In the new version of the VIVA2 add-on, the main focus was placed on improving the export functionalities of the protection requirement inheritance. Furthermore, the visual appearance has been adapted to the new layout of i-doit and an incompatibility of the installation routine with current i-doit versions has been rectified.
New features of the VIVA2 3.2.3 update in detail:
CSV and JSON export now takes the set filter into account in the VIVA2 update
Previously, the CSV and JSON export of the protection requirement inheritance always exported the complete information network. In the new version, only the target objects and their dependencies that are also displayed are now exported. In the CSV export, the object ID and object type are also output in the ‘Linked to’ column for better object identification.
Visual adjustments to the i-doit layout
In the IT-Grundschutz check, the icons have been changed to the i-doit icon set and the entire table has a clearer colour structure.
VIVA2 update brings alphabetical sorting of target objects
In the graphical determination and inheritance of protection requirements, the target objects and object groups are now displayed in alphabetical order, first sorted by object type, then by object name.
Installation bug under i-doit 23 fixed
If you tried to install VIVA2 under i-doit 23 (or higher), a server error occurred under certain circumstances. This bug has now been fixed.
Bug fixes VIVA2 3.2.3
As in every release, the open bugs have been fixed. A complete list of all changes and fixed bugs can be found in the CHANGELOG.
premium partner
becon is an i-doit Premium Partner, Certified Support Partner and Development Partner of synetics GmbH and thus offers an all-round carefree package.



Service Management
Thei-doit Compliance Suite gathers all important tools for your IT security in one place: CMDB, ISMS, data protection and change management
Information security with ISMS in i-doit
Information security affects every company. Protect your valuable data with standards and norms such as ISO 27001 and IT Grundschutz from the BSI. Standards help to proactively counter threats from outside and inside. Minimize the risk and thereby increase the security of your company. Monitor your processes by using meaningful reports. Benefit from the integration of a CMDB and numerous extensions to automate your IT documentation.
Subscribe to our blog!
We will not only talk about us here, but above all provide interesting information about the transformation of IT with all its technological facets.
blog
Related blog articles
DataGerry: The smart solution for flexible and schemaless IT documentation
DataGerry is the flexible open source solution for modern IT documentation – schemaless, automatable and user-friendly. Whether cloud or on-premise: companies of all sizes benefit from a future-proof, customizable CMDB.
The changing defense industry: challenges and opportunities in times of geopolitical tensions
The defense industry is facing a turning point. The digitalization, automation and networking of weapon systems present both opportunities and challenges. At the same time, the demands on IT security and the resilience of critical infrastructures are increasing.
Security Operations with Wazuh – Fast and effective incident response
An efficient response to security incidents is crucial. Companies must not only be able to detect threats in real time, but also respond immediately to minimize damage. In this third part of our blog series, we show how Wazuh helps companies to efficiently manage security incidents and optimize their security operations.
Contact
Instant contact
Do you have any questions, suggestions, requests or are you facing a particular challenge? We look forward to hearing from you!