Quantcast
Viewing all 1121 articles
Browse latest View live

Seems like i can't donwload only Microsoft critical définitions

Hello Everyone,

 

I'm a French user of EPM 2017.3 Update 3.

 

I want to donwload only the Microsoft critical definitions in my "Scan (global) folder in order to scan my client for these vulnerabilites and fix them.

 

Here are my "donwload" settings :

 

Image may be NSFW.
Clik here to view.

Image may be NSFW.
Clik here to view.

 

Sorry, the sreencaps are in French. Basically i chose to downloade only the definitions for the critical vulnerabilities from MS; but when i donwload are when i look into my "Scan (global)" folder i have almost all definitions that exist (Google, Mozilla, etc... and any type of vulnerabilities.

 

Does anyone know how to fix this issue ?

 

Regards,

 

David.

Image may be NSFW.
Clik here to view.

How to report Ivanti Patch and Compliance Manager vulnerability detection problems to technical support

This article describes how to report patch vulnerability definition issues to Ivanti Support.

 

There are several things that can happen with a vulnerability definition.

 

  • Definition is not detecting a vulnerability on an Operating System it should be.
  • Definition is detecting a vulnerability it should not be.
  • Definition is not detecting the product correctly.
  • Definition is detecting a product incorrectly.

 

First review the following document to make sure you understand what is going on with the detection:

 

Troubleshooting detection problems in Ivanti Patch and Compliance Manager

Please obtain or verify the following information

 

  1. The computer has rebooted.
  2. The patch was actually installed. You can find this by checking the following.
    • Open the Ivanti Endpoint Manager Console.
    • Expand Devices and click on All Devices.
    • Find the computer in question.
    • Right-click on the computer and select Security and Patch Information.
    • Highlight Installed Patches.
    • Verify the Vulnerability in question is listed.
  3. Run a security Scan on the computer.

When reporting these issues to Ivanti Support the following is recommended to expedite this process

 

  1. Open a new support ticket in the Self Service Portal here.
    • Select LANDESKas the Product Line you are working with.
    • Select Management Suite / Security Suite as the Product you are using.
    • Select the version of the Product you are using.
    • Select Patch Manageras the component that is involved.
  2. Gather vulscan*.log from C:\ProgramData\LANDESK\Log, place them into a .ZIP file and attach them to your case.

 

When reporting these issues to LANDESK Support the following is recommended to expedite this process:

 

  1. Open a new support ticket in the Self Service Portal here.
    • Select LANDESKas the Product Line you are working with.
    • Select Management Suite / Security Suite as the Product you are using.
    • Select the version of the Product you are using.
    • Select Patch Manageras the component that is involved.
  2. See if an article is displayed that will help you with your issue, otherwise select "Request contact from Support".

 

Please provide a detailed Subject and Description, and give a detailed explanation as to what impact this issue is causing.

 

Expectations

 

Updates to Security-related definitions can typically be expected within 2 days.   Non-security definitions can take longer.

Image may be NSFW.
Clik here to view.

Ivanti Endpoint Manager and Endpoint Security - Security and Compliance Frequently Asked Questions

Ivanti Endpoint Manager and Endpoint Security - Security and Compliance

NEW! About the New Patch Engine in Ivanti Endpoint Manager

How to patch Office 365

  Introduction to Patch Manager - LANDESK Patch Manager 2016

About LDMS 2016 new Patch and Compliance features

How to patch and manage Windows 10 using LANDESK Security and Patch Manager

How to patch Office365 Click-to-Run installations efficiently with LANDESK

How to upgrade to Windows 10 Anniversary Edition using Ivanti Patch and Compliance

How to troubleshoot a Patch and Compliance (vulnerability) scan

How to patch and manage Windows 10 using LANDESK Security and Patch Manager

 

 

 

How to report LANDESK Patch Manager definition issues to technical support
How to report LANDESK Patch Manager vulnerability detection problems to support
How to request new content be added to Patch and Compliance Manager

 

 

Remember, the LANDESK Help site is a valuable source of information!

 

Important Notices

 

LANDESK support program for Windows XP and Server 2003 patch content

 

How To'sIssues

How to get started with Patch Manager in LDMS 9.6

How to change the default Patch Location for Security and Patch Managerd

How to change the Default Distribution and Patch Settings

How to change the default Patch Location for Security and Patch Manager

How to change the number of Security Scan logs kept on a managed device

How to create a Custom Vulnerability Definition in Security and Compliance Manager

How to create a Pre-Cached Repair / Staged Repair

How to establish a Patch and Compliance Baseline Patch Group

How to exclude a managed device from applying patches

How to export patch definitions to a Dark Core (a core server with no internet access)

How to leverage Linux vendor tools to remediate vulnerabilities

How to manage superseded patches in Security and Compliance Manager

How to patch and manage Windows 10 using LANDESK Security and Patch Manager

How To: Repair Patches as a Specific User or "Run as Administrator"

How to repair vulnerabilities using a pre-cache task (install from local cached file or peers instead of from the source…

How to reset security scan local scheduler settings using a managed script

How to retain more vulscan logs before they are overwritten

How to Scan and/or Repair against a custom group

How to Scan for Specific Patches

How to schedule a Security Scan

How to set autofix attempt times before giving up

How to set up a Core Server to download patches for other cores with limited internet access (Dark Core)

How to speed up patching by disabling creation of restore points per each single update

How to start CBA8 with custom definition

How to troubleshoot a Patch and Compliance (vulnerability) scan

How to troubleshoot Core Server patch content download issues

How to troubleshoot detection problems in LANDESK

How to troubleshoot high CPU usage from the W3WP process for LDAppVulnerability

How to troubleshoot IIS using Log Parser Studio from Microsoft

How to troubleshoot Patch Manager detection and remediation issues

How to troubleshoot the Patch and Compliance Manager client scan and repair process

How to uninstall old Java versions with LDMS Patch and Compliance

How to uninstall Patches through Patch Manager

How to upgrade Software Using Patch Manager

How to upgrade to Internet Explorer 11 using Patch Manager

How to use Application Blocking in LDMS 9.6 Patch and Compliance Manager

How to use autofix in Security and Compliance Manager

How to use Custom Groups to repair groups of computers

How To: Use the Patch Cleanup Option in the Download Updates Tool in Patch and Compliance Manager

How to Use Manually Downloaded Patches

How to use Patch Manager to deploy a LANDESK Service Pack

How to use Security and Compliance Manager to deploy a Component Patch

How to use VBScript in the detection rule of a Custom Vulnerability

How to use VBScript in the Patch Installation & Removal (repair) section of a Custom Vulnerability

How to utilize LANDESK to Disable/Enable Windows Automatic Updates

How to view installed updates for Windows using WMIC

Issue: "Create custom definition" icon is greyed out in the Patch and Compliance tool.

Issue: Additional file in custom patch is not downloaded to same directory as the patch

Issue: Affected Computers window doesn't display any results

Issue: After upgrading to LDMS 9.6 the 'Download updates' screen still shows 9.5 content

Issue: Agent Continually Prompts for Reboot

Issue: Autofix no longer repairing vulnerabilities

Issue: Cannot open vulscan logs folder from the command line using "vulscan e"

Issue: Copied repair patch tasks will not delete

Issue: Definition types missing from the download updates window.

Issue: Download Updates options missing or show "Do Not Remove"

Issue: Download updates settings revert back to original options

Issue: Downloaded status next to a definition rule does not show correct status

Issue: Gather Historical Information task is failing to run in Management Suite 9.6.

Issue: Google Chrome not detected as an installed application on Windows Server in Security and Compliance Manager

Issue: High CPU load and slow patch deployment using LANDESK Patch Manager

Issue: Java Update Leaves Old Build Installed

Issue: KB# is showing up in Windows Update but not in LANDESK Patch Manager

Issue: Last Vulnerability (or other type) scan date is not updated in Inventory

Issue: Message "No Patches Available" in Scheduled Task status after scheduling repair task

Issue: Microsoft Hotfixes aren't included by default in LANDESK Security and Patch Manager

Issue: Patch Manager Configuration loses settings inside the Download Updates window

Issue: Patch Manager is not installing all of the patches that show up in Windows Update

Issue: Patch severity mismatch between Microsoft and LANDESK

Issue: Patches are downloaded in different languages

Issue: Patches failing to download with the message "Skipping old or disabled patch"

Issue: Patches show as both detected and installed

Issue: PatchHistory database table is very large and causing a strain on SQL resources

Issue: Reboot prompt shows hours until Automatic Reboot

Issue: Repair tasks not showing after Portal refreshes

Issue: Scanned and Detected numbers are not updating or are incorrect in Patch Manager

Issue: Security and Compliance Manager (Vulscan) window blank

Issue: Skype updates are not installing depending on the version

Issue: Special characters not working in unique filename path for Patch Information section of Custom Definitions

Issue: Unable to Download More Than 100 Vulnerabilities at a Time

Issue: Unable to download or install .MSU patches through Patch Manager

Issue: Unable to log in to Windows after applying Blocked Applications

Issue: Unable to schedule and start a patch content download

Issue: Very few patches are detected for Windows 2012 server managed nodes

Issue: Vulnerability Scans are not updating on the core

Issue: Vulscan cannot connect to the vulcore.asmx service on the Core Server

Issue: Vulscan is not applying agent setting changes or is using an incorrect agent setting

Issue: Vulscan stuck in a loop following deployment of SP1 for LDMS 9.5

Issue: Windows 7 and 2008 clients are blue screening when using Application Blocking

IIssue: Windows Devices in another AD domain do not get Patches applied

 

 

InformationErrors

About an update & improvement to the LANDeskScan.DLL notification

About Autofix and Scan by Scope changes in LDMS 9.6

About content verification in LANDESK Patch Manager

About IIS Virtual Directories and File Permissions for Security and Patch Manager

About LANDESK Distribution and Patch settings

About LANDESK Patch Content severity levels

About LANDESK Patch Manager and Antivirus return codes

About LANDESK Security and Compliance Manager content

About manually downloaded patch definitions

About Patch and Compliance content vulnerability definition title suffixes

About Patch Codes for Inventory

About Patch Manager 9.6 new permissions options for editing and importing definitions

About Patch Manager Auto Update

About Patch Manager vulnerability information and the processes that affect it

About Patching: 101 - A simple, effective method of patching

About the "Gather Historical Information" task in Ivanti EPM Patch and Compliance Manager

About the "Patch-only settings" inside "Distribution and Patch Settings"

About the "Use 64-bit registry view on 64-bit windows" setting within Patch and Compliance definition rules

About the Checksum and Hash types used in Patch Manager definitions

About the Compliance group in Security and Compliance Manager

About the icons in the Security and Compliance tool

About the LANDESK support program for Windows XP and Server 2003 patch content

About the LDMS 9.5 and 9.6 Patch Manager database schema

About the Patch Manager definition rules processing order

About the Registry Keys that are checked to see if a reboot is needed

About the security and compliance scan (vulscan) log files

About the Vulnerability scan and repair logs

Error "Unable to get the setting from core" when running security scan (Vulscan.exe)

Error: "0x8db30194" (404) from vulscan

Error: "0x8db3019c All Patches Failed" in Vulscan log file

Error: "1314" when installing a patch or application through Patch Manager

Error: "8004005" when patching Microsoft Office installs

Error: "Cannot complete the requested action. The device must be rebooted first." when running vulnerability repair job

Error: "Client user does not have administrator rights" when running Vulnerability Scan

Error: "Core could not find a file" when running vulscan on clients

Error: "Could not establish trust relationship for the SSL/TLS secure channel error" when downloading patch definitions

Error: "Error writing scripting file. Please verify access privilege" when running vulnerability repair job

Error: "Failed to apply compliance settings" during vulnerability scan

Error: "Failed to download all additional files" when repairing a vulnerability using a Policy method

Error: "Failed. Cannot Interpret Data" when running a Security and Compliance scan

Error: "Hash for patch does not match with host. Discarding" when downloading Patch Content

Error: "HTTP Error 403" / Vulscan Return Code 433

Error: "Invalid column name 'scan' when downloading content after Service Pack installation

Error: "Invalid XML file 951_updates.xml. There is an error in XML document (2, 2)" when downloading Antivirus definitio…

Error: "Length of LOB data (XXXXXX) to be replicated exceeds configured maximum 500000" when downloading updates

Error: "No uninstall instructions. Patch is not installed." when uninstalling a patch

Error: "Node's reported ID is not in the database"

Error: "RunPatches ERROR: Download failed (80072f76)" when repairing vulnerability

Error: "Server Busy" when running a Vulnerability Scan

Error: "Unable to find string with ID message" in Vulscan UI

Error: "Unable to get custom variable overrides"

Error: "You have not specified a site from which to download updates" when downloading updates in Patch Manager

Office 365 Click to Run Error: Unable to register O365Util.dll

I can't seem to get any of my endpoints to patch the O365 updates. Have followed the instructions and downloaded the appropriate patches (into the default /patch location, not custom)

 

One or two machines patched fine but now all of them are failing.

 

This is the extract from the Vulcan log.

 

Fri, 21 Sep 2018 09:07:09 Downloaded  C:\Program Files (x86)\LANDesk\LDClient\O365Util.dll

Fri, 21 Sep 2018 09:07:09 Download the following file successfully: O365Util.dll

Fri, 21 Sep 2018 09:07:09 Called CreateProcess: "C:\WINDOWS\system32\regsvr32.exe"

Fri, 21 Sep 2018 09:07:09 Exit Code for process C:\WINDOWS\system32\regsvr32.exe: 3, (0x3)

Fri, 21 Sep 2018 09:07:09 The result of regsvr32 is:  3

Fri, 21 Sep 2018 09:07:09 ReportRepairResult returned failure: Unable to register O365Util.dll

Fri, 21 Sep 2018 09:07:09 Unable to register O365Util.dll

Fri, 21 Sep 2018 09:07:09 Create object of  O365Util

Fri, 21 Sep 2018 09:07:09 ERROR.  Microsoft VBScript runtime error: ActiveX component can't create object: 'O365Util.O365Update' (line: 55, char: 1, text: )

Fri, 21 Sep 2018 09:07:09 Message returned from repair script was ERROR.  Microsoft VBScript runtime error: ActiveX component can't create object: 'O365Util.O365Update' (line: 55, char: 1, text: )

Fri, 21 Sep 2018 09:07:09 ERROR(RunVbScript) Failed to run command  - 80004005

Fri, 21 Sep 2018 09:07:09 DownloadPatch ERROR: Failed to run commands (80004005).

Fri, 21 Sep 2018 09:07:09 Last status: Failed

 

I've tried deleting the dll and then re-downloading but this hasn't fixed it.

 

Any help appreciated.

How to Give Support Information on False Patch and Other Detection Issues and Troubleshooting

Note: Clicking on a photo will enlarge it.

 

This document will go over what to look for and do if you think you have a patch that is detecting incorrectly on your devices.  Incorrect detections can happen if the detection logic is incorrect and still reports as needed but the patch has already been installed, is not applicable to the system or other issues.  In this document, you’ll learn what to look for in the vulscan logs which are required to submit the incorrect patch detection for review.

This document assumes you know how to find individual patches, create a patch group and move patches to it in the console and create a repair task on a specific patch or group of patches in the console.  It also assumes you have an understanding of repair tasks and how to add target devices to them and run the task.

 

Step 1: Run a repair task with just the patch having the issue on the client

 

Select the patch(es) having the issue in Security and Compliance and right click.  Click Repair.  Once saved you will have a scheduled task that repairs the patch.  Add the device to the task and run it, wait for it to complete.

 

Image may be NSFW.
Clik here to view.

 

When you click on Repair, the repair task dialog will open.  Most settings you can leave as a defaults.  You can add a target device at this time as well.  If you have a maintenance window on your clients, be sure to check Ignore Maintenance Window if specified so the patch tries to install as well as scan in this repair task.

Image may be NSFW.
Clik here to view.

Once you have a target in your task run it and wait for it to complete.

 

Step 2: Collect regular log files after the repair task.

 

Once the repair task is done, go to the client device and zip up all the files in the C:\programdata\landesk\log folder and attach the zip file to the support case.

 

Step 3: Run a DPDTrace on the device and upload its zip file.

 

As of January 2018, a new patch engine is being used to patch devices.  A DPDTrace will scan the device for installed software and versions and is needed by support to troubleshoot new definitions.

This document goes over how to run a DPDTrace on the device:  DPDTrace GUI Tool: Used to troubleshoot patch detection issues

 

Once the DPDTrace completes, upload its output HFCli_xxxxxxxxx.zip file to the support case.

 

Manually Testing the Patch

It is best practice that you manually run the patch in question on the device in the GUI.  The patch should display a message giving a reason for not installing in a dialog.

Vulscan Log

 

The full vulscan log, created as a result of running the repair task, is needed for us to determine the issue of the false detection.  This log is located on the target devices in the C:\programdata\Landesk\Log folder. They are named vulscan.log.  Older logs have a number in the name.   The correct log file will have a line at the top with the task ID in the name as shown in the example.  This information changes with each task.

 

Thu, 26 Oct 2017 14:59:37 Command line: /policyfile="C:\ProgramData\LANDesk\Policies\CP.2353.RunNow._iOiXj4cedTDG&#474FOGYMztt+mWNQ=.xml"
Thu, 26 Oct 2017 14:59:37 client policy file: C:\ProgramData\LANDesk\Policies\CP.2353.RunNow._iOiXj4cedTDG&#474FOGYMztt+mWNQ=.xml
Thu, 26 Oct 2017 14:59:37 Reading policy parameters
Thu, 26 Oct 2017 14:59:37 scan=0
Thu, 26 Oct 2017 14:59:37 scanFilter=INTL_4049179_MSU;INTL_3089023_MSU
Thu, 26 Oct 2017 14:59:37 fixnow=True
Thu, 26 Oct 2017 14:59:37    maintEnable=False

 

Once you have found the correct vulscan log. Doing a search in the log file for the all capitals case sensitive “DETECTED” will yield the detection of the patch and the reason.  In our example case it show the file version is out dated and that is the reason the patch is needed.

 

Thu, 26 Oct 2017 14:59:45 VUL: '3089023_MSU' (windows8.1-kb3089023-x64.msu) DETECTED.  Reason 'File C:\Windows\System32\flashplayerapp.exe version is less than the minimum version specified.'.  Expected '18.0.0.232'.  Found '11.3.300.265'.  Patch required 'windows8.1-kb3089023-x64.msu'.
Thu, 26 Oct 2017 14:59:45    Patch is NOT installed

 

You can see in the example the patch was detected as needed due to a file being at a lower version than in the patch.  Now scroll down to the bottom of the log file.  You’ll see a “Patch Installation” header and below that you will find details of what happened when the device attempted to install the patch. In our example the patch returned the error code 2149842967 converted to a hex value that gives a result of  0x80240017 Looking on the list of WUSA codes the patch returned a “Not Applicable”.

Thu, 26 Oct 2017 15:03:21 Command Interpreter running
Thu, 26 Oct 2017 15:03:21 Setting current directory: C:\Program Files (x86)\LANDesk\LDClient\
Thu, 26 Oct 2017 15:03:21 Executing C:\Windows\system32\wusa.exe "C:\Program Files (x86)\LANDesk\LDClient\sdmcache\windows8.1-kb3089023-x64.msu" /quiet /norestart
Thu, 26 Oct 2017 15:03:23 Exit Code: -2145124329 (0x80240017)
Thu, 26 Oct 2017 15:03:23 Error: "C:\Windows\system32\wusa.exe" returned failure exit code (2149842967)
Thu, 26 Oct 2017 15:03:23 ERROR(EXECUTEFILE) Failed to run command - 80004005
Thu, 26 Oct 2017 15:03:23 DownloadPatch ERROR: Failed to run commands (80004005).
Thu, 26 Oct 2017 15:03:23 Last status: Failed
Thu, 26 Oct 2017 15:03:23 Stopping wuauserv service.
Thu, 26 Oct 2017 15:03:23 Stop service wuauserv
Thu, 26 Oct 2017 15:03:25 Successfully controlled the service.
Thu, 26 Oct 2017 15:03:25 DeferredReportAction: name 'windows8.1-kb3089023-x64.msu', code '1', type '-1', status 'Error: "C:\Windows\system32\wusa.exe" returned failure exit code (2149842967)'
Thu, 26 Oct 2017 15:03:25 Running post-install/uninstall script 
Thu, 26 Oct 2017 15:03:25 RunPatches completed.  1 processed.  0 installed. 1 failures.  Thu, 26 Oct 2017 15:03:25 Sending previous action history to core

STdeployercore.log

In addition the STdeployercore.log will also show the patch being installed and the error code for the Next Gen definitions:

2018-01-26T21:15:53.2279239Z 134c I DeploymentPackageReader.cpp:783 Deploy package 'C:\ProgramData\LANDesk\timber\sandboxes\InstallationSandbox#2018-01-26-T-21-15-15\0001c460-0000-0000-0000-000000000000.zip' successfully opened unsigned for package IO
2018-01-26T21:15:53.2279239Z 134c I Authenticode.cpp:134 Verifying signature of C:\Program Files (x86)\LANDesk\LDClient\sdmcache\windows6.1-kb4056894-x64_tw1158080.msu with CWinTrustVerifier
2018-01-26T21:15:54.2534266Z 134c V UnScriptedInstallation.cpp:30 Executing (C:\Program Files (x86)\LANDesk\LDClient\sdmcache\windows6.1-kb4056894-x64_tw1158080.msu /quiet /norestart), nShow: true.
2018-01-26T21:19:19.4406288Z 134c V ChildProcess.cpp:140 Process handle 00000408 returned '3010'.

 

Windows Update(WUSA) Error Codes

Result CodeResult StringDescription
0x80240001WU_E_NO_SERVICEWindows Update Agent was unable to provide the service.
0x80240002WU_E_MAX_CAPACITY_REACHEDThe maximum capacity of the service was exceeded.
0x80240003WU_E_UNKNOWN_IDAn ID cannot be found.
0x80240004WU_E_NOT_INITIALIZEDThe object could not be initialized.
0x80240005WU_E_RANGEOVERLAPThe update handler requested a byte range that overlaps a previously requested range.
0x80240006WU_E_TOOMANYRANGESThe requested number of byte ranges exceeds the maximum number (2^31 - 1).
0x80240007WU_E_INVALIDINDEXThe index to a collection was invalid.
0x80240008WU_E_ITEMNOTFOUNDThe key for the item queried could not be found.
0x80240009WU_E_OPERATIONINPROGRESSA conflicting operation was in progress. Some operations (such as installation) cannot be performed simultaneously.
0x8024000AWU_E_COULDNOTCANCELCancellation of the operation was not allowed.
0x8024000BWU_E_CALL_CANCELLEDOperation was cancelled.
0x8024000CWU_E_NOOPNo operation was required.
0x8024000DWU_E_XML_MISSINGDATAWindows Update Agent could not find the required information in the update's XML data.
0x8024000EWU_E_XML_INVALIDWindows Update Agent found invalid information in the update's XML data.
0x8024000FWU_E_CYCLE_DETECTEDCircular update relationships were detected in the metadata.
0x80240010WU_E_TOO_DEEP_RELATIONUpdate relationships that are too deep were evaluated.
0x80240011WU_E_INVALID_RELATIONSHIPAn invalid update relationship was detected.
0x80240012WU_E_REG_VALUE_INVALIDAn invalid registry value was read.
0x80240013WU_E_DUPLICATE_ITEMOperation tried to add a duplicate item to a list.
0x80240016WU_E_INSTALL_NOT_ALLOWEDOperation tried to install while another installation was in progress or the system was pending a mandatory restart.
0x80240017WU_E_NOT_APPLICABLEOperation was not performed because there are no applicable updates.
0x80240018WU_E_NO_USERTOKENOperation failed because a required user token is missing.
0x80240019WU_E_EXCLUSIVE_INSTALL_CONFLICTAn exclusive update cannot be installed with other updates at the same time.
0x8024001AWU_E_POLICY_NOT_SETA policy value was not set.
0x8024001BWU_E_SELFUPDATE_IN_PROGRESSThe operation could not be performed because the Windows Update Agent is self-updating.
0x8024001DWU_E_INVALID_UPDATEAn update contains invalid metadata.
0x8024001EWU_E_SERVICE_STOPOperation did not complete because the service or system was being shut down.
0x8024001FWU_E_NO_CONNECTIONOperation did not complete because the network connection was unavailable.
0x80240020WU_E_NO_INTERACTIVE_USEROperation did not complete because there is no logged-on interactive user.
0x80240021WU_E_TIME_OUTOperation did not complete because it timed out.
0x80240022WU_E_ALL_UPDATES_FAILEDOperation failed for all the updates.
0x80240023WU_E_EULAS_DECLINEDThe license terms for all updates were declined.
0x80240024WU_E_NO_UPDATEThere are no updates.
0x80240025WU_E_USER_ACCESS_DISABLEDGroup Policy settings prevented access to Windows Update.
0x80240026WU_E_INVALID_UPDATE_TYPEThe type of update is invalid.
0x80240027WU_E_URL_TOO_LONGThe URL exceeded the maximum length.
0x80240028WU_E_UNINSTALL_NOT_ALLOWEDThe update could not be uninstalled because the request did not originate from a WSUS server.
0x80240029WU_E_INVALID_PRODUCT_LICENSESearch may have missed some updates before there is an unlicensed application on the system.
0x8024002AWU_E_MISSING_HANDLERA component that is required to detect applicable updates was missing.
0x8024002BWU_E_LEGACYSERVERAn operation did not complete because it requires a newer version of server software.
0x8024002CWU_E_BIN_SOURCE_ABSENTA delta-compressed update could not be installed because it required the source.
0x8024002DWU_E_SOURCE_ABSENTA full-file update could not be installed because it required the source.
0x8024002EWU_E_WU_DISABLEDAccess to an unmanaged server is not allowed.
0x8024002FWU_E_CALL_CANCELLED_BY_POLICYOperation did not complete because the DisableWindowsUpdateAccess policy was set.
0x80240030WU_E_INVALID_PROXY_SERVERThe format of the proxy list was invalid.
0x80240031WU_E_INVALID_FILEThe file is in the wrong format.
0x80240032WU_E_INVALID_CRITERIAThe search criteria string was invalid.
0x80240033WU_E_EULA_UNAVAILABLELicense terms could not be downloaded.
0x80240034WU_E_DOWNLOAD_FAILEDUpdate failed to download.
0x80240035WU_E_UPDATE_NOT_PROCESSEDThe update was not processed.
0x80240036WU_E_INVALID_OPERATIONThe object's current state did not allow the operation.
0x80240037WU_E_NOT_SUPPORTEDThe functionality for the operation is not supported.
0x80240038WU_E_WINHTTP_INVALID_FILEThe downloaded file has an unexpected content type.
0x80240039WU_E_TOO_MANY_RESYNCThe agent was asked by server to synchronize too many times.
0x80240040WU_E_NO_SERVER_CORE_SUPPORTWUA API method does not run on a Server Core installation option of the Windows 2008 R2 operating system.
0x80240041WU_E_SYSPREP_IN_PROGRESSService is not available when sysprep is running.
0x80240042WU_E_UNKNOWN_SERVICEThe update service is no longer registered with Automatic Updates.
0x80240FFFWU_E_UNEXPECTEDAn operation failed due to reasons not covered by another error code.
0x80241001WU_E_MSI_WRONG_VERSIONSearch may have missed some updates because Windows Installer is less than version 3.1.
0x80241002WU_E_MSI_NOT_CONFIGUREDSearch may have missed some updates because Windows Installer is not configured.
0x80241003WU_E_MSP_DISABLEDSearch may have missed some updates because a policy setting disabled Windows Installer patching.
0x80241004WU_E_MSI_WRONG_APP_CONTEXTAn update could not be applied because the application is installed per-user.
0x80241FFFWU_E_MSP_UNEXPECTEDSearch may have missed some updates because there was a failure of Windows Installer.
0x80242000WU_E_UH_REMOTEUNAVAILABLEA request for a remote update handler could not be completed because no remote process is available.
0x80242001WU_E_UH_LOCALONLYA request for a remote update handler could not be completed because the handler is local only.
0x80242002WU_E_UH_UNKNOWNHANDLERA request for an update handler could not be completed because the handler could not be recognized.
0x80242003WU_E_UH_REMOTEALREADYACTIVEA remote update handler could not be created because one already exists.
0x80242004WU_E_UH_DOESNOTSUPPORTACTIONA request for the handler to install (uninstall) an update could not be completed because the update does not support install (uninstall).
0x80242005WU_E_UH_WRONGHANDLERAn operation did not complete because the wrong handler was specified.
0x80242006WU_E_UH_INVALIDMETADATAA handler operation could not be completed because the update contains invalid metadata.
0x80242007WU_E_UH_INSTALLERHUNGAn operation could not be completed because the installer exceeded the time limit.
0x80242008WU_E_UH_OPERATIONCANCELLEDAn operation being done by the update handler was cancelled.
0x80242009WU_E_UH_BADHANDLERXMLAn operation could not be completed because the handler-specific metadata is invalid.
0x8024200AWU_E_UH_CANREQUIREINPUTA request to the handler to install an update could not be completed because the update requires user input.
0x8024200BWU_E_UH_INSTALLERFAILUREThe installer failed to install (uninstall) one or more updates.
0x8024200CWU_E_UH_FALLBACKTOSELFCONTAINEDThe update handler should download self-contained content rather than delta-compressed content for the update.
0x8024200DWU_E_UH_NEEDANOTHERDOWNLOADThe update handler did not install the update because the update needs to be downloaded again.
0x8024200EWU_E_UH_NOTIFYFAILUREThe update handler failed to send notification of the status of the install (uninstall) operation.
0x8024200FWU_E_UH_INCONSISTENT_FILE_NAMESThe file names in the update metadata are inconsistent with the file names in the update package.
0x80242010WU_E_UH_FALLBACKERRORThe update handler failed to fall back to the self-contained content.
0x80242011WU_E_UH_TOOMANYDOWNLOADREQUESTSThe update handler has exceeded the maximum number of download requests.
0x80242012WU_E_UH_UNEXPECTEDCBSRESPONSEThe update handler has received an unexpected response from CBS.
0x80242013WU_E_UH_BADCBSPACKAGEIDThe update metadata contains an invalid CBS package identifier.
0x80242014WU_E_UH_POSTREBOOTSTILLPENDINGThe post-reboot operation for the update is still in progress.
0x80242015WU_E_UH_POSTREBOOTRESULTUNKNOWNThe result of the post-reboot operation for the update could not be determined.
0x80242016WU_E_UH_POSTREBOOTUNEXPECTEDSTATEThe state of the update after its post-reboot operation has completed is unexpectedly.
0x80242017WU_E_UH_NEW_SERVICING_STACK_REQUIREDThe operating system servicing stack must be updated before this update is downloaded or installed.
0x80242FFFWU_E_UH_UNEXPECTEDThis update handler error is not covered by another WU_E_UH_* code.
0x80243001WU_E_INSTALLATION_RESULTS_UNKNOWN_VERSIONThe results of the download and installation could not be read in the registry due to an unrecognized data format version.
0x80243002WU_E_INSTALLATION_RESULTS_INVALID_DATAThe results of download and installation could not be read in the registry due to an invalid data format.
0x80243003WU_E_INSTALLATION_RESULTS_NOT_FOUNDThe results of download and installation are not available; the operation may have failed to start.
0x80243004WU_E_TRAYICON_FAILUREA failure occurred when trying to create an icon in the notification area.
0x80243FFDWU_E_NON_UI_MODEUnable to show the user interface (UI) when in a non-UI mode; Windows Update (WU) client UI modules may not be installed.
0x80243FFEWU_E_WUCLTUI_UNSUPPORTED_VERSIONUnsupported version of WU client UI exported functions.
0x80243FFFWU_E_AUCLIENT_UNEXPECTEDThere was a user interface error not covered by another WU_E_AUCLIENT_* error code.
0x80244000WU_E_PT_SOAPCLIENT_BASEWU_E_PT_SOAPCLIENT_* error codes map to the SOAPCLIENT_ERROR enum of the ATL Server Library.
0x80244001WU_E_PT_SOAPCLIENT_INITIALIZEInitialization of the SOAP client failed, possibly because of an MSXML installation failure.
0x80244002WU_E_PT_SOAPCLIENT_OUTOFMEMORYSOAP client failed because it ran out of memory.
0x80244003WU_E_PT_SOAPCLIENT_GENERATESOAP client failed to generate the request.
0x80244004WU_E_PT_SOAPCLIENT_CONNECTSOAP client failed to connect to the server.
0x80244005WU_E_PT_SOAPCLIENT_SENDSOAP client failed to send a message due to WU_E_WINHTTP_* error codes.
0x80244006WU_E_PT_SOAPCLIENT_SERVERSOAP client failed because there was a server error.
0x80244007WU_E_PT_SOAPCLIENT_SOAPFAULTSOAP client failed because there was a SOAP fault due to WU_E_PT_SOAP_* error codes.
0x80244008WU_E_PT_SOAPCLIENT_PARSEFAULTSOAP client failed to parse a SOAP fault.
0x80244009WU_E_PT_SOAPCLIENT_READSOAP client failed while reading the response from the server.
0x8024400AWU_E_PT_SOAPCLIENT_PARSESOAP client failed to parse the response from the server.
0x8024400BWU_E_PT_SOAP_VERSIONSOAP client found an unrecognizable namespace for the SOAP envelope.
0x8024400CWU_E_PT_SOAP_MUST_UNDERSTANDSOAP client was unable to understand a header.
0x8024400DWU_E_PT_SOAP_CLIENTSOAP client found the message was malformed (fix before resending).
0x8024400EWU_E_PT_SOAP_SERVERThe SOAP message could not be processed due to a server error (resend later).
0x8024400FWU_E_PT_WMI_ERRORThere was an unspecified Windows Management Instrumentation (WMI) error.
0x80244010WU_E_PT_EXCEEDED_MAX_SERVER_TRIPSThe number of round trips to the server exceeded the maximum limit.
0x80244011WU_E_PT_SUS_SERVER_NOT_SETWUServer policy value is missing in the registry.
0x80244012WU_E_PT_DOUBLE_INITIALIZATIONInitialization failed because the object was already initialized.
0x80244013WU_E_PT_INVALID_COMPUTER_NAMEThe computer name could not be determined.
0x80244015WU_E_PT_REFRESH_CACHE_REQUIREDThe reply from the server indicates that the server was changed or the cookie was invalid; refresh the state of the internal cache and retry.
0x80244016WU_E_PT_HTTP_STATUS_BAD_REQUESTHTTP 400 - the server could not process the request due to invalid syntax.
0x80244017WU_E_PT_HTTP_STATUS_DENIEDHTTP 401 - the requested resource requires user authentication.
0x80244018WU_E_PT_HTTP_STATUS_FORBIDDENHTTP 403 - server understood the request, but declined to fulfill it.
0x80244019WU_E_PT_HTTP_STATUS_NOT_FOUNDHTTP 404 - the server cannot find the requested Uniform Resource Identifier (URI).
0x8024401AWU_E_PT_HTTP_STATUS_BAD_METHODHTTP 405 - the HTTP method is not allowed.
0x8024401BWU_E_PT_HTTP_STATUS_PROXY_AUTH_REQHTTP 407 - proxy authentication is required.
0x8024401CWU_E_PT_HTTP_STATUS_REQUEST_TIMEOUTHTTP 408 - the server timed out waiting for the request.
0x8024401DWU_E_PT_HTTP_STATUS_CONFLICTHTTP 409 - the request was not completed due to a conflict with the current state of the resource.
0x8024401EWU_E_PT_HTTP_STATUS_GONEHTTP 410 - the requested resource is no longer available at the server.
0x8024401FWU_E_PT_HTTP_STATUS_SERVER_ERRORHTTP 500 - an error internal to the server prevented fulfilling the request.
0x80244020WU_E_PT_HTTP_STATUS_NOT_SUPPORTEDHTTP 501 - server does not support the functionality that is required to fulfill the request.
0x80244021WU_E_PT_HTTP_STATUS_BAD_GATEWAYHTTP 502 - the server, while acting as a gateway or proxy, received an invalid response from the upstream server it accessed when attempting to fulfill the request.
0x80244022WU_E_PT_HTTP_STATUS_SERVICE_UNAVAILHTTP 503 - the service is temporarily overloaded.
0x80244023WU_E_PT_HTTP_STATUS_GATEWAY_TIMEOUTHTTP 504 - the request was timed out waiting for a gateway.
0x80244024WU_E_PT_HTTP_STATUS_VERSION_NOT_SUPHTTP 505 - the server does not support the HTTP protocol version used for the request.
0x80244025WU_E_PT_FILE_LOCATIONS_CHANGEDOperation failed due to a changed file location; refresh internal state and resend.
0x80244026WU_E_PT_REGISTRATION_NOT_SUPPORTEDOperation failed because Windows Update Agent does not support registration with a non-WSUS server.
0x80244027WU_E_PT_NO_AUTH_PLUGINS_REQUESTEDThe server returned an empty authentication information list.
0x80244028WU_E_PT_NO_AUTH_COOKIES_CREATEDWindows Update Agent was unable to create any valid authentication cookies.
0x80244029WU_E_PT_INVALID_CONFIG_PROPA configuration property value was wrong.
0x8024402AWU_E_PT_CONFIG_PROP_MISSINGA configuration property value was missing.
0x8024402BWU_E_PT_HTTP_STATUS_NOT_MAPPEDThe HTTP request could not be completed and the reason did not correspond to any of the WU_E_PT_HTTP_* error codes.
0x8024402CWU_E_PT_WINHTTP_NAME_NOT_RESOLVEDThe proxy server or target server name cannot be resolved.
0x8024402FWU_E_PT_ECP_SUCCEEDED_WITH_ERRORSExternal .cab file processing completed with some errors.
0x80244030WU_E_PT_ECP_INIT_FAILEDThe external .cab file processor initialization did not complete.
0x80244031WU_E_PT_ECP_INVALID_FILE_FORMATThe format of a metadata file was invalid.
0x80244032WU_E_PT_ECP_INVALID_METADATAExternal .cab file processor found invalid metadata.
0x80244033WU_E_PT_ECP_FAILURE_TO_EXTRACT_DIGESTThe file digest could not be extracted from an external .cab file.
0x80244034WU_E_PT_ECP_FAILURE_TO_DECOMPRESS_CAB_FILEAn external .cab file could not be decompressed.
0x80244035WU_E_PT_ECP_FILE_LOCATION_ERRORExternal .cab processor was unable to get file locations.
0x80244FFFWU_E_PT_UNEXPECTEDThere was a communication error not covered by another WU_E_PT_* error code
0x80245001WU_E_REDIRECTOR_LOAD_XMLThe redirector XML document could not be loaded into the Document Object Model (DOM) class.
0x80245002WU_E_REDIRECTOR_S_FALSEThe redirector XML document is missing some required information.
0x80245003WU_E_REDIRECTOR_ID_SMALLERThe redirector ID in the downloaded redirector .cab file is less than in the cached .cab file.
0x8024502DWU_E_PT_SAME_REDIR_IDWindows Update Agent failed to download a redirector .cab file with a new redirector ID value from the server during the recovery.
0x8024502EWU_E_PT_NO_MANAGED_RECOVERA redirector recovery action did not complete because the server is managed.
0x80245FFFWU_E_REDIRECTOR_UNEXPECTEDThe redirector failed for reasons not covered by another WU_E_REDIRECTOR_* error code.
0x80246001WU_E_DM_URLNOTAVAILABLEA download manager operation could not be completed because the requested file does not have a URL.
0x80246002WU_E_DM_INCORRECTFILEHASHA download manager operation could not be completed because the file digest was not recognized.
0x80246003WU_E_DM_UNKNOWNALGORITHMA download manager operation could not be completed because the file metadata requested an unrecognized hash algorithm.
0x80246004WU_E_DM_NEEDDOWNLOADREQUESTAn operation could not be completed because a download request is required from the download handler.
0x80246005WU_E_DM_NONETWORKA download manager operation could not be completed because the network connection was unavailable.
0x80246006WU_E_DM_WRONGBITSVERSIONA download manager operation could not be completed because the version of Background Intelligent Transfer Service (BITS) is incompatible.
0x80246007WU_E_DM_NOTDOWNLOADEDThe update has not been downloaded.
0x80246008WU_E_DM_FAILTOCONNECTTOBITSA download manager operation failed because the download manager was unable to connect the Background Intelligent Transfer Service (BITS).
0x80246009WU_E_DM_BITSTRANSFERERRORA download manager operation failed because there was an unspecified Background Intelligent Transfer Service (BITS) transfer error.
0x8024600aWU_E_DM_DOWNLOADLOCATIONCHANGEDA download must be restarted because the location of the source of the download has changed.
0x8024600BWU_E_DM_CONTENTCHANGEDA download must be restarted because the update content changed in a new revision.
0x80246FFFWU_E_DM_UNEXPECTEDThere was a download manager error not covered by another WU_E_DM_* error code.
0x80247001WU_E_OL_INVALID_SCANFILEAn operation could not be completed because the scan package was invalid.
0x80247002WU_E_OL_NEWCLIENT_REQUIREDAn operation could not be completed because the scan package requires a greater version of the Windows Update Agent.
0x80247FFFWU_E_OL_UNEXPECTEDSearch using the scan package failed.
0x80248000WU_E_DS_SHUTDOWNAn operation failed because Windows Update Agent is shutting down.
0x80248001WU_E_DS_INUSEAn operation failed because the data store was in use.
0x80248002WU_E_DS_INVALIDThe current and expected states of the data store do not match.
0x80248003WU_E_DS_TABLEMISSINGThe data store is missing a table.
0x80248004WU_E_DS_TABLEINCORRECTThe data store contains a table with unexpected columns.
0x80248005WU_E_DS_INVALIDTABLENAMEA table could not be opened because the table is not in the data store.
0x80248006WU_E_DS_BADVERSIONThe current and expected versions of the data store do not match.
0x80248007WU_E_DS_NODATAThe information requested is not in the data store.
0x80248008WU_E_DS_MISSINGDATAThe data store is missing required information or has a null value in a table column that requires a non-null value.
0x80248009WU_E_DS_MISSINGREFThe data store is missing required information or has a reference to missing license terms, a file, a localized property, or a linked row.
0x8024800AWU_E_DS_UNKNOWNHANDLERThe update was not processed because its update handler could not be recognized.
0x8024800BWU_E_DS_CANTDELETEThe update was not deleted because it is still referenced by one or more services.
0x8024800CWU_E_DS_LOCKTIMEOUTEXPIREDThe data store section could not be locked within the allotted time.
0x8024800DWU_E_DS_NOCATEGORIESThe category was not added because it contains no parent categories, and it is not a top-level category.
0x8024800EWU_E_DS_ROWEXISTSThe row was not added because an existing row has the same primary key.
0x8024800FWU_E_DS_STOREFILELOCKEDThe data store could not be initialized because it was locked by another process.
0x80248010WU_E_DS_CANNOTREGISTERThe data store is not allowed to be registered with COM in the current process.
0x80248011WU_E_DS_UNABLETOSTARTCould not create a data store object in another process.
0x80248013WU_E_DS_DUPLICATEUPDATEIDThe server sent the same update to the client computer, with two different revision IDs.
0x80248014WU_E_DS_UNKNOWNSERVICEAn operation did not complete because the service is not in the data store.
0x80248015WU_E_DS_SERVICEEXPIREDAn operation did not complete because the registration of the service has expired.
0x80248016WU_E_DS_DECLINENOTALLOWEDA request to hide an update was declined because it is a mandatory update or because it was deployed with a deadline.
0x80248017WU_E_DS_TABLESESSIONMISMATCHA table was not closed because it is not associated with the session.
0x80248018WU_E_DS_SESSIONLOCKMISMATCHA table was not closed because it is not associated with the session.
0x80248019WU_E_DS_NEEDWINDOWSSERVICEA request to remove the Windows Update service or to unregister it with Automatic Updates was declined because it is a built-in service and Automatic Updates cannot fall back to another service.
0x8024801AWU_E_DS_INVALIDOPERATIONA request was declined because the operation is not allowed.
0x8024801BWU_E_DS_SCHEMAMISMATCHThe schema of the current data store and the schema of a table in a backup XML document do not match.
0x8024801CWU_E_DS_RESETREQUIREDThe data store requires a session reset; release the session and retry with a new session.
0x8024801DWU_E_DS_IMPERSONATEDA data store operation did not complete because it was requested with an impersonated identity.
0x80248FFFWU_E_DS_UNEXPECTEDThere was a data store error not covered by another WU_E_DS_* code.
0x80249001WU_E_INVENTORY_PARSEFAILEDParsing of the rule file failed.
0x80249002WU_E_INVENTORY_GET_INVENTORY_TYPE_FAILEDFailed to get the requested inventory type from the server.
0x80249003WU_E_INVENTORY_RESULT_UPLOAD_FAILEDFailed to upload inventory result to the server.
0x80249004WU_E_INVENTORY_UNEXPECTEDThere was an inventory error not covered by another error code.
0x80249005WU_E_INVENTORY_WMI_ERRORA WMI error occurred when enumerating the instances for a particular class.
0x8024A000WU_E_AU_NOSERVICEAutomatic Updates was unable to service incoming requests.
0x8024A002WU_E_AU_NONLEGACYSERVERThe old version of Automatic Updates has stopped because the WSUS server has been upgraded.
0x8024A003WU_E_AU_LEGACYCLIENTDISABLEDThe old version of Automatic Updates was disabled.
0x8024A004WU_E_AU_PAUSEDAutomatic Updates was unable to process incoming requests because it was paused.
0x8024A005WU_E_AU_NO_REGISTERED_SERVICENo unmanaged service is registered with AU.
0x8024AFFFWU_E_AU_UNEXPECTEDThere was an Automatic Updates error not covered by another WU_E_AU * code.
0x8024C001WU_E_DRV_PRUNEDA driver was skipped.
0x8024C002WU_E_DRV_NOPROP_OR_LEGACYA property for the driver could not be found. It may not conform with required specifications.
0x8024C003WU_E_DRV_REG_MISMATCHThe registry type read for the driver does not match the expected type.
0x8024C004WU_E_DRV_NO_METADATAThe driver update is missing metadata.
0x8024C005WU_E_DRV_MISSING_ATTRIBUTEThe driver update is missing a required attribute.
0x8024C006WU_E_DRV_SYNC_FAILEDDriver synchronization failed.
0x8024C007WU_E_DRV_NO_PRINTER_CONTENTInformation required for the synchronization of applicable printers is missing.
0x8024CFFFWU_E_DRV_UNEXPECTEDThere was a driver error not covered by another WU_E_DRV_* code.
0x8024D001WU_E_SETUP_INVALID_INFDATAWindows Update Agent could not be updated because an .inf file contains invalid information.
0x8024D002WU_E_SETUP_INVALID_IDENTDATAWindows Update Agent could not be updated because the wuident.cab file contains invalid information.
0x8024D003WU_E_SETUP_ALREADY_INITIALIZEDWindows Update Agent could not be updated because of an internal error that caused setup initialization to be performed twice.
0x8024D004WU_E_SETUP_NOT_INITIALIZEDWindows Update Agent could not be updated because setup initialization never completed successfully.
0x8024D005WU_E_SETUP_SOURCE_VERSION_MISMATCHWindows Update Agent could not be updated because the versions specified in the .inf file do not match the actual source file versions.
0x8024D006WU_E_SETUP_TARGET_VERSION_GREATERWindows Update Agent could not be updated because a Windows Update Agent file on the target system is newer than the corresponding source file.
0x8024D007WU_E_SETUP_REGISTRATION_FAILEDWindows Update Agent could not be updated because regsvr32.exe returned an error.
0x8024D008WU_E_SELFUPDATE_SKIP_ON_FAILUREAn update to the Windows Update Agent was skipped because previous attempts to update failed.
0x8024D009WU_E_SETUP_SKIP_UPDATEAn update to the Windows Update Agent was skipped due to a directive in the wuident.cab file.
0x8024D00AWU_E_SETUP_UNSUPPORTED_CONFIGURATIONWindows Update Agent could not be updated because the current system configuration is not supported.
0x8024D00BWU_E_SETUP_BLOCKED_CONFIGURATIONWindows Update Agent could not be updated because the system is configured to block the update.
0x8024D00CWU_E_SETUP_REBOOT_TO_FIXWindows Update Agent could not be updated because a restart of the system is required.
0x8024D00DWU_E_SETUP_ALREADYRUNNINGWindows Update Agent setup is already running.
0x8024D00EWU_E_SETUP_REBOOTREQUIREDWindows Update Agent setup package requires a reboot to complete installation.
0x8024D00FWU_E_SETUP_HANDLER_EXEC_FAILUREWindows Update Agent could not be updated because the setup handler failed when it was run.
0x8024D010WU_E_SETUP_INVALID_REGISTRY_DATAWindows Update Agent could not be updated because the registry contains invalid information.
0x8024D011WU_E_SELFUPDATE_REQUIREDWindows Update Agent must be updated before search can continue.
0x8024D012WU_E_SELFUPDATE_REQUIRED_ADMINWindows Update Agent must be updated before search can continue. An administrator is required to perform the operation.
0x8024D013WU_E_SETUP_WRONG_SERVER_VERSIONWindows Update Agent could not be updated because the server does not contain update information for this version.
0x8024DFFFWU_E_SETUP_UNEXPECTEDWindows Update Agent could not be updated because of an error not covered by another WU_E_SETUP_* error code.
0x8024E001WU_E_EE_UNKNOWN_EXPRESSIONAn expression evaluator operation could not be completed because an expression was unrecognized.
0x8024E002WU_E_EE_INVALID_EXPRESSIONAn expression evaluator operation could not be completed because an expression was invalid.
0x8024E003WU_E_EE_MISSING_METADATAAn expression evaluator operation could not be completed because an expression contains an incorrect number of metadata nodes.
0x8024E004WU_E_EE_INVALID_VERSIONAn expression evaluator operation could not be completed because the version of the serialized expression data is invalid.
0x8024E005WU_E_EE_NOT_INITIALIZEDThe expression evaluator could not be initialized.
0x8024E006WU_E_EE_INVALID_ATTRIBUTEDATAAn expression evaluator operation could not be completed because there was an invalid attribute.
0x8024E007WU_E_EE_CLUSTER_ERRORAn expression evaluator operation could not be completed because the cluster state of the computer could not be determined.
0x8024EFFFWU_E_EE_UNEXPECTEDThere was an expression evaluator error not covered by another WU_E_EE_* error code.
0x8024F001WU_E_REPORTER_EVENTCACHECORRUPTThe event cache file was defective.
0x8024F002WU_E_REPORTER_

 

EVENTNAMESPACEPARSEFAILED
The XML in the event namespace descriptor could not be parsed.
0x8024F003WU_E_INVALID_EVENTThe XML in the event namespace descriptor could not be parsed.
0x8024F004WU_E_SERVER_BUSYThe server rejected an event because the server was too busy.
0x8024FFFFWU_E_REPORTER_UNEXPECTEDThere was a reporter error not covered by another error code.

Windows Update Agent Result Codes

Image may be NSFW.
Clik here to view.

How To: Create a Custom Vulnerability Definition in Patch and Compliance Manager

Description

 

This article illustrates how to create a custom vulnerability definition in Patch and Compliance Manager.  Creating custom definitions is not part of the regular support that Ivanti offers, so this Community article will serve the purpose of assisting customers in creating these definitions.

In Ivanti Security and Compliance Manager the ability to create a "user-defined" vulnerability definition provides an extremely flexible and powerful tool that can be used to implement and maintain computers in your environment.

Create Custom vulnerability definitions (and detection rules) to scan managed devices for any operating system, application, single file, registry condition, or use custom VBScript for various conditions to have the client be detected in order to implement various solutions.

 

Possible implementations

Implementations of the custom vulnerabilities are almost limitless. It can be used to update any application on managed devices. It can be used to apply any single file executable to a managed device based on detection rules defined by the Ivanti LANDESK administrator.

The following step-by-step example shows how to create a custom vulnerability to update or install a fictitious "in-house" application.

 

Assumptions

The administrator should be able to install the Ivanti Endpoint Manager Core Server and clients.  The core and managed devices should be configured with the latest LDMS version and service pack.

 

Creating a Custom Vulnerability Definition

Vulnerability Definition Help Page

 

We will now create the custom vulnerability to detect a condition.  In this case, Iwe will use "File Detection" logic to look for a minimum allowed version of "SuperSpecialInHouseApplication.dll".

 

  1. From the Endpoint Manager on the Core Server or a Remote console open the Security and Compliance tool group.
  2. Open the Patch and Compliance tool and click on the Create Custom Definition icon. (Green circle with + in the middle)
    Image may be NSFW.
    Clik here to view.
    2015-06-05_9-00-05.jpg
  3. The following window will open which shows the General information for your Custom Definition:
    Image may be NSFW.
    Clik here to view.
    2015-06-05_9-08-55.jpg
  4. Enter an ID, Title, Severity, and Notes.  This will show up in your Custom Definitions list in the following way:
    Image may be NSFW.
    Clik here to view.
    2015-06-05_9-10-57.jpg

Detection Rules

  1. Under Detection Rules click Add to add detection rules.
    Detection Rule Help
    Detection rules define the conditions that will cause the computer to be deemed "vulnerable" or simply needing an update, configuration change, installation of an application, etc.
    Sometimes multiple detection rules are necessary to install patches, make configuration changes, based on conditions.
    A common use of multiple detection rules is when you have separate patches for 32-bit patches and 64-bit patches.

The following Properties for Rule # window will appear.

 

Give the rule a name, title, and comments as depicted below:
Image may be NSFW.
Clik here to view.
2015-06-05_9-18-58.jpg

 

Vulnerability definitions are processed from the top down, and the following detection checks are taken:

Selecting Affected Platforms

Affected Platforms Help Guide


The scanner checks to see if the client is running an affected platform (in this case as defined by the user).
This is the operating system that is running on the client computer.  It is possible to differentiate between 32-bit and 64-bit versions of the Operating Systems, Etc.
The following is an example of the Platform pick-list:
Image may be NSFW.
Clik here to view.
2015-06-05_9-24-50.jpg

 

If the client computer is not running an affected operating system all other detection criteria is ignored and the computer is not deemed "vulnerable" as it has not met the first detection criteria.
It the client computer is running an affected operating system (platform) the scanning will continue to "Affected Products".

 

Creating a custom Affected Product

Affected Products Help

 

The "Affected Products" check is to see if the Product exists on the client computer.  This is a top-level criterion, and will typically check for the mere existence of a file or registry key associated with the product.  Sometimes a VBScript is used.
If writing a custom definition for a product that is already in the EPM database, you can simply click "Configure" and select that product.
Otherwise, in our case of writing a custom definition for "Super Special In-House Application" we will create a new Product based on file detection of "SuperSpecialIn-HouseApplication.exe".

    1. Click "Configure" in the Properties for Rule # properties window.
    2. Click Add and file in the ID, Name, Vendor, and Version information (as applicable)
      Image may be NSFW.
      Clik here to view.
      2015-06-05_11-31-55.jpg

      Creating a custom product or selecting an already existing product adds another level of detection making other detection processes later in these steps more flexible.
      For example, if the scanner doesn't detect that Super Special In-House Application is installed it will leave the detection process.
    3. Move down to the "Files" section of the Detection logic and enter SuperSpecialIn-HouseApplication.exe (or of course your filename you are concerned with).
    4. Enter in a range for the Minimum Version the file has to be and the Maximum version.  In this case, we will enter 0.0.0.0 for Minimum version, and 99.99.99.99 so that any version found will be applicable.
    5. Click OK to save the newly created Custom Product.
    6. Now that the Product has been created, it will need to be included in the Rule.  Select the new  Product from the bottom pane of the Select Affected Products window and then click on Include to move it to the Affected Products pane.
    7. Click OK.

 

Query Filter

 

Now move down to the Query Filter section.  All detection fields are optional.  Typically the Query Filter pane is used to include or exclude clients from the detection based on EPM queries.
An existing query can be selected or a new query created.  For our example, we will not use a Query Filter.

 

Files Detection Logic

Files used for detection help

Registry settings used for detection help

Custom script detection help

 

    1. Move to the Files pane. 
      Our example will use "File Version" for detection.  However, there are various methods of detection that exist file Files detection:
      Image may be NSFW.
      Clik here to view.
      2015-06-05_11-56-47.jpg
    2. Since SuperSpecialIn-House.dll is used in our detection process, and our new file is version 1.5, we will check to see if anything older than 1.5.0.0 exists.  Note that the top of the window says "Detection will occur if any of these conditions are not met".
      Several different criteria can be added (stacked up) in the File detection section.  If any one condition is not met, the computer will be deemed vulnerable.  However, typically only one criterion will be added here.
    3. For path, you can enter in a static directory and filename (C:\Program Files (x86)\SuperSpecialIn-HouseApplication.dll) or use variables.  In order to use variables, right-click the FILEPATH entry and you will be presented with variables that can be used.
      Image may be NSFW.
      Clik here to view.
      2015-06-05_11-47-48.jpg
    4. In Min version enter "1.5.0.0".  This will indicate that if the scanner sees any version of the .DLL that is earlier than 1.5.0.0 (the version of the .DLL in the update to be installed) the computer will be deemed vulnerable. For our example, we will not use the Registry Settings detection or the Custom Script detection however, if any combination of detection criteria for all three detection types are not met, the computer will be deemed vulnerable.

     

    There is an important difference between "File must exist," "File must NOT exist," and "File may exist":

    • "Must" means that the file needs to exist. If it does not exist the computer is deemed vulnerable.  This is important because if you have not defined a product and are simply using detection criteria. The fact that a file does not exist will cause the computer to be detected to be vulnerable, even if an affected product is not installed. 
    • "May" means that if the file does not exist, that is fine - detection will not happen and the computer will not be deemed vulnerable.  However, if the file DOES exist, the detection criteria must be met, in our case the file must be at version 1.5.0.0 or higher or detection will occur.
    • "Must Not" means that if the file is detected, it will be ignored and the computer will not be deemed vulnerable.

     

    Patch Information

    Patch Information Help

     

    There are three options available regarding Patch Information:

    Image may be NSFW.
    Clik here to view.
    2015-06-05_12-11-44.jpg

    1. "Repairing this issue requires downloading a patch" is used when you want to install a patch, an upgrade file, or an application.
    2. "This issue can be repaired without downloading a patch" is used when you intend to use scripting, additions/changes to the registry, copying files, starting or stopping a service, etc to "repair" the computer.
    3. "This issue cannot be repaired by Security and Compliance Manager" is used when you simply want to use detection only and do not plan to patch, upgrade or otherwise configure the client.

     

    For our example, we will use the "This issue requires downloading a patch".

     

    1. Select "This issue requires downloading a patch"
    2. If you have a source to download from, enter the FTP or HTTP address into the "Manufacturer's patch URL:" section.
    3. Select "Auto-downloadable" and set it to "Yes".  If the patch is not downloadable, the patch file will need to be placed in the default patch location.  (Also see this document: How to change the default Patch Location for Patch and Compliance Manager)
    4. Each file that is installed by Patch Manager must be given a unique filename when it is downloaded.  This filename can differ from the original filename that existed on the source for the download.  Enter in a unique filename or the existing filename if manually copying the file into the default patch location rather than downloading from an FTP or HTTP source.
    5. Once the file is in place, you will need to generate a hash for the file to ensure that it is secure and cannot be replaced with another file surreptitiously. 
      To do so, click the Calculate Hashes button and you should see the red X's above turn to a green checkmark, you will also see the "File Size" line populated with the file size.
    6. If your application requires a reboot, enter the appropriate choice in the "Requires Reboot" section.
    7. If your application can be installed silently select the appropriate choice in the "Silent Install" section.
      (Note: These fields are used for purely informational purposes.  The "Patch Install" section of the rule controls the silent switches, and the Distribution and Patch Settings control the reboot options.

     

    Detecting the Patch

     

    Various criteria can be used to detect whether the patch is installed.  Both File Detection and Registry Detection can be used.  This detection criterion is the opposite of the detection criteria to detect the vulnerability.  Note that this section says "The patch will be detected if all these conditions are met, along with all registry and script conditions".    The Detection Logic section says if the criteria is NOT met.  This is an important distinction.  Due to this, the exact same criteria can possibly be used both in the Detection Logic section and in the Detecting the Patch section.

     

    Patch Installation and Removal

    Patch Install and Uninstall Help

     

    Stop Processes

    If processes need to be stopped prior to your install, update or configuration change, you can list the process name as it would appear in Task Manager in windows.  Several entries can exist.

    This will cause any of these processes to be "killed" (stopped) prior to the patch install actions.

     

    Additional files

    This will allow you to specify additional files that will be downloaded to the client along with the main file that is listed under the Patch Information section.    Enter the HTTP and/or UNC path, then click the blue arrow to browse to that location and then select the file(s) you wish to include from the "Available files" listing. After adding the files you will be presented with options to hash the files.

    Patch Install Commands

    Various combinations of actions can be added to the Patch Install commands section:

        Image may be NSFW.
    Clik here to view.
    2015-06-05_12-42-01.jpg

    These actions will be run in the order that they are listed.  You can re-arrange them with the Move Up and Move Down buttons after they are entered.

     

    As in other areas of the Rule properties, variables can be used, this is typically displayed by right-clicking an appropriate field such as "Path".

    Image may be NSFW.
    Clik here to view.
    2015-06-05_12-44-09.jpg

    Patch Uninstall Commands

    Path uninstall commands are the same as the Patch Install commands.  A combination of actions can be defined to uninstall a patch, undo a configuration change, etc.

     

    Tips and Tricks

     

    In order to see examples of vulnerability definitions and rules, you can right-click any existing definition (custom or not) and select "Clone".   This will create a duplicate of the definition that will show up in the Custom Vulnerabilities category and can be edited.

    This is a great way to learn how to create detection logic and installation commands.

    Image may be NSFW.
    Clik here to view.

    Patch Failing "All Patches Failed" - Office 365

    The following error messages were pulled out of the clients vulscan.log when attempting to patch Office 365.  I followed the document and have the patches in the folder specified.  I can browse to the patch folder in a web browser and see the files on the client.

     

    Sun, 30 Sep 2018 16:16:11 -------------------Patch Installation----------------------

    Sun, 30 Sep 2018 16:16:11 BeginWaitForMutex 'Global\vulscan_continue'

    Sun, 30 Sep 2018 16:16:11 WaitForMutex 'Global\vulscan_continue' succeeded

    Sun, 30 Sep 2018 16:16:11 Getting list of autofix patches

    Sun, 30 Sep 2018 16:16:11 HTTP POST: http://LANDESK01.ck.c-k.com:443/WSVulnerabilityCore/VulCore.asmx

    Sun, 30 Sep 2018 16:16:11 Setting a proxy...

    Sun, 30 Sep 2018 16:16:11 Setting socket timeout to 1000 * 60 * 4

    Sun, 30 Sep 2018 16:16:12 Success

    Sun, 30 Sep 2018 16:16:12 1 patches were found to run

    Sun, 30 Sep 2018 16:16:12 Last status: Done.  1 patches were found

    Sun, 30 Sep 2018 16:16:12 No patch download required for *MSO365_MONTHLY_16.0.10730.20102_X64

    Sun, 30 Sep 2018 16:16:12 Removing local scheduler maint window task: 893751

    Sun, 30 Sep 2018 16:16:12 Checking for other running install/repair actions

    Sun, 30 Sep 2018 16:16:12 Last status: Waiting

    Sun, 30 Sep 2018 16:16:12 BeginWaitForMutex 'Global\SDClientLockMutex'

    Sun, 30 Sep 2018 16:16:12 WaitForMutex 'Global\SDClientLockMutex' succeeded

    Sun, 30 Sep 2018 16:16:12 Last status: Done

    Sun, 30 Sep 2018 16:16:33 Exit Code: 0 (0x0)

    Sun, 30 Sep 2018 16:16:33 Launched desktop instance of vulscan to detect full screen apps.  It returned: 0

    Sun, 30 Sep 2018 16:16:33 Running patch *MSO365_MONTHLY_16.0.10730.20102_X64

    Sun, 30 Sep 2018 16:16:33 Running pre-install/uninstall script

    Sun, 30 Sep 2018 16:16:33 ERROR: Failed to open Patch monitoring info HKLM\Software\LANDesk\ManagementSuite\WinClient\PatchMonitoring (0x2)

    Sun, 30 Sep 2018 16:16:33 Patch directory : 'C:\Program Files (x86)\LANDesk\LDClient\sdmcache\'

    Sun, 30 Sep 2018 16:16:33 Patch name : '*MSO365_MONTHLY_16.0.10730.20102_X64'

    Sun, 30 Sep 2018 16:16:33

    Sun, 30 Sep 2018 16:16:33 Command Interpreter running

    Sun, 30 Sep 2018 16:16:33 Work Path: C:\Program Files (x86)\LANDesk\LDClient\

    Sun, 30 Sep 2018 16:16:33 regsvr file:C:\WINDOWS\system32\regsvr32.exe

    Sun, 30 Sep 2018 16:16:33 fullPathDll of DLL file:C:\Program Files (x86)\LANDesk\LDClient\O365Util.dll

    Sun, 30 Sep 2018 16:16:33 obtaining core server name LANDESK01.ck.c-k.com from scriptable interface.

    Sun, 30 Sep 2018 16:16:33 Core server Name:  LANDESK01.ck.c-k.com

    Sun, 30 Sep 2018 16:16:33 Hash File: O365Util.dll

    Sun, 30 Sep 2018 16:16:33 In SendRequest: Action = SOAPAction: "http://tempuri.org/GetHashForSingleFile"

     

     

    Sun, 30 Sep 2018 16:16:33 SendRequest: SOAPAction: "http://tempuri.org/GetHashForSingleFile"

     

     

    Sun, 30 Sep 2018 16:16:33 Action SOAPAction: "http://tempuri.org/GetHashForSingleFile" failed, socket error: 10054, SOAPCLIENT_ERROR: 5.  Status code: -1, fault string:

    Sun, 30 Sep 2018 16:16:33   Retrying in 7 seconds...

    Sun, 30 Sep 2018 16:16:36 Last status: Retrying in 4 seconds...

    Sun, 30 Sep 2018 16:16:37 Last status: Retrying in 3 seconds...

    Sun, 30 Sep 2018 16:16:38 Last status: Retrying in 2 seconds...

    Sun, 30 Sep 2018 16:16:39 Last status: Retrying in 1 seconds...

    Sun, 30 Sep 2018 16:16:41 Success

    Sun, 30 Sep 2018 16:16:41 Work Path: C:\Program Files (x86)\LANDesk\LDClient\

    Sun, 30 Sep 2018 16:16:41 GetFileHash: could not find "C:\Program Files (x86)\LANDesk\LDClient\O365Util.dll"

    Sun, 30 Sep 2018 16:16:41 obtaining core server name LANDESK01.ck.c-k.com from scriptable interface.

    Sun, 30 Sep 2018 16:16:41 About to call DownloadFiles (1 files) with these settings:

    Sun, 30 Sep 2018 16:16:41 m_allowedBandwidthWAN: 91

    Sun, 30 Sep 2018 16:16:41 m_allowedBandwidthLAN: 91

    Sun, 30 Sep 2018 16:16:41 m_discardPeriodSeconds: 604800

    Sun, 30 Sep 2018 16:16:41 m_preserveDirectoryStructure: 0

    Sun, 30 Sep 2018 16:16:41 m_bUseWanBWForPush: 0

    Sun, 30 Sep 2018 16:16:41 m_bSynchronize: 0

    Sun, 30 Sep 2018 16:16:41 Allowed download methods(m_downloadControl):

    Sun, 30 Sep 2018 16:16:41 Peer

    Sun, 30 Sep 2018 16:16:41 Source

    Sun, 30 Sep 2018 16:16:41 m_preferredServerControl: AttemptPreferredServer

    Sun, 30 Sep 2018 16:16:54 http://LANDESK01.ck.c-k.com/ldlogon/O365Util.dll Done

    Sun, 30 Sep 2018 16:16:55 Last status: Done

    Sun, 30 Sep 2018 16:16:55 Downloaded  C:\Program Files (x86)\LANDesk\LDClient\O365Util.dll

    Sun, 30 Sep 2018 16:16:55 Download the following file successfully: O365Util.dll

    Sun, 30 Sep 2018 16:16:55 Called CreateProcess: "C:\WINDOWS\system32\regsvr32.exe"

    Sun, 30 Sep 2018 16:16:55 Exit Code for process C:\WINDOWS\system32\regsvr32.exe: 0, (0x0)

    Sun, 30 Sep 2018 16:16:55 The result of regsvr32 is:  0

    Sun, 30 Sep 2018 16:16:55 Create object of  O365Util

    Sun, 30 Sep 2018 16:16:55 created the instance ok : O365Util

    Sun, 30 Sep 2018 16:17:07 Register C2RCom returnCode:0

    Sun, 30 Sep 2018 16:17:07 Custom Variable URL : http://landesk01.ck.c-k.com/Patch/Office365/2016/Current/x64/

    Sun, 30 Sep 2018 16:17:07 Patch Binaries URL : http://landesk01.ck.c-k.com/Patch/Office365/2016/Current/x64/

    Sun, 30 Sep 2018 16:17:09 ReportRepairResult returned failure: Failed to execute download and apply actions for installer

    Sun, 30 Sep 2018 16:17:09 Failed to execute installer. ReturnCode:5

    Sun, 30 Sep 2018 16:17:09 Message returned from repair script was Failed to execute download and apply actions for installer

    Sun, 30 Sep 2018 16:17:09 ERROR(RunVbScript) Failed to run command  - 80004005

    Sun, 30 Sep 2018 16:17:09 DownloadPatch ERROR: Failed to run commands (80004005).

    Sun, 30 Sep 2018 16:17:09 Last status: Failed

    Sun, 30 Sep 2018 16:17:09 DeferredReportAction: name '*MSO365_MONTHLY_16.0.10730.20102_X64', code '1', type '-1', status 'Failed to execute download and apply actions for installer'

    Sun, 30 Sep 2018 16:17:09 App killer is stopping

    Sun, 30 Sep 2018 16:17:09 Running post-install/uninstall script

    Sun, 30 Sep 2018 16:17:10 RunPatches completed.  1 processed.  0 installed.  1 failures.

    Sun, 30 Sep 2018 16:17:10 Sending previous action history to core

    Sun, 30 Sep 2018 16:17:10 HTTP POST: http://LANDESK01.ck.c-k.com:443/WSStatusEvents/EventHandler.asmx

    Sun, 30 Sep 2018 16:17:10 Setting a proxy...

    Sun, 30 Sep 2018 16:17:10 Setting socket timeout to 1000 * 60 * 4

    Sun, 30 Sep 2018 16:17:10 Success

    Sun, 30 Sep 2018 16:17:10 Last status: Done

    Sun, 30 Sep 2018 16:17:10 Reboot action set to 'never.'  Not rebooting.

    Sun, 30 Sep 2018 16:17:10 Reboot and rescan.  Rescan set to false, so doing nothing.

    Sun, 30 Sep 2018 16:17:10 ReleaseMutex 'Global\SDClientLockMutex' succeeded. Code: 0

    Sun, 30 Sep 2018 16:17:10 No 'continue' tasks

    Sun, 30 Sep 2018 16:17:10 ReleaseMutex 'Global\vulscan_scan' succeeded. Code: 0

    Sun, 30 Sep 2018 16:17:10 Exiting with return code 0x8db3019c (412).

    Sun, 30 Sep 2018 16:17:11 Process is terminating, cleaning scanner...

    Image may be NSFW.
    Clik here to view.

    Where to start with MS critical Updates?

    Hello,

     

    I've started using Patch manager and completely understand the way it works technically.

     

    My aim is now to make sure all our Ivanti clients are patched with MS critical updates. I just don't know where to start. Should i take all MS critical definitions and include them in a rollout project ? Should i only start with the current/last month ?

     

    if you have advice or can explain how you manage it, i'd be glad.

     

    For your info, some of my clients used WSUS where some others never had any patch. Clients are mainly W10 (different build) and few Windows 7.

     

    I know the question could be difficult to answer (or too long) but i'd just be on the right tracks right now.

     

    Thank you.

     

    David.

    Image may be NSFW.
    Clik here to view.

    Firefox "International" updates not detecting existing installs

    My environment is all x64 Firefox installations on ~version 60.  Every since Ivanti changed the name of the patching scheme to "FF18-0X_INTL" the patches are no longer being detected as needed.  Even though the computer does need to be patched.

     

    I'm considering fixing this myself by cloning and adjust the detection logic, but I'd rather not have to and just hope Ivanti fixed the detection logic.

    Image may be NSFW.
    Clik here to view.

    New to Patch and compliance

    I have the Groups i want to patch already set up and a scheduled task to scan those groups and download patches.

     

    My first big question is should i be cleaning out my unassigned folder and adding them to my patching groups. I ask because i found the security roll ups in the un assigned folder so they were not being applied.

     

    Next i would appreciate any good documentation videos and what not any of you use to get a good handle on the Patching and Compliance workflow in Ivanti. Thank you all for your help.

    Patching and Compliance - Unassigned Folder

    Semi new to the Patching process with ivanti and would just like to know the best practice for using the unassigned folder. Should i move them all to the scan global folder and see if it is detected? Thank you for your help.

    Image may be NSFW.
    Clik here to view.

    How to set up a dark network Core Server (without outside network access)

    How to set up your Dark Network Core: Step by step

     

     

    Description

    This document details the procedure for copying definitions from a "light core" (A core that is connected to outside networks) and a "Dark Core" (a core that is not connected to outside networks)  This is often done for security purposes or lack of connectivity.

     

     

    Assumptions

     

    • The user has a familiarity with Ivanti Endpoint Manager and associated files and functions
    • The user has 2 servers, one "Light" and one "Dark" (One with Internet connectivity and one without internet connectivity)
    • The user has Ivanti Endpoint Manager installed with default parameters, file and drive locations, etc.
    • The user has Activated both "Light" and the "Dark" Cores.

    Process

     

    Compatibility of Ivanti EMP is being constantly reviewed by our Development team and more updates regarding Dark Core setup will follow.

     

    Step one: Prepare both core servers to have accurate data

     

    In order to make correct Patch data transfer from the"Light" Core to "Dark" Core, the Database tables related to Patch Manager must be reset.

     

    This can be done on both core servers by doing the following:

     

    1. On each core server, open a command prompt on the server and go to the C:\Program Files\LANDESK\ManagementSuite folder.
    2. Run "CoreDbUtil.exe /patchmanager".
    3. Open the process list in Task Manager (right-click the taskbar and select "Task Manager) and watch for CoreDbUtil.exeto drop from the list to make sure it has finished.

                     (The log for CoreDBUtil.exe is located in the main log location at \Program Files\LANDESK\ManagementSuite\Log)

       

      Step two: Prepare the Dark Core folder structure

       

      On the "Dark" Core (Without Network), you will need to have a location for the vulnerability XML files and a location for the actual patches themselves to be stored in.
      We recommend using the already by default created "\Program files\LANDESK\ManagementSuite\LDLogon\patch" patch folder structure that is set up when you install Ivanti EPM.

      (If patches have not been downloaded on the "Light" Core to "Dark" Core previously the patch folder may not have been created. On the "Dark" Core it should be manually created.)

      If a different location is desired this article can be used to set up the alternative location.

       

      Step three: Retrieve content on the "Light Core"

       

        1. Within Security and Patch and Complianceopen the Download Updates window and select all of the categories you want to download.
        2. In addition select "Download patches for definitions selected above and also the radio button for "for all downloaded definitions" and click "Apply" and then "Close".
          Image may be NSFW.
          Clik here to view.
          SelectCategories.gif
        3. From a Command prompt, go to the LANDESK\ManagementSuite folder.
        4. From a Command prompt, type "vaminer /noprompt/copy" and hit enter.  (If scripting this action to run regularly please add the "/noui" switch to the vaminer command line switches)

       

      (Vaminer.exe is the executable that runs to download content from the Ivanti patch content servers).

       

      The first time this is run it will take quite a while as it will not only be downloading vulnerability definitions but also all patches. 

      (Due to this you will need a large amount of storage space on the dark core server). 

      This will download updates and store them to a to the patch directory.  The default patch directory is \Program Files\LANDESK\ManagementSuite\LDLOGON\patch.

       

      To verify further that this process has completed correctly, in \Program Files\LANDESK\Managementsuite\ldlogon\patch and it's subdirectories you should have.XML files that were generated by the Ivanti Content download to represent your vulnerability definitions. Do not change the folder structure or files.

       

      Step four: Copy PatchSources file to patch directory on Source (Light) Core

       

                Copy *ENU_PatchSourcesXXX.xmlfrom \Program Files\LANDESK\ManagementSuite\LDMAIN

                 to \Program Files\LANDESK\ManagementSuite\LDLOGON\PATCH on the source core. 
                This step is necessary because Vaminer.exe expects that file to be in that location.
                This needs to match the version you are running: 9.5 (ENU_PatchSources95.xml), 9.6 (ENU_PatchSource96.xml, 2016.3 (ENU_PatchSources101.xml) and so on. 

                Modification of the file is not necessary, it just needs to exist in that location. *(XXX equals the current LDMS version)

       

                     (On LDMS 2017.3 SU3 the file needs to be renamed from ENU_PatchSources1013.xml to ENU_PatchSources10132.xml)

       

      Step five: Prepare the *ENU_PatchSourcesXXX.xml on the Dark Core
      *(XXX equals the current LDMS version)

       

                     In the \Program Files\LANDESK\ManagementSuite\LDMAIN folder there will be several files called *ENU_PatchSourcesXXX.xml. *(XXX equals the current LDMS version)

                     Choose the one that is the latest and matches your version on your core server. To check correct version of your Core server please refer to this article.

       

      For example: On a 2017.3 Core server you will likely see three ENU_PATCHSOURCESXXX files:

          • ENU_PatchSources951.xml
          • ENU_PatchSources961.xml
          • ENU_PatchSources101.xml
          • ENU_PatchSources1013.xml

       

      We would select ENU_PatchSources1013.xml as this corresponds to LDMS 2017.3 and begin editing it.

       

      If your core is not running in the English language you will want to select the XML file that matches your language prefix (ESP, JPN, etc)

       

      Modify the Enu_PatchSourcesXXX.xml as modeled below:

      Line #3 in the .XML will contain ‘/LDPM8/ldvul.php?%Credentials%KEYWORD=filename&FILENAME=’.  Replace it with  /ldlogon/Patch (or whatever directory you have defined as your patch storage directory).

      Before:

      PatchesSrcRelativePath>/LDPM8/ldvul.php?%Credentials%KEYWORD=filename&amp;FILENAME=patches</PatchesSrcRelativePath>
      <LDAVRelativePath>/kvirus-8.0/mirror</LDAVRelativePath>
      <CVEMoreInfo>http://cve.mitre.org/cgi-bin/cvename.cgi?name=%CVE_ID%</CVEMoreInfo>


      After:

      <PatchesSrcRelativePath>/LDLOGON/PATCH</PatchesSrcRelativePath>
      <LDAVRelativePath>/kvirus-8.0/mirror</LDAVRelativePath>
      <CVEMoreInfo>http://cve.mitre.org/cgi-bin/cvename.cgi?name=%CVE_ID%</CVEMoreInfo>
      1. Next you will need to change the URL's for each Patch Content Server location.    These will be listed under the <Sites> tag.  Search for <Sites> and you will see 3 sites, West Coast, East Coast, and EMEA.

        Delete two out of three sites leaving just one site. 

        You will change the hostname listed in the <URL> field and then the Description.

        Image may be NSFW.
        Clik here to view.
        EditXML.gif

      If you are using content that will be manually copied to the core server, put the name of your Dark Core server.  If there will be constant or periodic network connection between your light core and dark core, put the name of your light core here.


      In the following section, you will select the definition download category that you want to download to the dark core and you will edit that entry in the .XML.  We will replace the string that normally works with the Ivanti Patch server and replace it with a local path.

       

      The following example is for the vulnerability definition category Windows Vulnerabilities  Again, you will modify the path from the patch server location to a local directory.

      Search for /LDPM8/ldvul.php?%Credentials%KEYWORD=filename&amp;FILENAME=Windows2 the correct section by searching for "Windows2".  Modify the section within the <URL> tags

       

      The resulting line will be<URL>/LDLOGON/PATCH/Windows2</URL>. 

       

      You also will add the tag <Enabled>true</Enabled>. This is the same as ticking the checkbox next to the vulnerabilities category when bringing up the Download Updates tool.  Without adding the <Enabled> tag you will need to select the categories every time Download Updates is opened.
      Image may be NSFW.
      Clik here to view.
      EditXML2.gif

      When renaming these sections per component you wish to download, FILENAME=Windows2 will use the subdirectory name of "Windows2" under the Patch directory after you modify it. 
      For example, if I wanted to change the source for Ivanti Data Analytics updates, you would search for that category by searching for just that - "LANDESK Data Analytics Updates".

       

      You would then modify the <URL>/LDPM8/ldvul.php?%Credentials%KEYWORD=filename&amp;FILENAME=LDDA</URL> to <URL>/LDLOGON/PATCH/LDDA</URL>.

       

           Before:
           <Source>

                           <URL>/LDPM8/ldvul.php?%Credentials%KEYWORD=filename&amp;FILENAME=LDDA</URL>

                         <Description>LANDESK Data Analytics Updates</Description>

                         <ShowInLDSM>true</ShowInLDSM>

                         <ShowInLSM>true</ShowInLSM>

                  </Source>

       

           After:
           <Source>

                              <URL>/LDLOGON/PATCH/LDDA</URL>

                              <Description>LANDESK Data Analytics Updates</Description>

                              <ShowInLDSM>true</ShowInLDSM>

                              <ShowInLSM>true</ShowInLSM>

                              <Enabled>true</Enabled>

                  </Source>

       

      Once all of the edits have been made do a "Save as" and save it as "Patchsourcestemp.xml" and mark it as a read-only file.  (Right-click, go to properties and check the box "Read Only")

      After you have marked it as read-only, rename it to "patchsources.xml".  Remember, all of this is taking place in the LDMAIN folder.

       

      If you are using a 2016.5 or newer you will need to import the Landesk Secure Token Server from the light core to the dark core

           1. On the light Core run Certlm.msc to open the Local Computer Certificates store.

           2. Open the Personal Certificates, locate the certificate with the Light Core server name (also has the Friendly Name LANDESK Secure Token Server)

      Image may be NSFW.
      Clik here to view.
      LightCoreCert.PNG

           3. Export this certificate.

           4. Import this certificate into the Dark Cores  Local Computer Certificates store into the Trusted Root Certification Authorities certificate store.

      Image may be NSFW.
      Clik here to view.
      CertImportedToDarkCore.PNG

       

       

      Step six: Import the vulnerability definitions into the "Dark Core"

       

      1. Now you will need to move the data to the dark core for insertion into the database.   Copy the following to an external hard drive, flash drive, or whatever method you prefer to transfer using.
        • The entire Patch directory and all subdirectories of that folder
        • The entire LDLOGON\Timber folder
        • The following files from the LDLOGON folder on the light core to the LDLOGON directory on the dark core, once at first, but the copying procedure should include copying these files if newer files are detected.
          • Office365Utility (folder)
          • SCSDiscovery_11.1.0.75.exe
      2. These files will need to be copied to the same directories on the dark core server.  If the light core will have access to the dark core this can be done automatically through a file transfer process, automated or otherwise.  The key is to download content on the light core server regularly using the "vaminer /noprompt /noui /copy" switch and then copy the updated data to the Dark Core.
      3. When copying the Patch Directory from your Light Core to your Patch Directory on your Dark Network Core, ensure the directories look the same.
      4. Run Download Updates on the Dark Core Server, if running via script simply run "VAMINER.EXE" from the main ManagementSuite folder.

       

       

      If automating the copying of Data from the light core to the dark core:

       

      If you are automating the copying of the vulnerability data from the light core to the dark core, ensure the following steps are taking place:

       

        1. "Vaminer /copy /noprompt /noui" is run on the light core server.
        2. All files from the Patch directory, its subdirectories, the LDLOGON\Timber folder and the listed files above in step 6 from the LDLOGON folder are copied to the Patch folder on the dark core.  This can be done using content replication, robocopy or other preferred methods.
        3. Vaminer.exe is run on the dark core (without switches).

       

      This should be done on an automated schedule so that these steps take place in sequence and that there is enough time for each step to complete before the next one starts.

      Image may be NSFW.
      Clik here to view.

      Looks like the "disable replaced rules" fonction doesn't work in my console

      Hello,

       

      I know there's a lot of topics about it and i've read them all but i just want to be sure. There's probably something i don't understand.

       

      For Windows 10 we only have cumulative updates for the differents build.

       

      So, for exemple, the  "Security Cumulative Update for Windows 10 Version 1709: September 11, 2018" should replace the "Security Cumulative Update for Windows 10 Version 1709: August 14, 2018".

       

      Now if i use the "disable replaced rules" feature, the August Cumulative Update should not be display in my "Scan (global)" folder and should be in the "replaced" folder.

       

      If i look in my "Scan (global)" this is what i've got (i use Ivanti in French):

       

       

      Image may be NSFW.
      Clik here to view.

       

      If i look into my "replaced" folder or "partially replaced" folder there's nothing. It is empty.

       

      Is it a normal behaviour or is there a problem in my console?

       

      Thank,

       

      David.

      Image may be NSFW.
      Clik here to view.

      Patch Replacements, or lack of... 9th October 2018

      I have been reviewing the latest patch release:

       

      New Ivanti Endpoint Manager Content Available - 10/09/2018

       

      I can't see any of the new definitions replacing older patches, even though there clearly are patches that would be superseded.

       

      For example, I would expect:

       

           MS18-10-W10-4462919_INTL Security Cumulative Update for Windows 10 Version 1803: October 9, 2018 (KB4462919)

       

      to replace:

       

           MS18-09-W10-4457128_INTL Security Cumulative Update for Windows 10 Version 1803: September 11, 2018 (KB4457128)

       

      I have also noticed that the some of patches are not even marked as critical/important:

       

           APSB18-35_INTL

           ARDC18-005_INTL

       

      This is problematic as we rely on these ratings for automatic patch approval.

       

      I am going to submit a ticket for this, but am curious if any one else seeing the same thing?

      Image may be NSFW.
      Clik here to view.

      How to patch Office 365

      Overview:

      Ivanti Patch and Compliance now provides support for Office 365 versions 2013 and 2016.  Patch and Compliance administrators can now scan, detect, and remediate client devices that have Office 365 installed. For Office 365 version 2013, Ivanti leverages the Microsoft Office Deployment Tool to perform the remediation tasks for updating Office 2013 installations. For Office 365 version 2016, Ivanti has developed an Office Com API to perform remediation tasks for updating Office 2016 installations. Ivanti provides a utility (Office365Util.exe) for you to use to download the Office installation data and to check the hash for Office 2016 installation data. When the Office patches are downloaded, Ivanti Endpoint Manager will check the hash on the pertinent files to ensure validity.

       

      High Level Process

       

      1. The Ivanti administrator downloads Office 365 definitions from the Ivanti global servers.
      2. Once the Office 365 definitions are downloaded to the core, the Ivanti administrator can scan for those Office 365 vulnerabilities.
      3. In order to remediate (apply latest patches) detected vulnerabilities, Ivanti administrator have to manually run, on the core machine, a new tool provided by Ivanti (Office365Util.exe). Using this tool, the Ivanti administrator can choose the Office 365 versions that are relevant to the environment. The Ivanti Office 365 utility will download the patch binaries and the Microsoft Office deployment tool from the Microsoft cloud.
      4. Once the patch binaries are downloaded to the core, the Ivanti administrator can apply the patches to all vulnerable endpoints using the standard method of applying patches.

      Step 1: Download Content

       

      Customers download the Office 365 vulnerability definitions, the O365Util.dll, and the Office365Util.exe from the Ivanti Global Host Content Server by downloading the latest Microsoft Windows Vulnerabilities.

       

      Download Updates (Microsoft Windows Vulnerabilities)Updating Definitions (Office365Util.exe/O365Util.dll)
      Image may be NSFW.
      Clik here to view.
      o365downloadupdates.jpg
      Image may be NSFW.
      Clik here to view.
      updates.jpg

       

      Updating Definitions (MSO365)MSOFFICE 365 (Vul_Defs)MSO365 (Vul_Defs)
      Image may be NSFW.
      Clik here to view.
      MSO365.jpg
      Image may be NSFW.
      Clik here to view.
      MSo365Def.jpg

      Step 2: Launch Office365Util.exe

       

      Upon successful content download, an Office365Utility folder is created under the LDLogon share and will contain the Office365Util.exe file provided by Ivanti.

       

      \\Core_Server\LDLogon\Office365Utility

       

      Image may be NSFW.
      Clik here to view.
      2017-10-18_1747.png

      This utility will allow you to select the specifics regarding the Office 365 product you are patching. Launch this utility directly from C:\Program Files\LANDesk\ManagementSuite\ldlogon\Office365Utility\ by double-clicking on Office365Utility.exe
      (do not try to run it via the network share \\Core_Server\LDLogon\Office365Utility or \\localhost\LDlogon\Office365Utility as you will get an error).

       

      Step 3: Select Options from Office365Util

       

      The view provided below displays the available options inside of the Office365Util application (Ivanti Office 365 Utility for Patch and Compliance):

      There is no Channel support for Office 2013

      The Office365Util.exe does not utilize the Proxy information in EPM and it is not configurable, you may need to open access to download.microsoft.com and microsoft.com

      PlatformsDeployment Tools
      Image may be NSFW.
      Clik here to view.
      o365Patform.jpg
      Image may be NSFW.
      Clik here to view.
      o365Utility2016.jpg

       

      The following channels have changed:

      The Current Channel is now the Monthly Channel.

      The Defferred Channel is now the Semi-Annual Channel.

      The First Release Deferred Channel is now the Semi-Annual Channel (Targeted) Channel.

       

      Please see Manage Office 365 ProPlus updates - Configuration Manager | Microsoft Docs  for reference.

       

      ChannelsOffice 365 (2013) Product List View
      Image may be NSFW.
      Clik here to view.
      o365_2013.jpg
      Image may be NSFW.
      Clik here to view.
      o365Channel.jpg

       

      In order to successfully patch Office 365, select which Office 365 patch product updates to download in order to support client remediation. After selecting the desired product updates from the Ivanti Office 365 Utility for Patch and Compliance application, click START.

       

       

          Image may be NSFW.
      Clik here to view.
      STARTo365.jpg
       

       

      Office 365 Tool

       

      The START action will do (2) things:

       

      1. Create an Office365Tool folder under the LDLogon share and process the Microsoft setup.exe file

        \\Core_Server\LDLogon\Office365Tool

      The contents of this folder will contain the Deployment Tool Type (2016 or 2013) selected during the download and all relative installation data applicable to the options selected in the Ivanti Office 365 Utility for Patch and Compliance
      application. The display below will outline the contents of both Deployments Tools (2016 and 2013).

       

      If you have both 2016 and 2013 products in need of patching, the download has to be completed separately.

       

      Office365Tool
      Deployment Tool Options
      Image may be NSFW.
      Clik here to view.
      oToolOverview.jpg
      Image may be NSFW.
      Clik here to view.
      oToolBothPlats.jpg

       

      2016 Content2013 Content
      Image may be NSFW.
      Clik here to view.
      2016View.jpg
      Image may be NSFW.
      Clik here to view.
      2013View.jpg

         
            2. Create an Office365 folder under the LDLogon\Patch share that contains the patch files(s):

       

      \\Core_Server\LDLogon\Patch\Office365

      Patch Location

       

      Updated Office 365 patching is not designed to take advantage of our download technology. The client device will NOT download o365 patch files from a preferred server or peer device. The files will be retrieved from the default or non-default patch location.

      Image may be NSFW.
      Clik here to view.
      iis.jpg
      Image may be NSFW.
      Clik here to view.
      explorer.jpg

       

      Non-Default Patch Location

       

      This section is only applicable to those who have changed the default download location for patches. After downloading the Office 365 patch updates and installation data with the Ivanti Office 365 tool, the following SOURCE will be in the vulnerability definition:

       

      Office 365 (2016)

       

      httpSourcesURL="Core_Server/LDLogon/Patch/Office365/DeploymentToolType/Channel/Architecture"

       

      Ex: httpSourcesURL=http://2016E/ldlogon/patch/office365/2016/current/x64

      Office 365 (2013)

      httpSourcesURL=http://Core_Server/LDLogon/Patch/Office365/DeploymentToolType

       

      Ex: httpSourcesURL= http://2016E/ldlogon/patch/office365/2013

       

      In order for the Patch Install Commands in the vulnerability definition to interpret the correct patch location, the Custom Variable will have to be set in every MSO365 vulnerability definition.

       

      To do this, open the properties on the definition and select the Custom Variables tab. By default the value specified will resolve to the default patch location.

      Image may be NSFW.
      Clik here to view.

       

      You will need to explicitly set the value to reflect the location your patches reside. For instance, if you are desiring to distribute from a location called "Patches" on your network storage server and are updating a 32 bit machine on the Office 365 2016 Deferred (now Semi-Annual) channel, you would put in the following path:

      http://nameofmystorageserver/Patches/office365/2016/Deferred/X86

      Image may be NSFW.
      Clik here to view.

      It is not enough to specify the custom path to the office365 directory where your updates reside. You must include every part of the path after the office365 directory down to the architecture type as is shown above.

       

      The Patch Install Commands section of the definition utilizes a script that resolves the Custom Variable.

      Image may be NSFW.
      Clik here to view.

       

      References

      How to change the default Patch Location for Security and Patch Manager

      Microsoft Office 2016 Deployment Tool

      Microsoft Office 2013 Deployment Tool for Click-to-Run


      How to Set up Definition Filter Rules by Product to Automatically move to a Custom Folder

      Set up Definition Filter Rules by Product to Automatically move to a Custom Folder

       

      Note: All images within this document can be viewed full size by clicking on them.

       

      This document will teach you how to setup definition filter rules by affected product in the Download Updates > Definition Download Settings section when downloading future updates.  For this example we will set Google Chrome Enterprise definition updates to go to a group folder named Chrome in the console.

      Open patch and compliance by going to Tools > Security and Compliance > Patch and Compliance.  Next find and double-click a patch who’s future updates you want to set up a rule for, in our case, we used the current Google Chrome Enterprise patch.

      Then double-click a file name in the Detection Rules section.  Then click on Affected Products.

      Image may be NSFW.
      Clik here to view.

       

      In the Products section make a note of the wording used by the definition.  In our case the word "Chrome" is relevant so we will use that.

      Close out of the dialogs and open the Download Updates by clicking on the Image may be NSFW.
      Clik here to view.
      icon on the Patch and Compliance menu bar.

      Image may be NSFW.
      Clik here to view.

       

      Once the Download Updates dialog is open click on the Definition download settings… button in the lower right corner.

      Image may be NSFW.
      Clik here to view.

       

      Once the dialog is open click New on the bottom.

      Image may be NSFW.
      Clik here to view.

       

      On the Filter tab create the filter by Selecting Vulnerability and Any in the lower tabs.  Then in Comparison Choose Product, contains, and Type out Chrome.  You can be as general or granular here as you want.

      Image may be NSFW.
      Clik here to view.

       

      Next go to the Groups and Tags tab.  Check the Put Definition in custom group(s) box and click Add.  Then select the group you want to put the definition in.  In our example, it is named Chrome.

      Image may be NSFW.
      Clik here to view.

       

      Click Ok in all the dialogs to close out of all of them.  You should see the new filter present in the Definition download settings dialog. Any new Chrome updates will be automatically added to then Chrome folder.

      Image may be NSFW.
      Clik here to view.

      If you run a Download Updates now and there were definitions with the word Chrome in the product information.  They would be placed in the Chrome folder.

      Image may be NSFW.
      Clik here to view.

      Image may be NSFW.
      Clik here to view.

      Note:  This filter will only process future downloads.  Any definitions that were downloaded prior to creating the filter will NOT be processed into the folder.

      Scanning a Virtual Machine with 2 IPs (NIC)

      Hi All,

       

      I am using an Ivanti (agentless) to scan VMs on a host (vCenter) via machine groups

      2 of 7 VMs are having issues while being scanned as the IP which has no route from our Ivanti server is the one scanned.

      Is it possible for Ivanti to force the scan on a specific NIC/IP?

       

      I tried to include the 2 VMs in the group via adding the required IP, it worked.

      However, im afraid it will not do a snapshot before the patch deployment so I need to add the machines via Hosted virtual machines.

       

      Thanks in advance.

      Image may be NSFW.
      Clik here to view.

      How to I update/patch Adobe Creative Cloud products?

      I know LANDesk cannot patch it natively, but is there a way to patch/update this software?

       

      I have a handful of computers that need it.

      Issue: Gather Historical Information task is failing to run

      Issue

       

      Gather Historical Information crashes the LANDESK Console.

      Gather Historical Information task is failing to run.

       

      Following is in the GatherHistory.Details.Log file in the Managmentsuite\Log folder on the Core Server:

       

      09/18/2014 15:12:18 INFO  13352:SaveTrendInfoForVulnerabilitiesAsync : Critical Exception: System.Data.OleDb.OleDbException (0x80040E31): Query timeout expired   at System.Data.OleDb.OleDbCommand.ExecuteReaderInternal(CommandBehavior behavior, String method)   at System.Data.OleDb.OleDbCommand.ExecuteNonQuery()   at LANDesk.ManagementSuite.Database.Database.ExecuteNonQueryP(String sql, Int32 timeoutSeconds, Object[] parameters)   at LANDesk.ManagementSuite.Database.Database.ExecuteNonQuery(String sql, Int32 timeoutSeconds, ArrayList oleDbParameters)   at LANDesk.ManagementSuite.Database.Database.ExecuteNonQuery(String sql)   at LANDesk.ManagementSuite.PatchBiz.PatchTrend.SaveTrendInfoForVulnerabilities(Int32 removeOldDataDays)   at LANDesk.ManagementSuite.PatchManagement.ProgressForm. € ()   at System.Threading.ExecutionContext.RunInternal(ExecutionContext executionContext, ContextCallback callback, Object state, Boolean preserveSyncCtx)   at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state, Boolean preserveSyncCtx)   at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state)   at System.Threading.ThreadHelper.ThreadStart() Stack Trace:    at System.Data.OleDb.OleDbCommand.ExecuteReaderInternal(CommandBehavior behavior, String method)   at System.Data.OleDb.OleDbCommand.ExecuteNonQuery()   at LANDesk.ManagementSuite.Database.Database.ExecuteNonQueryP(String sql, Int32 timeoutSeconds, Object[] parameters)   at LANDesk.ManagementSuite.Database.Database.ExecuteNonQuery(String sql, Int32 timeoutSeconds, ArrayList oleDbParameters)   at LANDesk.ManagementSuite.Database.Database.ExecuteNonQuery(String sql)   at LANDesk.ManagementSuite.PatchBiz.PatchTrend.SaveTrendInfoForVulnerabilities(Int32 removeOldDataDays)   at LANDesk.ManagementSuite.PatchManagement.ProgressForm. € ()   at System.Threading.ExecutionContext.RunInternal(ExecutionContext executionContext, ContextCallback callback, Object state, Boolean preserveSyncCtx)   at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state, Boolean preserveSyncCtx)   at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state)   at System.Threading.ThreadHelper.ThreadStart()   

       

      Solution

       

      1. Close the Ivanti EPM Console.
      2. Create the "Query Timeout" registry value (without the quotes) as a 32-bit DWORD in the following registry key on the Core Server:

      9.6 or 2016 Core Server:

       

      HKLM\SOFTWARE\LANDesk\ManagementSuite\WinConsole

      Create any registry keys that are missing. Set the value to 10000 decimal.

      Image may be NSFW.
      Clik here to view.

      No MS-Patches for Microsoft Windows 10 Professional Edition - Release:1607

      Maybe you are wondering like me, why some of your 1607 clients do not get any MS-Patches via Ivanti EPM.

       

      Support pointed out to me:

      It is Because Win 10 Pro 1607 is End Of Life by Microsoft and newer patches are no longer offered to it. They need to update to a newer version: 1703, 1709 or 1803 to be offered patches for Pro.

      https://support.microsoft.com/en-us/help/13853/windows-lifecycle-fact-sheet

      Image may be NSFW.
      Clik here to view.
      Viewing all 1121 articles
      Browse latest View live


      <script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>