Fleet 4.73.0 (Sep 8, 2025)
Security Engineers
- Added new detail query, only executed if TPM PIN enforcement is required, for determining whether a BitLocker PIN is set.
- Added host identity certificate renewal support for TPM-backed certificates (Linux-only). When a certificate is within 180 days of expiration, orbit will automatically renew it using proof-of-possession with the existing certificate's private key.
- Added new global activity created when a new disk encryption key is escrowed.
- Added issuer and issued cells to the host details and my device page certificates table.
- Allowed filtering host and team software by minimum and maximum CVSS score in the Fleet UI.
- Updated UI to display kernel vulnerabilities in the operating system details page for Linux systems.
- Updated macOS 13 CIS policies to align with CIS Benchmark v3.1.0 (from v3.0.0).
- Updated macOS 14 CIS policies to align with CIS Benchmark v2.1.0 (from v2.0.0).
- Updated macOS 15 CIS policies to align with CIS Benchmark v1.1.0 (from v1.0.0).
- Updated Fleet's certificate ingestion to accept non-standard country codes of longer than 2 characters. In addition, updated ingestion of other fields to truncate long values and log an error instead of failing.
IT Admins
- Added API endpoints for adding, deleting and listing secret variables.
- Added ability to add and delete custom variables in the UI.
- Added APIendpoints to get and list batch scripts.
- Added cron job to launch scheduled batch scripts.
- Added API endpoint to cancel scheduled batch script run.
- Added the ability to cancel batch script runs directly from the UI summary modal.
- Added ability to schedule batch script runs in advance to the "Run scripts" modal.
- Added the ability to filter the hosts list to those hosts that were incompatible with the script in a batch run.
- Added side navigation on the Controls > Scripts page, with the previous Scripts page content under the "Library" tab and a new "Batch progress" tab containing details about started, scheduled, and finished scripts.
- Added batch execution IDs to script run activities.
- Added IdP SSO authentication to the BYOD mobile devices enrollment if that option is enabled for the team.
- Allowed overriding install/uninstall scripts, and specifying pre-install queries and post-install scripts, for Fleet-maintained apps in GitOps.
- Added support of
$FLEET_VAR_HOST_UUID
in Windows MDM configuration profiles. - Added additional logging information for Windows MDM discovery endpoint when errors occur.
- Added support for last opened time for Linux software (DEB & RPM packages).
- NOTE: Package will need to be updated out-of-band once, because the pre-removal script from previously-generated packages is called upon an upgrade. The old pre-removal script stopped Orbit unconditionally.
fleet-osquery
can safely be updated through the Software page only after a new package generated with this version of fleetctl has been installed through other means.
- NOTE: Package will need to be updated out-of-band once, because the pre-removal script from previously-generated packages is called upon an upgrade. The old pre-removal script stopped Orbit unconditionally.
- Added indication of whether software on a host was never opened, vs. being a software type where last opened time collection is not supported.
- Added automatic install policies into host software responses.
- Updated
fleetctl api
to now support sending data in the body of non-GET requests using the-F
flag. (Thanks @fuhry!)
Other improvements and bug fixes
- Added permissions to OS updates page so that only global admins and the team admin can see the page.
- Cleared label membership when label platform changes (via GitOps).
- Improved public IP extraction for Fleet Desktop requests.
- Marked DDM profiles as failed if response comes back with Unknown Declaration Type error, and improve upload validation for declaration type.
- Modified
PUT /api/v1/fleet/spec/secret_variables
endpoint to only accept secret variables with uppercase letters, numbers and underscores. - Updated software inventory so that when multiple version of a software are installed the last used timestamp for each version is properly returned.
- Revised stale vulnerabilities deletion (for false positive cleanup) to clear vulnerabilities touched before the current vulnerabilities run, instead of using a hard-coded threshold based on how often the vulns cron runs.
- Removed unintended broken sort on Fleet Desktop > Software > type column.
- Validated Gitops mode URL on frontend and backend.
- Updated to not log an error if EULA is missing for the
/setup_experience/eula/metadata
endpoint. - Loosened validation during GitOps dry runs for software installer install/uninstall scripts that contain Fleet secrets.
- Added missing checks for invalid values before trying to store them in DB.
- Updated styles for turn on MDM info banner button.
- Updated so that DEB and RPM packages generated by
fleetctl package
to now be safe to upgrade in-band through the Software page. - Updated so that individual script executions from batch jobs are now hidden from the global feed.
- Updated to attest the signed Windows Orbit binary instead of the unsigned one.
- Updated both Fleet desktop and osquery for macOS and Windows artifacts to attest the binaries inside archives.
- Made sure that if disk encryption is enabled and a TPM PIN is required, the user is able to set a TPM PIN protector.
- Removed
DeferForceAtUserLoginMaxBypassAttempts
from FileVault profile, to use default value of 0 to indicate the FileVault enforcement can not be deferred on next login. - Updated go to 1.24.6.
- Fixed cases where the uninstall script population job introduced in Fleet 4.57.0 would attempt to extract package IDs on software that we don't generate uninstall scripts for, causing errors in logs and retries of the job.
- Fixed potential panic in error handler when Redis is down.
- Fixed a potential race condition issue, where a host might get released because no profiles has been sent for installation before releasing the device, by checking the currently installed profiles against what is expected.
- Fixed invalid rate limiting applied on Fleet Desktop requests for which a public IP could not be determined.
- Fixed VPP token dropdown to allow user to choose "All teams" selection.
- Fixed an issue where Windows configuration profiles fails to validate due to escaping data sequence with
<![CDATA[...]]>
and profile verifier not stripping this away. - Fixed an issue where a host could be stuck with a "Unlock Pending" label even if the unlock script was canceled.
- Fixed 5XX errors on
/api/v1/fleet/calendar/webhook/*
endpoint due to missing authorization checks. - Fixed server panic when listing software titles for "All teams" with page that contains a software title with a policy automation in "No team".
- Fixed operating system icons from bleeding into software icons.
Fleet-maintained app updates and vulnerability fixes are applied, whether or not you upgrade.
Fleet's agent
The following version of Fleet's agent (fleetd
) support the latest changes to Fleet:
- orbit-v1.47.2
fleet-desktop-v1.47.2
(included with Orbit)- fleetd-chrome-v1.3.3
While newer versions of
fleetd
still function with older versions of the Fleet server (and vice versa), Fleet does not actively test these scenarios and some newer features won't be available.
Upgrading
Please visit our upgrade guide for upgrade instructions.
Documentation
Documentation for Fleet is available at fleetdm.com/docs.
Binary Checksum
SHA256
e6e611867bdc5e3949a2c2b53eecd1fc6e679a2a0da6e6249547629bd986a02c fleet_v4.73.0_linux.tar.gz
f01a004d6d2395951b8099dc28e28daad9c700d4e1e4c8188263aee538b68312 fleetctl_v4.73.0_linux_amd64.tar.gz
c9648ea4c4aea716039f54ade2f778ae7d5a6ffc6c6c7025fe2dc303f7879689 fleetctl_v4.73.0_linux_amd64.zip
31a3eb8a6c562eb67a5a702894c813ec99c251962221f89f13fca318cd267d02 fleetctl_v4.73.0_linux_arm64.tar.gz
33b9e55414572ada27cd49edcd491d54c4cc333451822453357b400d9f99d28b fleetctl_v4.73.0_linux_arm64.zip
dd74cf3db664015dd159dff3ec888540d9c95bffa31f4c6bc329ea44d4df6011 fleetctl_v4.73.0_macos.tar.gz
5595bb3f8c2a596090d9b4d1285eec051f658f5c65c075f9e26d28fe9d52de68 fleetctl_v4.73.0_macos.zip
4a58eec5619739df5789d229dc4ac44393594beafa9277924ec9c728bf2dc70c fleetctl_v4.73.0_windows_amd64.tar.gz
0f253d47e437875d874ac1db63103ac60faa71c4997d2749ccdfaf00fec4e969 fleetctl_v4.73.0_windows_amd64.zip
526af3178b6cc64c9b6e90fe76ba27fff2e043f25c74b2ed42de09f09b74fe49 fleetctl_v4.73.0_windows_arm64.tar.gz
6b316179f78f78f7aee4303a55f8144ee6308e189ee30f2970ccfc3da5284d2c fleetctl_v4.73.0_windows_arm64.zip