Unit4 Financials 2025 Q1 Release

Unit4 Financials by Coda 2025Q1 was made available on 11th March 2025.

Highlights of the 2025Q1 release include:

Administration:

Tasks

The Table Link Document Housekeeping task has been enhanced to include:

  • a ‘User-defined status’ option, enabling the removal of non-system statuses.
  • a ‘Document Date’ range, enabling the deletion of data within a specified date range.

Finance:

Undo Matching

Undo Matching now uses the browse limit on the user capability and the browse limit set on the Financials console when selecting data.

The transaction limit applied is the lower of the two settings. If this limit is exceeded no data is returned and the user is requested to select less data.

Company Master

You can now specify the default posting destination (Finance or Invoice Matching) and the Invoice Matching posting settings (Input Template Master and Mapping Master for invoices and credit notes) on the Company Master for use in Electronic Invoicing.

Element Master

You can now specify the posting destination (Company Master, Finance, or Invoice Matching) and the Invoice Matching posting settings (Input Template Master and Mapping Master for invoices and credit notes) on the Element Master for use in Electronic Invoicing.

Copy Company

External copy company has been changed to remove a stored procedure which was used when copying element masters. This change has been made to improve the upgrade process.

Electronic Invoicing:

API

The Electronic Invoicing REST resource is now available to allow authorized users to submit a UBL Invoice or Credit Note to Invoice Matching using input type Header and Tax entry types ‘Total only’, ‘By tax code’ and ‘By tax code with turnover’.

Mapping Master

A new Invoice Matching tab has been added to Mapping Master to define how additional data in the UBL is mapped to the transaction to be created in Invoice Matching.

Invoice Maintenance

The Invoice Maintenance screen has been enhanced to include more detail on failed submissions and to allow the rows to be sorted.

Public API:

REST API

The navigation and performance of the REST API documentation has been improved.

The REST API definition has been improved to better represent enumerated types. The API now indicates the set of valid values for enumeration types.

Miscellaneous

Message Transport Master

It is now possible to use Microsoft Graph API when sending emails.

File Encryption (PGP)

PGP encryption is now available using HTTP POST to send files to Extension Kit. A sample Extension Kit Flow (file_encryption_pgp.json) has been created to demonstrate this process and is available on the .iso and also via Community4U.

Technical:

Deprecated features:
The .NET router has been deprecated. The final release has not been determined.

The Integration Toolkit Command Centre module (ITK) has been deprecated and will be removed in a future release. The final release has not been determined.

Removed features:

32-bit XL has been removed. Please use the 64-bit XL. As a result, there is a new version of XL. Functionally it is the same as the 2024Q4 release of XL.

Therefore, there is no requirement to update to this version.

Security Updates

  • Third party libraries Apache HttpClient and Java Native Access have been updated to improve security.
  • A third-party library, Netty, used in the Unit4 Message Hub integration has been updated to improve security.

General Fixes/Updates:

  • An issue in Billing when posting documents with analysis line flexi-fields to Finance has now been resolved.
    • The ‘Exclude zero lines on posting’ setting is now ignored if the Billing document has analysis line level flexi-fields.
  • In certain circumstances Undo Year End would fail to complete. This has been corrected
  • Print Customer Statements performance has been improved.
    • Property com.coda.finance.app.customerStatementSelectionSize is now documented in the Configuration Settings Guide.
  • Customer statements sent via FTP/SFTP now appends a date and timestamp to the file name to make it unique.
  • The Electronic Invoicing endpoint now authenticates when using OpenID Connect and Authorization Code Flow with PKCE is configured as the web application flow.
  • An error which prevented the Audit Trail configuration tool from starting has been corrected.
  • An issue relating to the customisation of standard forms such as element master (finance/elmmasmain.frm) has now been resolved.
  • The system will now recover from transient external failures, such as a DNS outage, rather than require a restart.

Further details on the new features, security updates and reported issues can be found in the release documentation.

The release documentation for this release (and previous releases) can be found in the documentation area on the community.

The software can be downloaded from the “Software” tab on Community4U.


Are you making the most of Unit4 Financials by Coda?

Our Systems Health Check is designed to help you identify areas where you may be able to improve performance and ensure you extract the maximum benefit from your investment in Unit4 Financials by Coda.

Find out more

ROI linked to cloud migration is soaring. This report illustrates why

APRIL 2025

ROI linked to cloud migration is soaring

This report illustrates why

The financial case for cloud migration has always been a compelling one. And as the costs associated with on-premises deployments continue to rise, that case is now impossible to ignore.

Get The Full Report

A recent study from global technology research specialists Nucleus Research found that cloud migrations returned $3.43 for every dollar spent on the migration project. A subsequent follow up showed that in 30 months, that had increased by 12.5%.

Read the full report for more details on the following:

On-premise hosting
Practically all areas of business operations have felt the effects of rising costs in the last few years. Cloud costs have increased. Crucially, however, the costs associated with on-premises operations have increased even further.

The price of hardware components and maintenance, an increased compliance burden, personnel costs, and energy: the report illustrates how rising costs in these areas make on-premise systems less and less attractive.

Pain-free, cost-effective migration
Lengthy and costly migrations benefit neither software vendors nor customers. To reflect this, reputable vendors and their trusted partners seek to make the process as smooth as possible. Discover what this means regarding lower cost barriers and more rapid return on investment.

On-premises costs will continue to increase
In terms of both the capital expenditure and the management overhead associated with legacy on-premises IT ecosystems, the future does not look bright.

Discover what this means and how it will cause the benefit-to-cost ratio of cloud migration to increase even further over the next couple of years.

Get The Full Report

The wider case for cloud migration: further resources

For any head of IT or finance looking for practical ways to curb capital technical infrastructure spend and day-to-day operational costs, the case for cloud migration is becoming increasingly strong.

But it’s not just about cost savings. Strategic advantages like scalability, flexibility, and performance make cloud migration a critical step for future-ready businesses.

At Millennium, we have helped countless businesses migrate to the cloud, successfully guiding organisations across all industry verticals. With many more migrations underway, we know the challenges companies face—and how to make the transition smooth, fast, and cost-effective.

That’s why so many businesses turn to Millennium to guide them through the process.

We answer your most common Cloud Migration questionsThe Path to SaaS. Four Steps to a Successful Cloud MigrationUnit4 Cloud: Busting the Myths and Realising the Benefits

Could you be fooled by a deepfake? Why CFOs need to boost their cyber awareness

Could you be fooled by a deepfake? Why CFOs need to boost their cyber awareness

Over the past few years, the social engineering threat has stepped up a gear, with criminals putting AI to work to mount spectacularly convincing fraud scams. As keepers of the purse strings, corporate finance professionals are prime targets in this new wave of cybercrime.

Here’s a closer look at the evolving social engineering landscape and the guardrails you should have in place to keep your business safe.

Deepfakes: no longer the stuff of sci-fi

Last year, CFO Dive reported how the UK engineering group Arup lost approximately $25 million after scammers used AI-generated “deepfakes” to pose as the company’s CFO and dupe an employee to transfer cash into a number of bank accounts. An Arup staff member got a fake message, claiming to be from the company’s CFO, regarding a “confidential transaction”. Following a video conference with the false CFO and other AI-generated employees, the employee executed transactions to five different Hong Kong-based banks.

In July, a Ferrari executive received a series of messages from an unknown number, purporting to be from the company’s CEO, Benedetto Vigna. The messages detailed a company acquisition, advising the Ferrari exec to maintain discretion and that an NDA would be needed. Following the texts, the executive received a phone call from the same number, with the caller mimicking Vigna’s distinctive voice (subsequent inquiries revealed that this had been created with an AI voice clone). Despite the scenario’s plausibility, the executive grew suspicious of certain aspects of the caller’s intonation. The exec asked the caller the name of a book Vigna had recommended to him just a few days earlier. The call suddenly ended.

How common is the deepfake problem?

Evidence suggests that sophisticated AI-driven fraud is now part of the mainstream.

A 2024 Medius poll of 1,533 US and UK finance professionals suggested that just over half (53%) of corporations have been targeted with financial scams using deepfake technology, with 43% falling victim to such attacks. Another report suggested that in 2023, deepfake incidents targeting the fintech sector increased by 700%.

According to Deloitte’s Center for Financial Services, total losses from financial fraud in 2023 amounted to $12.3 billion. By 2027, generative AI is predicted to enable losses to reach $40 billion.

The most popular deepfake techniques include the following:

  • Deepfake voice scams. With just a few seconds of audio, scammers use AI tools to clone a person’s voice. They then make fake phone calls or submit voicemails impersonating key company insiders
  • Deepfake video scams. Based on snippets from, for example, YouTube or corporate webinars, AI can generate fake video footage of a real person. The level of sophistication in this area has now reached a point where it is possible to clone a company executive’s face and voice to conduct entire real-time video conference calls
  • Fake ID and social media scams. AI can generate realistic fake profile pictures for scam accounts. These profiles can then be used as broader corporate fraud attempts
  • Fake AI-generated documents. AI can create counterfeit passports, IDs and other documents. These forgeries can help scammers bypass security checks in financial fraud and identity theft scams

A big part of the problem is that deepfake technology is available to pretty much anyone – if you know where to look. A booming dark web cottage industry sells scamming software of various levels of sophistication from $20 to thousands of dollars. You do not need advanced AI skills to mount an attack; you need cash.

Deepfakes and the wider social engineering landscape

Phishing – i.e. scammers attempting to trick people into revealing sensitive information – has long been part of the cyber threat landscape. An estimated 3.4 billion emails a day are sent by cybercriminals, designed to look like they come from trusted senders, which amounts to over a trillion phishing emails per year.

Finance leaders must be especially wary of ‘bespoke’, personalised attacks. Spear phishing is where messages – ostensibly from a known or trusted party, such as a supplier or customer – are sent to targeted individuals to induce them to reveal information or take specific actions. A highly refined version of this is known as “whaling”, where precisely engineered spoofing messages are created to trick CEOs, CFOs, and other senior stakeholders.

According to Barracuda, spear phishing campaigns make up only 0.1% of all email-based phishing attacks but are responsible for 66% of all breaches. The more targeted and personalised the social engineering campaign, the more likely it is to be successful.

Against this backdrop, deepfake technology extends the fraudster’s toolkit. It sits alongside existing phishing techniques, injecting them with an extra layer of realism.

For example, an attacker does some homework on your company. They obtain the details of your CEO and finance team members via LinkedIn. They hone in on an individual whose job title suggests the authority to execute substantial cash transfers. Looking at the company news section of your website, they also notice details of a couple of new deals or partnerships that they can use as possible backdrops from which to concoct a story.

Lifted from a webinar on your site, they have an excellent data extract of your CEO’s voice. Using a replication tool purchased on the dark web, they can use this for cloning and live voice manipulation.

Using a spoof email, they message the finance team member, pretending to be the CEO. The message requests a quick chat to discuss an urgent transaction. A call is arranged, and the fake CEO tells the employee where to send the cash.

How to prevent deepfake attacks

Good practice includes the following:

Raise awareness 

Most cyber attack techniques rely on human vulnerability, carelessness, and/or a lack of awareness on the victim’s part. This applies to all types of social engineering, including deepfakes.

As we’ve seen, there’s nothing new about phishing, so you should have awareness training in place already (if not, this is an area that needs to be addressed). This should include training on the telltale signs of phishing to look out for, such as irregular email domains or attachments, display name mismatch, or an undue sense of urgency within requests.

Update your training to cover the threats raised by advanced AI. This should include the signs of deepfake attacks, such as unnatural facial movements and expressions, slight visual distortions and imperfect lip synching in video, and slightly robotic speech patterns and inconsistent tone in audio.

Have set procedures in place 

Scammers thrive on inconsistency. If payments are routinely made in an ad-hoc way within a company, it becomes much more challenging for employees to spot a fake email, call, or Zoom session from a genuine one.

Especially for financial transactions, ensure you have set consistent protocols. Examples of this may include:

  • The requirement that every request needs to be accompanied by an invoice and submitted in a set format
  • Multi-factor authentication, e.g. requiring at least two levels of authentication for payment approvals
  • One-time passwords for high-value transactions
  • Multi-person approval systems
  • A strict call-back policy for unusual requests

Ensure that the rules apply to everyone 

Threat actors also prey on the fact that a kind of “Do you know who I am?” culture exists in many organisations. It’s easy to pull rank if you’re a senior exec. So, if you need a payment to be actioned, instead of following the relevant workflow, you telephone someone in accounts and tell them to make it happen.

This is precisely why highly personalised attacks involving senior stakeholders are so popular with fraudsters. If people at the top are routinely bypassing your safeguards, they start to lose effectiveness quickly!

What next? Future-proofing your information security stance

The rapid rise of deepfake attack techniques in such a short time highlights that no company can afford to stand still when it comes to cyber security. Risk analysis, awareness training, multi-layer defence strategies, and optimisation of transaction procedures all demand regular reappraisal and constant vigilance.

So are you currently making the right choices regarding keeping your business safe? Where are your vulnerabilities, and how can they be addressed? This is where Millennium Consulting can help. Combining expertise in cybersecurity and optimisation of office of finance processes, our consultants can review your existing processes, identify your weak points, fill in any skills gaps you may have, and ensure the implementation of an information security framework tailored to your specific needs.

Find Out More Here

Millennium Consulting Awarded ISO27001 & ISO9001 Certification

January 2025

Updating and re-validation of our ISO 9001 & 27001 certification to the globally recognised UK Government UKAS standard. The ISO 27001 certification now aligns with the latest ISO 27001:2022 standard.

VIEW OUR ACCREDITATIONS PAGE

Information Security Best Practice: what to look for when choosing a consultancy partner

Information Security Best Practice: what to look for when choosing a consultancy partner

Information Security Best Practice: what to look for when choosing a consultancy partner 

Your business takes its cyber and information security obligations seriously. But can the same be said of your partners? When appraising potential consultants and service providers, these are the trust indicators to look for.

Avoiding exposure: What makes a technology consultancy a potential infosec weak point?

What attributes do you look for when choosing a consultant to work with? Inside-out knowledge is a must-have. So, too, is responsiveness; you need a partner who ‘gets’ what you need and will work with you to deliver it. And especially when it comes to digital transformation, most decision-makers also want to see clear evidence of program success: “This is a significant move for our company, so can this consultancy actually deliver what we are aiming to achieve?”.

Alongside this, information security is a further area you need to look closely at. With any technological consultancy arrangement, there is an element of handing over the keys to the kingdom or, at the very least, a back-and-forth flow of some sensitive information. Depending on the project, your partner will need detailed information about – and often, direct access to – critical systems, processes, and data.

Threat actors are all too aware of this. They know that when they successfully infiltrate a professional services provider, IT consultancy, or software implementation partner, it potentially opens a rich treasure trove, exposing sensitive data relating to each and every one of their target’s clients.

According to Security Magazine, third-party attack vectors are responsible for 29% of all breaches. Three quarters of these third-party breaches are linked to software products and technological services.

An estimated 60% of organisations use cyber security risk as a key factor when determining transactions and business engagements with third parties, which suggests that a significant minority may be failing to give it proper thought. When it comes to technology projects and process transformation, this risk needs to be on the radar of every business.

So how can you tell if a particular consultancy takes cyber risks and information security seriously? Here are the areas to focus on…

They Have the Right Accreditations

To understand your business, your consultant will need to see items such as your business process maps, details of internal procedures, information on existing system priorities and vulnerabilities, and more general information linked to your future and growth strategies. Once the project is underway, they may need to move or process segments of your data across multiple locations or export it for analysis or testing. Obviously, you do not want this to fall into the wrong hands.
Look for consultancies that have been independently verified as having what it takes to keep your information safe. Probably the single most valuable trust indicator here is ISO 27001. If your consultant has an up-to-date ISO 27001 certification, it shows they have an effective ISMS (information security management system) in place. This means the following:

  • The consultancy has identified the risks to which its information assets – and clients – are exposed.
  • It has appropriate measures (i.e., controls) to protect those assets.
  • It has a clear action plan in case of an information security breach.
  • It adheres to clear accountability and auditability principles: i.e. you know exactly who the individuals responsible are for each step of the information security process.

They Embrace Security by Design

Security by Design (SbD) means that security is considered an integral part of a project at the beginning rather than being layered in later as an afterthought. It means that appropriate security measures are hardwired into new systems or processes at the outset, helping you avoid costly-post-deployment security fixes.

You can learn a lot about whether a particular consultancy takes SbD seriously by the questions they ask you as part of any initial needs appraisal process. The main point of this is to establish how you operate, what you want to achieve, and what needs to be done to help you reach your goals. At the same time, however, an SbD-focused consultant should also explore areas such as the nature and sensitivity of the data you hold, who need access to it, and details of any specific regulatory frameworks that apply to your business. Right from this early encounter, a consultant should consider the information security risks your business faces and factor them into their proposals and recommendations.

They Maintain Appropriate Safeguards

It’s easy for a business to claim that they prioritise information security. The proof is in the action they take. If a consultancy takes its responsibilities seriously, you should expect to see the following types of safeguards in place:

  • The consultancy has an information security policy in place
  • Regular security audits and risk assessments are carried out
  • They follow a recognised information security framework (e.g. ISO 27001). They have up-to-date accreditation to demonstrate this
  • There are clear measures in place to protect client data, including encryption for data at rest and in transit, access controls, and secure storage
  • Special care is taken with personally identifiable information (PII) and other categories of sensitive data. This includes GDPR compliance
  • If they need to do system or application testing using PII, this is anonymized or pseudonymized beforehand
  • Access to client systems and data is closely managed. This includes the application of the principle of least privilege (PoLP)
  • Auditability is taken seriously: they can track and log consultant access to client environments
  • Care is taken to revoke access after project completion
  • Appropriate DevSecOps practices are followed for software implementations
  • Incident response and disaster recovery plans are both in place and verifiable. This includes clear procedures for notifying clients in the event of an information security breach

Millennium Consulting: De-Risking Your Business Transformation Journey

Reputation counts for a lot when it comes to information security. The same goes for longevity.

In its 30-plus years of operating, Millennium Consulting has delivered significant business transformation projects for hundreds of organisations, including businesses in some of the most tightly regulated sectors out there.

Our approach to information security is a big part of our success and longevity. Far from being an afterthought, cyber and infosec best practices are hardwired into everything we do.

To discover more about de-risking and successfully transforming your business, speak to us today.

Contact us

Millennium Consulting Awarded ISO27001 & ISO9001 Certification

January 2025

Updating and re-validation of our ISO 9001 & 27001 certification to the globally recognised UK Government UKAS standard. The ISO 27001 certification now aligns with the latest ISO 27001:2022 standard.

VIEW OUR ACCREDITATIONS PAGE

Millennium+ for Unit4 ERP and ERPx

Millennium+ for Unit4 ERP and ERPx

Find out more

Get in touch to learn more about Millennium+ and explore putting together a cost-effective package that is fully aligned with your needs.

Get in Touch

(Article written and published January 2025)


Cloud ERP has gone mainstream

Unlike traditional on-prem ERP systems, cloud ERP eliminates the need for substantial hardware and infrastructure investment and pay-as-you-go pricing makes ERP accessible to businesses of all sizes.

Cloud ERP can scale up or down based on business needs, accommodating growth or seasonal fluctuations and employees can access the platform from anywhere, enabling remote work and global collaboration. It can be deployed much faster than traditional solutions, which reduces time to value and ERP providers manage software upgrades, ensuring businesses always have access to the latest features and security enhancements.

Cloud ERP is designed to integrate easily with other cloud-based applications, providing a unified technology stack so that businesses benefit from real-time insights and analytics, enhancing decision-making capabilities. Cloud providers also invest heavily in cybersecurity, often providing more rigorous protection than on-premise systems and leading providers will also ensure adherence to global and industry-specific compliance standards.

The shift to hybrid and remote working models has accelerated the need for cloud ERP systems, which provide access from any device with an internet connection. Cloud ERP supports rapid changes in business operations, making it ideal for companies that operate in dynamic fast moving industries. Cloud ERP providers embed advanced technologies such as AI, ML and predictive analytics, enabling intelligent automation and improved processes. Seamless integration with IoT devices enhances real-time operational monitoring and decision-making.

Cloud-based systems reduce the need for energy-intensive on-premise data centres, aligning with environmental sustainability initiatives. The combination of cost efficiency, adaptability and technological advancement makes cloud an attractive choice for businesses aiming to remain competitive in a fast-paced, digital-first world.

Isn’t it time you considered migrating to the Cloud?

To explore how you can make the Cloud a reality, speak with Millennium Consulting and we can share with you the benefit of our experience working with many of the world’s leading organisations on their Cloud journeys.

Contact us

Unit4 Release Schedules 2025

Unit4 Release Schedules 2025

Unit4 Financial Planning & Analysis Release Schedule 2025

Please find below the preliminary release schedule of FP&A 2025

2025 Non-production (Preview & Acceptance) Production
Q1 18th March 26th/27th April
Q2 17th June 19th/20th July
Q3 16th September 25th/26th October
Q4 9th December 24th/25th January
  • Data Centre: SaaS Azure
  • Product: U4FPA
  • Deployment option: Shared, Dedicated
  • Environment types: Preview, Acceptance, Production

Please note that this is a preliminary schedule and is subject to change.

ERR CR Release Schedule 2025

Please find below the preliminary release schedule of ERP CR 2025

2025 Preview Acceptance Production
Q1 24th March 21st April 25th/26th May
Q3 22nd  September 27th October 22nd / 23rd November
  • Regions: Worldwide
  • Products: ERP CR
  • Data Centre: SaaS Azure
  • Deployment option: Shared, Dedicated
  • Environment types: Preview, Acceptance, Production
2025 Non-production (Preview & Acceptance) Production
Q1 24th March 26th May
Q3 22nd  September 24th November
  • Regions: Nordics
  • Products: ERP CR
  • Data Centre: Nordics
  • Deployment option: Public, Dedicated
  • Environment types: Preview, Acceptance, Production

Please note that this is a preliminary schedule and is subject to change.

A detailed overview of the release scope and hourly schedule will be published after the official Release announcement on Community4U.

Unit4 Financials by Coda Continuous Release

Please find below the preliminary release schedule of Unit4 Financials by Coda 2025

2025 Preview Acceptance Production
Q1 18th March (R1)

22nd/23rd April (R2)

25th March (R1)

7th/8th May (R2)

26th/27th April

24th/25th May

Q2 17th June 24th June 19th/20th July
Q3 16th September 23rd September 25th/26th October
Q4 9th December 16th December 24th/25th January
  • Data Centre: SaaS Azure
  • Product: U4F
  • Deployment option: Shared, Dedicated
  • Environment types: Preview, Acceptance, Production

Please note that this is a preliminary schedule and is subject to change.

Unit4 ERPx Release Schedule 2025

Please find below the preliminary release schedule of ERPx 2025

 

2025 Non-production (Preview & Acceptance) Production
Q1 17th March from 5.00 am to 5:00 pm UTC – United States/Australia/ Norway

 

18th March from 05.00 am to 5:00 pm UTC – Europe/United Kingdom/ Canada

26th April from 5:00 pm to 27th April 05.00 am UTC – all regions
Q2 16th June from 05.00 am to 5:00 pm UTC – United States/ Australia/ Norway

 

17th June from 05:00 am to 5:00 pm UTC – Europe/United Kingdom/ Canada

 

19th  July from 5.00 pm to 20th July 5.00 am UTC – all regions
Q3 15th September from 5.00 am to 5.00 pm UTC – United States/Australia/ Norway

 

16th September from 05:00 am to 5:00 pm UTC – Europe/United Kingdom/ Canada

 

 

 

18th October from  5.00 pm to 20th July 5.00 am UTC – all regions
Q4 To be updated To be updated

Please note that this is a preliminary schedule and is subject to change.

Source-to-Contract Release Schedule 2025

Please find below the preliminary release schedule of Source-to-Contract 2025

2025 Non-production (Preview) Acceptance Status
Q1 12th March 16th March Planned
Q2 11th June 15th June Planned
Q3 10th September 14d September Planned
Q4 3rd December 7th December Planned
  • Regions: EU, Australia, Singapore
  • Products: Source-to-Contract
  • Data Centre: Amazon Web Services and Google Cloud Platform
  • Deployment option: Shared
  • Environment types: Non-production (Preview) & Production

Please note that this is a preliminary schedule and is subject to change.


Why choose Millennium for Unit4?

As an Elite Unit4 Partner with over three decades of experience in Change Management, we bring expertise in designing, implementing, and supporting the right Unit4 solution for your business. Unlock the full potential of your Unit4 solution by partnering with Millennium – your trusted transformation partner.

Talk to our experts

Unit4 Financials by Coda Release Schedule 2025

Unit4 Financials by Coda

Release Schedule 2025

Unit4 Financials by Coda Continuous Release

Please find below the preliminary release schedule of Unit4 Financials by Coda 2025

2025 Preview Acceptance Production
Q1 18th March (R1)

22nd/23rd April (R2)

25th March (R1)

7th/8th May (R2)

26th/27th April

24th/25th May (R2)

Q2 17th June 24th June 19th/20th July
Q3 16th September 23rd September 25th/26th October
Q4 9th December 16th December 24th/25th January
  • Data Centre: SaaS Azure
  • Product: U4F
  • Deployment option: Shared, Dedicated
  • Environment types: Preview, Acceptance, Production

Please note that this is a preliminary schedule and is subject to change.

Why choose Millennium for Unit4 Financials by Coda?

We are an Elite Unit4 Partner with more than three decades of experience working with Unit4 Financials by Coda. That means we have the knowledge and experience to design, implement and support the right Unit4 Financials solution for your business.

Talk to our experts

Unit4 Financials 2024 Q4 Release

Unit4 Financials by Coda 2024Q4 was made available on 3rd December 2024.

The new release contains all the previous Unit4 Financials by Coda functionality, new features, security updates, and customer-identified fixes to extend the best-in-class software solution. Unit4 has addressed many customer-reported issues and hence always encourages customers to upgrade to the latest release.

 

Highlights of the 2024Q4 release include:

Administration:

Hyperlink on Print Formats

It is now possible to have a hyperlink on a print format.

Finance:

Element Master

The Credit note document and Mapping master can now be specified on a Supplier element for use in Electronic Invoicing.

Company Master

The Credit note document and Mapping master can now be specified on the Company for use in Electronic Invoicing.

Electronic Invoicing:

API

The Electronic Invoicing REST resource is now available to allow authorized users to submit a UBL Invoice or Credit Note to Unit4 Financials by Coda.

Invoice Maintenance

The document type is now displayed in the Invoice Maintenance grid.

It is now possible to delete rows from within Invoice Maintenance.

Public API:

REST API

A new suite of REST API functions is now available.

The REST API follows the same business structure as the XMLi and SOAP API options, so each functional operation available in those integration methods is also available in the REST API.

Technical:

Security Updates

A vulnerability in the ExtJS user interface library has been resolved.

HTTP security headers (Cross-Origin-Resource-Policy and Permissions-Policy) have been added to the WildFly setup scripts as default.

A third-party library, Apache XML Graphics FOP, used in the printing functionality has been updated to improve security.

Deprecated features:
The .NET router has been deprecated. The final release has not been determined.

32-bit XL is deprecated and will be removed in the 2025Q1 Release. We recommend the use of 64-bit XL.

The Integration Toolkit Command Centre module (ITK) has been deprecated and will be removed in a future release. The final release has not been determined.

General Fixes/Updates:

  • It is no longer possible to delete the user master which is registered as the system user in Application Parameters.
  • Table Link Document Housekeeping now deletes the flexi field data when the table naming does not match the flexi field master code.
  • Print Formatter Print functionality has been corrected.
  • The Document approver field is now populated in Browse Details when this field is set on the presenter.
  • Microsoft SQL Server Hint Masters now work correctly when selecting data for the Pay/Collect process.
  • Where Intray modification is prevented, the user can now auto-post from Intray to Books for manual tax and Intercompany documents.
  • In Finance Input the ‘Resolve‘ button will also be triggered on leaving the field if the value in the field has not been modified.
  • Shared master audit no longer shows errors for Electronic Invoicing account mappings on recently created element masters.
  • When confirming reminder letters using webservices the GetProgress service now returns the appropriate response
  • Reporting Codes and Element Status are now correctly displayed in Browse Balances when the description is more than 20 characters. A serious error no longer occurs.
  • The selector operator ‘Is blank‘ is now available in XL when using Generic Browse.
  • Property com.coda.common.app.attachment.http.checkRemote is now documented in the Configuration Settings Guide.
  • The Strict-Transport-Security HTTP header is now correctly set. This fix particularly affects users of WebSphere where later fix packs now perform validation of HTTP header names.
  • Memory usage when exporting data to Microsoft Excel has been reduce, e.g., exporting data from Browse Details.

Further details on the new features, security updates and reported issues can be found in the release documentation.

The release documentation for this release (and previous releases) can be found in the documentation area on the community.

The software can be downloaded from the “Software” tab on Community4U.

 

Release dates for Cloud users

Unit4 Cloud customers are notified by Unit4 Cloud support when their pre-production and production systems will be updated. This information can also be found within the Cloud Services – Release Schedules area.

View the 2024 Release Schedule here

The Release Notes detailing the fixes and features within this release can be found in the Documentation area on Unit4’s Community 4U.


Are you making the most of Unit4 Financials by Coda?

Our Systems Health Check is designed to help you identify areas where you may be able to improve performance and ensure you extract the maximum benefit from your investment in Unit4 Financials by Coda.

Find out more

Unit4 Financials by Coda Release Schedule 2024

Unit4 Financials by Coda is maintained via continuous release cycle of the software. An .iso is available from within Unit4’s Community 4U.

Local / Additional modules are released independently of the above release cycles and are notified via Unit4’s Community 4U. The maintenance of local products at v14 ceased at the end of December 2022.

Below you will find the currently planned release availability dates of Unit4 Financials by Coda Continuous Release during 2024. The dates below are advising of the date the software is released from Engineering and downloadable by our on-premise customers.

Unit4 Financials by Coda Continuous Release

2023Q4 Release Released 5th December 2023
2024Q1 Release

2024Q1 Release 2

Released 12th March 2024

Released 15th April 2024

2024Q2 Release

2024Q2 Release 2

Released 11th June 2024

Released 1st July 2024

2024Q3 Release Released 10th September 2024
2024Q4 Release Released 3rd December 2024

(The final release available for on-premise customers)

These dates can sometimes be subject to alteration.


Unit4 Financials by Coda, Cloud Upgrades Schedule 2024

Unit4 Cloud customers are notified by Unit4 Cloud support when their pre-production and production systems will be updated. This information can also be found within the Cloud Services – Release Schedules area.

2024 Preview Acceptance Production (Planned Maintenance Window)
Q1 Tuesday 19th March 2024 Tuesday 26th March 2024 20th /21st April 2024
Q1 R2 Tuesday 19th March 2024 Tuesday 26th March 2024 25th/ 26th May 2024
Q2 Tuesday 18th June 2024 Tuesday 25th June 2024 20th /21st July 2024
Q2 R2 Monday 1st July 2024 Friday 5th July 2024 20th /21st July 2024
Q3 Tuesday 17th September 2024 Tuesday 24th September 2024 19th /20th October 2024
Q4 Tuesday 10th December 2024 Tuesday 17th December 2024 25th /26th January 2025

These dates can sometimes be subject to alteration.


On 17th October 2023, Unit4 announced to its customers that it has taken a strategic decision to provide only Software as a Service (SaaS) solutions going forward. With Cloud being industry standard, we are transitioning on-premises Unit4 ERP, Unit4Financials by Coda, and Unit4 FP&A to being fully cloud based solutions.

With that, these solutions will no longer be supported or maintained by Unit4 with effect from 31st December 2024. Millennium and Unit4 are offering all on-premise customers a clear and attractive opportunity to migrate to the Unit4 Cloud.


Legacy software versions

v14

Release 19 – Released 28th October 2022

Critical bug fix end date has been reached for v14 – Please contact your Unit4 Account Manager to discuss upgrade options to Unit4 Financials by Coda Continuous Release.

v13

Service Pack 23 – Released 27th September 2019

Critical bug fix end date has been reached for v13 – Please contact your Unit4 Account Manager to discuss upgrade options to Unit4 Financials by Coda Continuous Release.


Why choose Millennium for Unit4 Financials by Coda?

We are an Elite Unit4 Partner with more than three decades of experience working with Unit4 Financials by Coda. That means we have the knowledge and experience to design, implement and support the right Unit4 Financials solution for your business.

Talk to our experts