The following article applies to a version of the product that is no longer officially supported |
Applies to LANDESK Management Suite 9.0 Service Pack 2 and earlier
LANDesk provides a large number of vulnerability definitions for a large number of products going back quite some time. Because newer patches sometimes replace older patches, LANDesk provides this information as part of the definition. When a newer patch or vulnerability becomes available, the previous version will be marked as replaced, either partially or completely. This information can be used to improve the performance of Security Scans on client machines as well as provide more accurate information about the vulnerability status of machines. Some other symptoms that are seen and can be resolved include:
- Vulnerabilities keep getting detected on computers and the patch will not install
- Patches are stuck in loop continually trying to install on the clients
While this process will not resolve all cases with the above symptoms, it can resolve some issues. It is recommended that all customers review this information to help keep the Patch Content up-to-date.
Issue
Vulnerabilities keep getting detected on computers and the patch will not install
Patches are stuck in loop continually trying to install on the clients
Security Scans (VULSCAN.EXE) takes a long time to run
Solution
Quick Reference
The general overview of the steps required is outlined below. Continue reading for more detailed information, or select the step in question for more details.
- Download the latest patch content
- Make sure all neccesary vulnerabilities are in the Scan folder
- Sort the items in the Scan folder by the Replaced column
- Move superseded vulnerabilities to Do Not Scan
- Verify vulnerabilities were correctly moved to the Do Not Scan folder
- Disable replaced detection rules
- Delete superseded vulnerabilities from custom groups
- Run deleteOldPatches.exe on the Core Server
Download the Latest Patch Content
The Download Updates tool is accessed from the Patch and Compliance window.
LANDesk® Management Suite 8.8
To get to the Download Updates tool, select Tools > Security > Security and Patch Manager. Then select the Download updates button from the toolbar. It is the first button on the left.
For more information about updating defintions see: Getting started with Patch Manager in LANDesk® Management Suite 8.8
LANDesk® Management Suite 9.0
To get to the Download Updates tool, select Tools > Security and Compliance > Patch and compliance. Then select the Download Updates button from the toolbar. It is the first button just to the right of the drop-down menus.
For more information about updating defintions see: Getting started with Patch Manager in LANDesk® Management Suite 9.0
Verify Vulnerabilities are in the Scan Folder
After the Patch Content has downloaded, move any new vulnerabilities that should be scanned from the Unassigned folder to the Scan folder. Only put vulnerabilities in the Scan folder that should be scanned for on the computers to help speed up the security scans on clients.
Sort Items in the Scan Folder by the Replaced Column
![replaced1.png]()
- Open the Patch Manager tool in the LANDesk Console
- Select All Types in the Type box
- Select All Items in the Filter box
- Click the Scan folder under All Types on the left pane
- Click the Replaced column to sort by the Replaced value
Move Superseded Vulnerabilities to Do Not Scan
There are 2 methods to complete this step. One is using a SQL query and the other is through the LANDesk Management Console. Only one of the options needs to be completed for this step.
SQL Query Method
For LANDesk® Management Suite 8.8, run the following SQL statement against the LANDesk database:
/* This Query will move vulnerabilites that have
"All" in the "Replaced" column to the "Do Not Scan" folder.
*/
UPDATE Vulnerability SET Status = 0
WHERE Vulnerability_Idn in (
SELECT Vulnerability_Idn FROM Vulnerability WHERE SupercededState = 2 AND Status != 0
)
For LANDesk® Management Suite 9.0, run the following SQL statements against the LANDesk database:
/* This Query will move vulnerabilites that have
"All" in the "Replaced" column to the "Do Not Scan" folder.
*/
INSERT INTO PatchTask (TaskType, RequestDate, param1, param3, message)
SELECT 2, GETDATE(), Vul_ID, 'False','Remove scan status for vulid: '+ Vul_ID +' , patch'
FROM Vulnerability WHERE SupercededState = 2 AND Status != 0
UPDATE Vulnerability SET Status = 0
WHERE Vulnerability_Idn in (
SELECT Vulnerability_Idn FROM Vulnerability WHERE SupercededState = 2 and Status != 0
)
Note: The SQL statements have only been tested on Microsoft SQL server. They may require modifacation to run on Oracle. The SQL statements can be added to the database maintenance run by your DBMS so that they run on a regular basis. Contact your DBA for help with this.
If you use the SQL statement(s), continue to the next section titled "Verify only superseded vulnerabilities moved to Do not Scan".
LANDesk Management Console Method
![replaced2.png]()
- Click on the first vulnerability in the list that has All in the replaced column It should be the first item in the list.
- Scroll down the list to the last item in the list that has ALL in the Replaced column.
- Hold the shift key down and click the last item with All in the Replaced column. This should highlight all vulnerabilities with All in the Replaced column.
- Click and drag the selected items to the Do Not Scan folder.
![Dependencies.pmg.png]()
For LANDesk® Management Suite 9.0, if the "Update dependent or prerequisite definitions as well" box comes up, click No.
For LANDesk® Management Suite 8.8, if the "Update dependent or prerequisite definitions as well" box comes up, click Yes.
Verify Only Superseded Vulnerabilities Moved to Do Not Scan
![verify.png]()
- Click on the Do Not Scan folder under All Types
- Click the Replaced column to sort by it
- Verify that all vulnerabilities have All in the Replaced column
Note: This assumes that no other vulnerabilities had already been moved to the Do Not Scan folder. If there were already definitions in the Do not Scan folder only move back definitions that may have been moved inadvertently.
Disable Superseded Detection Rules
Sometimes only part of a vulnerability will be replaced. For example, only the Windows XP part of the previous definition will be replaced by a newer definition. In this case, the Replaced column will indicate Some. In these cases, you can disable the scanning of each replaced detection fule inside the vulnerability
There are 2 methods to complete this step. One is using a SQL query and the other is through the LANDesk Management Console. Only one of the options needs to be completed for this step.
SQL Query Method
For LANDesk® Management Suite 8.8 and 9.0, run the following SQL statement against the LANDesk database:
/* This Query will disable individual detection rules
if they have been superseeded and if the vulnerability they belong to
has "Some" in the "Replaced" column.
This only disables detection rules for vulnerabilities currently in the Scan Folder
*/
UPDATE Patch Set Ignore = 1 WHERE Patch_Idn IN ( SELECT p.Patch_Idn FROM Patch p, Vulnerability v WHERE p.Vulnerability_Idn = v.Vulnerability_Idn AND SupercededByVulID IS NOT NULL AND v.SupercededState = 1 AND v.Status NOT IN (0, 2)
)
Note: The SQL statement has only been tested on Microsoft SQL server. It may require modifacation to run on Oracle. The SQL statement can be added to the database maintenance run by your DBMS so that it runs on a regular basis. Contact your DBA for help with this.
If you use the SQL statement, continue to the next section titled "Delete superseded vulnerabilities from custom groups".
LANDesk Management Console Method
Once you have moved all of the definitions that have been entirely replaced (All) to Do not Scan, some definitions will remain in the Scan folder that have been partially replaced. To deal with these, you can disable any superseded detection rules.
![disablerule1.png]()
- Click on the Scan folder under All Types
- Click the Replaced column to sort it so vulnerabilities with Some in the column show up at the top of the list
![disablerule2.png]()
- Right-click the first vulnerability in the list and select Properties.
![disablerule3.png]()
- Right-click each detection rule in the list that has an entry in the Replaced by column and select the Disable scan option.
![disablerule4.png]()
- Repeat this process for all vulnerabilities that have Some in the Replaced column. This will disable the detection of rules that have been replaced by newer vulnerabilities.
Delete Superseded Vulnerabilities from Custom Groups
Now that superseded detection rules have been disabled, it is time to delete the superseded vulnerabilities from custom groups.
![custom.png]()
- In the Patch Manager window, expand Custom Groups.
- Click on each custom group and sort the vulnerabilities by the Replaced column.
- Select all of the vulnerabilities that have ALL in the Replaced column and delete them.
- Repeat this process for each custom group under My custom groups and Public custom groups.
Run deleteOldPatches.exe on the Core Server
This tool will delete all patches from the patch folder for the Core Server that are not associated with a vulnerability in the Scan folder.
- Download deleteOldPatches.zip attached to this article.
- Extract deleteOldPatches.exe from deleteOldPatches.zip
- Copy deleteOldPatches.exe to the Core Server.
- Run deleteOldPatches.exe on the Core Server.
Note: Adding s to the commandline (deleteOldPatches.exe s) will make it run silently so that it can be scheduled. This tool is provided as-is without any warranty, express or implied and is not supported by LANDesk support. If patches are deleted inadvertantly, they can generally be re-downloaded using the Download Updates tool