Quantcast
Channel: Ivanti User Community : All Content - Patch Manager
Viewing all 1121 articles
Browse latest View live

Patch and Compliance Definitions - Inventory Categories only showing on some servers

$
0
0

How can I get every server to have the Inventory Categories of Detected Patch and Compliance Definitions and Patch and Compliance Definitions Fields.  It is on some servers but not all; how do I get it on ALL Servers; is there a Data Analytics option that I need to run?  Please help, that seems to give a lot more information regarding patch levels on a server.  I'm also trying to find reports that can help during monthly patch remediation; what reports do you suggest that will tell me what patches were put on what machine this month?

 

I really need some good reports for Patch and Compliance for my servers; please point me in the right direction.


List of wusa.exe exit codes and descriptions

$
0
0

Hello.

 

When troubleshooting Windows patch installs, it's often a good help knowing what the wusa.exe exit code means as it can point you in the right direction to what the cause might be.

 

My problem is that I so far haven't found a good source of information for these exit codes. For some of them, I can convert the decimal value to hex and find the code on Windows Update error code list. I currently have more than 70 different "wusa.exe returned failure exit code" messages in my database, but it's only less than 10 of them I've been able to find a good description for.

 

Does anyone have a good list they want to share?

 

Thanks in advance.

Printer Issues after Security and Patch Updates

$
0
0

Has anyone out there seen any issues with printers after doing Security and Patch updates via LANDESK?  We've been seeing a fair amount of issues where printers have to be reinstalled after the LANDESK Security and Patch scan is run against the machine and patches are applied.  This seems to affect both locally-installed and network printers, Windows XP and 7, desktops and laptops.  We're only pushing Microsoft and LANDESK updates, so it's entirely possible that one of the Microsoft updates is causing it, but we haven't been able to identify which one (or ones) might be causing it.

 

Thanks in advance!

Patch manager and WSUS

$
0
0

Hi,

 

Have anyone have both WSUS and patch manager working together?  I just want to know can they co-exist in the same environment and what is the benefit to have both of them coexist.   Thanks, Chan

Creating a distribution and patch agent setting video tutorial

$
0
0

This video will go through some of the basics of creating a distribution and patch agent setting.

 

Change the number of Security Scan logs kept on a managed device

$
0
0

Environment


  • LANDESK Management Suite 9.6

 

Issue


  • The LANDESK Agent doesn't keep the desired number of Security Scan logs in the %programdata%\vulscan folder


Resolution

 

Add or change the key maxBackups (DWORD) in the following registry path, as shown in the video:

 

32 bit devices

HKLM\Software\LANDesk\ManagementSuite\LogOptions\Vulscan.exe

 

64 bit devices

HKLM\Software\Wow6432Node\LANDesk\ManagementSuite\LogOptions\Vulscan.exe

 

LANDesk Integration Microsoft WSUS

$
0
0

Is it possible tointegrate MicrosoftWSUSinLANDesk Management Suite9.5SP2?

Does LANDesk Maintain ESR builds of Adobe Flash in their patch module?


Downloading Patch Content Fails on Schedule But Works Manually

$
0
0

When I manually initiate the downloading of patch content everything works fine.  When I schedule it as a task and run it, it fails.  Thoughts?  LANDesk 9.6 SP1.  The owner of the task is the same as what I am logged in with (and able to run manually with). The vaminer.details.log file is a bit cryptic; it's acting like it can't verify the connection to the patch site (I am on the east coast, so my corporate firewall is open for https://patchec.landesk.com).  We are not using a proxy server.

 

I can post the text of the log file (once from the successful download and also from the failed) if that would be helpful.  I'm looking for any thoughts or advice at this point.

 

Thanks!

LDMS 9.5 and 9.6 Patch Manager Schema

$
0
0

Introduction

This document lists the main tables used by patch manager.  It also describes some of the columns useful in building custom reports.  This document covers both LANDESK Management Suite 9.5 and 9.6.

 

Purpose

Many customers wish to create their own reports or query the database for patch information directly using SQL tools.  This document describes most of the patch tables and how the information they hold.  It also highlights many of the columns that either link to other tables or are not easily understood and could use a little explanation.

 

LANDESK Customer Support does not write custom reports, however this document will help customers when they write their own queries/reports.

Main Patch Definition Tables


Vulnerability Table

This table contains information about the Patch Definition.  In this example we’ll use MS14-065.

 

Vulnerability_Idn this column is unique per patch definition and is how the definition will be referenced in other tables.


Vul_ID this value is what appears in Patch Manager as the “ID” column.

Severity this value corresponds to the severity as follows:

0- Service Pack

1- Critical

2- Important/High

3- Moderate/Medium

4- Low

5- NA

6- Used by non-Vulnerability types like Application Blocking


Vendor this value lists the vendor of the patch


Status this value denotes what state the patch definition is in as follows:

0- Do Not Scan

1- Scan

2- Unassigned


Type defines what type of a definition it is as follows:

0- Vulnerabilities

1- Spyware

2- Security Threats

3- LANDESK Updates

4- Custom Definitions

5- Blocked Apps

6- Software Updates

7- Drivers

8- Antivirus


Scanned, Detected, Repaired, NotScannedCount all refer to the counts of machines that have fallen into the various categories.  Important note: Gather historical data is the task that updates these numbers


SupercededState This value denotes if the vulnerability has been superceded (replaced) by a newer vulnerability

0- Not superceded

1- Some rules have been superceded

2- All rules have been superceded

Patch Table

Inside of each definition listed in the vulnerability table, there could be multiple rules that define how to detect and usually how to remediate each vulnerability.  In our example definition MS14-065 there are 9 rules at the time of writing this.  You can view these by opening the MS14-065 definition and viewing “Detection Rules” under the General Tab.

Highlights of the Patch table and how certain columns relate to the Vulnerability Table:


Patch_idn this column assigns a unique ID to each Patch rule. Other tables like patchtoproduct and patchtoplatform will refer to rows in the Patch table by this patch_idn.

Vulnerability_idn shows the unique Vulnerability that each Patch rule refers to.  This number will likely be different for each core.  For example, in my DB MS14-065 is Vulnerability_Idn 25870.  If I query the Patch table for all rows that have Vulnerability_Idn = 25559 I get back 9 rows as expected.  These are the 9 rules that are found under “Detection Rules” in the console for MS14-065.


UniqueFileName This column shows the patch name that is stored in the Patch download location, typically //coreserver/ldlogon/patch. 

URL is the download URL for the patch, if there is one.  Some vulnerabilities don’t have a download or it has to be manually downloaded.


Name this is the name of the rule.  You may note some strange capitialization in names, this is normal.  In case more than one rule is needed per patch (UniqueFileName) this column maintains case-sensitivity.


Ignore this is used if the rule has been disabled (0 = on, 1 = disabled).  See this document for more info on disabled rules: https://community.landesk.com/support/docs/DOC-32270


Download indicates if a patch can be downloaded for this rule.


InPatchDir indicates if the patch has been downloaded


Commands this is where the rule’s detection and remediation commands are stored, it is not human readable.


Reboot, CanRunSilent, Uninstallable all indicate if the rule needs a reboot, can run silent, and/or is uninstallable.  0=no 1=yes


SupercededByVulID this column indicates the Vulnerability_Idn of a definition that replaces that rule.  In this example, MS14-080 replaces all of the rules in MS14-065.


ComputerVulnerability

This table ties vulnerabilities and computers together; showing which machines are vulnerable or not vulnerable to a particular vulnerability.  It also shows the detection reason, first detection date and the last date the vulnerability has been scanned for on the computer.


Computer_Idn relates to the Computer table.  Using the Computer_Idn you can query the Computer table to find device name or other info.


Detected indicates the vulnerability is detected on that computer


PatchDetected indicates if the patch has been identified as having been installed on the machine. 0= Not detected, 1= Detected, -1= Unknown


Reason shows the cause of detection or non-detection


Patch shows the specific patch that would or was detected


PatchInstalledState Shows if the patch was not installed (0), failed to install (1), or succeeded (2)


DateDetected shows the first date the vulnerability was detected


LastScanDate shows the last date the computer was scanned for the vulnerability


Expected Shows what value was expected


Found Shows what was actually found on the computer


PatchHistory Table

The patchhistory table shows actions that have occurred on a computer.  There are 2 unique columns that need explanation: Type and ActionCode.

Type:

TypeVulnerability= 0,

TypeSpyware= 1,

TypeSecurityCheck= 2,

TypeSoftwareUpdate= 3,

TypeUserDefined= 4,

TypeBlocker= 5,

TypeSoftware= 6,

TypeDrivers= 7,

TypeAV= 8,

TypeLastType= 8,

TypeGeneralEvent= 10,

TypeSendTaskStatus= 13,

TypeSWPackage= 20,

TypeNone= -1,

TypeLANDeskAV= 80,

TypeCompliance= 98,

TypeAlerting= 99,

TypeGroup= 100

 

ActionCode::

IS_NONE= 0,

IS_DOWNLOAD_FAILED= 0,  

IS_LAUNCH_FAILED= 1,

IS_LAUNCH_SUCCEEDED= 2,

IS_UNINSTALL_DOWNLOAD_FAILED= 3,

IS_UNINSTALL_LAUNCH_FAILED= 4,

IS_UNINSTALL_LAUNCH_SUCCEEDED= 5,

IS_SPYWARE_REPAIR_FAILED= 6,

IS_SPYWARE_REPAIR_SUCCEEDED= 7,

IS_RT_SPYWARE_REPAIR_FAILED= 8,

IS_RT_SPYWARE_REPAIR_SUCCEEDED= 9,

IS_VIRUS_REPAIR_FAILED= 10,

IS_VIRUS_REPAIR_SUCCEEDED= 11,

IS_VIRUS_QUARANTINE_FAILED= 12,

IS_VIRUS_QUARANTINE_SUCCEEDED= 13,

IS_SUSPICIOUS_QUARANTINE_FAILED= 14,

IS_SUSPICIOUS_QUARANTINE_SUCCEEDED= 15,

IS_SUSPICIOUS_NO_ACTION_TAKEN= 16,

 

IS_RT_VIRUS_REPAIR_FAILED= 17, 

IS_RT_VIRUS_REPAIR_SUCCEEDED= 18,

IS_RT_VIRUS_QUARANTINE_FAILED= 19,

IS_RT_VIRUS_QUARANTINE_SUCCEEDED= 20,

IS_RT_SUSPICIOUS_QUARANTINE_FAILED= 21,

IS_RT_SUSPICIOUS_QUARANTINE_SUCCEEDED= 22,

IS_APP_BLOCK_FAILED= 23,

IS_APP_BLOCK_SUCCEEDED= 24,

IS_AVSERVICE_FAILED_TO_START= 25,

IS_VIRUS_FOUND= 26,

IS_RT_VIRUS_FOUND= 27,

IS_SUSPICIOUS_FOUND= 28,

IS_RT_SUSPICIOUS_FOUND= 29,

 

IS_REBOOT_NEEDED= 30,

IS_REBOOT_NOT_NEEDED= 31,

 

IS_INSTALLING_AV= 32,

IS_REMOVING_AV= 33,

IS_INSTALLED_AV= 34,

IS_REMOVED_AV= 35,

IS_FAILED_INSTALL_AV= 36,

IS_FAILED_REMOVE_AV= 37,

IS_AV_REBOOT_PENDING= 38,

 

IS_LOGIN= 39,

IS_LOGOFF= 40,

 

Miscellaneous Patch Tables


Platform

Lists the various platforms that Vulscan can detect.  Not all Platforms will be listed as patch content may be the same between similar platforms.


PatchProduct

Shows the different products detected by Patch.  Not all products are expected to be in this list, these are just common ones.


PatchSettings

This is where the different settings are stored such as proxy info for download updates


PatchtoPatchProduct and PatchtoPlatform

Relates the Patch table to PatchProduct and Platform tables


PatchTrend, PatchTrendCompCounts, and PatchTrendScoped

Shows trending information for patches.  Trend data is captured during Gather Historical Data tasks.


VulcountsScoped

Shows detection counts for vulnerabilities with the various scopes applied.

It also shows if vulnerabilities are set to be scanned or autofixed by scope (9.6sp1+)

Conclusion

This document describes the main tables used in patch and lists information about columns that would be useful for building custom reports

Definitions not updating (no patches available for Microsoft/Firefox/Chrome/etc.) Reporting "Signature is not valid"

$
0
0

We've noticed that we are currently unable to download definitions through LANDesk (either through the schedule of manually)

 

When we run the update manually, we see the error messages:

Signature is no valid
Failed to download platform information

 

If we turn off signature validation, the log looks successful, however no patches are added to the Unassigned group.

 

We haven't changed our process for downloading and assigning definitions since we updated to LANDesk 9.6 three months ago.

 

Thanks

Issue: Cannot download patch content after installing SP1 for 9.6.

$
0
0

Issue:

Get the following error when downloading Patch Content after installing SP1 on the 9.6 Core Server:

Invalid column name 'Scan'

 

Cause:

DATAMARTPM.XML did not get updated in the Managementsuite folder on the Core Server when SP1 was installed.

 

Solution:

1. Delete the DATAMARTPM.XML file from the Managementsuite folder on the Core Server.

2. Reinstall SP1 on the Core Server.

LANDESK Management Suite 9.6 patch & compliance documentation

$
0
0

The links below go to the LANDESK Help Center user documentation:

New icon showing up in clean/repair history.

$
0
0

As of 12/1/2014 we have a new icon and action showing up in clean/repair history for login/logout. Has anyone seen this, and if so what setting is tracking login/logouts?

Login.png
logout.png

New Icons.png

 

LDMS 9.5 SP3

LDDA 9.6 SP1

Surface Pro 3 firmware updates

$
0
0

Does anybody know where I can find the firmware updates for the Surface Pro 3 in Patch Management?


Java SE 6 Update 91 x64 binaries in patch folder, but still showing as "not downloaded" - ideas?

$
0
0

I downloaded Oracle Patch 9553040 from My Oracle Support (patch filename is p9553040_160_MSWIN-x86-64.zip).  I extracted the two executables (jdk-6u91-windows-x64.exe and jre-6u91-windows-x64.exe) to the patch folder (right-click to"Open patch folder...").  They still show up as not downloaded.  This worked just fine for the 32-bit binaries (ending in -i586.exe instead of -x64.exe).  Any ideas what might be the issue?

 

Thanks,

Charles

Reboot Prompt Shows Hours Until Automatic Reboot

$
0
0

Symptom

 

Reboot prompts indicate more time till automatic reboot than is defined in the reboot settings.

Example: Reboot shows it will automatically reboot in 13 hours instead of 5 minutes which is what the reboot settings show.

 

1-long time reboot.png

 

Cause

 

LDReboot.exe was called outside of the reboot maintenance window defined for the agent.

 

"C:\ProgramData\landesk\log\ldReboot.log" shows that ldReboot was called outside of the maintenance window:

 

Tue, 27 Jan 2015 14:28:41    Auto-reboot window is specified
Tue, 27 Jan 2015 14:28:41       Time window:   04:00 to 05:00
Tue, 27 Jan 2015 14:28:41       Days of week:  any
Tue, 27 Jan 2015 14:28:41       Days of month: any
Tue, 27 Jan 2015 14:28:41    Auto-reboot time is outside auto-reboot window - changing to 2015-01-28 04:00:00

 

The maintenance window is defined in the Agent's reboot settings under General | Automatic reboot

 

2-window.png

 

Solution / Workaround

 

Because an auto-reboot window has been defined, automatic reboots will only be permitted within the designated time frame.

This can cause behavior different than intended if ldReboot is called outside of that window, for example during a patch cycle.

To correct this, define a longer reboot window, or disable the window.

Allowing multiple hour delays on automatic reboots has been seen to fail, as other actions may call ldReboot and reset the timer.

vulscan.exe is Causing UAC Prompt after Login

$
0
0

After deploying an updated agent configuration to some Windows systems, I get the following UAC prompt:

 

vulscan uac prompt.png

 

Why is this?  I'm not even sure which logs would help; there's also nothing apparent in Event Viewer.

How can I use Landesk to disable addons in Internet Explorer?

$
0
0

Specifically, I would like to be able to disable and prevent the user from re-enabling Flash.

 

-Brendan

Patches fail; when manually installed the result in "does not apply to this computer"

$
0
0

We recently upgraded to LANDesk 9.6 SP1.

 

We are now going through and patching our machines. I apply a patch. It fails. I try again. It fails. I remoted to the machine and set LANDesk to show the installation. I ran the patch again to see if there was anything interesting. All it does is says it failed. The return code is 412.

 

So I copied the actual patch from the Core Server and placed it on the machine. I ran it. I get "This update is not applicable to your computer."

 

I don't want to move the patch to Do Not Scan because there may be other machines that need the patch down the road.

 

Any thoughts on what I should do?

Viewing all 1121 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>