Netwrix Endpoint Policy Manager version 2601 introduces new Client Side Extension (CSE) updates and a new automatic rules generation tool for Netwrix Endpoint Privilege Manager (PPLPM).
Want the full details? Click the link below!
Endpoint Privilege Manager Updates (CSE Updates)
- New Event ID 6405 logged when justification popup is displayed for explicit rules
- Re-authentication supports configured Windows Hello methods (PIN, fingerprint, etc.)
- Admin Approval Session ID added to email notifications, notepad output, and Event Log
- Fixed 400 (Bad Request) error when launching files via NPS policies after upgrade
- “Force Re-authenticate” is now an independent option. Now it is possible to re-authenticate without displaying a pop-up window with justification text.
ARG Tool – Automatic Rule Generation Improvements
- Automatically generates Least Privilege (PPLPM) rules from detected events
- Supports file-based, local, and remote Event Log sources
- Reduces manual configuration effort
- Provides a consistent and unified rule structure
Note: Generated rules should be reviewed before production use.
Example how to use video: https://youtu.be/7ePtXLTRCtI
Example how to use screenshots:
Then look up “What’s happened” on the Remote or Local machine… and make EPM rules and export or apply directly to a Group Policy Object for small scale testing !
PPExport Standalone Tool – MSI Signing
- New feature: Added UI to select signing certificates (.cer, .pfx, .p12). This way you can be sure that the MSIs you deploy via MDM, etc are signed by your authority.
- Generated MSI files can now be digitally signed during export
Tips: You will need SignTool from Microsoft on the machine you wish to do the signing. Signtool comes from the Windows SDK here: https://learn.microsoft.com/en-us/windows/apps/windows-sdk/downloads
Then at install time, select only this (or more if desired).
Then using the EPM Exporter utility, you will be able to specify a .CER file to sign your MSIs.
Standalone Policy Editor Updates
- New Feature: Use the Standalone Policy Editor with GPOs to get a “Read-Write” or “Read-Only” view of policies (based upon actual access level.) Therefore, Read-only users can explore policies and export settings as XML (See screenshots below.)
Video: https://youtu.be/uA1gk8CpM-Q
- Ability to add or remove products from GpoExport MSI files
- Improved object title detail
- Protection against opening multiple instances of the same file type simultaneously (XML, MSI, or Group Policy Object)
Example of opening GPOs in Read/Write or Read Only mode using the Standalone editor:
Fixes Included in This Release
- Fixed memory handle leak in Least Privilege Manager
- SecureRun no longer blocks inline CMD commands when parent process is elevated
- NSM email notifications now preserve text formatting
Resolved Support Tickets
- GPO Report EPM settings displayed under Extra Registry Settings
- File Explorer not functional – PPLPMShellExt
- PPExtensionService.exe excessive handle usage
- Missing Adobe Reader DC 2025 settings
- Variables unusable in Parent Process Filter
- Blocked URL not clickable in Block rule message
- HTTP 400 error after upgrade to NPS/PAM platform
- Group Policy (gpsvc) lock timeout during processing
- Spaces in signatures causing mismatch in Admin Approval long code
Known Issues
No new known issues identified in this release.
Need help with this update?
There are many different ways to get help with our products!
| Situation | Action |
|---|---|
| If you feel the product is broken and not working as intended… | Contact Support |
| If you have a question you’d like to ask other experts… | Create a discussion in the community: Endpoint Policy Manager > Discussions & Questions |
| If you have a feature request… | Let our product team know directly: Endpoint Policy Manager > Ideas |
| If you have something cool to show… | Show everyone what you built: Endpoint Policy Manager > Show & Tell |
What are your thoughts?
We are always happy to hear from our users on what you like, and what you hope to see in the future. Please, share your thoughts below!








