Hi,

Patch is available for testing now.

 

Update sources:

http://dnl-test.kaspersky-labs.com/test/ap

 

Please note that to install the patch in KSeC (KSDE), you need to update the product from the test server using the commands below.

Windows x86cd "%ProgramFiles%\Kaspersky Lab\Kaspersky Secure Connection 3.0"avp.com update http://dnl-test.kaspersky-labs.com/test/ap
Windows x64cd "%ProgramFiles(x86)%\Kaspersky Lab\Kaspersky Secure Connection 3.0"avp.com update http://dnl-test.kaspersky-labs.com/test/ap

Check the presence of a patch in the standard windows "Support", "About the program."

 

 

Scope features:

∙             Requirement 3285316: [BRQ][Win10]19H1 full support

∙             Requirement 3239857: [BRQ] Notifying user when switching KSN to Israeli segment

∙             Requirement 3295081: [BRQ][VPN][Win][3.0 patch F] LicenseID should be passed within ALL renew scenarios

∙             Requirement 3317724: [BRQ][Support] Замена ссылок на community портал

∙             Requirement 3320195: [BRQ] Изменить описание и ссылку на суппортный форум

∙             Requirement 3090040: [BRQ][IPP] Too much time for IPP load

 

 

Fixed problems:

∙             Bug 3307380: [2019 patch F] Safe browser window not highlighted

∙             Bug 3353968: [2019 patch F][Support] connection issues at https://www.mql5.com

∙             Bug 3339754: 2019F: 'Enable Self-Defense' message is being shown in Safe Money

∙             Bug 3218267: [2019 pach F][SUPPORT] Yandex browser instead of opening sites, downloads attaches.

∙             Bug 3276306: [2019 patch F] Does not work child detection engine after migrate KFA -> KSC

∙             Bug 3331892: [2019 patch F] DUMP: app_core_legacy!service_Create_5B7CAB85

∙             Bug 3284007: [2019 patch F] DUMP: kneps!GetIpv6AndTransportHeader_437C211E

∙             Bug 3146877: [2019 patch F] убрать trafmon исключение для www.bancomer.com

∙             Bug 3211366: [2019 patch F] убрать исключение для https://firestore.googleapis.com в трафмон

∙             Bug 3081600: [2019 patch F][Support] error opening https://gestobrig.com site with SSL scan enabled

∙             Bug 3274570: [2019 patch F][UrlAdvisor] Дублируются иконки UrlAdvisr'а в результатах поиска bing.com

∙             Bug 3265712: [KSOS][Prod] Error 404 while opening EULA for KSOS PC from shopping cart

∙             Bug 2253640: [PPL_rootcause] DUMP: KasperskyLab.Kis.UI.WeakSettings.SettingsScan.ViewModel.WeakSettingsScanViewModel!b__27_0_43B3

 

 

To begin testing you need to do next:

1. Install product

2. Update from public servers and reboot OS

3. Enable traces

4. Set Manual mode of Update

5. Set Update source: http://dnl-test.kaspersky-labs.com/test/ap (ftp://dnl-test.kaspersky-labs.com/test/ap)

6. Reboot OS

 

As usual I'd like to remind you:

1) If you found any problem, please, re-check it on the previous patch. Here we are looking only for bugs related to current patch.

2) Don't forget about traces and screenshots.

 

Bug report: version 2019MR0

Flood will be deleted.

There are no topics in this category.
Why don't you try posting one?

Looks like your connection to Beta Testing was lost, please wait while we try to reconnect.