# Fleet 4.30.0 | MDM public beta, Observer+ role, Vulnerability publication dates.
![Fleet 4.30.0](../website/assets/images/articles/fleet-4.30.0-1600x900@2x.png)
Fleet 4.30.0 is live. Check out the full [changelog](https://github.com/fleetdm/fleet/releases/tag/fleet-v4.30.0) or continue reading to get the highlights.
For upgrade instructions, see our [upgrade guide](https://fleetdm.com/docs/deploying/upgrading-fleet) in the Fleet docs.
## Highlights
* Fleet introduces MDM public beta
* Granular roles added
* Vulnerability objects include publication date
* Go version to 1.19.8
## Fleet introduces MDM public beta
Fleet has enabled MDM features in the latest release of Fleet as a public beta broadly available to everyone. 🟣 Openness is at the heart of open-source, and we are excited to bring an open-source MDM. [Read the full announcement.](https://fleetdm.com/releases/fleet-introduces-mdm)
## Granular roles added
_Available in Fleet Premium and Fleet Ultimate_
With this update, you can take 🟠Ownership of Fleet account roles with greater granularity. Fleet 4.30.0 includes a new user role, `observer+.`
The `observer+` user role extends the observer user role. The observer+ user role can edit and run SQL for a given query without saving the query allowing for greater discovery without overriding the original query. Users with the `observer+` role can also execute [live queries.](https://fleetdm.com/docs/using-fleet/fleet-ui#run-a-query)
## Vulnerability objects include publication date
Knowing how long ago a vulnerability was published, helps gauge the urgency of the vulnerability. Vulnerability objects now include the date a vulnerability was published in the National Vulnerability Database (NVD) to provide you with better 🟢 Results. The published date from NVD in the vulnerability object is also available in the Fleet API and when using the vulnerability webhooks.
## Go updated to 1.19.8
Fleet has updated Go to 1.19.8 in light of Go’s [crypto/elliptic](https://github.com/golang/go/issues/58647) fix. While this only affected niche configurations with very specific direct uses of crypto/elliptic, Fleet does not make any special use of crypto/elliptic, but Fleet takes 🟠Ownership of the tools we use and ensures they are kept up to date.
## More new features, improvements, and bug fixes
### List of features
- Removed both `FLEET_MDM_APPLE_ENABLE` and `FLEET_DEV_MDM_ENABLED` feature flags.
- Automatically send a configuration profile for the `fleetd` agent to teams that use Automatic Device Enrollment (ADE).
- ADE JSON profiles are now automatically created with default values when the server is run.
- Added the `--mdm` and `--mdm-pending flags` to the `fleetctl get hosts` command to list hosts enrolled in Fleet MDM and pending enrollment in Fleet MDM, respectively.
- Added support for the "enrolled" value for the `mdm_enrollment_status` filter and the new `mdm_name` filter for the "List hosts", "Count hosts" and "List hosts in label" endpoints.
- Added the `fleetctl mdm run-command` command, to run any of the [Apple-supported MDM commands](https://developer.apple.com/documentation/devicemanagement/commands_and_queries) on a host.
- Added the `fleetctl get mdm-command-results` sub-command to get the results for a previously-executed MDM command.
- Added API support to filter the host by the disk encryption status on "GET /hosts", "GET /hosts/count", and "GET /labels/:id/hosts" endpoints.
- Added API endpoint for disk encryption aggregate status data.
- Automatically install `fleetd` for DEP enrolled hosts.
- Updated hosts' profiles status sync to set to "pending" immediately after an action that affects their list of profiles.
- Updated FileVault configuration profile to disallow device user from disabling full-disk encryption.
- Updated MDM settings so that they are consistent, and updated documentation for clarity, completeness, and correctness.
- Added `observer_plus` user role to Fleet. Observers+ are observers that can run any live query.
- Added a premium-only "Published" column to the vulnerabilities table to display when a vulnerability was first published.
- Improved version detection for macOS apps. This fixes some false positives in macOS vulnerability detection.
- If a new CPE translation rule is pushed, the data in the database should reflect that.
- If a false positive is patched, the data in the database should reflect that.
- Include the published date from NVD in the vulnerability object in the API and the vulnerability webhooks (premium feature only).
- User management table informs which users only have API access.
- Added configuration option `websockets_allow_unsafe_origin` to optionally disable the websocket origin check.
- Added new config `prometheus.basic_auth.disable` to allow running the Prometheus endpoint without HTTP Basic Auth.
- Added missing tables to be cleared on host deletion (those that reference the host by UUID instead of ID).
- Introduced new email backend capable of sending email directly using SES APIs.
- Upgraded Go version to 1.19.8 (includes minor security fixes for HTTP DoS issues).
- Uninstalling applications from hosts will remove the corresponding entry in `software` if no more hosts have the application installed.
- Removed the unused "Issuer URI" field from the single sign-on configuration page of the UI.
- Fixed an issue where some icons would appear clipped at certain zoom levels.
- Fixed a bug where some empty table cells were slightly different colors.
- Fixed e-mail sending on user invites and user e-mail change when SMTP server has credentials.
- Fixed logo misalignment.
- Fixed a bug where for certain org logos, the user could still click on it even outside the navbar.
- Fixed styling bugs on the SelectQueryModal.
- Fixed an issue where custom org logos might be displayed off-center.
- Fixed a UI bug where in certain states, there would be extra space at the right edge of the Manage Hosts table.-
## Ready to upgrade?
Visit our [upgrade guide](https://fleetdm.com/docs/deploying/upgrading-fleet) in the Fleet docs for instructions on updating to Fleet 4.30.0.