Quantcast
Channel: Ivanti User Community : All Content - Patch Manager
Viewing all 1121 articles
Browse latest View live

Patching Dell Hardware (Latitudes) with Ivanti

$
0
0

Has anyone run into issues patching Dell Latitude BIOS or drivers with patch manager? We are looking to start patching Dell Latitude BIOS and possibly drivers, as well. Do you see any downside to using Ivanti patch manager? I'm a little wary patching the BIOS or firmware because the computer needs to restart. How Ivanti know the patch is complete?

 

We are running Ivanti 2017.3.


About the Next Gen Microsoft Patch Definition Naming Convention

$
0
0

Overview

Starting with the April 11th 2017 Patch Tuesday, Microsoft no longer uses a traditional naming format for Security Bulletins. To help our customer's, we created our own naming format as follows:

 

The new Security Bulletin mappings our products will be using: MS[YY]-[MM]-[PP(P)]

 

  • MS = Microsoft
  • YY = Year
  • MM = Month Released
  • PP =  Product

Here are examples from Patch Tuesday December 12, 2017:

  • MS17-12-OFF
    • All Office patches
  • MS17-11-O365
    • Security Only Updates for Office 365
  • MS17-12-IE
    • All IE patches
  • MS17-12-AFP
    • All Microsoft released Flash patches
  • MS17-12-W10
    • All Windows 10 patches, rollups and Deltas
  • MS17-12-2K8
    • All Vista and 2008 patches
  • MS17-12-SO7
    • Security Only Update for Windows 7 and Server 2008 R2
  • MS17-12-SO8
    • Security Only Update for Server 2012
  • MS17-12-SO81
    • Security Only Update for Windows 8.1 and Server 2012 R2
  • MS17-12-MR7
    • Monthly Rollup for Windows 7 and Server 2008 R2 (this is the rollup that includes non-security fixes)
  • MS17-12-MR8
    • Monthly Rollup for Server 2012 (this is the rollup that includes non-security fixes)
  • MS17-12-MR81
    • Monthly Rollup for Windows 8.1 and Server 2012 R2 (this is the rollup that includes non-security fixes)
  • MS17-12-SLV
    • All Microsoft Silverlight patches
  • MS17-12-2K3
    • All Server 2003 patches for the customers that subscribe to them (Extended support)
  • MS17-12-XPE
    • All Microsoft XP Embedded patches

.NET Patches will follow a slightly different naming scheme:

  • MS[YY]-[MM]-[TT][PP]-[KB]
    • YY = Year
    • MM = Month
    • TT = Type (Security Only or Monthly Rollup)
    • PP = Product (.NET)
    • KB = Parent KB
  • MS17-12-SONET-1234567
    • Security only patches associated with that parent KB
    • Security patch type
  • MS17-12-MRNET-1234567
    • Monthly Rollup associated with that parent KB
    • Non-Security patch type

Non-security .NET Patches also have a slightly different naming scheme:

  • MSNS[YY]-[MM]-[TT][PP]-[KB]
    • YY = Year
    • MM = Month
    • TT = Type (Quality Preview or Quality Rollup)
    • PP = Product (.NET)
    • KB = Parent KB
  • MSNS17-12-QPNET-1234567
    • Quality Preview patches associated with that parent KB
    • Non-Security patch type
  • MSNS17-12-QRNET-1234567
    • Quality Rollup associated with that parent KB
    • Non-Security patch type

 

Additional Information

Additional Naming Conventions

  • QP = Quality Preview
  • NS = Non-Security

 

Microsoft released the following article for FAQ on the changes made: Security Updates Guide dashboard and API:

 

Q: Why is the security bulletin ID number (e.g. MS16-XXX) not included in the new Security Update Guide?

A: The way Microsoft documents security updates is changing. The previous model used security bulletin webpages and included security bulletin ID numbers (e.g. MS16-XXX) as a pivot point. This form of security update documentation, including bulletin ID numbers, is being retired and replaced with the Security Update Guide. Instead of bulletin IDs, the new guide pivots on vulnerability ID numbers and KB Article ID numbers.

Seeking documentation or known processes for installing Microsoft updates on servers.

$
0
0

We are looking at installing Microsoft updates on our servers.  Looking for advice or process.

 

Thanks

Firefox 58.0.1

$
0
0

Hi!

 

When will the Critical Patch for Firefox 58.0.1 be available through Patch Manager?
It's now 3 days out and still not in Patch Manager.

 

thx

Regards

Skype 8 in Patch Manager

$
0
0

I may be missing something obvious here but I don't see any patch definitions for Skype version 8 when downloading the latest patch content in Patch Manager. Previous patches for Skype had IDs of the form SKYPEvA.B.C.D; the latest version I currently see is 7.40.0.103.

 

Skype 8 is supported as per https://www.ivanti.com/support/supported-products, is there a reason Patch Manager would not be picking up these patches? The definition types we download are attached.

Result: Unable to get vulnerability definitions from core in security/compliance scan

$
0
0

Hi,

Got "Result: Unable to get vulnerability definitions from core" in security/compliance scan

Is there a way to check if LANDesk is pulling the latest patch and compliance definition?

$
0
0

I want to make sure my core is pulling the last patch and compliance definitions from Ivanti. For instance, my core has the latest Java version as 8.152 but java.com shows 8.161. I am hoping for some kind of a portal at Ivanti to see what they have so I can compare it to what I have. My core is on version 2016.3.5.

Preferred Server/Replicators pre load source server content

$
0
0

This MAY be an instant NO but been tasked with creating a few preferred servers and replicators. Replicator and Preferred Server will be on the same device.

 

These preferred servers/replicators will be connected to VERY slow internet connections due to being in small shops. Therefore the challenge is to replicate 20-30GB worth of from our main source to these new preferred servers.

 

One idea we came up with was to install the IEM Agent onto each of the replicators, then it becomes a managed device. Take a hard drive with has a copy of the source folder from our source server, plug it into each replicator/preferred server and paste the content into the appropriate folders (sdmcache etc).

 

Would this be possible?


Gathering historical information isn't working properly. Not pulling old data into the core to create reports.

$
0
0

Gathering historical information isn't working properly. Not pulling old data into the core to create reports.

 

brand new core, brand new operating system. Why isn't it pulling all this information down.

Support for Non-Security Patch MSNS18-01-4078130 to disable mitigation against CVE-2017-5715

$
0
0

Overview

 

Microsoft has released an out of band Critical Update KB4078130 to disable mitigation against CVE-2017-5715.

Note: We highly recommend reading this Microsoft article:Update to disable mitigation against Spectre, Variant 2

MSNS18-01-4078130 / KB4078130 is a Critical Non-Security Patch that will disable the fix for variant 2 for stability issues.  The machine must reboot after installing the patch for it to apply on the system.

 

Additional Information

 

To enable the fix again you may reinstall the patch for your OS that remediates CVE-2017-5715

How to Give Support Information on False Patch Detections and Troubleshooting

$
0
0

Note: Clicking on a photo will enlarge it.

 

This document will go over what to look for and do if you think you have a patch that is detecting incorrectly on your devices.  Incorrect detections can happen if the detection logic is incorrect and still reports as needed but the patch has already been installed, is not applicable to the system or other issues.  In this document, you’ll learn what to look for in the vulscan logs which are required to submit the incorrect patch detection for review.

This document assumes you know how to find individual patches, create a patch group and move patches to it in the console and create a repair task on a specific patch or group of patches in the console.  It also assumes you have an understanding of repair tasks and how to add target devices to them and run the task.

 

Prep the Client

 

As of January 2018 all new content created uses the new patching engine.  Additional logs are needed as well as the vulscan log to troubleshoot the false detection.

 

Diagnostic Tool

Updated The "Get debug logs and zip (patch)" feature is only available in 2017.3 and newer product versions.

To retrieve logging remotely access the Diagnostic tool and select the Logs | Client option to view client-side logs. An additional option "Get debug logs and zip (patch)" is present for debug logging for all Next Gen definitions. This will only function if the Distribution and Patch agent setting has Enable security scan debug trace logselected.

 

Diag_DebugLog.jpg

 

To enable debug trace logs for versions 9.6 - 2017.1 run the following cmd locally on the endpoint or distribute a script to the desired device:

 

vulscan /enableDpdTrace=true /showui

 

The showui switch is optional.

 

This will generate additional logging in the Programdata\Landesk\DebugLog folder consisting of the following (2) files:

 

PatchManifestSyncSDK.log

PatchScanSDKDpdTrace.log

 

When the repair job finishes you will need the following files to give to support in a zip file:

 

C:\Programdata\landesk\log\Vulscan.log  (Make sure it is the correct one, see below)

C:\Programdata\landesk\log\stdeploy.log

C:\Programdata\landesk\log\stdeployercore.log

C:\Programdata\Landesk\DebugLog\PatchManifestSyncSDK.log

C:\Programdata\Landesk\DebugLog\PatchScanSDKDpdTrace.log

 

 

Run a Repair Task

 

Running a repair task for the specific patch(es) gives supports the best information.  The vulscan logs only showing one patch or two processing will show them detecting and installing and are more concise and easier to look over to find details.  General vulscan logs are not Ideal as many only show the patch detecting but not installing and have a lot of unneeded information.  Running a specific repair task with patches having the issue will provide the best logs.

You can create a repair task by going to Tools > Security and Compliance > Patch and Compliance.  Click the Scan folder and find your patch.  When you find the patch having the issue right click it and from the menu that appears click Repair.  If you have a patch group or several patches you can do the same and create a repair task for several patches at the same time.

 

The Repair task dialog will open.  Most settings you can leave as a defaults.  You can add a target device at this time as well.  If you have a maintenance window on your clients, be sure to check Ignore Maintenance Window if specified so the patch tries to install as well as scan in this repair task.

Once you have a target in your task run it and wait for it to complete.

 

Vulscan Log

 

The full vulscan log, created as a result of running the task, is needed for us to determine the issue of the false detection.  This log is located on the target devices in the C:\programdata\Landesk\Log folder. They are named vulscan.log.  Older logs have a number in the name.   The correct log file will have a line at the top with the task ID in the name as shown in the example.  This information changes with each task.

 

Thu, 26 Oct 2017 14:59:37 Command line: /policyfile="C:\ProgramData\LANDesk\Policies\CP.2353.RunNow._iOiXj4cedTDG&#474FOGYMztt+mWNQ=.xml"
Thu, 26 Oct 2017 14:59:37 client policy file: C:\ProgramData\LANDesk\Policies\CP.2353.RunNow._iOiXj4cedTDG&#474FOGYMztt+mWNQ=.xml
Thu, 26 Oct 2017 14:59:37 Reading policy parameters
Thu, 26 Oct 2017 14:59:37 scan=0
Thu, 26 Oct 2017 14:59:37 scanFilter=INTL_4049179_MSU;INTL_3089023_MSU
Thu, 26 Oct 2017 14:59:37 fixnow=True
Thu, 26 Oct 2017 14:59:37    maintEnable=False

 

Once you have found the correct vulscan log. Doing a search in the log file for the all capitals case sensitive “DETECTED” will yield the detection of the patch and the reason.  In our example case it show the file version is out dated and that is the reason the patch is needed.

 

Thu, 26 Oct 2017 14:59:45 VUL: '3089023_MSU' (windows8.1-kb3089023-x64.msu) DETECTED.  Reason 'File C:\Windows\System32\flashplayerapp.exe version is less than the minimum version specified.'.  Expected '18.0.0.232'.  Found '11.3.300.265'.  Patch required 'windows8.1-kb3089023-x64.msu'.
Thu, 26 Oct 2017 14:59:45    Patch is NOT installed

 

You can see in the example the patch was detected as needed due to a file being at a lower version than in the patch.  Now scroll down to the bottom of the log file.  You’ll see a “Patch Installation” header and below that you will find details of what happened when the device attempted to install the patch. In our example the patch returned the error code 2149842967 converted to a hex value that gives a result of  0x80240017 Looking on the list of WUSA codes the patch returned a “Not Applicable”.

Thu, 26 Oct 2017 15:03:21 Command Interpreter running
Thu, 26 Oct 2017 15:03:21 Setting current directory: C:\Program Files (x86)\LANDesk\LDClient\
Thu, 26 Oct 2017 15:03:21 Executing C:\Windows\system32\wusa.exe "C:\Program Files (x86)\LANDesk\LDClient\sdmcache\windows8.1-kb3089023-x64.msu" /quiet /norestart
Thu, 26 Oct 2017 15:03:23 Exit Code: -2145124329 (0x80240017)
Thu, 26 Oct 2017 15:03:23 Error: "C:\Windows\system32\wusa.exe" returned failure exit code (2149842967)
Thu, 26 Oct 2017 15:03:23 ERROR(EXECUTEFILE) Failed to run command - 80004005
Thu, 26 Oct 2017 15:03:23 DownloadPatch ERROR: Failed to run commands (80004005).
Thu, 26 Oct 2017 15:03:23 Last status: Failed
Thu, 26 Oct 2017 15:03:23 Stopping wuauserv service.
Thu, 26 Oct 2017 15:03:23 Stop service wuauserv
Thu, 26 Oct 2017 15:03:25 Successfully controlled the service.
Thu, 26 Oct 2017 15:03:25 DeferredReportAction: name 'windows8.1-kb3089023-x64.msu', code '1', type '-1', status 'Error: "C:\Windows\system32\wusa.exe" returned failure exit code (2149842967)'
Thu, 26 Oct 2017 15:03:25 Running post-install/uninstall script
Thu, 26 Oct 2017 15:03:25 RunPatches completed.  1 processed.  0 installed. 1 failures.  Thu, 26 Oct 2017 15:03:25 Sending previous action history to core

STdeployercore.log

In addition the STdeployercore.log will also show the patch being installed and the error code for the Next Gen definitions:

2018-01-26T21:15:53.2279239Z 134c I DeploymentPackageReader.cpp:783 Deploy package 'C:\ProgramData\LANDesk\timber\sandboxes\InstallationSandbox#2018-01-26-T-21-15-15\0001c460-0000-0000-0000-000000000000.zip' successfully opened unsigned for package IO
2018-01-26T21:15:53.2279239Z 134c I Authenticode.cpp:134 Verifying signature of C:\Program Files (x86)\LANDesk\LDClient\sdmcache\windows6.1-kb4056894-x64_tw1158080.msu with CWinTrustVerifier
2018-01-26T21:15:54.2534266Z 134c V UnScriptedInstallation.cpp:30 Executing (C:\Program Files (x86)\LANDesk\LDClient\sdmcache\windows6.1-kb4056894-x64_tw1158080.msu /quiet /norestart), nShow: true.
2018-01-26T21:19:19.4406288Z 134c V ChildProcess.cpp:140 Process handle 00000408 returned '3010'.

 

Windows Update(WUSA) Error Codes

Result CodeResult StringDescription
0x80240001WU_E_NO_SERVICEWindows Update Agent was unable to provide the service.
0x80240002WU_E_MAX_CAPACITY_REACHEDThe maximum capacity of the service was exceeded.
0x80240003WU_E_UNKNOWN_IDAn ID cannot be found.
0x80240004WU_E_NOT_INITIALIZEDThe object could not be initialized.
0x80240005WU_E_RANGEOVERLAPThe update handler requested a byte range that overlaps a previously requested range.
0x80240006WU_E_TOOMANYRANGESThe requested number of byte ranges exceeds the maximum number (2^31 - 1).
0x80240007WU_E_INVALIDINDEXThe index to a collection was invalid.
0x80240008WU_E_ITEMNOTFOUNDThe key for the item queried could not be found.
0x80240009WU_E_OPERATIONINPROGRESSA conflicting operation was in progress. Some operations (such as installation) cannot be performed simultaneously.
0x8024000AWU_E_COULDNOTCANCELCancellation of the operation was not allowed.
0x8024000BWU_E_CALL_CANCELLEDOperation was cancelled.
0x8024000CWU_E_NOOPNo operation was required.
0x8024000DWU_E_XML_MISSINGDATAWindows Update Agent could not find the required information in the update's XML data.
0x8024000EWU_E_XML_INVALIDWindows Update Agent found invalid information in the update's XML data.
0x8024000FWU_E_CYCLE_DETECTEDCircular update relationships were detected in the metadata.
0x80240010WU_E_TOO_DEEP_RELATIONUpdate relationships that are too deep were evaluated.
0x80240011WU_E_INVALID_RELATIONSHIPAn invalid update relationship was detected.
0x80240012WU_E_REG_VALUE_INVALIDAn invalid registry value was read.
0x80240013WU_E_DUPLICATE_ITEMOperation tried to add a duplicate item to a list.
0x80240016WU_E_INSTALL_NOT_ALLOWEDOperation tried to install while another installation was in progress or the system was pending a mandatory restart.
0x80240017WU_E_NOT_APPLICABLEOperation was not performed because there are no applicable updates.
0x80240018WU_E_NO_USERTOKENOperation failed because a required user token is missing.
0x80240019WU_E_EXCLUSIVE_INSTALL_CONFLICTAn exclusive update cannot be installed with other updates at the same time.
0x8024001AWU_E_POLICY_NOT_SETA policy value was not set.
0x8024001BWU_E_SELFUPDATE_IN_PROGRESSThe operation could not be performed because the Windows Update Agent is self-updating.
0x8024001DWU_E_INVALID_UPDATEAn update contains invalid metadata.
0x8024001EWU_E_SERVICE_STOPOperation did not complete because the service or system was being shut down.
0x8024001FWU_E_NO_CONNECTIONOperation did not complete because the network connection was unavailable.
0x80240020WU_E_NO_INTERACTIVE_USEROperation did not complete because there is no logged-on interactive user.
0x80240021WU_E_TIME_OUTOperation did not complete because it timed out.
0x80240022WU_E_ALL_UPDATES_FAILEDOperation failed for all the updates.
0x80240023WU_E_EULAS_DECLINEDThe license terms for all updates were declined.
0x80240024WU_E_NO_UPDATEThere are no updates.
0x80240025WU_E_USER_ACCESS_DISABLEDGroup Policy settings prevented access to Windows Update.
0x80240026WU_E_INVALID_UPDATE_TYPEThe type of update is invalid.
0x80240027WU_E_URL_TOO_LONGThe URL exceeded the maximum length.
0x80240028WU_E_UNINSTALL_NOT_ALLOWEDThe update could not be uninstalled because the request did not originate from a WSUS server.
0x80240029WU_E_INVALID_PRODUCT_LICENSESearch may have missed some updates before there is an unlicensed application on the system.
0x8024002AWU_E_MISSING_HANDLERA component that is required to detect applicable updates was missing.
0x8024002BWU_E_LEGACYSERVERAn operation did not complete because it requires a newer version of server software.
0x8024002CWU_E_BIN_SOURCE_ABSENTA delta-compressed update could not be installed because it required the source.
0x8024002DWU_E_SOURCE_ABSENTA full-file update could not be installed because it required the source.
0x8024002EWU_E_WU_DISABLEDAccess to an unmanaged server is not allowed.
0x8024002FWU_E_CALL_CANCELLED_BY_POLICYOperation did not complete because the DisableWindowsUpdateAccess policy was set.
0x80240030WU_E_INVALID_PROXY_SERVERThe format of the proxy list was invalid.
0x80240031WU_E_INVALID_FILEThe file is in the wrong format.
0x80240032WU_E_INVALID_CRITERIAThe search criteria string was invalid.
0x80240033WU_E_EULA_UNAVAILABLELicense terms could not be downloaded.
0x80240034WU_E_DOWNLOAD_FAILEDUpdate failed to download.
0x80240035WU_E_UPDATE_NOT_PROCESSEDThe update was not processed.
0x80240036WU_E_INVALID_OPERATIONThe object's current state did not allow the operation.
0x80240037WU_E_NOT_SUPPORTEDThe functionality for the operation is not supported.
0x80240038WU_E_WINHTTP_INVALID_FILEThe downloaded file has an unexpected content type.
0x80240039WU_E_TOO_MANY_RESYNCThe agent was asked by server to synchronize too many times.
0x80240040WU_E_NO_SERVER_CORE_SUPPORTWUA API method does not run on a Server Core installation option of the Windows 2008 R2 operating system.
0x80240041WU_E_SYSPREP_IN_PROGRESSService is not available when sysprep is running.
0x80240042WU_E_UNKNOWN_SERVICEThe update service is no longer registered with Automatic Updates.
0x80240FFFWU_E_UNEXPECTEDAn operation failed due to reasons not covered by another error code.
0x80241001WU_E_MSI_WRONG_VERSIONSearch may have missed some updates because Windows Installer is less than version 3.1.
0x80241002WU_E_MSI_NOT_CONFIGUREDSearch may have missed some updates because Windows Installer is not configured.
0x80241003WU_E_MSP_DISABLEDSearch may have missed some updates because a policy setting disabled Windows Installer patching.
0x80241004WU_E_MSI_WRONG_APP_CONTEXTAn update could not be applied because the application is installed per-user.
0x80241FFFWU_E_MSP_UNEXPECTEDSearch may have missed some updates because there was a failure of Windows Installer.
0x80242000WU_E_UH_REMOTEUNAVAILABLEA request for a remote update handler could not be completed because no remote process is available.
0x80242001WU_E_UH_LOCALONLYA request for a remote update handler could not be completed because the handler is local only.
0x80242002WU_E_UH_UNKNOWNHANDLERA request for an update handler could not be completed because the handler could not be recognized.
0x80242003WU_E_UH_REMOTEALREADYACTIVEA remote update handler could not be created because one already exists.
0x80242004WU_E_UH_DOESNOTSUPPORTACTIONA request for the handler to install (uninstall) an update could not be completed because the update does not support install (uninstall).
0x80242005WU_E_UH_WRONGHANDLERAn operation did not complete because the wrong handler was specified.
0x80242006WU_E_UH_INVALIDMETADATAA handler operation could not be completed because the update contains invalid metadata.
0x80242007WU_E_UH_INSTALLERHUNGAn operation could not be completed because the installer exceeded the time limit.
0x80242008WU_E_UH_OPERATIONCANCELLEDAn operation being done by the update handler was cancelled.
0x80242009WU_E_UH_BADHANDLERXMLAn operation could not be completed because the handler-specific metadata is invalid.
0x8024200AWU_E_UH_CANREQUIREINPUTA request to the handler to install an update could not be completed because the update requires user input.
0x8024200BWU_E_UH_INSTALLERFAILUREThe installer failed to install (uninstall) one or more updates.
0x8024200CWU_E_UH_FALLBACKTOSELFCONTAINEDThe update handler should download self-contained content rather than delta-compressed content for the update.
0x8024200DWU_E_UH_NEEDANOTHERDOWNLOADThe update handler did not install the update because the update needs to be downloaded again.
0x8024200EWU_E_UH_NOTIFYFAILUREThe update handler failed to send notification of the status of the install (uninstall) operation.
0x8024200FWU_E_UH_INCONSISTENT_FILE_NAMESThe file names in the update metadata are inconsistent with the file names in the update package.
0x80242010WU_E_UH_FALLBACKERRORThe update handler failed to fall back to the self-contained content.
0x80242011WU_E_UH_TOOMANYDOWNLOADREQUESTSThe update handler has exceeded the maximum number of download requests.
0x80242012WU_E_UH_UNEXPECTEDCBSRESPONSEThe update handler has received an unexpected response from CBS.
0x80242013WU_E_UH_BADCBSPACKAGEIDThe update metadata contains an invalid CBS package identifier.
0x80242014WU_E_UH_POSTREBOOTSTILLPENDINGThe post-reboot operation for the update is still in progress.
0x80242015WU_E_UH_POSTREBOOTRESULTUNKNOWNThe result of the post-reboot operation for the update could not be determined.
0x80242016WU_E_UH_POSTREBOOTUNEXPECTEDSTATEThe state of the update after its post-reboot operation has completed is unexpectedly.
0x80242017WU_E_UH_NEW_SERVICING_STACK_REQUIREDThe operating system servicing stack must be updated before this update is downloaded or installed.
0x80242FFFWU_E_UH_UNEXPECTEDThis update handler error is not covered by another WU_E_UH_* code.
0x80243001WU_E_INSTALLATION_RESULTS_UNKNOWN_VERSIONThe results of the download and installation could not be read in the registry due to an unrecognized data format version.
0x80243002WU_E_INSTALLATION_RESULTS_INVALID_DATAThe results of download and installation could not be read in the registry due to an invalid data format.
0x80243003WU_E_INSTALLATION_RESULTS_NOT_FOUNDThe results of download and installation are not available; the operation may have failed to start.
0x80243004WU_E_TRAYICON_FAILUREA failure occurred when trying to create an icon in the notification area.
0x80243FFDWU_E_NON_UI_MODEUnable to show the user interface (UI) when in a non-UI mode; Windows Update (WU) client UI modules may not be installed.
0x80243FFEWU_E_WUCLTUI_UNSUPPORTED_VERSIONUnsupported version of WU client UI exported functions.
0x80243FFFWU_E_AUCLIENT_UNEXPECTEDThere was a user interface error not covered by another WU_E_AUCLIENT_* error code.
0x80244000WU_E_PT_SOAPCLIENT_BASEWU_E_PT_SOAPCLIENT_* error codes map to the SOAPCLIENT_ERROR enum of the ATL Server Library.
0x80244001WU_E_PT_SOAPCLIENT_INITIALIZEInitialization of the SOAP client failed, possibly because of an MSXML installation failure.
0x80244002WU_E_PT_SOAPCLIENT_OUTOFMEMORYSOAP client failed because it ran out of memory.
0x80244003WU_E_PT_SOAPCLIENT_GENERATESOAP client failed to generate the request.
0x80244004WU_E_PT_SOAPCLIENT_CONNECTSOAP client failed to connect to the server.
0x80244005WU_E_PT_SOAPCLIENT_SENDSOAP client failed to send a message due to WU_E_WINHTTP_* error codes.
0x80244006WU_E_PT_SOAPCLIENT_SERVERSOAP client failed because there was a server error.
0x80244007WU_E_PT_SOAPCLIENT_SOAPFAULTSOAP client failed because there was a SOAP fault due to WU_E_PT_SOAP_* error codes.
0x80244008WU_E_PT_SOAPCLIENT_PARSEFAULTSOAP client failed to parse a SOAP fault.
0x80244009WU_E_PT_SOAPCLIENT_READSOAP client failed while reading the response from the server.
0x8024400AWU_E_PT_SOAPCLIENT_PARSESOAP client failed to parse the response from the server.
0x8024400BWU_E_PT_SOAP_VERSIONSOAP client found an unrecognizable namespace for the SOAP envelope.
0x8024400CWU_E_PT_SOAP_MUST_UNDERSTANDSOAP client was unable to understand a header.
0x8024400DWU_E_PT_SOAP_CLIENTSOAP client found the message was malformed (fix before resending).
0x8024400EWU_E_PT_SOAP_SERVERThe SOAP message could not be processed due to a server error (resend later).
0x8024400FWU_E_PT_WMI_ERRORThere was an unspecified Windows Management Instrumentation (WMI) error.
0x80244010WU_E_PT_EXCEEDED_MAX_SERVER_TRIPSThe number of round trips to the server exceeded the maximum limit.
0x80244011WU_E_PT_SUS_SERVER_NOT_SETWUServer policy value is missing in the registry.
0x80244012WU_E_PT_DOUBLE_INITIALIZATIONInitialization failed because the object was already initialized.
0x80244013WU_E_PT_INVALID_COMPUTER_NAMEThe computer name could not be determined.
0x80244015WU_E_PT_REFRESH_CACHE_REQUIREDThe reply from the server indicates that the server was changed or the cookie was invalid; refresh the state of the internal cache and retry.
0x80244016WU_E_PT_HTTP_STATUS_BAD_REQUESTHTTP 400 - the server could not process the request due to invalid syntax.
0x80244017WU_E_PT_HTTP_STATUS_DENIEDHTTP 401 - the requested resource requires user authentication.
0x80244018WU_E_PT_HTTP_STATUS_FORBIDDENHTTP 403 - server understood the request, but declined to fulfill it.
0x80244019WU_E_PT_HTTP_STATUS_NOT_FOUNDHTTP 404 - the server cannot find the requested Uniform Resource Identifier (URI).
0x8024401AWU_E_PT_HTTP_STATUS_BAD_METHODHTTP 405 - the HTTP method is not allowed.
0x8024401BWU_E_PT_HTTP_STATUS_PROXY_AUTH_REQHTTP 407 - proxy authentication is required.
0x8024401CWU_E_PT_HTTP_STATUS_REQUEST_TIMEOUTHTTP 408 - the server timed out waiting for the request.
0x8024401DWU_E_PT_HTTP_STATUS_CONFLICTHTTP 409 - the request was not completed due to a conflict with the current state of the resource.
0x8024401EWU_E_PT_HTTP_STATUS_GONEHTTP 410 - the requested resource is no longer available at the server.
0x8024401FWU_E_PT_HTTP_STATUS_SERVER_ERRORHTTP 500 - an error internal to the server prevented fulfilling the request.
0x80244020WU_E_PT_HTTP_STATUS_NOT_SUPPORTEDHTTP 501 - server does not support the functionality that is required to fulfill the request.
0x80244021WU_E_PT_HTTP_STATUS_BAD_GATEWAYHTTP 502 - the server, while acting as a gateway or proxy, received an invalid response from the upstream server it accessed when attempting to fulfill the request.
0x80244022WU_E_PT_HTTP_STATUS_SERVICE_UNAVAILHTTP 503 - the service is temporarily overloaded.
0x80244023WU_E_PT_HTTP_STATUS_GATEWAY_TIMEOUTHTTP 504 - the request was timed out waiting for a gateway.
0x80244024WU_E_PT_HTTP_STATUS_VERSION_NOT_SUPHTTP 505 - the server does not support the HTTP protocol version used for the request.
0x80244025WU_E_PT_FILE_LOCATIONS_CHANGEDOperation failed due to a changed file location; refresh internal state and resend.
0x80244026WU_E_PT_REGISTRATION_NOT_SUPPORTEDOperation failed because Windows Update Agent does not support registration with a non-WSUS server.
0x80244027WU_E_PT_NO_AUTH_PLUGINS_REQUESTEDThe server returned an empty authentication information list.
0x80244028WU_E_PT_NO_AUTH_COOKIES_CREATEDWindows Update Agent was unable to create any valid authentication cookies.
0x80244029WU_E_PT_INVALID_CONFIG_PROPA configuration property value was wrong.
0x8024402AWU_E_PT_CONFIG_PROP_MISSINGA configuration property value was missing.
0x8024402BWU_E_PT_HTTP_STATUS_NOT_MAPPEDThe HTTP request could not be completed and the reason did not correspond to any of the WU_E_PT_HTTP_* error codes.
0x8024402CWU_E_PT_WINHTTP_NAME_NOT_RESOLVEDThe proxy server or target server name cannot be resolved.
0x8024402FWU_E_PT_ECP_SUCCEEDED_WITH_ERRORSExternal .cab file processing completed with some errors.
0x80244030WU_E_PT_ECP_INIT_FAILEDThe external .cab file processor initialization did not complete.
0x80244031WU_E_PT_ECP_INVALID_FILE_FORMATThe format of a metadata file was invalid.
0x80244032WU_E_PT_ECP_INVALID_METADATAExternal .cab file processor found invalid metadata.
0x80244033WU_E_PT_ECP_FAILURE_TO_EXTRACT_DIGESTThe file digest could not be extracted from an external .cab file.
0x80244034WU_E_PT_ECP_FAILURE_TO_DECOMPRESS_CAB_FILEAn external .cab file could not be decompressed.
0x80244035WU_E_PT_ECP_FILE_LOCATION_ERRORExternal .cab processor was unable to get file locations.
0x80244FFFWU_E_PT_UNEXPECTEDThere was a communication error not covered by another WU_E_PT_* error code
0x80245001WU_E_REDIRECTOR_LOAD_XMLThe redirector XML document could not be loaded into the Document Object Model (DOM) class.
0x80245002WU_E_REDIRECTOR_S_FALSEThe redirector XML document is missing some required information.
0x80245003WU_E_REDIRECTOR_ID_SMALLERThe redirector ID in the downloaded redirector .cab file is less than in the cached .cab file.
0x8024502DWU_E_PT_SAME_REDIR_IDWindows Update Agent failed to download a redirector .cab file with a new redirector ID value from the server during the recovery.
0x8024502EWU_E_PT_NO_MANAGED_RECOVERA redirector recovery action did not complete because the server is managed.
0x80245FFFWU_E_REDIRECTOR_UNEXPECTEDThe redirector failed for reasons not covered by another WU_E_REDIRECTOR_* error code.
0x80246001WU_E_DM_URLNOTAVAILABLEA download manager operation could not be completed because the requested file does not have a URL.
0x80246002WU_E_DM_INCORRECTFILEHASHA download manager operation could not be completed because the file digest was not recognized.
0x80246003WU_E_DM_UNKNOWNALGORITHMA download manager operation could not be completed because the file metadata requested an unrecognized hash algorithm.
0x80246004WU_E_DM_NEEDDOWNLOADREQUESTAn operation could not be completed because a download request is required from the download handler.
0x80246005WU_E_DM_NONETWORKA download manager operation could not be completed because the network connection was unavailable.
0x80246006WU_E_DM_WRONGBITSVERSIONA download manager operation could not be completed because the version of Background Intelligent Transfer Service (BITS) is incompatible.
0x80246007WU_E_DM_NOTDOWNLOADEDThe update has not been downloaded.
0x80246008WU_E_DM_FAILTOCONNECTTOBITSA download manager operation failed because the download manager was unable to connect the Background Intelligent Transfer Service (BITS).
0x80246009WU_E_DM_BITSTRANSFERERRORA download manager operation failed because there was an unspecified Background Intelligent Transfer Service (BITS) transfer error.
0x8024600aWU_E_DM_DOWNLOADLOCATIONCHANGEDA download must be restarted because the location of the source of the download has changed.
0x8024600BWU_E_DM_CONTENTCHANGEDA download must be restarted because the update content changed in a new revision.
0x80246FFFWU_E_DM_UNEXPECTEDThere was a download manager error not covered by another WU_E_DM_* error code.
0x80247001WU_E_OL_INVALID_SCANFILEAn operation could not be completed because the scan package was invalid.
0x80247002WU_E_OL_NEWCLIENT_REQUIREDAn operation could not be completed because the scan package requires a greater version of the Windows Update Agent.
0x80247FFFWU_E_OL_UNEXPECTEDSearch using the scan package failed.
0x80248000WU_E_DS_SHUTDOWNAn operation failed because Windows Update Agent is shutting down.
0x80248001WU_E_DS_INUSEAn operation failed because the data store was in use.
0x80248002WU_E_DS_INVALIDThe current and expected states of the data store do not match.
0x80248003WU_E_DS_TABLEMISSINGThe data store is missing a table.
0x80248004WU_E_DS_TABLEINCORRECTThe data store contains a table with unexpected columns.
0x80248005WU_E_DS_INVALIDTABLENAMEA table could not be opened because the table is not in the data store.
0x80248006WU_E_DS_BADVERSIONThe current and expected versions of the data store do not match.
0x80248007WU_E_DS_NODATAThe information requested is not in the data store.
0x80248008WU_E_DS_MISSINGDATAThe data store is missing required information or has a null value in a table column that requires a non-null value.
0x80248009WU_E_DS_MISSINGREFThe data store is missing required information or has a reference to missing license terms, a file, a localized property, or a linked row.
0x8024800AWU_E_DS_UNKNOWNHANDLERThe update was not processed because its update handler could not be recognized.
0x8024800BWU_E_DS_CANTDELETEThe update was not deleted because it is still referenced by one or more services.
0x8024800CWU_E_DS_LOCKTIMEOUTEXPIREDThe data store section could not be locked within the allotted time.
0x8024800DWU_E_DS_NOCATEGORIESThe category was not added because it contains no parent categories, and it is not a top-level category.
0x8024800EWU_E_DS_ROWEXISTSThe row was not added because an existing row has the same primary key.
0x8024800FWU_E_DS_STOREFILELOCKEDThe data store could not be initialized because it was locked by another process.
0x80248010WU_E_DS_CANNOTREGISTERThe data store is not allowed to be registered with COM in the current process.
0x80248011WU_E_DS_UNABLETOSTARTCould not create a data store object in another process.
0x80248013WU_E_DS_DUPLICATEUPDATEIDThe server sent the same update to the client computer, with two different revision IDs.
0x80248014WU_E_DS_UNKNOWNSERVICEAn operation did not complete because the service is not in the data store.
0x80248015WU_E_DS_SERVICEEXPIREDAn operation did not complete because the registration of the service has expired.
0x80248016WU_E_DS_DECLINENOTALLOWEDA request to hide an update was declined because it is a mandatory update or because it was deployed with a deadline.
0x80248017WU_E_DS_TABLESESSIONMISMATCHA table was not closed because it is not associated with the session.
0x80248018WU_E_DS_SESSIONLOCKMISMATCHA table was not closed because it is not associated with the session.
0x80248019WU_E_DS_NEEDWINDOWSSERVICEA request to remove the Windows Update service or to unregister it with Automatic Updates was declined because it is a built-in service and Automatic Updates cannot fall back to another service.
0x8024801AWU_E_DS_INVALIDOPERATIONA request was declined because the operation is not allowed.
0x8024801BWU_E_DS_SCHEMAMISMATCHThe schema of the current data store and the schema of a table in a backup XML document do not match.
0x8024801CWU_E_DS_RESETREQUIREDThe data store requires a session reset; release the session and retry with a new session.
0x8024801DWU_E_DS_IMPERSONATEDA data store operation did not complete because it was requested with an impersonated identity.
0x80248FFFWU_E_DS_UNEXPECTEDThere was a data store error not covered by another WU_E_DS_* code.
0x80249001WU_E_INVENTORY_PARSEFAILEDParsing of the rule file failed.
0x80249002WU_E_INVENTORY_GET_INVENTORY_TYPE_FAILEDFailed to get the requested inventory type from the server.
0x80249003WU_E_INVENTORY_RESULT_UPLOAD_FAILEDFailed to upload inventory result to the server.
0x80249004WU_E_INVENTORY_UNEXPECTEDThere was an inventory error not covered by another error code.
0x80249005WU_E_INVENTORY_WMI_ERRORA WMI error occurred when enumerating the instances for a particular class.
0x8024A000WU_E_AU_NOSERVICEAutomatic Updates was unable to service incoming requests.
0x8024A002WU_E_AU_NONLEGACYSERVERThe old version of Automatic Updates has stopped because the WSUS server has been upgraded.
0x8024A003WU_E_AU_LEGACYCLIENTDISABLEDThe old version of Automatic Updates was disabled.
0x8024A004WU_E_AU_PAUSEDAutomatic Updates was unable to process incoming requests because it was paused.
0x8024A005WU_E_AU_NO_REGISTERED_SERVICENo unmanaged service is registered with AU.
0x8024AFFFWU_E_AU_UNEXPECTEDThere was an Automatic Updates error not covered by another WU_E_AU * code.
0x8024C001WU_E_DRV_PRUNEDA driver was skipped.
0x8024C002WU_E_DRV_NOPROP_OR_LEGACYA property for the driver could not be found. It may not conform with required specifications.
0x8024C003WU_E_DRV_REG_MISMATCHThe registry type read for the driver does not match the expected type.
0x8024C004WU_E_DRV_NO_METADATAThe driver update is missing metadata.
0x8024C005WU_E_DRV_MISSING_ATTRIBUTEThe driver update is missing a required attribute.
0x8024C006WU_E_DRV_SYNC_FAILEDDriver synchronization failed.
0x8024C007WU_E_DRV_NO_PRINTER_CONTENTInformation required for the synchronization of applicable printers is missing.
0x8024CFFFWU_E_DRV_UNEXPECTEDThere was a driver error not covered by another WU_E_DRV_* code.
0x8024D001WU_E_SETUP_INVALID_INFDATAWindows Update Agent could not be updated because an .inf file contains invalid information.
0x8024D002WU_E_SETUP_INVALID_IDENTDATAWindows Update Agent could not be updated because the wuident.cab file contains invalid information.
0x8024D003WU_E_SETUP_ALREADY_INITIALIZEDWindows Update Agent could not be updated because of an internal error that caused setup initialization to be performed twice.
0x8024D004WU_E_SETUP_NOT_INITIALIZEDWindows Update Agent could not be updated because setup initialization never completed successfully.
0x8024D005WU_E_SETUP_SOURCE_VERSION_MISMATCHWindows Update Agent could not be updated because the versions specified in the .inf file do not match the actual source file versions.
0x8024D006WU_E_SETUP_TARGET_VERSION_GREATERWindows Update Agent could not be updated because a Windows Update Agent file on the target system is newer than the corresponding source file.
0x8024D007WU_E_SETUP_REGISTRATION_FAILEDWindows Update Agent could not be updated because regsvr32.exe returned an error.
0x8024D008WU_E_SELFUPDATE_SKIP_ON_FAILUREAn update to the Windows Update Agent was skipped because previous attempts to update failed.
0x8024D009WU_E_SETUP_SKIP_UPDATEAn update to the Windows Update Agent was skipped due to a directive in the wuident.cab file.
0x8024D00AWU_E_SETUP_UNSUPPORTED_CONFIGURATIONWindows Update Agent could not be updated because the current system configuration is not supported.
0x8024D00BWU_E_SETUP_BLOCKED_CONFIGURATIONWindows Update Agent could not be updated because the system is configured to block the update.
0x8024D00CWU_E_SETUP_REBOOT_TO_FIXWindows Update Agent could not be updated because a restart of the system is required.
0x8024D00DWU_E_SETUP_ALREADYRUNNINGWindows Update Agent setup is already running.
0x8024D00EWU_E_SETUP_REBOOTREQUIREDWindows Update Agent setup package requires a reboot to complete installation.
0x8024D00FWU_E_SETUP_HANDLER_EXEC_FAILUREWindows Update Agent could not be updated because the setup handler failed when it was run.
0x8024D010WU_E_SETUP_INVALID_REGISTRY_DATAWindows Update Agent could not be updated because the registry contains invalid information.
0x8024D011WU_E_SELFUPDATE_REQUIREDWindows Update Agent must be updated before search can continue.
0x8024D012WU_E_SELFUPDATE_REQUIRED_ADMINWindows Update Agent must be updated before search can continue. An administrator is required to perform the operation.
0x8024D013WU_E_SETUP_WRONG_SERVER_VERSIONWindows Update Agent could not be updated because the server does not contain update information for this version.
0x8024DFFFWU_E_SETUP_UNEXPECTEDWindows Update Agent could not be updated because of an error not covered by another WU_E_SETUP_* error code.
0x8024E001WU_E_EE_UNKNOWN_EXPRESSIONAn expression evaluator operation could not be completed because an expression was unrecognized.
0x8024E002WU_E_EE_INVALID_EXPRESSIONAn expression evaluator operation could not be completed because an expression was invalid.
0x8024E003WU_E_EE_MISSING_METADATAAn expression evaluator operation could not be completed because an expression contains an incorrect number of metadata nodes.
0x8024E004WU_E_EE_INVALID_VERSIONAn expression evaluator operation could not be completed because the version of the serialized expression data is invalid.
0x8024E005WU_E_EE_NOT_INITIALIZEDThe expression evaluator could not be initialized.
0x8024E006WU_E_EE_INVALID_ATTRIBUTEDATAAn expression evaluator operation could not be completed because there was an invalid attribute.
0x8024E007WU_E_EE_CLUSTER_ERRORAn expression evaluator operation could not be completed because the cluster state of the computer could not be determined.
0x8024EFFFWU_E_EE_UNEXPECTEDThere was an expression evaluator error not covered by another WU_E_EE_* error code.
0x8024F001WU_E_REPORTER_EVENTCACHECORRUPTThe event cache file was defective.
0x8024F002WU_E_REPORTER_

 

EVENTNAMESPACEPARSEFAILED
The XML in the event namespace descriptor could not be parsed.
0x8024F003WU_E_INVALID_EVENTThe XML in the event namespace descriptor could not be parsed.
0x8024F004WU_E_SERVER_BUSYThe server rejected an event because the server was too busy.
0x8024FFFFWU_E_REPORTER_UNEXPECTEDThere was a reporter error not covered by another error code.

Windows Update Agent Result Codes

 

Manually Testing the Patch

It is best practice that you download the patch to the device and manually run in in the GUI.  The patch should display a message giving the same reason for not installing in a dialog. Once you have verified why the patch will not install manually, contact support and be sure to upload the vulscan log from the repair task to the case.

 

Detection Issues That Support Likely Will Not be able to Resolve

Certain false detection issues can occur that support will likely be unable to troubleshoot or resolve.  The most likely of these is with our powershell scripts running on Windows 7 devices. The example from another vulscan log below shows a script error when trying to run on a device.

Mon, 23 Oct 2017 14:58:48 File OSVERSION version within specified
Mon, 23 Oct 2017 14:58:48 Prod Windows 7 Service Pack 1 (ID:WIN7SP1) verified OSVERSION, found: 6.1.7601.1
Mon, 23 Oct 2017 14:58:48 Prod Windows 7 Service Pack 1 (ID:WIN7SP1) verified C:\Windows\explorer.exe, found: C:\Windows\explorer.exe
Mon, 23 Oct 2017 14:58:48 Running detection script
Mon, 23 Oct 2017 14:58:48 Content filename: 'RollupFixB201710.ps1'
Mon, 23 Oct 2017 14:58:48 Writing script content to file 'C:\Windows\TEMP\RollupFixB201710.ps1' starting at line 5
Mon, 23 Oct 2017 14:58:48 Launching external script processor: <powershell.exe>
Mon, 23 Oct 2017 14:58:48 args: <-executionpolicy bypass C:\Windows\TEMP\RollupFixB201710.ps1>
Mon, 23 Oct 2017 14:58:48 External timeout: 60
Mon, 23 Oct 2017 14:58:48 Called CreateProcess: "powershell.exe"
Mon, 23 Oct 2017 14:58:48 Error 2 launching application <powershell.exe>
Mon, 23 Oct 2017 14:58:48 4041681_MSU detected
Mon, 23 Oct 2017 14:58:48 VUL: '4041681_MSU' (windows6.1-kb4041681-x86.msu) DETECTED. Reason 'Unexpected error in custom script source. See agent log for details'. Expected ''. Found ''. Patch required 'windows6.1-kb4041681-x86.msu'.

Mon, 23 Oct 2017 14:58:48 Patch is NOT installed
Mon, 23 Oct 2017 14:58:48 Last status: Done

 

You can see from the log that the script attempted to run but got a 'Unexpected error in custom script source. See agent log for details' error. In all cases where we cannot get a proper detection from our scripts Ivanti errs on the side of caution and will throw a DETECTED and will try and install the patch just to be safe.

Issues that arise from script errors are difficult to impossible for us to troubleshoot.  The likely cause is a security setting or Antivirus/Malware program that prevents the script from running.  GPOs and powershell policies can also interfere if they are enabled in the customers environment. Since issues like this are impossible to replicate in our teat labs and are unique to the customers environment, the customer is advised to do some troubleshooting and see if security settings and restrictions can be lowered on a test device to try and get the script to run properly before contacting support.

HP client driver updates

$
0
0

Does anybody use this definition types? What is your experience with them? By contrast of others patches, it looks for me that there is no replacement logics included so old sp..... are not replaced.

 

Regards

Ivan

�����������µ�Adobe reader �� flash player ������������

$
0
0

找不到最新的Adobe reader 和 flash player 补丁和升级包

 

2018-02-05_153813.jpg2018-02-05_154109.jpg2018-02-05_154306.jpg

 

 

2018-02-02_140007.jpg

About Patching: 101 - A simple, effective method of patching

$
0
0

As the Enterprise Ivanti Endpoint Manager Administrator of a large company that has had over 15 Core Servers with over 12,000 systems and over 20 other Ivanti tech's to support I have found "how should I patch" to come up often at my location as well as on this forum.

 

Like Windows, there are 3 or more ways to do most anything in Ivanti Endpoint Manager patching being one of those, and I have re-written the way I advocate our techs patch in Ivanti from the way I recommended a few years back and thought I would post it here for other to use as needed. It is not the only way, nor am I saying it is the best way.

 

Please keep in mind that this is a basic method, simple and effective.  I did not go into Auto-Fix, some of our advanced tech's use it, others don't.  I wanted something a newbie could pick up, read and begin patching in a very short amount of time.

 

Picking what patches to patch can be a political nightmare depending on your companies policies.  Ours went from 12 groups doing it all differently, some patching critical's only, some not patching, others patching everything possible to a reduced number of groups that all now have a "baseline" that is set from up above that is pretty in-depth and aggressive deadlines to have them patched by.

 

In short, we patch all security related items with few exceptions that are patchable via Ivanti and we do it aggressively as you must nowadays in this world of exploits.

 

If you are not patching, I strongly suggest you start.

 

Attached is the method I recommend, it uses two tasks, one a "Push" the other a straight "Policy".  Why not a "Policy Support Push" you ask?  We were doing that but are finding that some systems will stick in the "active" bin of the scheduled tasks for some reason (being researched) and thus the task will not become a policy.  If you restart the task, some of those systems will clear, but then others will stick... and so on.

 

It goes over creating a group of patches, creating the tasks, targeting the systems and scheduling the deployment.

 

I look forward to your feedback and I hope this helps some of you.

Support for the Intel 'Meltdown' security vulnerability KB4058702

$
0
0
For the latest information regarding the Meltdown and Spectre vulnerabilities see this document: A comprehensive guide to the Meltdown and Spectre vulnerabilities

 

Information

 

Microsoft released KB4058702 late the night of 1/3/18 (out of band) to address an Intel CPU firmware vulnerability.  The patches released will be added to our patch definition update to be released later today, 1/4/18.

 

List of patches from Microsoft:

https://www.catalog.update.microsoft.com/Search.aspx?q=2018-01

 

Additional Information

Important information on detection logic for the Intel 'Meltdown' security vulnerability

 

Current definitions in Patch and Compliance referencing Support for the Intel 'Meltdown' Security Vulnerability

 


A comprehensive guide to the Meltdown and Spectre vulnerabilities

$
0
0

metlddownspectredave.jpg

 

This document serves to be a reference to demonstrate the following:

 

 

Overview of the Meltdown and Spectre vulnerabilities

For a further overview of both the Meltdown and Spectre vulnerabilities please see the following Ivanti Blog Post:

 

Meltdown - CVE Notice # CVE-2017-5754                 More information from the National Vulnerability Database: NVD - CVE-2017-5754

Spectre Variant 1 - CVE Notice # CVE-2017-5753    More information from the National Vulnerability Database: NVD - CVE-2017-5753

Spectre Variant 1 - CVE Notice # CVE-2017-5715    More information from the National Vulnerability Database: NVD - CVE-2017-5715

 

These CVE and NVD entries contain lists of advisories, solutions, and tools regarding these vulnerabilities. CVE is a reference method for publicly known IT vulnerabilities and exposures.

 

Meltdown and Spectre are vulnerabilities that affect various computer processors including Intel x86 processors and some ARM-based processors.  Due to this, we will cover how to mitigate this through the features of Ivanti EPM.  Meltdown affects a very large range of computers, cell phones, tablets, etc.  Thus this touches some of the systems that you manage with Ivanti EPM.  (Examples are servers, desktops, cell phones and other mobile devices)  In January of 2018, it was disclosed along with another exploit called "Spectre" with which it shares some but not all characteristics.  Meltdown patches may introduce some amount of performance loss, however, it is not as high as initially reported.   On January 18th, 2018 unwanted reboots and other stability issues were reported due to patches applied for the mitigation of these vulnerabilities.  Due to this newer updates have been released.   All updates will be addressed later in the document underneath the OS Updates section.

 

OS Updates

Windows Updates

 

This section describes available Patch and Compliance definitions that can be delivered through the EPM Patch and Compliance tool.

 

New 01/29/2018  Important update for all operating systems

 

Microsoft has released an emergency out of band update that disables the mitigation for Spectre variant 2.  This was due to the fact that Intel's new microcode can cause higher than expected reboots that can result in data loss or corruption. 

 

Ivanti Patch News Bulletin: A tool to disable Mitigation against Spectre (KB4078130) has been released by Microsoft. 29/Jan/2018

 

Microsoft news about this patch release: https://support.microsoft.com/en-us/help/4078130/update-to-disable-mitigation-against-spectre-variant-2

 

This update adds two registry settings that “manually disable mitigation against Spectre Variant 2”:

 

"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 1 /f

"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 1 /f

The installation of this latest patch is optional, however, caution should be taken.  If the prior Spectre mitigation patches caused instability, you will want to install this patch (within definition MSNS18-01-4078130_INTL) in order to return to better system stability.

 

Note: If you choose to install the following patch for KB4078130, the previously fixed patches will again detect as being installed.  You need to choose one or the other to put in your scan group.  Meaning MSNS18-01-4078130_INTL or the patches further below

 

Ivanti Patch and Compliance Manager IDMicrosoft KB #Ivanti Publish DateOther Notes
MSNS18-01-4078130_INTLKB407813001/29/2018

 

 

Windows 10

Ivanti Patch and Compliance Manager IDMicrosoft KB #Ivanti Publish Date
Other Notes
MS18-01-W10_INTLVersion 1507 - KB405689301/03/2018Cumulative Update and Delta Update
"Version 1511 - KB405688801/03/2018Cumulative Update and Delta Update
"Version 1607 - KB405689001/03/2018Cumulative Update and Delta Update
"Version 1703 - KB405689101/03/2018Cumulative Update and Delta Update
"Version 1709 - KB405689201/03/2018Cumulative Update and Delta Update

 

Windows 8.1 and Server 2012

Ivanti Patch and Compliance Manager IDMicrosoft KB #Ivanti Publish DateOther Notes
MS18-01-SO81_INTL  (Windows 8.1)KB405689801/04/2018Security Only
MS18-01-SO9_INTL (Server 2012)KB405689901/04/2018Security Only
MS18-01-MR7_INTLKB405689401/04/2018Monthly Rollup

 

Windows 7 and Server 2008

Ivanti Patch and Compliance Manager IDMicrosoft KB #
Ivanti Publish Date
Other Notes
MS18-01-S07_INTLKB405689701/04/2018Security Only
MS18-01-MR7-INTLKB405689401/04/2018Monthly Rollup

 

Note: As of 01/17/2018 for all OS Versions all Windows patches for 32-bit systems do not provide Meltdown mitigations.  This is a Windows Patch issue, not an Ivanti Patch issue.

macOS and iOS updates

 

Apple included mitigations for macOS 10.13.2 and iOS 11.2 released in December.  It has since followed up with additional mitigations with the just-released Apple macOS Supplemental Update: About speculative execution vulnerabilities in ARM-based and Intel CPUs - Apple Support

 

 

Browser Vulnerabilities

 

EdgeInternet ExplorerGoogle ChromeFirefoxOpera
Earliest Recommended VersionVaries per build numberVaries per OS

64.0.3282.134

57.0.450.0.2762.67
Ivanti Patch Definition IDMS18-01-W10_INTLMS18-01-IE_INTLPendingFF18-001_INTL or newerOPERA-154_INTL

BIOS, firmware and driver updates

 

Ivanti EPM Patch and Compliance provides content for several vendor's BIOS and driver updates.  It is recommended to follow the advice of the vendor and to update your systems accordingly.

 

As a convenience we offer some links to vendor websites relating to this issue:

 

Dell: Meltdown and Spectre Vulnerabilities | Dell US

HP: HPSBHF03573 rev. 7 - Side-Channel Analysis Method | HP® Customer Support

Lenovo: Reading Privileged Memory with a Side Channel

 

These vendor links are provided for convenience.  They may quickly become outdated and there may be better links provided by the vendor.

 

Antivirus software and possible compatibility issues with OS patches

 

See the following article for information specific regarding antivirus compatibility including Ivanti Antivirus: About Antivirus products and the Meltdown and Spectre security vulnerabilities

Current definitions in Patch and Compliance referencing Support for the Intel 'Meltdown' Security Vulnerability

$
0
0

For the latest information regarding the Meltdown and Spectre vulnerabilities see this article: A comprehensive guide to the Meltdown and Spectre vulnerabilities

 

Affected patches:

Vulnerability

KB

Product

Type

MS18-01-2K8_INTL

KB4056615
KB4056759
KB4056941
KB4056942
KB4056944

Windows Server 2008

Security Updates

MS18-01-IE_INTL

KB4056568

Internet Explorer

Security Update

MS18-01-MR7_INTLKB4056894Windows 7, Server 2008 R2Monthly Rollup
MS18-01-MR8_INTLKB4056896Windows Server 2012Monthly Rollup

MS18-01-SO7_INTL

KB4056897

Windows 7, Server 2008 R2

Security Only

MS18-01-SO8_INTL

KB4056899

Windows Server 2012

Security Only

MS18-01-SO81_INTL

KB4056898

Windows 8.1, Server 2012 R2

Security Only

MS18-01-SQL_INTL

KB4052987
KB4057118
KB4057119
KB4057122

SQL Server 2016, 2017

Security Updates

MS18-01-W10_INTL

KB4056888
KB4056890
KB4056891
KB4056892
KB4056893

Windows 10

Cumulative Update and Delta Update

 

 

How to Scan and/or Repair against a custom group

 

Additional Information

 

Due to to possible BSOD issues that may occur when installing this update on system with out of date AV software, we will be adding a detection prerequisite as Windows Update does:

Key="HKEY_LOCAL_MACHINE" Subkey="SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat"

Value="cadca5fe-87d3-4b96-b7fb-a231484277cc"

Type="REG_DWORD”

 

If key does not exist you will be offered the detection only version of this patch.

 

This means that the associated patch for a system will not be remediated unless the Registry key is present. This mirrors how the patches are handled by Microsoft. Full details regarding the offering of the patch, and options if the Registry key is missing, are located in the Microsoft article here: https://support.microsoft.com/en-us/help/4072699/important-information-regarding-the-windows-security-updates-released

 

An Example of the detection only definition being returned will contain "DETECT" in the definition name and under Patch Required it will say: No repair action specified There is also no patch information provided

NoRegKeyHighlighted.PNG

An Example of the definition where the regkey is detected and you will be able to remediate

PatchRequired.PNG

 

Support for the Intel 'Meltdown' security vulnerability KB4058702

Important information on detection logic for the Intel 'Meltdown' security vulnerability

How to troubleshoot a Patch and Compliance (vulnerability) scan

$
0
0

 

This document illustrates the files, registry, settings and other information necessary to effectively troubleshoot a vulnerability scan.

In addition, this document walks through the steps that a basic Patch and Compliance scan (otherwise known as a vulnerability scan) takes.

 

This article will not describe every single step that the Vulnerability Scanner takes, but those steps where a failure can occur.

 

For the purposes of this document a simple scan is performed by running the following at the client command line:

vulscan /scan=0 /showui

 

This command tells the vulnerability scanner to scan Windows vulnerabilities (type 0) and to show a user interface.

 

The name "LDMS2016" and "LDMS2016_v###" will be seen throughout this document.   This refers to the Core Server name of "LDMS2016" which is the name of the core server that the author had when creating the document.

 

 

Settings

The settings that control how the vulnerability scanner will behave are stored in the Distribution and Patch Settings within the Agent Settings tool.

 

These settings control behaviors such as user input options, Cloud Services Appliances patch options, scanner CPU utilization, etc.

 

These settings are stored in the Ivanti EPM Database in the AgentSettings table and physically on the core server in the

\Program Files\LANDESK\ManagementSuite\ldlogon\AgentBehaviors folder.  The Distribution and Patch Settings are stored in the AgentBehavior_(Corename)_v###.xml file within this folder.

 

AgentBehaviorsXML.jpg

                                                                            Example

 

 

Product Licensing

The categories available to scan and repair are controlled by the Product license that has been purchased and activated on the core server.

 

The following graphic shows the categories available within the Download Updates function within the Patch and Compliance tool for those with a license for all categories.

   DownloadUpdatesCategories.jpg

Click for full size

For Product Licensing support Contact Ivanti supportand select the Product Licensing option.

 

Registry Keys

 

Core

HLKM\Software\LANDESK\ManagementSuite\PatchManagement\WebServiceMaxThreads

This key does not exist by default and should only be created with an understanding of how this key works and the full ramifications of creating this key and changing the default value.  This changes the number of default threads

 

This key is documented here: https://community.landesk.com/docs/DOC-36027#jive_content_id_Increasing_the_Number_of_Web_Process_to_Database_Threads

 

Client

HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\landesk\managementsuite\WinClient\Vulscan

 

This registry key contains the following information:

 

NameTypeData
Description
AgentBehaviorREG_SZLDMS2016_v495The agent behavior that vulscan will use when operating
AlternateRebootBehavior

/rebootIfNeeded is called from 3 possible locations during a client configuration.  It is hard for the task-handler version of the caller to know that a one-time-only (client-config-only) reboot override has been specified.  So all installers just call vulscan with the /UseAlternateRebootBehavior.  If vulscan can find the string value of "AlternateRebootBehavior" in the vulscanreg key, it'll act as if the behavior was passed by the command line.

CommandLineREG_SZThe command line that was used to launch vulscan
ComputerIdn.LDMS2016REG_DWORD0x00000006When running in a /showui mode the ComputerIDN is accessed locally from the registry rather than needing a separate GetSystemIDN for the UI through a second web service call to the core.  This value matches the ComputerIDN identifier in the Ivanti Endpoint Manager database.
KLBehaviorREG_SZLDMS2016_v517This refers to the Ivanti Antivirus behavior.  This will exist even if Ivanti Antivirus is not installed on the client.
LastReportedReboot.LDMS2016REG_DWORD0x00000001
trustedfilelistREG_SZLDMS2016_v861Trusted file list used for Ivanti Endpoint Security.  This will be present even if EPS is not installed or trusted file lists are not configured for this client.

Note: The populated "Data' entries are provided as an example.  Yours will differ.

 

The VulscanReboot key should NOT be modified, deleted or created.   This is a volatile registry key used by the vulnerability scanner.  Creating this key manually will create a persistent registry key that does not go away and will cause reboot loops and/or other undesirable behavior.

 

 

Gathering information for Ivanti Support

 

The vulnerability scan log files are located in the C:\ProgramData\LANDESK\log folder.

 

When in doubt just .ZIP up the entire folder and send it.

 

Otherwise, the following logs should be gathered:

 

  • vulscan*.log
  • statusdlg*.log

 

It is very useful to turn on Xtrace with the following enabled from the registry key prior to duplicating the problem and gathering logs:

 

From HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\landesk\managementsuite\LogOptions:

2016-07-18_11-23-22.jpg

How To: Enable XTrace Diagnostic Logging for the Ivanti Core and Clients

 

Tips and Tricks

 

Vulscan can be used as a shortcut to open various folders.  The following should be run on the client command line:

 

Vulscan e - Open the folder where Vulscan resides

Vulscan c - Open the LDClient folder,

Vulscan log - Open the ProgramData\LANDESK\Log folder

 

Issue: Cannot open vulscan logs folder from the command line using "vulscan e"

 

Ivanti Patch and Compliance (vulnerability) Scan Process Flow

 

It is important to note that the following must all be able to take place:  Client contact to core through IIS and several web services.  Core contact to Database Server  Core Contact to client  Correct permissions on core ManagementSuite\Incoming directory and \ManagementSuite\LDLOGON\VulnerabilityData and VulscanResults folders.

 

Note that issues can come and go during a vulscan.  This would indicate intermittent issues.  Most of the time this occurs when the server or database has connectivity issues or are too overwhelmed to respond to requests.

 

Step 1  - Contact the Ivanti Core Server

The vulscan engine attempts to contact the core server by checking the HKLM\SOFTWARE\Intel\LANDESK\LDWM registry key.  The client tries to contact vulcore.asmx through the WSVulnerabilityCore web service.  Thus the client needs to be able to contact the core, IIS needs to be available, the app pool needs to be running, and the database needs to be able to contact the core. 

 

Good Vulscan.log entry

Fri, 15 Jul 2016 11:38:20 Core server name found in HKLM\SOFTWARE\Intel\LANDesk\LDWM: LDMS2016

Fri, 15 Jul 2016 11:38:20 File C:\Program Files (x86)\LANDesk\Shared Files\ProxyHost.exe version within specified

Fri, 15 Jul 2016 11:38:20 Attempting to connect to proxyhost

Fri, 15 Jul 2016 11:38:20 connect to proxy result: 0

Fri, 15 Jul 2016 11:38:20 Using proxyhost to communicate with the core

What could go wrong?

Certificate-Based Authentication - New Secure Client information

 

Ivanti Endpoint Manager Enhanced Security Mode

 

If core has been upgraded and you have copied the .CRT, .KEY and

Client unable to connect to the core server

 

Error: "Host not found. Retrying"

Bad vulscan.log entry:

Fri, 15 Jul 2016 13:50:16 In SendRequest: Action = SOAPAction: "http://tempuri.org/GetHashForFile"

 

Fri, 15 Jul 2016 13:50:16 SendRequest: SOAPAction: "http://tempuri.org/GetHashForFile"

 

Fri, 15 Jul 2016 13:50:16 Action SOAPAction: "http://tempuri.org/GetHashForFile" failed, socket error: 0, SOAPCLIENT_ERROR: 5.  Status code: 503, fault string:

Fri, 15 Jul 2016 13:50:16   Retrying in 0 seconds...

Fri, 15 Jul 2016 13:50:16 Action SOAPAction: "http://tempuri.org/GetHashForFile" failed, socket error: 0, SOAPCLIENT_ERROR: 5.  Status code: 503, fault string:

Fri, 15 Jul 2016 13:50:16   Retrying in 9 seconds...

Fri, 15 Jul 2016 13:50:19 Last status: Retrying in 6 seconds...

The client makes a SOAP request to the core server webservice and gets HTTP error 503 - Service Unavailable

 

Note: The default timeout for Vulscan to connect to the core is 10 minutes.   Connection will fail after this time.


Basic Troubleshooting

    • Does the HKLM\SOFTWARE\Intel\LANDESK\LDWM registry key have the correct core name listed?
    • Can you ping the core server?  Try IP address, netbios name, and FQDN
    • Does the client have connectivity otherwise?
    • Can you browse to http://coreservername/WSVulnerabilityCore/vulcore.asmx from the client browser?
      • Is the LDAppVulnerability application pool running on the core and is is the identity assigned to it correct?
      • Is IIS running on the core?

 

Useful Articles

IIS Troubleshooting and Ivanti Endpoint Manager: 101

How to troubleshoot IIS using Log Parser Studio from Microsoft

 


Core server unable to talk to the database

 

This error shows that something is wrong with the core to database communication or web service to database communication.  This can be a simple connectivity issue, database too busy, IIS/ASP.NET, etc.

 

Error: "Server busy"

 

Bad Vulscan.log entry:

Fri, 15 Jul 2016 13:31:07 In SendRequest: Action = SOAPAction: "http://tempuri.org/ResolveDeviceID"

 

 

Fri, 15 Jul 2016 13:31:07 SendRequest: SOAPAction: "http://tempuri.org/ResolveDeviceID"

 

 

Fri, 15 Jul 2016 13:31:22 Action SOAPAction: "http://tempuri.org/ResolveDeviceID" failed, socket error: 0, SOAPCLIENT_ERROR: 7.  Status code: 500, fault string: Server was unable to process request. ---> A network-related or instance-specific error occurred while establishing a connection to SQL Server. The server was not found or was not accessible. Verify that the instance name is correct and that SQL Server is configured to allow remote connections. (provider: TCP Provider, error: 0 - The remote computer refused the network connection.) ---> The remote computer refused the network connection

Fri, 15 Jul 2016 13:31:22   Retrying in 5 seconds...

Fri, 15 Jul 2016 13:31:25 Last status: Retrying in 2 seconds...

Fri, 15 Jul 2016 13:31:26 Last status: Retrying in 1 seconds..

The client does a SOAP request to the core web service to resolve it's device ID and gets HTTP Error 500 - Internal Server Error

 

    • Can you browse from the client to http://<coreservername>/WSVulnerabilityCore/Vulcore.asmx?
    • Is the core server overloaded or is the database overloaded causing a lack of a timely response?
    • Do other functions that depend on database connectivity work?  (Inventory Scan, doing a search for computers, running an Ivanti query, etc)
    • Is the APP pool assigned to the right version of .NET (4.0)
    • Is ASP.NET 4.0 bound to IIS?
    • Are the database credentials on core correct?  Check in the Configure Services drop-down in the Ivanti Endpoint Manager console.
    • Is the database server up and running?  (Ping the database server, etc)

 


Useful Articles

Error: "Server Busy" When Running a Vulnerability Scan

Step 2  - Core downloads and applies various agent settings

At this step the core server downloads and applies various agent settings.  If a setting does not apply to the computer the file will be downloaded anyway.  (For example, if you have Endpoint Security in your

 

Good Vulscan.log entry

Fri, 15 Jul 2016 14:38:57 Checking whether to unzip 'C:\ProgramData\vulScan\ClientConnectivityBehavior_Apply.zip'.  Force: false

Fri, 15 Jul 2016 14:38:57 GetFileHash: could not find "C:\ProgramData\vulScan\ClientConnectivityBehavior_Apply.zip"

Fri, 15 Jul 2016 14:38:57 Calling 'PreApplyBehavior' in 'C:\Program Files (x86)\LANDesk\LDClient\ClientConnectivityBehavior_Apply.dll'

Fri, 15 Jul 2016 14:38:57 Client connectivity settings pre-apply dll

Fri, 15 Jul 2016 14:38:57 Allowing to download from the source

Fri, 15 Jul 2016 14:38:57 Downloading trusted certificates

Fri, 15 Jul 2016 14:38:57 In SendRequest: Action = SOAPAction: "http://tempuri.org/GetHashForFile"

 

Fri, 15 Jul 2016 14:38:57 SendRequest: SOAPAction: "http://tempuri.org/GetHashForFile"

 

Fri, 15 Jul 2016 14:38:57 Success

Fri, 15 Jul 2016 14:38:57 Self update: files are up to date.

Fri, 15 Jul 2016 14:38:57 Last status: Done

Fri, 15 Jul 2016 14:38:57 Calling 'ApplyBehavior' in 'C:\Program Files (x86)\LANDesk\LDClient\ClientConnectivityBehavior_Apply.dll'

Fri, 15 Jul 2016 14:38:57 Successfully loaded ClientConnectivityBehavior_apply behaviors from 'C:\ProgramData\vulScan\ClientConnectivityBehavior_LDMS2016_v499.xml'.

The client checks it's file hash for the behavior file and compares it through a SOAP request to the core web service function "GetHashForFile".

It then applies the behavior to the client.

What could go wrong?

Client cannot access the AgentBehaviors folder on the core server

 

The client needs to be able to access the \LDLOGON\Agentbehaviors folder on the core server.  It then downloads the agent behavior .XML files and applies them if they pertain to the computer, otherwise the settings come down, but they are not applied.

 

Error: " 'Applying XXX settings failed"

Bad vulscan entry:

Fri, 15 Jul 2016 15:20:53 Info: Core did not find file AgentBehaviors/RebootBehavior_LDMS2016_v503.xml

Fri, 15 Jul 2016 15:20:53 Last status: File not found on core

Fri, 15 Jul 2016 15:20:53 Info: Core did not find file RebootBehavior_Apply.zip

Fri, 15 Jul 2016 15:20:53 Last status: File not found on core

Fri, 15 Jul 2016 15:20:53 Info: Core did not find file AgentBehaviors/RCBehavior_LDMS2016_v511.xml

Fri, 15 Jul 2016 15:20:53 Last status: File not found on core

Fri, 15 Jul 2016 15:20:53 Info: Core did not find file RCBehavior_Apply.zip

Fri, 15 Jul 2016 15:20:53 Last status: File not found on core

 

Useful Articles

Issue: Vulscan is not applying agent setting changes or is using an incorrect agent setting

Error "Unable to get the setting from core" when running security scan (Vulscan.exe)

Error: "Core could not find a file" when running vulscan on clients

Error: "Failed to apply compliance settings" during vulnerability scan return code 451


 

Step 3 - Vulscan loads and caches local MSI information

In order for the vulnerability scanner to scan MSI information, the vulnerability scanner reads and caches the MSI information from the local computer's registry. This calls the MsiEnumProducts and MsiEnumPatches functions.  This depends on the existence of MSI.DLL in the C:\Windows\System32 directory.

 

Vulscan.log entry:

Fri, 15 Jul 2016 15:20:56   Loading MSI patch information

Fri, 15 Jul 2016 15:20:56   product {7A4192A1-84C4-4E90-A31B-B4847CA8E23A}

Fri, 15 Jul 2016 15:20:56   product {7E8833A1-AF24-4CAE-82DF-CFE14C14B94D}

Fri, 15 Jul 2016 15:20:56   product {2EDC2FA3-1F34-34E5-9085-588C9EFD1CC6}

Fri, 15 Jul 2016 15:20:56   product {E7D4E834-93EB-351F-B8FB-82CDAE623003}

Fri, 15 Jul 2016 15:20:56   product {764384C5-BCA9-307C-9AAC-FD443662686A}

Fri, 15 Jul 2016 15:20:56   product {5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}

Fri, 15 Jul 2016 15:20:56   product {3D6AD258-61EA-35F5-812C-B7A02152996E}

Fri, 15 Jul 2016 15:20:56   product {45734758-4041-4EA8-8E62-DE661FC3879C}

Fri, 15 Jul 2016 15:20:56   product {23170F69-40C1-2702-0920-000001000000}

Fri, 15 Jul 2016 15:20:56   product {60EC980A-BDA2-4CB6-A427-B07A5498B4CA}

Fri, 15 Jul 2016 15:20:56   product {1F1C2DFC-2D24-3E06-BCB8-725134ADF989}

Fri, 15 Jul 2016 15:20:56   product {4C5EF2FF-EEA0-4314-8693-2AF565F14525}

Fri, 15 Jul 2016 15:20:56 Loaded 12 products and/or patches

 

Step 4 - Client requests vulnerability data information from core

 

  1. Vulnerability Definitions are downloaded from the Ivanti Patch Content servers and stored in the Ivanti Endpoint Manager database connected to the core server.
  2. When a client calls in to scan for particular data, it requests Vulnerability data of a certain type (Windows Vulnerabilities, LANDESK Updates, Custom Definitions, etc) and for the particular OS the client is running.
    1. If the client is close to up to date the client gets the vulnerability data directly from the web service.  If it is not close to up to date it downloads the entire vulnerablity data set from the .XML file(s) mentioned below.
    2. The core server also writes this information to XML files in \Program Files\LANDesk\ManagementSuite\LDLogon\VulnerabilityData
    3. The file that gets written is "type_os-bitlevel_language.timestamp".   So a Windows 7 x64 client requesting Windows Vulnerability Data information would cause the core server to write a file called "0_win7-x64_enu.1315869631.xml" and also a compressed .XMLZ version of the same file.  Only the first requesting client causes the .XML file to be initially written.  Thereafter the other clients will simply receive this .XML file.

      Note: Deleting a definition will cause the entire .XML file to be re-written and all clients will redownload the entire .XML file.

    4. LDZIP.DLL in \Program Files (x86)\LANDesk\ManagementSuite\WSVulnerabilityCore\Bin is responsible for writing the compressed version.
    5. The client then downloads this .XMLZ file, decompresses it and begins parsing it.

     

    Good vulscan.log entry:

    Fri, 15 Jul 2016 15:20:56 -------------------ProcessRules of type 0----------------------

    Fri, 15 Jul 2016 15:20:56 GetData(): agentconfig =

    Fri, 15 Jul 2016 15:20:56 Getting definition data from core LDMS2016

    Fri, 15 Jul 2016 15:20:56 HTTP POST: http://LDMS2016:443/WSVulnerabilityCore/VulCore.asmx

    Fri, 15 Jul 2016 15:20:56 Setting a proxy...

    Fri, 15 Jul 2016 15:20:56 Setting socket timeout to 1000 * 60 * 4

    Fri, 15 Jul 2016 15:20:56 Success

    Fri, 15 Jul 2016 15:20:56 Last status: Done

    Fri, 15 Jul 2016 15:20:56 Parsing information

    Fri, 15 Jul 2016 15:20:56 Decompressing data

     

    What could go wrong?

     

    Error: "0x8db30194" (404) from vulscan

    Error: "Client user does not have administrator rights" when running Vulnerability Scan

    Error: "Failed. Cannot Interpret Data" when running a Security and Compliance scan

     

    Step 5 - Vulnerability scanning results are sent to the core server

    After scanning the results are sent to the core server through http://<corename>:443/WSVulnerabilityCore/vulcore.asmx.  At this point the Web services processes the results and creates a scan result file (in this case ScanResults_{A25894AD-E7E7-C042-86AB-5F8BBD866601}_0.vrz) that goes into the \Program Files\LANDESK\ManagementSuite\VulscanResults folder on the core.  This gets processed into the database and will show up in the Security and Compliance information for the client in the inventory.

     

    Good vulscan.log entry

    Mon, 18 Jul 2016 08:37:40 Sending scan results to core LDMS2016

    Mon, 18 Jul 2016 08:37:40 PutResultsAsFile uncompressed length: 4936

    Mon, 18 Jul 2016 08:37:40 compressed length: 914

    Mon, 18 Jul 2016 08:37:40 HTTP POST: http://LDMS2016:443/incomingdata/postcgi.exe?prefix=vulscanresults\&name=ScanResults_{A25894AD-E7E7-C042-86AB-5F8BBD866601}_0.vrz

    Mon, 18 Jul 2016 08:37:40 Setting a proxy...

    Mon, 18 Jul 2016 08:37:40 Setting socket timeout to 1000 * 60 * 4

    Mon, 18 Jul 2016 08:37:40 Success

    Mon, 18 Jul 2016 08:37:40 In SendRequest: Action = SOAPAction: "http://tempuri.org/PutResultsByFile"

     

    What can go wrong?

    Failures to send the results can come from some of the following issues:

     

    • Incorrect permissions to the \Program Files\LANDESK\ManagementSuite\IncomingData folder.
    • Incorrect permissions to the \Program Files\LANDESK\ManagementSuite\VulscanResults folder.
    • Missing, corrupted or incorrect version of postcgi.exe in the IncomingData folder.
    • Inability to contact the web service to place results.

     

    Failure in vulscan.log

    Mon, 18 Jul 2016 08:49:37 Sending scan results to core LDMS2016

    Mon, 18 Jul 2016 08:49:37 PutResultsAsFile uncompressed length: 4936

    Mon, 18 Jul 2016 08:49:37 compressed length: 913

    Mon, 18 Jul 2016 08:49:37 HTTP POST: http://LDMS2016:443/incomingdata/postcgi.exe?prefix=vulscanresults\&name=ScanResults_{A25894AD-E7E7-C042-86AB-5F8BBD866601}_0.vrz

    Mon, 18 Jul 2016 08:49:37 Setting a proxy...

    Mon, 18 Jul 2016 08:49:37 Setting socket timeout to 1000 * 60 * 4

    Mon, 18 Jul 2016 08:49:37 Failed http://LDMS2016:443/incomingdata/postcgi.exe?prefix=vulscanresults\&name=ScanResults_{A25894AD-E7E7-C042-86AB-5F8BBD866601}_0.vrz on server (0), server status: 404.

    Mon, 18 Jul 2016 08:49:37 HTTP Error 404.  Giving up.

    Mon, 18 Jul 2016 08:49:37 Last status: Failed: No response from core

    Mon, 18 Jul 2016 08:49:37 Failed to put vulnerability results to core as file: 8DB301B1

    Mon, 18 Jul 2016 08:49:37 Skipping repair step because scan errors occurred.

    Mon, 18 Jul 2016 08:49:37 ReleaseMutex 'Global\vulscan_scan' succeeded. Code: 0

    Mon, 18 Jul 2016 08:49:37 Failed

    In this case the postcgi.exe was missing in the incomingdata folder.  The service responded with an HTTP 404 error "File or directory not found".

     

    Additional articles:

    Issue: Vulnerability Scans are not updating on the core

    Error: "HTTP Error 403" Vulscan Return Code 433

     

    Step 6 - Vulnerability scanner checks for autofix patches

    The vulnerability scanner then checks with the core server to see if there are any patches that should be auto fixed at this time.  This is done through the http://localhost/wsvulnerabilitycore/vulcore.asmx web service using the GetAllPatches function.  If patches are found that need to be auto fixed one of the following methods is called:

     

    • Getallpatches2 -  GetAutofix Patches for all definitions specified
    • GetAutofixPatchesForGroup - If scanning against a group, get all Autofix definitions for that group.
    • GetPatchesForGroup - Get all patches for a group (remember, you can push a repair job against a group and it will be able to scan and repair in one scan)
    • GetPatchesForVulnerability - Get all auto fix patches for patches manually selected and scanned.

     

    The core then builds a list of the repair logic that vulscan will follow and it gets sent to the client through the web service, the client then writes an .XML file to follow as it repairs patches.   This information is all of the repair logic from the definition.

    Changing FQDN for the Policy Update

    $
    0
    0

    I'm having some problems forcing repair of windows patches.  I was looking through the logs when I saw this steady stream of the following errors on my schedpkgupdate.exe file.  I need to change the domain name companyA.org to companyB.com.  The server has already been joined to the new domain for some time.  Does anyone know where to edit the name that it's trying to use to find that file?

     

    08/07/2017 15:22:49 INFO  23652:1 RollingLog : [Start] Republishing policies...
    08/07/2017 15:22:49 INFO  23652:1 RollingLog : Performing policy update...
    08/07/2017 15:22:49 INFO  23652:1 RollingLog : Core has changed, resetting the core language cache
    08/07/2017 15:22:49 INFO  23652:1 RollingLog : Getting core language for Key:CurrentLanguage Language:ENU
    08/07/2017 15:22:49 INFO  23652:1 RollingLog : Getting core language for Key:LegacyLanguage Language:ENU
    08/07/2017 15:22:50 INFO  23652:1 RollingLog : Calculating hash for http://hostname.companyA.org/landesk/files/delstreameddocs.bat
    08/07/2017 15:22:50 INFO  23652:1 RollingLog : ERROR: failed to get the hash for http://hostname.companyA.org/landesk/files/delstreameddocs.bat
    08/07/2017 15:22:50 INFO  23652:1 RollingLog : UpdatePackageHash: exception - Failed to get the hash for http://hostname.companyA.org/landesk/files/delstreameddocs.bat : The remote server returned an error: (404) Not Found..

    Adobe Flashplayer 28.0.0.161

    $
    0
    0

    When will this patch be available in Patch Manager. Our Security Team is anxious to get this out to the masses. If it will not be available soon I will need to create a software distribution task to deploy.

    Viewing all 1121 articles
    Browse latest View live


    <script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>