 (2022-09-12):
21.04.21 (2022-08-19):
21.04.20 (2022-08-08):
21.04.19 (2022-06-27):
21.04.18 (2022-05-25):
21.04.17 (2022-05-19):
21.04.16 (2022-05-12):
21.04.15 (2022-03-17):
21.04.14 (2022-03-11):
21.04.13 (2022-02-25):
21.04.12 (2022-01-31):
21.04.11 (2022-01-04):
21.04.10 (2021-12-02):
21.04.9 (2021-11-01):
21.04.8 (2021-10-13):
21.04.7 (2021-10-05):
find_all: TRUE
is passed to the function (#SC-395).21.04.6 (2021-09-08):
21.04.5 (2021-08-02):
21.04.4 (2021-07-12):
21.04.3 (2021-07-08):
21.04.2 (2021-06-08):
21.04.1 (2021-05-19):
21.04.0 (2021-04-30):
2020-08-31: Greenbone OS 20.08
Current Patch Level: 20.08.13 (2021-12-02)
Lifecycle-Phase: Retired
20.08.13 (2021-12-02):
20.08.12 (2021-09-08):
20.08.11 (2021-08-02):
20.08.10 (2021-06-08):
20.08.9 (2021-05-03):
20.08.8 (2021-03-18):
20.08.7 (2021-01-25):
20.08.6 (2020-11-30):
20.08.5 (2020-10-15):
20.08.4 (2020-09-23):
20.08.3 (2020-09-10):
20.08.2 (2020-09-07):
20.08.1 (2020-09-03):
20.08.0 (2020-08-31):
2019-10-31: Greenbone OS 6.0
Aktuellster Patch-Level: 6.0.15 (22.02.2021)
Lifecycle-Phase: Retired 2021-02-22
6.0.15 (2021-02-22):
6.0.14 (2020-09-23):
6.0.13 (2020-09-16):
6.0.12 (2020-09-03):
6.0.11 (2020-08-31):
6.0.10 (2020-07-30):
6.0.9 (2020-06-29):
6.0.8 (2020-05-25):
6.0.7 (2020-04-15):
6.0.6 (2020-03-05):
6.0.5 (2020-02-19):
6.0.4 (2020-02-13):
6.0.3 (2020-01-23):
6.0.2 (2019-12-19):
6.0.1 (2019-12-17):
2019-04-30: Greenbone OS 5.0
Aktuellster Patch-Level: 5.0.20 (2021-02-22)
Lifecycle-Phase: Retired 2021-02-22
5.0.20 (2021-02-22):
5.0.19 (2020-07-30):
5.0.18 (2020-05-25):
5.0.17 (2020-01-20):
5.0.16 (2019-12-17)
5.0.15 (2019-11-26):
5.0.14 (2019-11-01):
5.0.13 (2019-10-29):
5.0.12 (2019-10-08):
5.0.11 (2019-09-24):
5.0.10 (2019-09-03):
5.0.9 (2019-08-26):
5.0.8 (2019-08-14):
5.0.7 (2019-07-25):
5.0.6 (2019-07-11):
5.0.5 (2019-07-09):
5.0.4 (2019-07-01):
5.0.3 (2019-06-19):
5.0.2 (2019-06-03)
5.0.1 (2019-05-05):
5.0.0 (2019-04-30)
2018-08-31: Greenbone OS 4.3
Aktuellster Patch-Level: 4.3.22 (2021-02-22)
Lifecycle-Phase: Retired 2021-02-22
4.3.22 (2021-02-22):
4.3.21 (2020-07-30):
4.3.20 (2020-05-25):
4.3.19 (2019-11-26):
4.3.18 (2019-10-08)
4.3.17 (2019-09-24)
In case you are using the ExpertNet functionality in GOS 4.2, please follow these steps: 1. Save the ExpertNet Configuration separate from the GSM. 2. Optional: Consult Greenbone Support about possible challenges for the substitution of your ExpertNet configuration. Some advanced ways might not directly be transferable to the new scheme. 3. Deactivate ExpertNet. 4. Migrate to GOS 4.3 5. Configure the network with the new opportunities based on the details in the preserved ExpertNet configuration.
4.3.17 (2019-09-24):
4.3.16 (2019-07-09):
4.3.15 (2019-07-01):
4.3.14 (2019-06-19):
4.3.13 (2019-06-03)
4.3.12 (2019-05-01):
4.3.11 (2019-04-03):
4.3.10 (2019-04-02):
4.3.9 (2019-03-26)
4.3.8 (2019-02-25):
4.3.7 (2019-02-14):
4.3.6 (2019-02-02):
4.3.5 (2019-02-01):
4.3.4 (2018-12-03):
4.3.3 (2018-10-26):
4.3.2 (2018-10-15):
2017-09-30: Greenbone OS 4.2
Aktuellster Patch Level: 4.2.30 (2019-07-31)
Lifecycle-Phase: End-of-Life 2019-07-31
4.2.30 (2019-07-31):
4.2.29 (2019-06-19):
4.2.28 (2019-02-20):
4.2.27 (2019-02-14):
4.2.26 (2019-02-02):
4.2.25 (2019-02-01):
4.2.24 (2018-11-20):
4.2.23 (2018-10-26):
4.2.22 (2018-10-15):
4.2.21 (2018-10-04):
4.2.20 (2018-09-14):
4.2.19 (2018-08-24):
4.2.18 (2018-06-14):
4.2.17 (2018-05-12):
4.2.16 (2018-05-03):
4.2.15 (2018-04-13):
4.2.14 (2018-04-10):
4.2.13 (2018-03-14):
4.2.12 (2018-03-03):
4.2.11 (2018-03-01):
4.2.10 (20108-01-19):
4.2.9 (2017-12-19):
4.2.8 (2017-12-15):
4.2.7 (2017-12-04):
4.2.6 (2017-11-03):
2015-01-26: Greenbone OS 3.1
Aktuellster Patch Level: 3.1.48 (2018-09-05)
Lifecycle-Phase: End-of-Life 2019-07-31
Die mit (*) gekennzeichneten Einträge ändern voreingestelltes Verhalten.
Patch-Level GOS 3.1:
3.1.32 (2016-08-13)
Die mit (*) gekennzeichneten Einträge ändern voreingestelltes Verhalten.
2017-04-25: Greenbone OS 4.1 für Neu-Auslieferungen ohne Sensor-Kopplung von GSM ONE, GSM 400, GSM 600 und GSM 650.
Verfügbar auch als Upgrade mit Migration für alle GSM ONE.
Aktuellster Patch Level: 4.1.7 (2017-08-24)
Lifecycle-Phase: End-of-Life 2017-12-15
Greenbone OS 4.1.7 (2017-08-24)
Greenbone OS 4.1.6 (2017-07-18)
Greenbone OS 4.1.5 (2017-06-20)
Greenbone OS 4.1.4 (2017-05-31)
Greenbone OS 4.1.3 (2017-05-23)
Greenbone OS 4.1.2 (2017-04-25):
2016-12-21: Greenbone OS 4.0 für GSM ONE und GCE
Aktuellster Patch Level: 4.0.5 (2017-04-04)
Lifecycle Phase: End-of-Life (2017-07-30)
Aktuellster Patch Level: 4.0.5 (2017-04-04):
Greenbone OS 4.0.4 (2017-03-30)
Greenbone OS 4.0.3 (2017-01-13)
2014-03-21: Greenbone OS 3.0
Aktueller Patch Level: 3.0.38 (2015-10-07)
Die mit (*) gekennzeichneten Einträge ändern voreingestelltes Verhalten.
Alternativ kein man eine neue Rolle (z.B. “Anwender sehen”) erstellen die ausschließlich das Recht “get_users” enthält. Diese neue Rolle kann dann als Ergänzung an alle Benutzer verteilt werden die die entsprechende Berechtigung erhalten sollen. Natürlich sind auch andere Berechtigungs-Modellierungen nach eigenen Vorstellungen möglich.
Beachten Sie, dass bei Verwendung der vor-definierten Scan Konfigurationen keine Änderungen zu beobachten sein werden. Diese Scan Konfigurationen selektieren ohnehin sämtliche NVTs explizit.
Patch-Level GOS 3.0:
This site is only using technically necessary cookies. By continuing to browse the site, you are agreeing to use this cookies.
Accept CookiesPrivacy policyWe may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.
We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
You can read about our cookies and privacy settings in detail on our Privacy Policy Page.
Datenschutzerklärung