Overview
Ivanti Endpoint Manager’s Patch and Compliance tool now welcomes our Next Generation patch engine. This new architecture enables us to continue optimizing well into the future and is only applicable to the Windows environment. As a preliminary feature, we’re providing the ability to opt-in, allowing for a more controlled introduction of all Next Generation content into your environment. The new patch engine is currently available in the 2017.3 product version.
Updated We are now offering this feature in ALL supported versions of the product.
By electing to download Next Gen content, the core will download new vulnerabilities definitions for products that are currently not supported in the standard content stream (i.e. Microsoft Windows Vulnerabilities). This means that if both options are selected (Next Gen Microsoft Windows Vulnerabilities (beta) and Microsoft Windows Vulnerabilities) there will be no overlap in the vulnerability content downloaded to the core.
Note: All images within this document can be viewed full size by clicking on them
Definition Downloads
In the definition download utility, a new definition type exists under Windows | Vulnerabilities | Next Gen Microsoft Windows Vulnerabilities (beta).
New As of 3 Jan 2018, the Next Gen Microsoft Windows Vulnerabilities (beta) option is no longer applicable. All new Windows Vulnerability (this includes 3rd party software) content has been formatted to use the Next Gen scan engine and is contained under Vulnerabilities | Windows Microsoft Vulnerabilities. Any content downloaded prior to 3 Jan will not be affected by this change.
Please ensure your definition downloads are scheduled to occur (2) times per week for the Microsoft Windows Vulnerability definitions. The recommended download occurrence should be scheduled on Wednesday and Friday evenings.
New![3Jan.jpg]()
When selected, all associated Next Gen binaries/vulnerabilities definitions will be downloaded to the core. The binaries (about 30 MB) will be contained in Managementsuite \ Ldlogon \ Timber directory and the definition grouping will be based on your configuration and download filters. Upon definition download, the following can be expected:
Definition Download
| Managementsuite \ Ldlogon \ Timber
|
---|
![Next Gen def download.jpg]() | ![Next Gen Timber Folder.jpg]() |
The Managementsuite \ Ldlogon \ Timber \ Content folder will contain a WindowsPatchData.zip file and associated Delta zip files. The WindowsPatchData.zip file contains all vulnerability detection rulesand the Delta zip files contain the differences. This content, along with the remaining Next Gen binaries, will be downloaded to the endpoint upon scanning against Next Gen content. The main WindowsPatchData.zip file will only be downloaded once, Deltas are downloaded to the Core if there are differences that aren't in the WindowsPatchData.zip file. Once the endpoint has the main zip file, it will only retrieve the Delta zip files when scanning against Next Gen content.
30
Upon definition download completion of Next Gen Microsoft Windows Vulnerabilities (beta), filtering for this definition type can be done by using the filter string "Next Gen". Every next-gen definition has the filter string hardcoded in the Summary column.
![NextGenDef_Sum.jpg]()
To isolate these definitions, a custom patch group can be created to house these definitions. If you elect to do so, a manual transfer has to take place. To further isolate which devices scan against this custom group, an alternate Distribution and Patch agent setting can be configured to scan against this group. More information on how to configure this is outlined in How to Scan and /or Repair against a custom group and How to use Custom Groups to repair groups of computers.
Content Changes
Every Next Gen definition will contain a pre-defined fixed script for Detection and Remediation. The pre-defined detection script will evaluate Registry, File and Script logic to determine if a device is vulnerable to a definition. The detection details have been included at the beginning of the script content. The Files and Registry Settings section will be blank for all Next Gen content.
These scripts are not meant to be modified. Modification of this logic will leave these definition in an unsupported state
Sample Next Gen definition (Detection Logic) | Sample Next Gen definition (Repair Logic) |
---|
![NextGenCustomScript_Detection.jpg]() | ![NextGenContent_Remediation.jpg]() |
Distribution and Patch Agent Setting
Updated The "Enable security scan debug trace log" UI feature is only available in 2017.3 and newer product versions. To enable debug trace logs for versions 9.6 - 2017.1 run the following cmd locally on the endpoint or distribute a script to the desired device:
vulscan /enableDpdTrace=true /showui (the showui switch is optional).
This will generate additional logging in the Programdata\Landesk\DebugLog folder consisting of the following (2) files:
- PatchManifestSyncSDK.log
- PatchScanSDKDpdTrace.log
To enhance the log level for all Next Gen content definitions, the following addition has been made to the Distribution and Patch agent settings:
![D&PDebugSettings.jpg]()
This feature is only intended for troubleshooting purposes and should not be on in your default agent setting. When troubleshooting a Next Gen content issue, please create an alternate Distribution and Patch agent setting, enable this feature and assign this setting to the device during troubleshooting only.
Diagnostic Tool
Updated The "Get debug logs and zip (patch)" feature is only available in 2017.3 and newer product versions.
To retrieve logging remotely access the Diagnostic tool and select the Logs | Client option to view client-side logs. An additional option "Get debug logs and zip (patch)" is present for debug logging for all Next Gen definitions. This will only function if the Distribution and Patch agent setting has Enable security scan debug trace log selected.
![Diag_DebugLog.jpg]()
How Does Scanning and Remediation Work
If the endpoints are on a supported version of the product, the agent does not need to be updated immediately to take advantage of the enhanced patch engine. All devices on an unsupported product version will need to be upgraded. Upon initiation of the vulnerability scanner, the self-update feature will update the necessary vulscan files to ensure compatibility between the files on the client and the latest files on your 2017.3 core. For more on the Self Update feature please reference About Patch Manager Self Update. These binaries must be updated in order for the Next Gen binaries to work with vulscan.exe.
Scanning:
A security scan works the same as before for all current content. Whenever the scanner encounters a definition with Next Gen content it will launch the fixed script contained within the definition and perform the following actions:
- Check for definition scan results in memory.
- If this is the first Next Gen definition encountered in the current security scan, no scan results will be found on the client and the following will occur:
- The client will check if it needs to download any Next Gen binary files from the core (ldlogon/timber) and transfer them to the LDCLient\Timber directory:
- The detection rules “WindowsPatchData.zip” file (about 14MB) is updated on the content servers every time new content is added and will be download to the client. If WindowsPatchData.zip already exists on the client, the smaller delta files will be used to update this file to the current version.
- Additional Next Gen binary files will be downloaded if the current versions do not already exist on the client:
- The Next Gen COM object is then registered on the client to allow Vulscan.exe to interact with the Next Gen scan engine
- The Next Gen scan engine then scans for ALL vulnerabilities and stores the scan results “in-memory”. A FULL scan of all vul_defs is only completed if this is the first Next Gen definition encountered in the current security scan.
- The script then references the in-memory scan results to determine if the current definition is vulnerable.
The security scan continues scanning as usual. For any remaining Next Gen content definitions in the current security scan, the detection script will return the result of the specified definition from the in-memory scan results.
The Next Gen scanner runs (maximum of once per vulscan instance) it checks for everything and stores that information in memory, but that information is only used by Next Gen definitions. Legacy definitions work the same way they always have.
Remediation:
- Patch files (Default location - Ldlogon/Patch) uses the existing download mechanism "lddwnld.dll" to transfer the patch files to the sdmcache directory on the client.
- The pre-defined remediation script calls the Next Gen SDK with a GUID, Language and a unique file name that’s used for patching.
- A temporary “package” is created during the repair and contained on the client (Programdata\Landesk\Timber\Pkgs) which is used by the Next Gen patch SDK.
Logging
The vulscan.log file will continue to serve as the primary log for content detection and remediation, however, several additional logs have been introduced to provide further insight on the activity of the Next Gen content.
- vulscan.log (Programdata\Landesk\Log folder)
- PatchManifestSyncSDK.log (Programdata\Landesk\Log folder)
- PatchScanSDK.log (Programdata\Landesk\Log folder, only created when debug trace logging is disabled)
- PatchScanSDKDpdTrace.log (Programdata\Landesk\DebugLog folder, only created when debug trace logging is enabled)
- STDeploy.log (Programdata\Landesk\Log folder, but only created when repairing)
- TimberDeployEvents.log (Programdata\Landesk\Log folder, only created when repairing)
Pre-Staging Next Generation Binaries
Pre-Staging Next Generation Binaries