Quantcast
Channel: Ivanti User Community : All Content - Patch Manager
Viewing all 1121 articles
Browse latest View live

High CPU Usage by ISSUSER.exe

$
0
0

On LD 9.6 SP1 client I'm seeing issues with ISSUSER.exe running at 100% of one core and sometimes faulting.

Once suggestion was to replace the jscript.v55 file, but that has not resolved the issue.

 

Looking at the application errors  in the diagnostic data in inventory I'm seeing the following

2015-05-29 16_20_06-Inventory - BRDROEDE3NKNWZ1 - __Remote.png

So it appears the LIBEAY32MT.dll is where it's faulting at with an exception code of c0000005

 

Any advice?


Problems with SHOCKWAVEPLAYERv11.6.7.637

$
0
0

Anyone else have this problem? Patch won't download because has doesnt match what is being downloaded from adobe.com

 

Downloading sw_lic_slim_installer.exe (3710 KB)...

Hash for patch sw_lic_slim_installer.exe does not match with host.  Discarding.

How to upgrade from MS Lync to Skype for Bussiness using LANDesk (patch manager)?

$
0
0

Hi,

did anyone went through this process? What are the proper steps? I did try to use MS script that should switch from Lync to Skype but didn't work. Using patch management I didn't find the way neither.

 

Thank you for hints.

Repair Tasks not Showing After Portal Refreshes

$
0
0

Purpose

 

This article explains the behavior of optional and recommended Patch Repair tasks as they relate to the LDMS Portal

.

Symptoms

 

When creating a patch repair task as a policy, and setting the task to be optional or recommended in the LDMS Portal, the task may:

  • Take multiple refreshes to show in the portal
  • May not show in the portal at all

 

Cause

 

When a patch repair task is set as a policy, and is made optional or recommended in the LDMS Portal, the following occurs:

  • The policy is made available to the client
  • The client runs policy sync (clicks refresh in the portal)
  • The policy is downloaded and triggers vulscan to scan for the patches in the repair task
    • A patch must be detected as 'missing' to be displayed in the portal.
  • A secondary policy.xml file is created on the client containing a list of which patches were found as missing
  • The client runs poilcy sync (clicks refresh in the portal)
  • The second policy.xml file is parsed, and any patches listed within it are published to the portal

 

If 'show one portal entry with the following title:' is selected, a single entry will be created in the portal which when ran will repair all detected patches.

Note: If no patches were found as missing, no items will be shown in the portal.

 

If 'show each definition seperately' is selected in the scheduled tasks properties, patches will be contained per definition within the portal.

Example: Definition MS15-020_MSU contains patch kb3039066 and kb3032323.

In our test scan, both of these patches were detected as missing, but since they belong to the same definition (MS15-020_MSU), only the definition is advertised in the portal.

 

patchmanager.png

 

 

 

Because vulscan checks patches listed for repair first, and only offers those needed through the portal for repair, policysync (refresh in the portal) is required to be ran a second time after vulscan finishes its scan.

Running policysync (refresh in the portal) prior to vulscan completing its scan will not populate any items in the portal.

If policysync (refresh in the portal) is not manually ran, it will be ran on its scheduled interval as defined in the agents settings.

AfterApplying AdobeDC patch, all machines lost Adobe file associations

$
0
0

After applying the below patch, all machines that this was applied to, lost their local file associations with PDFs and are unable to open PDF docs via IE or Chrome.

 

LANDESK Patch News Bulletin: Adobe has Released Acrobat Reader DC version 2015.008.20082 for Windows 15-JUL-2015

 

Running a repair Installation via Adobe DC (Reader) fixes the issue, but why is this causing this problem, and how do we fix this on a wide-scale?  has anyone else encountered this problem?

 

Thanks!

 

LDMS 9.6 SP2

Unable to schedule and start a patch download

$
0
0

Overview: The ability to schedule and start a patch content download is limited to administrators. A non-administrator can schedule the download but they cannot start it.

 

Resolution: This is by the current design.

Scheduled Tasks

$
0
0

Hello:

 

We are running LANDesk 9.6 with SP2 on Windows Server 2012 R2.  When we have tasks scheduled and those tasks run, it logs an error in the Event Viewer.  The error that is logged is "The Interaction Services Detection service terminated with the following error: Incorrect Function". 

 

What do I need to do or how should I be scheduling these tasks, so that it does not try to start the Interactive Services Detection service wish is set to "manual" in Windows Services.

 

Thanks,

Gary Shadley

Status: "No Patches Available" in Scheduled Task status after scheduling Patch and Compliance repair job

$
0
0

Issue

After scheduling a repair task or policy, clients complete with a status message of “Successful” a result of "No Patches Available"

 

Cause

This is caused by patches in the repair task not being detected as needed on the client.  Patches can only be applied if the vulnerability definition being scanned for shows the computers as affected.

Typically this is because a security scan has not been run recently.

 

Resolution

  1. Make sure the vulnerability is in the Scan folder in the Patch Manager window.
  2. Run a Security Scan, verify that the Distribution and Patch Settings are configured to scan for the type of definition desired. (vulnerability, LANDesk update, etc.)
  3. Verify that the scan completed successfully.
  4. Add the machine(s) to the repair task and restart the task.


Alternatively, when repairing against a group of definitions in Security and Patch Manager, both the Scan and Repair take place during the repair job

 

──────────────────────────────────────────────────────────────────────────────

This issue can also be indicative of a failure for the Core Server to access the database to get the patch information.  This is typically done through the GetAllPatches web call from client to core.  The core then generates an XML that gets downloaded to the client that contains the data about the patches that need to be installed.   Failures to parse the XML on the client can cause the issue as well.

──────────────────────────────────────────────────────────────────────────────

 

The following details this issue:

 

Getting errors in the vulscan log that reflect:

Warning:  AddPatchesToPatchList - Failed to parse xml data or there were no patches 0x80004005

No patches found for vulnerability="Vulnerability ID".  Returning PATCH_NO_PATCHES_AVAILABLE


Cause

 

This is due to an incompatible Vulscan.dll version causing the .XML data for the patch information to be parsed incorrectly.

 

After the Vulnerability Scanner has run on a client, it will report back the vulnerabilities found to the server.   If autofix is enabled, or the vulscan task is a repair job, it will also request the corresponding patch details from the core server.

 

An .XML file containing the patch data will then be downloaded to the client.

 

Typically this .XML file will have a name like the following:

 

If repairing against a group: GetPatchesForGroup.CoreNameAndRevision.patchlist.xml

 

If repairing a particular vulnerability: GetPatchesForVulnerability.PatchName.CoreNameAndRevision.patchlist.xml

 

The client then attempts to parse this XML and pass the information over to the Software Distribution portion of the repair process.

 

Resolution

Check the Vulscan.dll version on the core in your LDLogon directory.  If the DLL version is does not match what should exist due to your current patch level, manually copy the vulscan.dll from the service pack install or component patch and see if this resolves the issue.


not able to push landesk 9.6 agent

$
0
0

I have pushed the agent to new machines ,I am not getting any error .

All Patches failed on Microsoft updates error 412- but its false error - 34 patches sucessfull

$
0
0

I patch a server a server yesterday with roughly 40 Microsoft updates.

All were downloaded prior to the job.

Patch 34 patched just fine and I verified this on the server, but the Task in the Management Console shows All Patches Failed- Error 412.

This cannot be, but there it is as plain as day.

 

how can I achieve accurate results.  is there a report I can run that show all the patches applied and failed patches?

 

Thanks in advance

 

Dave

 

Log file...

   
Running patch windows-kb890830-x64-v5.27.exe
Installing patch 34 out of 34 patches
Contacting server...

Contacting server...

     Done
Running post-install/uninstall script
Sending previous action history to core
Contacting server...

     Done
Sending status to core

...

 

http://192.168.46.134/LDLogon/patch/ie10-windows6.1-kb3087985-x64.msu
    Failed
     Failed: Could not download http://192.168.46.134/LDLogon/patch/ie10-windows6.1-kb3087985-x64.msu
Running pre-install/uninstall script
Running post-install/uninstall script
Sending previous action history to core
Contacting server...

     Done
Sending status to core

How to maintain patch content in LDMS 9.0 SP2 and earlier

$
0
0
The following article applies to a version of the product that is no longer officially supported
Latest information on this topic:How to manage replaced (superceded) patches in Security and Compliance Manager

 

Applies to LANDESK Management Suite 9.0 Service Pack 2 and earlier


LANDesk provides a large number of vulnerability definitions for a large number of products going back quite some time. Because newer patches sometimes replace older patches, LANDesk provides this information as part of the definition. When a newer patch or vulnerability becomes available, the previous version will be marked as replaced, either partially or completely. This information can be used to improve the performance of Security Scans on client machines as well as provide more accurate information about the vulnerability status of machines. Some other symptoms that are seen and can be resolved include:

 

  • Vulnerabilities keep getting detected on computers and the patch will not install
  • Patches are stuck in loop continually trying to install on the clients

 

While this process will not resolve all cases with the above symptoms, it can resolve some issues. It is recommended that all customers review this information to help keep the Patch Content up-to-date.

Issue

  • Vulnerabilities keep getting detected on computers and the patch will not install

  • Patches are stuck in loop continually trying to install on the clients

  • Security Scans (VULSCAN.EXE) takes a long time to run

 

Solution

Quick Reference

The general overview of the steps required is outlined below. Continue reading for more detailed information, or select the step in question for more details.

 

  1. Download the latest patch content
  2. Make sure all neccesary vulnerabilities are in the Scan folder
  3. Sort the items in the Scan folder by the Replaced column
  4. Move superseded vulnerabilities to Do Not Scan
  5. Verify vulnerabilities were correctly moved to the Do Not Scan folder
  6. Disable replaced detection rules
  7. Delete superseded vulnerabilities from custom groups
  8. Run deleteOldPatches.exe on the Core Server

 

Download the Latest Patch Content

The Download Updates tool is accessed from the Patch and Compliance window.

 

LANDesk® Management Suite 8.8

To get to the Download Updates tool, select Tools > Security > Security and Patch Manager. Then select the Download updates button from the toolbar. It is the first button on the left.

For more information about updating defintions see: Getting started with Patch Manager in LANDesk® Management Suite 8.8

 

LANDesk® Management Suite 9.0

To get to the Download Updates tool, select Tools > Security and Compliance > Patch and compliance. Then select the Download Updates button from the toolbar. It is the first button just to the right of the drop-down menus.

For more information about updating defintions see: Getting started with Patch Manager in LANDesk® Management Suite 9.0

 

Verify Vulnerabilities are in the Scan Folder

After the Patch Content has downloaded, move any new vulnerabilities that should be scanned from the Unassigned folder to the Scan folder. Only put vulnerabilities in the Scan folder that should be scanned for on the computers to help speed up the security scans on clients.

 

Sort Items in the Scan Folder by the Replaced Column

replaced1.png

 

  1. Open the Patch Manager tool in the LANDesk Console
  2. Select All Types in the Type box
  3. Select All Items in the Filter box
  4. Click the Scan folder under All Types on the left pane
  5. Click the Replaced column to sort by the Replaced value

 

Move Superseded Vulnerabilities to Do Not Scan

There are 2 methods to complete this step. One is using a SQL query and the other is through the LANDesk Management Console. Only one of the options needs to be completed for this step.

 

SQL Query Method

 

For LANDesk® Management Suite 8.8, run the following SQL statement against the LANDesk database:

/* This Query will move vulnerabilites that have
 "All" in the "Replaced" column to the "Do Not Scan" folder.
*/
UPDATE Vulnerability SET Status = 0
WHERE Vulnerability_Idn in (
SELECT Vulnerability_Idn FROM Vulnerability WHERE SupercededState = 2 AND Status != 0
)

 

For LANDesk® Management Suite 9.0, run the following SQL statements against the LANDesk database:

/* This Query will move vulnerabilites that have
"All" in the "Replaced" column to the "Do Not Scan" folder.
*/
INSERT INTO PatchTask (TaskType, RequestDate, param1, param3, message)
SELECT 2, GETDATE(), Vul_ID, 'False','Remove scan status for vulid: '+ Vul_ID +' , patch'
FROM Vulnerability WHERE SupercededState = 2 AND Status != 0

UPDATE Vulnerability SET Status = 0
WHERE Vulnerability_Idn in (
SELECT Vulnerability_Idn FROM Vulnerability WHERE SupercededState = 2 and Status != 0
)

 

Note: The SQL statements have only been tested on Microsoft SQL server. They may require modifacation to run on Oracle. The SQL statements can be added to the database maintenance run by your DBMS so that they run on a regular basis. Contact your DBA for help with this.

 

If you use the SQL statement(s), continue to the next section titled "Verify only superseded vulnerabilities moved to Do not Scan".

 

LANDesk Management Console Method

replaced2.png

 

  1. Click on the first vulnerability in the list that has All in the replaced column It should be the first item in the list.
  2. Scroll down the list to the last item in the list that has ALL in the Replaced column.
  3. Hold the shift key down and click the last item with All in the Replaced column. This should highlight all vulnerabilities with All in the Replaced column.
  4. Click and drag the selected items to the Do Not Scan folder.

 

Dependencies.pmg.png

 

For LANDesk® Management Suite 9.0, if the "Update dependent or prerequisite definitions as well" box comes up, click No.

For LANDesk® Management Suite 8.8, if the "Update dependent or prerequisite definitions as well" box comes up, click Yes.

 

Verify Only Superseded Vulnerabilities Moved to Do Not Scan

verify.png

 

  1. Click on the Do Not Scan folder under All Types
  2. Click the Replaced column to sort by it
  3. Verify that all vulnerabilities have All in the Replaced column

 

Note: This assumes that no other vulnerabilities had already been moved to the Do Not Scan folder. If there were already definitions in the Do not Scan folder only move back definitions that may have been moved inadvertently.

 

Disable Superseded Detection Rules

Sometimes only part of a vulnerability will be replaced. For example, only the Windows XP part of the previous definition will be replaced by a newer definition. In this case, the Replaced column will indicate Some. In these cases, you can disable the scanning of each replaced detection fule inside the vulnerability

There are 2 methods to complete this step. One is using a SQL query and the other is through the LANDesk Management Console. Only one of the options needs to be completed for this step.

 

SQL Query Method

For LANDesk® Management Suite 8.8 and 9.0, run the following SQL statement against the LANDesk database:

/* This Query will disable individual detection rules
if they have been superseeded and if the vulnerability they belong to
has "Some" in the "Replaced" column.
This only disables detection rules for vulnerabilities currently in the Scan Folder
*/
UPDATE Patch Set Ignore = 1 WHERE Patch_Idn IN (      SELECT p.Patch_Idn FROM Patch p, Vulnerability v WHERE      p.Vulnerability_Idn = v.Vulnerability_Idn      AND SupercededByVulID IS NOT NULL      AND v.SupercededState = 1      AND v.Status NOT IN (0, 2)
)

 

Note: The SQL statement has only been tested on Microsoft SQL server. It may require modifacation to run on Oracle. The SQL statement can be added to the database maintenance run by your DBMS so that it runs on a regular basis. Contact your DBA for help with this.

 

If you use the SQL statement, continue to the next section titled "Delete superseded vulnerabilities from custom groups".

 

LANDesk Management Console Method

Once you have moved all of the definitions that have been entirely replaced (All) to Do not Scan, some definitions will remain in the Scan folder that have been partially replaced. To deal with these, you can disable any superseded detection rules.

disablerule1.png

 

  1. Click on the Scan folder under All Types
  2. Click the Replaced column to sort it so vulnerabilities with Some in the column show up at the top of the listdisablerule2.png
  3. Right-click the first vulnerability in the list and select Properties.disablerule3.png
  4. Right-click each detection rule in the list that has an entry in the Replaced by column and select the Disable scan option.disablerule4.png
  5. Repeat this process for all vulnerabilities that have Some in the Replaced column. This will disable the detection of rules that have been replaced by newer vulnerabilities.

 

Delete Superseded Vulnerabilities from Custom Groups

Now that superseded detection rules have been disabled, it is time to delete the superseded vulnerabilities from custom groups.

custom.png

 

  1. In the Patch Manager window, expand Custom Groups.
  2. Click on each custom group and sort the vulnerabilities by the Replaced column.
  3. Select all of the vulnerabilities that have ALL in the Replaced column and delete them.
  4. Repeat this process for each custom group under My custom groups and Public custom groups.

Run deleteOldPatches.exe on the Core Server

This tool will delete all patches from the patch folder for the Core Server that are not associated with a vulnerability in the Scan folder.

  1. Download deleteOldPatches.zip attached to this article.
  2. Extract deleteOldPatches.exe from deleteOldPatches.zip
  3. Copy deleteOldPatches.exe to the Core Server.
  4. Run deleteOldPatches.exe on the Core Server.

 

Note: Adding s to the commandline (deleteOldPatches.exe s) will make it run silently so that it can be scheduled. This tool is provided as-is without any warranty, express or implied and is not supported by LANDesk support. If patches are deleted inadvertantly, they can generally be re-downloaded using the Download Updates tool

Allow creation and editing of Custom Patch Groups without over-assigning permissions

$
0
0

Similar to this thread here:  https://community.landesk.com/support/message/110694

 

This one deals with Patch Manager, but also seems to be a flaw in the way rights are assigned via RBA controls in LANDesk.

 

I'd like to allow users to create their own custom patch groups and drag and drop patch definitions into these groups.  I assume that is the entire purpose of the "My custom groups" and also the "Team" Custom groups.  However, there doesn't seem to be a way to assign a user to do this, without also granting them access to edit the main Scan, Do Not Scan, Unassigned groups, which also grants them the rights to delete patches (LANDesk provided and custom created ones).

 

Am I overlooking something here?

 

The only thing I have seen work, and I can only assume this is an unintended side effect, is if a user tries to patch >25 patches in one job, the console will prompt them to create a new repair group.  This lets them create a new patch group under "My custom groups" but they still can't edit it after the fact.

Recently downloaded patches don't seem to be "replacing" older patches.

$
0
0

I'm wondering if anyone else is seeing odd behaviour regarding "Replaced" patches.

 

For example:

Google Chrome

I currently have patches listed from 43.0.2357.130 thru 44.0.2403.107.

There are 10 patches in total, each an increment in version #. Each patch is listed as "Replaced by" the patch ahead of it.

 

However, nothing shows up in the "Replaced" folder under Scan.

 

I would expect that these "replaced" patches would be filtered into that folder so that I can disable scanning for them.

 

This makes me wonder if these Chrome patches have a dependence on previous patches or if my LDMS just stopped working properly in this regard.

 

Thanks.

 

-Brendan

Hi, Can you help me to update IE 11 update using Landesk

$
0
0

Hi ,

 

I am planning to deploy IE 11 in the workstations ( Windows 7 SP1 Machines )

 

I do not have a package for IE 11 . Can you help me how to download and push it from LANDESK

Trouble downloading Patches (underlying connection was closed)

$
0
0

Landesk 9.6 SP2, this used to work just fine but it was maybe after an update that it stopped working? I'm not entirely sure. I can't connect using any of the patch servers. Small part of the error log below. Note that I can navigate to the file in IE and download it just fine. Same error for every single file it tries to download

 

06/12/2015 06:00:34 INFO  17552:1     : Downloading Latitude_E6400.xml (0 KB)...

06/12/2015 06:00:35 INFO  17552:LoadingPatchSources : GetStreamForPath http://downloads.dell.com/FOLDER02045533M/1/E6400-VISTA-A03-RW93N.CAB failed The underlying connection was closed: An unexpected error occurred on a receive.

06/12/2015 06:00:36 INFO  17552:LoadingPatchSources : GetStreamForPath http://downloads.dell.com/FOLDER02045533M/1/E6400-VISTA-A03-RW93N.CAB failed The underlying connection was closed: An unexpected error occurred on a receive.

06/12/2015 06:00:36 INFO  17552:1     : Failed to download file E6400-vista-A03-RW93N.CAB

06/12/2015 06:00:36 INFO  17552:1     : Connection to http://downloads.dell.com/FOLDER02045533M/1/E6400-VISTA-A03-RW93N.CAB failed. Unable to read data from the transport connection: An existing connection was forcibly closed by the remote host.

Proxy settings: Not using a proxy server.

06/12/2015 06:00:36 INFO  17552:1     : Failed to download E6400-vista-A03-RW93N.CAB.

06/12/2015 06:00:36 INFO  17552:LoadingPatchSources : GetStreamForPath http://downloads.dell.com/FOLDER02067077M/1/E6400-XP-A09-R60F7.CAB failed The underlying connection was closed: An unexpected error occurred on a receive.

06/12/2015 06:00:37 INFO  17552:LoadingPatchSources : GetStreamForPath http://downloads.dell.com/FOLDER02067077M/1/E6400-XP-A09-R60F7.CAB failed The underlying connection was closed: An unexpected error occurred on a receive.

06/12/2015 06:00:37 INFO  17552:1     : Failed to download file E6400-xp-A09-R60F7.CAB

06/12/2015 06:00:37 INFO  17552:1     : Connection to http://downloads.dell.com/FOLDER02067077M/1/E6400-XP-A09-R60F7.CAB failed. Unable to read data from the transport connection: An existing connection was forcibly closed by the remote host.

Proxy settings: Not using a proxy server.


Post Repair Script

$
0
0

I think this should be a simple one.  I want to use a post repair script that lets the user know the repair has been completed.

I tried using a simple msgbox command but the vulscan log said I did not have rights to run that command.

How would I display a message to the user at the end of the repair?  I am running 9.5 SP2.

 

Thank you.

- Kurt

How to: Retain more vulscan logs before they are overwritten

$
0
0

Reviewed: 9/15/2015


Applies to:  LDMS 9.6+


By default, vulscan writes 7 logs to the ProgramData\Log folder and then begins overwriting existing logs to save disk space.  In LDMS 9.6+ this controlled by a registry key and can be modified.  For x64 clients the key is:

 

HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\landesk\managementsuite\LogOptions

 

For x86 the key is:

 

HKEY_LOCAL_MACHINE\SOFTWARE\landesk\managementsuite\LogOptions

 

In both cases, change the "maxbackups" value to the hex number of logs you would like to retain.  Please note, this applies to vulscan logs as well as other logs.  This can be changed manually or via script.

Keep more vulscan log files

$
0
0

Hello.

 

Does anyone know if it's possible to increase the no. of vulscan log files that are stored on a device or is the limit of 11 hardcoded?

 

Thanks in advance.

How to change the default Patch Location for Security and Patch Manager

$
0
0

Applies to LANDesk Management Suite 8.8 and LANDesk Managment Suite 9

Description

By default, patches are downloaded and stored in the core servers LDLogon\Patch directory. It is often desirable to store the patches on a seperate server, such as a Preferred Package Server.

 

Configuring the Patch Download Location

  1. Open the LANDesk Console and go to Tools | Security | Patch and Compliance and click on the first iconDownloadUpdatesIcon.pngto open the Download Updates window.
  2. Click the Patch Location tab.
  3. Enter a UNC path where the patches are to be stored.
    Note: The default location is the Core Server's \LDLogon\Patch directory.
  4. If the UNC path entered above is to a location other than the core server, enter a valid username and password to authenticate to that location.
  5. Enter a Web URL where devices can access the downloaded patches for deployment. This Web URL should match the UNC path above.
  6. Click Test Settings to check to see if a connection can be made to the Web address specified above.

    Note: If you want to restore the UNC path and Web URL to their default locations, click Restore to Default.

PatchLocationGUI.png

How to properly set up a web and UNC share for the new patch location

Creating the UNC Share

  1. Connect directory or through remote desktop to the share server where the patches will be stored.
  2. Create a new directory.
  3. Right-click the newly created directory and choose Sharing and Security.
  4. Click the Sharing Tab.
  5. Click Share this folder.
  6. Verify the Share name is correct.
  7. Click Permissions.
  8. An account needs Full control permissions to this UNC share. These are the credentials you will use in step 3 of "Changing Patch Location" (In download updates  tool).  Note: You will also need to set up the permissions on the new share to have the same security settings as the original patch location.
  9. Click OK.
  10. If you click Test settings when you are setting the patch location in the Security and Patch Manager Tool and you get the error "Failed to write test file to UNC path \\ServerName\sharename\TestWritePatchData.txt" it means you have not given the user in the credentials field write rights to the share.

Creating the Web Share

  1. Right click on the folder you want to share and select Properties.
  2. Click on the Web Sharing tab.
  3. Click Share this folder.
  4. Check Read and Directory browsing.
  5. Click OK once.
  6. Click on the Security tab.
  7. Add the IUSR_computername account and give it Read & Execute permissions.
  8. Click OK.
  9. Open IIS Manager, navigate to the default web site and expand its contents.
  10. Right click on the newly created virtual directory and select properties
  11. Click on the Directory Security tab, then Edit... under Authentication and access control.


Check Enable anonymous access and apply the changes.

If you click Test settings when you are setting the patch location in the Security and Patch Manager Tool and you get the error "Failed to read test file from HTTP URL http://serverName/shareName/TestWritePatchData.txt" you have not enabled Anonymous access correctly (Steps 7 - 12).

 

If you click Test settings when you are setting the patch location in the Security and Patch Manager Tool and you get the error "Failed to write test file from HTTP URL http://serverName/shareName/TestWritePatchData.txt" the UNC share permissions have not been set correctly.   The share permissions for the patch share should mimic the permissions assigned by default to the LDLogon share.

     

If you have moved the patch directory to a new server and receive an "HTTP Error 404 File or Directory not found" when attempting to download any files, open the IIS manager, right click the Web directory, choose properties, click the HTTP Headers tab, click MIME types..., and add .* All File Types to the MIME types. Now at the run line type iisreset and after IIS restarts the files should be available for download.

Creating the Web Share in Windows 2008

  1. Go to Start > Administrative Tools > Internet Information Services (IIS) Manager:
  2. Right click on Default Web Site and then click on 'Add Virtual Directory' ScreenHunter_002.bmp
  3. Alias will be the name of the folder in IIS. It should be the same as the actual folder name and should not contain any spaces
  4. Browse to your physical path that you created and then hit ok.
  5. Test the share by going to http://CORESERVER/PathToHTTPShare

 


How to Scan for Specific Patches

$
0
0

 

How To:

 

How to scan for a specific patch or group of patches.

 

Purpose:

 

In some situations it may becomes necessary to scan for a specific patch or group of patches.

 

Examples:

  • One off patching instances
  • Verifying baseline compliance

 

Steps

 

Note: We will be using JREJDKv8u31_Manual in the following examples.

Create Custom Group

  • Begin by creating a new Custom Group in Patch and Compliance.
    • Click Tools | Security and Compliance | Patch and Compliance.

1a-patch and compliance.png

 

  • In Patch and Compliance create a new Custom Group.
    • Right click My Custom Groups or Public Custom Groups | New Group

1-new group.png

 

 

  • Name the custom group according to your needs.
    • Example: Our scan will be for Java 8u31, so the name will reflect this.

2-custom name.png

 

 

  • Locate the content to add to the custom scan group, and add it to the custom group.
    • Drag the content onto the custom group
    • Alternatively right click the content, choose copy, right click the custom group and choose paste.

3-add to group.png

 

  • This provides a custom group to scan against that only contains the desired patch(es).

4-content in group.png

 

 

Create Distribution and Patch Setting

 

  • Open Agent Settings - Tools | Security and Compliance | Agent Settings

1-agent setting.png

 

  • Click Agent Settings | My Agent Settings or Public Agent Settings | Right click Distribution and Patch  and choose New

2-new setting.png

 

 

  • Provide the new Distribution and Patch setting a name that indicates what it is used for.

3-name.png

 

  • Double click the new Distribution and Patch setting to open the options, and choose Patch-only settings | Scan options then click the Groupbrowse button.

4-group.png

 

 

  • In the Group Selectionwindow, choose the custom group that contains the content to be scanned for and click Ok

5-select group.png

 

  • The Group field now reflects the custom group that will be scanned for, click Save

Note: If you only want to scan for a patch, uncheck 'Enable autofix' to ensure autofix is turned off. If you want just this scan also repair the vulnerability, check the box 'Immediately install (repair) all applicable items'.

This will take precedence over Autofix settings, and will allow just patches that are found with this scan to be fixed.

 

6-scan ready.png

 

 

Run Scan - Run Now

 

  • Select the device(s) in inventory to be scanned
  • Right click and choose Patch and compliance scan now...

1-patch and compliance scan now.png

 

  • In the Patch/compliance scan nowwindow,
    • Select Security and Patch scan
    • Click the drop down list and select the Distribution and patch settingpreviously configured.

2-scan now selection.png

 

  • A status window will appear indicating the state of the current scan.

3-progress.png

 

  • Once the scan completes, repairs and reporting can occur as needed.

Run Scan - Scheduled

 

In the event the scan needs to happen at a different date/time, or be recurring, it can be scheduled.

 

  • In the LDMS Core click Tools | Security and Compliance | Agent Settings
  • Click the Create a Task button(calendar icon)
  • Click Security scan...

1-sched.png

 

  • In the Patch and Compliance - scan task window, click Agent Settings
  • Click the drop down list for Distribution and patch, and select the previously configured setting.

2-agentsettings.png

 

  • Configure other settings as needed (Scheduled times, dates etc).
  • Save the task
Viewing all 1121 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>