Quantcast
Channel: Shavlik User Community : Document List - All Communities
Viewing all 1352 articles
Browse latest View live

Availability of patches and Shavlik updated XML files after vendor patch release

$
0
0
Purpose

 

This document contains information about the availability of patches and Shavlik updated XML files after vendor patch release.

 

 

Description

 

While Shavlik aims to release updated assessment and deployment XML files on the same business day that a new security bulletin-related patch is released, we may require up to 24 hours after bulletin release to fully test the patches and release updated XML files. This is to ensure the proper amount of time for testing Protect's ability to scan, deploy and uninstall (where applicable) the latest patches on all affected systems.

 

New XML files can be downloaded by selecting Help > Refresh Files or by simply allowing a patch scan to automatically download them as part of the scanning process.

 

If you would like to be updated when new XML files have been released, please see the following resources:

 

Sign-up for XML announcement emails:

http://www.shavlik.com/support/xmlsubscribe/

 

XML Information page:

http://protect7.shavlik.com/

 

XML Twitter:

https://twitter.com/ShavlikXML

 

 

Affected Products

Patch Day Checklist when using Agents

$
0
0
Purpose

 

This document is meant to provide a checklist that will ensure successful deployment of patches when using agents with the Protect product.

 

Description

 

Checklist for patch day when using agents with Protect

 

 

1) Make sure you are signed up for the XML Announcements list. This gives you up to date information on when XML releases and what new patches have been added into the product. Whenever our data content team releases new patch definitions for Protect you will be sent an email notification.

http://www.shavlik.com/support/xmlsubscribe/

 

You can also see the latest patch defiintion information at these sites:

http://protect7.shavlik.com/category/patch-and-bulletin-information/http://protectessentials.shavlik.com/

https://twitter.com/ShavlikXML

 

2) Once the latest XML is live make sure your Protect console is updated.  Run Tools > Refresh Files.  This will check in with XML.Shavlik.com and update any new XML and Engine files.

 

You can Automate this update by doing the following:

 

In Shavlik Protect 9: Go to Tools > Operations > Downloads. Under 'Schedule automatic downloads' choose Core engines/definitions in the drop down, then click the Add button to the left. You can then set up a schedule for the definitions to automatically download. You may also want to set up the same type of schedule for Threat Engines/Definitions.

 

In Protect 8: Go to Tools > Options > Definitions. Put a check next to 'Periodically download new definitions', and you can set the schedule.

 

3) Download patches you need to push for this patch cycle.

 

This step is required for agents using a distribution server for patch downloads, but is optional for agents set to download from vendor over internet. 

 

The best way to do this is to scan a test group of machines that include all products and platforms that would be found in your production environment.  From that scan result select and download all or selected patches. Another method is to search for the patches you want within View > Patches and download any that you know are required.

 

4) Synchronize your distribution servers. (Not required if your agent policy is set to downlaod via Vendor over Internet.)

 

How to do this:

 

In Protect 9: Go to Tools > Operations > Distribution Servers. Under 'Distribution Servers' highlight the distribution server you wish to synchronize. You must set up a scheduled sync - in the drop-down above the recommended method is to choose 'All engines, definitions, and patch downloads'. Then click on 'Add scheduled sync'. This allows the synchronization to take place on the schedule you set up, and you will now see the synchronization jobs listed under the 'Scheduled automatic synchronization' area. If you wish to run synchronization immediately you can highlight one of the scheduled syncs, then click 'Run now'.

 

In Protect 8: Go to Tools > Distribution Servers > Synchronization tab.  Synch Engines and XML and Download Center. You can also enable automatic synchronization, which would take place at the same time as the schedule set up under Tools > Options > Definitions for the automatic download.

 

5) Update any approved patch listing in the agent policy or patch groups that are being used. If you use these methods to limit what Protect can scan for or deploy you may need to update them accordingly to contain any newly released patches.

 

 

 

Affected Products

 

Shavlik Protect 9.x

vCenter Protect 8.x

How to activate or renew Shavlik Protect console - Licensing

$
0
0

Template

1604_157_49_cache.png

 

 

Purpose


This document outlines the various ways to activate the Protect Console.  These methods are also used when the protect subscription has been renewed and the license needs to be refreshed.

 

 

Access the Licensing Window

 

Help > Enter/Refresh license key

 

1.PNG

 

Shavlik Protect Activation window

2.PNG

 

 

Activate Online

 

Select "Product or Bundle license".

If this is a new license, enter your activation key and select Add.

Choose "Online activation".

Click "Activate online now"

 

If you are refreshing a license, leave the existing key and click "Activate online now"

 

 

Activate Offline

Select "Product or Bundle license".

If this is a new license, enter your activation key and select Add.

If you are refreshing a license, leave the existing key

Choose "Offline activation".

Click "Create Request"

The manual activation request file "LicensInfo.xml will be saved to your desktop.

 

Move the XML file to a computer with Internet access.

Go to: https://license.shavlik.com/OfflineActivation to upload the file, "LicenseInfo.xml".

The license portal will generate a license file for you to download and import

1.PNG

 

 

 

Select "Download Manual License" to download the manual license file and move it to the console computer

Within Shavlik Protect, select Help>Enter/refresh license key.

Import the processed license to the console by selecting  "Import manual license"'.

Click "select file" to browse for the file, ProtectLicense.xml, and click "Open".

Shavlik Protect will process the file and the program will be activated.

 

 

Trial License

 

Choose "Trial Mode" and hit "Create request".

 

Note : if you have a proxy, in order to go through the Shavlik licensing servers you will need to configure the parameters inside the "configure proxy" dialog box.

 

 

 

Affected Product(s)


Shavlik Protect 8.x
Shavlik Protect 9.x

How Credentials work in Protect

$
0
0

1604_157_49_cache.png

 

 

Purpose

 

This document is meant to provide a full overview of how credentials are entered, used, and work within the Shavlik Protect product.

 

 

Description

 

Credential Precedence for Physical Machines and Online Virtual Machines

Initiating actions from the home page, from a machine group, or from a favorite

The home page, machine groups and favorites can be used to initiate actions, patch scans, asset scans, power management, and to execute scripts. When performing these actions, Shavlik Protect will attempt to authenticate to each machine using a variety of credentials and will do so using the following strategy:

  1.   If one or more of the following are available,  the credential with the highest precedence will be used. The precedence order is as follows:  
    1. Machine-level credentials

    2. Group-level credentials

    3. Default credentials

Example: If machine-level credentials are not available but group-level and default credentials are available, the program will use the group-level credentials.

  1.   If the credential used above does not work, then Integrated Windows Authentication (the credentials of the person currently logged on to the program) will be used.

If neither of these credentials work, the scans and the power management tasks will fail.

One suggestion is to make your default credentials the same as the account credentials you typically use to log on to the program. This will eliminate problems that may occur if you forget to assign credentials.

Initiating an agent installation from a machine group

When using a machine group to push install the Shavlik Protect Agent service to connected target machines, the credentials used by the program follows the same strategy as above with one major exception -- integrated credentials will not be used. So the agent installation must be successful using machine-level, group-level, default, or explicitly supplied credentials.

Initiating actions from Machine View or Scan View

When initiating a scan, a patch deployment or a power management action from Machine View or Scan View, the program will attempt to authenticate to the target machines using a variety of credentials and will do so using the following strategy:

  1.   If one or more of the following are available, the Protect console will try to authenticate using the credential with the highest precedence, where the precedence order is as follows:  
    1. Any manually or automatically assigned managed machine credentials (see the To Individual Machines in a Machine Group section in Supply Credentials for Machines (used if the scan credentials are invalid or missing, for example, if an agent performed the scan rather than the console)

  2.   If the credential used above does not work, then Integrated Windows Authentication (the credentials of the person currently logged on to the program) will be used.

Note: Integrated credentials will not work for deployments to offline virtual machines or for rescans.

If neither of these credentials work then the action will fail.

Initiating an agent installation from Machine View or Scan View

When using Machine View or Scan View to push install the Shavlik Protect Agent service to connected target machines, the credentials used by the program follows the same strategy as immediately above with one major exception -- integrated credentials will not be used. So the agent installation must be successful using managed machine credentials, default credentials, or explicitly supplied credentials.

 

Credential Precedence for Offline Hosted Virtual Machines

Initiating actions from the home page, from a machine group, or from a favorite

The home page, machine groups and favorites can be used to initiate patch scans, asset scans, and power management actions and to execute scripts. When performing these actions, Shavlik Protect will attempt to authenticate to each offline hosted virtual machine using the browse credentials.

Initiating actions from Machine View or Scan View

When initiating a scan, a patch deployment or a power management action from Machine View or Scan View, the credentials that will be used to authenticate to an offline virtual machine depends on the power state of the machine when it was initially scanned.

If a machine was originally scanned in offline mode

The program will attempt to authenticate using the browse credentials.

If a machine was originally scanned in online mode

The program will attempt to authenticate using a variety of credentials and will do so using the following strategy:

  1.   Try using any manually or automatically assigned managed machine credentials
  2. If the following are available, try to authenticate using the credential with the highest precedence, where the precedence order is as follows:

    1. The administrator credential from the machine group. If the administrator credential exists but fails, the default credentials will not be tried.

    2. Default Credentials (used if the scan credentials are invalid or missing (for example, if an agent performed the scan rather than the console))

  3.   If the credentials used above do not work, then Integrated Windows Authentication (the credentials of the person currently logged on to the program) will be used.

Note: Integrated credentials will not work for deployments to offline virtual machines or for rescans.

If none of these credentials work then the action will fail.

 

Defining Credentials

The Define Credential dialog can be accessed anywhere a credential is used within the Shavlik Protect interface (for example, from a machine group, from the Credentials Manager, etc.). It is used to specify a new user name and password pair that collectively define one credential. The credential is stored with strong encryption techniques. Only the administrator that creates the credential will be able to decrypt the credential and access it from within the program. If you elect to share the credential, however, it will be made available to other administrators as well as to Shavlik Protect service components.

 

Note: Credentials may be automatically defined for you during a product upgrade or when importing a machine group. Any credentials that are found during these processes are preserved and will be assigned friendly names according to their usage. The term Discovery filter is the friendly name assigned by the program to a machine group credential that it identifies during an upgrade or import process. Feel free to change the name to something that more closely reflects the usage of the credential in your organization.

 

define_cred.jpg

 

Name this credential so it can be used elsewhere

Provide a friendly name for this credential that describes exactly where it should be used.

User name

Type a user name that has access to the machine(s). When specifying the user name:

  • If you need to specify a domain as part of the credentials be sure to include the domain name as part of the user name. For example, if you enter User@<Domain>, <Domain>\User, or a fully qualified user name, Shavlik Protect will use the domain account rights. 
  • If you enter <Target Machine>\User, Shavlik Protect will use the target's local account rights.

  • If you do not include a domain or machine as part of the user name, the name will be qualified to the target machine (<targetmachinename>\User).

  • Microsoft Windows .alias name formats (for example: '.\username') are supported by Shavlik Protect.

Password

Type the password for the user.

Verify password

Retype the password to verify you specified it correctly.

Share this with background tasks, agents, and other features

If enabled, this credential will be available to all Shavlik Protect administrators and can be used to specify credentials for service components within the program. The service components within Shavlik Protect that require a shared credential include the following:

  • Proxy service
  • Email service

  • Agent internet proxy

  • Distribution servers

  • TrustedHost list access when running remote scripts

Why is it necessary to share a credential? Credentials are encrypted, so you must share a credential so that the service components can decrypt and access it when needed.

Example: If you select Tools > Options > Proxy and attempt to assign Service credentials, only shared credentials are available for selection. The service must have a copy of the credential in order to decrypt it.

Note: It is recommended that you create a service account to perform these service functions rather than using a domain administrator account. See Potential Security Implications When Sharing Credentials for more information.

 

Supplying Scan Credentials for Target Machines

Note: Browse credentials are slightly different from the scan credentials described in this section. Browse credentials are used by servers, domains, and organizational units to enumerate machines but do not actually authenticate to the individual machines.

 

This section provides information on how to define new scan credentials and how to assign the credentials to target machines. Credentials consist of a user name and password pair used to authenticate the program to specified target machines. One credential can be associated with any number of operations or entities. The credentials are stored with strong encryption techniques and are not available to anyone except the user who provided them.

 

The scan credentials you supply will be used to access remote machines, perform any scans, and push any necessary files. The supplied credentials will NOT be used to:

  •   Authenticate to the local (console) machine

Rather, the program uses the credentials of the currently logged on user to authenticate to resources on the local machine. Therefore, in order to perform tasks on the local machine, make sure you log on using an account that has administrator and local machine access rights.

  •   Perform a patch deployment

The machine credentials that you supply are used to provide access to the remote machine and to push the necessary patch deployment files. The actual deployment, however, will be run under the remote machine's Local System account.

You use a machine group to initially assign scan credentials to target machines. You can assign credentials to individual machines, to all machines in a machine group, or both. After a machine has been scanned and is contained in Shavlik Protect 's database of managed machines, you can use the Machine Properties dialog to assign different credentials if desired.

 

Important! If there are two or more administrators using Shavlik Protect, each administrator should provide their own machine credentials.

Assigning Credentials to Individual Machines in a Machine Group

To assign credentials to one or more machines in a machine group, in the bottom pane select the machines and then select Credentials > Set Admin Credentials.

assigning_creds1.jpg

On the Assign Credentials dialog, select from the list of available credentials or click New to define new credentials.

assigning_creds2.jpg

When credentials are applied to the selected machines, the icon in the Admin Credentials column will become active. In addition, the name of the assigned credential is displayed next to the icon.

assign_creds_tiny.jpg

Assigning Credentials to All Machines in a Machine Group

To assign credentials to all machines in a machine group, in the top pane select Credentials > Set Credentials.

assigning_creds3.jpg

On the Assign Credentials dialog, select from the list of available credentials or click New to define new credentials.

assigning_creds2.jpg

When credentials are assigned the icon will contain a check mark:

assign_creds_tiny.jpg

In addition, the button name will change to the name of the assigned credential.

Assigning Credentials to Virtual Machines

There are several different tabs that can be used to add virtual machines to a machine group. The credentials that will be used to scan and/or deploy patches to these machines depends on how the machines are defined to the group and on the current power state of each machine.

  • Hosted Virtual Machines tab: Used to add virtual machines that are hosted by a server. The credentials used to scan each machine depends on the current power state of the machine. 
    • A hosted virtual machine that is offline at the time of a scan will be accessed using the server's browse credentials. Any individual credentials supplied for the machine are ignored.

assigning_creds4.jpg

    • A hosted virtual machine that is online at the time of a scan will be accessed using scan credentials for that machine. See Assigning Credentials to Individual Machines in a Machine Group, above.

    assigning_creds5.jpg

    • Workstation Virtual Machines tab: Used to add offline virtual machines that reside on individual workstations. You should assign individual machine credentials for each virtual machine defined using this tab. If appropriate, credentials can also be assigned at the machine group level. The credentials are used during the mounting process and provide permission for Shavlik Protect to access the virtual machine files on the workstation. See Assigning Credentials to Individual Machines in a Machine Group, above. 
    • Machine Name tab, Domain Name tab, or IP Address/Range tab: Used to add virtual machines that reside on individual workstations and that are online at the time of a scan. See Assigning Credentials to Individual Machines in a Machine Group, above.

    Assigning New Credentials to Machines After They Have Been Scanned

    After one or more machines have been scanned and are contained in Shavlik Protect 's database of managed machines, you can use the Machine Properties dialog to assign different credentials or to remove credentials.

     

    There may be several reasons for providing different credentials to machines after a scan has been performed. If you have multiple administrators in your organization and each is responsible for a different domain, they will need to set their own credentials before performing an action. Or, your organization's policy may be to separate scan (assessment) duties from deployment duties, in which case different credentials are probably required.

    assigning_creds6.jpg

     

    Managing Credentials

    Important! If there are two or more administrators using Shavlik Protect, each administrator should provide their own machine credentials.

    The Credentials Manager is used to manage all credentials used within the program. It is also used to set the default credential for the program.

    Although you can supply new credentials from several different areas of the program, all of the credentials can be edited and deleted from this single location. This greatly simplifies the credentials management process. For example, if a password that is used to authenticate a specific group of machines changes, you simply use the Credentials Manager to update the associated credential. All items assigned to that credential are automatically updated with the new password.

     

    To manage the credentials used by the program, select Manage > Credentials.

    manage_creds1.jpg

     

    Add

    Enables you to add a new credential.

    Edit

       Enables you to modify the selected credential.

    Delete

    Deletes the selected credential. You can delete multiple credentials at the same time.

    When you delete a credential the following occurs:

    • The credential itself is deleted 
    • All usages of the credential throughout the program are deleted

    • If it is a shared credential, the shared credential and all its usages are deleted

    Caution! Any items using the deleted credential will no longer be assigned a credential. Before you delete a credential you should browse your machine groups to verify the credential is not being used.

    Merge

    Tip: This credential cleanup tool will typically be used immediately following an upgrade from an earlier version of Shavlik Protect that does not contain the Credentials Manager.

    Enables you to merge one or more credentials that contain the same user name and password with another credential entry that also contains the same user name and password. Or you can merge several different credentials into one new credential that is effective in all situations. By eliminating duplicate and unneeded credentials you reduce confusion and lessen the chance for human error.

    1. On the Credentials Manager dialog select the credential(s) you want to merge with another credential. 
    2. Click Merge.

    The Merge Credentials dialog is displayed. For example:

    manage_creds2.jpg

    1. At the bottom of the dialog do one of the following:
    • Select an existing credential: The credential(s) specified in the Confirm credentials to merge list will be merged with the credential you select here. 
    • Create a new credential: The credential(s) specified in the Confirm credentials to merge list will be merged with the new credential you create here.

    Note: A shared credential can only be merged with another shared credential. Therefore, if any of the credentials in the Confirm credentials to merge list are shared, then (1) only shared credentials will be offered for selection in the Existing box, and (2) any new credential you create will automatically be defined as a shared credential.

    1. Click Merge
    2. Read the message on the confirmation dialog and if you agree with the merger, click Merge.

    View usages

    Enables you to see how and where the selected credentials are being used in the program. Only those credentials that are currently being used in the program will be displayed in the Credential Usages dialog. A credential may be listed multiple times if it is used in different areas of the program.

    manage_creds3.jpg

    You can right-click on any list item and perform a number of different actions.

    • Assign different credential: Enables you to assign a different credential to the selected item(s). You can assign a different credential to multiple items at once but only if they all have the same Shared Usage value (Yes or No). 
    • Expand all: Expands all lists.

    • Collapse all: Collapses all lists.

    • Export selected credential usages to CSV: Export information about the selected items to a Comma Separated Values (CSV) file. The CSV file can then be used within a spreadsheet program.

    Set as default

    Assigns the selected credential as the default credential. The program will use the default credential if other credentials are missing or invalid.

    Clear default

    Removes the default credential assignment.

    User Name

    Displays the user name portion of each credential. 

    Name

    Displays the unique name assigned to each credential.

    Shared

    Displays whether the credentials are shared credentials. The information in this column is directly related to the Share this with background tasks, Agents, and other features check box on the Define Credential dialog.

     

     

    Managing Individual Machine Properties (Explicitly supplied credentials)

    You can set explicit credentials for machines via View > Machines > Right Click a machine > Machine Properties.

     

    Manage_Machine_Properties.jpg

    Credential: Specifies the credential used when authenticating Shavlik Protect to the machine. The credential you supply here will override credentials specified in other areas of the program. If you select None you effectively remove the credential currently assigned to the machine.

     

    There may be several reasons for providing different credentials to a machine after a scan has been performed. If you have multiple administrators in your organization and each is responsible for a different domain, they will need to set their own credentials before performing an action. Or, your organization's policy may be to separate scan (assessment) duties from deployment duties, in which case different credentials are probably required.

     

    How Shavlik Protect Manages Multiple Administrators

    Shavlik Protect contains a number of built-in checks to guard against simultaneous and conflicting commands from different administrators. For example:

    • The program will not allow duplicate group names or template names 
    • The program will not allow simultaneous updates to any groups, templates, distribution servers, or agent policies by different administrators. If this situation should occur the second administrator will receive a warning message similar to the following:

    another_user.jpg

    • Only one console will be authorized to use the Database Maintenance tool. If an administrator at another console wants to perform maintenance on the database, that administrator must take ownership of that task before the program will allow the administrator to continue.
      • Note: The 'Take Ownership' button is only displayed if you have two or more consoles that share one database. If your organization uses multiple Shavlik Protect consoles that share the same database, only one console will be authorized to use the Database Maintenance tool. If an administrator at another console wants to perform maintenance on the database, that administrator must take ownership of the task before the program will allow the administrator to continue. Any existing maintenance tasks will be allowed to complete before ownership is transferred to another administrator.

     

    Best Practices When Using Multiple Administrators

    Recommendations

    • You should upgrade your hardware platform by increasing the number of processors and the amount of installed memory on the console machine. This will increase performance in those instances when two or more administrators are logged on at the same time and performing tasks. 
      • Minimum suggested hardware requirements for two administrators: 2 processor cores and 4 GB RAM

      • For each additional administrator, add 1 processor core and 1 GB RAM

      • For a high performance system, use 16 processor cores and 32 GB RAM

    • When two administrators log on to the same console they must use different accounts. The same account can be used only when logging on to different consoles.

    • If you edit a group that is typically used by another administrator you should notify that person about the change.

    • Each administrator should create their own credentials and assign them to machines.

    • Each administrator should define default credentials that are the same as their logon credentials. This will eliminate problems that may occur if the administrator forgets to assign machine credentials.

     

     

     

    Potential Issues When Using Multiple Administrators

    Usage Issues

    You must take a few common sense precautions when using multiple administrators.  Even though Shavlik Protect contains a number of built-in safety checks, it cannot guard against all possibilities. The program may act in unpredictable ways if the following occur:

    •   If two administrators try to scan the same machine group or ESXi Hypervisor at the same time.

    The machines will be scanned twice, causing potential performance issues. In addition, there may be administrative rights errors due to the multiple connections.

    •   If two or more administrators try to deploy patches or bulletins to the same machine at the same time.

    The most likely result is that one deployment task will succeed and the other will fail. But because the deployment that succeeds will likely perform a restart of the target machines, the machines may be in an unknown state when the other deployment fails.

    Credential Issue

    When you create credentials and assign them to machines, those credentials belong to your administrator account. If a different administrator (Administrator B) logs on and uses Shavlik Protect, they will not have access to the machine credentials you provided. The second administrator must provide their own machine credentials.

    One of the ways this can be confusing is if Administrator B fails to provide their own machine credentials and tries to schedule a patch deployment from a scan that was performed by Administrator A. The deployment can be successfully scheduled if default credentials are available, but the actual patch deployment will likely fail because the patch deployment requires machine credentials -- credentials that were provided by Administrator A but that are not available to Administrator B.

    Recommendations:

    • Each administrator should create their own credentials and assign them to machines 
    • Each administrator should define default credentials that are the same as their logon credentials. This will eliminate some of the problems that may occur if the administrator forgets to assign machine credentials.

    Virtual Inventory Consideration

    Unlike machine groups (which can be viewed by all administrators), vCenter Servers and ESXi Hypervisors can only be viewed by the administrator that added them to Shavlik Protect. If two different administrators want to manage the same vCenter Server or ESXi Hypervisors, both administrators must add the item to the Virtual Inventory list.

     

     

     

    Additional Information

     

    More information concerning credentials usage in Protect and possible known issues can be found in the following community documents:

     

    Shavlik Protect Encryption Q&A

    How-To troubleshoot Error 5 - Access is denied

    Change Machine Credentials on Multiple Machines at Once

    Account Lockout - Scheduler Service using Credentials

     

     

    Affected Product(s)

     

    Shavlik Protect 9.x

    vCenter Protect 8.x

    Patches that will not be supported in Protect from 1/14/14 Patch Tuesday

    $
    0
    0
    Purpose

     

    This document is meant to provide information about specific patches that cannot be supported for patching within the Protect application.

     

     

    Description

     

    The following patches from the January 14, 2014 Patch Tuesday will not be supported within Protect:

     

    MS14-004 - DynamicsAX

    Reason: The patch cannot be automated in Protect.

     

    MS14-001, KB2863901 only

    Reason: This is a custom Microsoft patch for a specific customers which we cannot support.

     

     

    Additional Information

     

    You can find additional information for these patches at the corresponding Microsoft articles:

     

    MS14-004

    http://technet.microsoft.com/en-us/security/bulletin/ms14-004http://support.microsoft.com/kb/2880826

     

    MS14-001

    http://technet.microsoft.com/en-us/security/bulletin/MS14-001

     

     

    Affected Products

     

    Shavlik Protect 9.x

    vCenter Protect 8.x

    Shavlik SDK, All Versions

    Shavlik Rebrands

    Security Update Patch MS14-004 (KB 2880826): Cannot be Supported by Shavlik Protect

    $
    0
    0

    1604_157_49_cache.png

     

    Purpose

     

    This document explains why Microsoft Security Bulletin MS14-004 cannot be supported by Shavlik Protect.

     

    Description

     

    Patch bulletin MS14-004 (http://technet.microsoft.com/en-us/security/bulletin/ms14-004) references a security update for Microsoft Dynamics® AX that resolves a security vulnerability in the software. Some administrators may wonder why MS14-004 cannot be found under patches in Shavlik Protect. Restrictions on this security update from Microsoft does not allow for it to be distributed through Shavlik Protect or any other standard means.

     

    According to Microsoft's official bulletin article:

    "Due to the servicing model for Microsoft Dynamics AX updates, Microsoft is releasing these updates to the Microsoft Download Center, Microsoft Dynamics CustomerSource, and Microsoft Dynamics PartnerSource only."

    From <http://technet.microsoft.com/en-us/security/bulletin/ms14-004>

     

    For this reason, Shavlik Protect is unable to provide this security update to customers for patching. For those with affected software (see next section of article), the security update referenced in this bulletin as noted above is only available through Microsoft Download Center, Microsoft Dynamics CustomerSource, and Microsoft Dynamics PartnerSource.

     

     

    Affected Software

     

    This security update is applicable to the following software versions:

     

    Software

    Maximum Security Impact

    Aggregate Severity Rating

    Updates Replaced

    Microsoft Dynamics AX 4.0

     

     

     

    Microsoft Dynamics AX 4.0 Service Pack 2[1]

    (2920510)

    Denial of Service

    Important

    None

    Microsoft Dynamics AX 2009

     

     

     

    Microsoft Dynamics AX 2009 Service Pack 1[1]

    (2914058)

    Denial of Service

    Important

    None

    Microsoft Dynamics AX 2012 and Microsoft Dynamics AX 2012 R2

     

     

     

    Microsoft Dynamics AX 2012[1]

    (2914055)

    Denial of Service

    Important

    None

    Microsoft Dynamics AX 2012 R2[1]

     

     

     

     

    From <http://technet.microsoft.com/en-us/security/bulletin/ms14-004>

     

     

    Additional Information

     

    Microsoft KB Article for Security Bulletin MS14-004

     

    Affected Product(s)

     

    Shavlik Protect 9.x
    vCenter Protect 8.x

    Deploying 32-bit Java updates to 64-bit operating systems fails when using SCUPdates

    $
    0
    0
    Symptoms

     

    When deploying 32-bit Java updates to 64-bit operating systems when using SCUPdates, the update fails.

     

     

    Cause

     

    This issue is caused by a Java install bug. The installer reads information for deployment on Windows operating systems in the 64-bit region of the registry, rather than the 32-bit region, which causes the failure.

     

     

    Resolution

     

    Currently, there is no workaround or resolution available for this issue. Once a workaround or a resolution is available, this article will be updated.

     

    Technical support has submitted a bug report to Sun/Oracle. For more information, see Oracle bug 6995830.

     

    Update 1/16/14 - Shavlik will soon be releasing a new plugin for SCCM called Shavlik Patch for SCCM which should help to resolve Java installation issues. The plugin allows Shavlik to utilize the same mechanisms that the Shavlik Protect program uses to workaround the Java bug.

     

     

    Additional Information

     

    To be alerted when this article is updated, click Subscribe to Document in the Actions box.

     

    We have implemented a workaround solution with our Shavlik Protect product. Unfortunately, SCCM does not have the advanced commands for patch deployment which are necessary for this solution to be used along with a publicly available download of Java patches. For SCUPdates, we are looking for ways around this problem, but for the time being will need to continue waiting for Oracle to fix the installer issue.

     

    We submitted a bug over two years ago to Sun/Oracle stating the issue and the necessary fix. Oracle has a voting system from their consumers to decide on which non-security bugs will be fixed with each update.

     

     

    Affected Products

     

    Shavlik SCUPdates

     

    Supersedence / Patch Replacement Information for SCUPdates content and Expiring Patches in SCUP

    $
    0
    0
    Purpose

     

    This document covers information about patch supersedence or replacement and how to expire patches via SCUP when using the Shavlik SCUPdates content.

     

     

    Description

     

    Patch Supersedence or Replacement information

     

    The first thing to note is that SCUPdates content does not include any built-in detection for patch supersedence or patch replacement. There is currenlty no information provided within the SCUPdates concerning patch supersedence or replacement.

     

    How to handle patch supersedence/replacement with SCUPdates content:

     

    Since there is no supersedence information provided within the SCUPdates content, you can still use these methods to find out if patches are superseded:

     

    1) For most 3rd party updates such as Adobe and Java you can assume that the newest update replaces all others of that version. In the example screenshot you will see that the latest version of Adobe Flash Player for Internet Explorer is 11.8.800.175. Therefore any previous/older Adobe Flash for Internet Explorer updates would be superseded by this patch. Using the "Date Modified" column in SCUP will help determine the newest patch available.

     

    2) To make certain if a patch replaces others you can always go to the vendor's website for more information. In SCUPdates content under the patch Summary there is generally a link provided to the vendor's webpage concerning the patch release. This can be helpful in determining patch supersedence as well as other information.

     

     

    Expiring Superseded/Replaced Patches in SCUP

     

    The Shavlik content team did not focus on including built in supersedence detection so that it's left up to administrators to expire patches when they wish to. You can use the "Expire" feature within SCUP if you determine that you no longer want old, superseded, or unwanted patches being detected.

     

    *Important notes*: When you expire an update within SCUP it is a permanent change, and it may take some time for the change to synchronize with WSUS/SCCM.

     

    How to expire patches in SCUP:

     

    1) You will need to locate the patch(es) you wish to expire. In the example below you can see that we have Adobe Flash for IE version 11.8.800.174 highlighted. This patch is superseded (replaced) by the latest Adobe Flash for IE update - version 11.8.800.175. Since it is superseded we are going to expire Adobe Flash for IE version 11.8.800.174.

     

    In this image you can also see where more information is available in the patch summary.

    Capture1.JPG

     

    2) Highlight any patches you wish to expire. You can select multiple items with the CTRL+ features in Windows. Right click on the highlighted item(s) and choose 'Expire'.

    Untitled.jpg

     

    3) You will be asked if you're certain you want to expire the updates since the change is permanent. Click yes.

    Capture2.JPG

     

    4) You will now see that the Expired column shows 'Yes'.

    Capture3.JPG

     

     

     

    Additional Information

     

    You can find more information about using the latest version of System Center Updates Publisher (SCUP) here:

    http://technet.microsoft.com/en-us/library/hh134742.aspx

     

     

     

    Affected Products

     

    Shavlik SCUPdates


    Publishing an update in SCUP using data from SCUPdates fails with the error: Hash (or Digest) verification failed on content for update

    $
    0
    0
    Symptoms

     

    • Cannot publish an update in SCUP using data SCUPdates content
    • Publishing  an update in SCUP using data from SCUPdates fails 
    • You see the error:

      Hash verification failed on content for update

          

           or

     

           Digest Verification failed

     

    • In the AutoPublish.log you see messages such as:
      • Error: the downloaded update for 'xxx' does not match the expected digest. The vendor may have replaced the download with a newer update.
      • Error downloading and/or verifying installers

     

    Cause

     

    This issue occurs because the update contains a static URL for the vendor file.

     

     

    The SCUP editor stores the hash value of the downloaded file. When an older version of the update is published using the URL, the hash value does not match the newer file.

     

     

    Resolution

     

    To resolve this issue ensure you are using the latest data, and do not attempt to publish outdated updates.

      

     

    Affected Products

     

    Shavlik SCUPdates

    Shavlik Patch for SCCM

    Power Management and Wake-on-LAN (WoL) Requirements

    $
    0
    0

    CommunityTemplate

    1604_157_49_cache.png

     

     

    Purpose

     

    Environmental and setup prerequisites for Power Management and Wake-on-Lan functionality

     

    Description

    Power Management Requirements

    Before performing a power management task, please confirm that you meet the following requirements.

     

    General Requirements

    • Power management tasks performed from machine groups will be successful on physical machines and online virtual machines, but not on offline virtual machines

     

    • A power management license key is required for all power tasks

     

    • An asset management license key is also required for Wake-on-LAN tasks

     

    • In order for power state changes to be made to a target machine, a user must be logged on to the machine or the local security policy Interactive logon: Do not require

     

    • CTRL+ALT+DEL must be disabled.

     

    • The proper credentials must be available:
      • When initiating a power management action from Machine View or Scan View, the program will attempt to authenticate to the target machines using the credentials used in the most recent patch scan. If those credentials are invalid or missing (for example, if an agent performed the scan rather than the console) the program will attempt to authenticate to the machines using the default credentials. If the default credentials do not work the program will attempt to authenticate using the account credentials of the person currently logged on to the program. If those credentials do not work, the power management task will fail.

     

      • When initiating a power management action from a machine group or a favorite, the program will attempt to authenticate to the machines using the credentials defined in the machine group. If those credentials are invalid or missing, the program will attempt to authenticate to machines using the default credentials. If the default credentials do not work, the program will attempt to authenticate using the account credentials of the person currently logged on to the program. If those credentials do not work , the power management task will fail.

     

    Sleep and Hibernate Requirements

    In order to put a machine in or take a machine out of a sleep or hibernate state, its operating system must be configured to allow the operation.

     

    Wake-on-LAN (WoL) Requirements

     

    Hardware Requirements:

     

    • WoL tasks must be performed on physical machines, not on virtual machines
    • WoL must be enabled in the BIOS of the target machines. See your hardware vendor's product documentation for details.
    • Target machines must have either a wired or a wireless Network Interface Card (NIC) that supports WoL. See your hardware vendor's product documentation for details.
    • Target machines can be in sleep, hibernate, or powered off states.
    • Network cards on the target machines must have power available (either electric or battery).
    • Any intervening routers may need to be configured to forward subnet-directed broadcasts. See your hardware vendor's product documentation for details on configuring your routers.
    • Whether you need to configure your routers depends on where your target machines are located. If all the target machines are located on the same subnet as the console, your routers do not need to be reconfigured. If some of your target machines are behind one or more routers and thus on different subnets, the intervening routers must be configured to forward subnet-directed broadcasts on UDP port 9.

     

    Software Requirements

    • A hardware asset scan of each target machine must be performed prior to initiating a WoL request. The scan is needed in order to obtain the MAC address of each target machine. When configuring the hardware asset scan, make sure the Network option is selected.
    • Each target machine's operating system must be configured to allow WoL.
    • Outbound UDP port 9 must be open on the console machine.

     

    Power Status Scan Requirements

    A power status scan can be performed on physical machines, online virtual machines, and offline virtual machines.

     

     

    Additional Information

    A 3rd party freeware application can be used to verify that the target workstation is setup properly to receive Magic Packets. This is explained in the following document: Wake-on-Lan Magic Packet Test http://community.shavlik.com/docs/DOC-23187

     

    Affected Product(s)

    Protect 9.X

    Protect 8.X

    Troubleshooting issues when adding machines via Machine Group > Organizational Unit > Browse Active Directory

    $
    0
    0
    Symptoms

     

    When attempting to add machines to a machine group in Protect via the Organizational Unit tab when clicking 'Browse Active Directory' you experience any of the followng:

     

    -You see the message "The list of servers for this workgroup are currently unavailable".

    -The OU list is missing machines that you expect to show up.

     

    Cause

     

    For any number of reasons the Protect application is unable to either connect to or browse active directory.

     

     

    Resolution

     

    Here are troubleshooting steps that should help:

     

    1) Check that the "Browse Credentials" are set correctly and have access to active directory.

     

     

    2) Make sure NetBIOS is enabled.

    - Go into Computer Management > Device Manager.

    - Click View > Show hidden devices.

    - Under Non-Plug and Play Drivers locate NETBT.

    - Right click on NETBT and go to Properties.

    - Ensure the General tab lists this device as working properly.

    - Ensure the Driver tab lists this device with a current status of Started.

     

     

    3) On your Protect console system, open command prompt, and run NBTSTAT -R

    This command purges the contents of the NetBIOS name cache and then reloads the #PRE-tagged entries from the Lmhosts file. The #Pre section is where domain controllers may be listed.  For more information on nbtstat commands see this Microsoft Technet article: http://technet.microsoft.com/en-us/library/bb490938.aspx

     

     

    4) If you are having problems enumerating Organizational Units across domains, ensure that the Protect console has access to a DNS server that provides lookups to all involved domains.

     

    You can edit the host file (C:\WINDOWS\system32\drivers\etc)

    Add an entry for:

    [Net Bios Name of Domain Controller] [IP Address]

    or

    [DomainName] [IP Address of primary DC]

     

     

    5) Enable the Computer Browser service. The computer browser service is disabled by default on Server 2008 R2, but it should start without error.

     

    See this document: http://community.shavlik.com/docs/DOC-22966

     

    -Is there an error in the event log? This can help narrow down what is going wrong.

     

    -The computer browser service will automatically stop if your registry settings are not configured to maintain the browse list. To verify your settings do the following:

     

    -Go to Start> Run

    -Type regedit

    -Press enter

    -Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Browser\Parameters

    -The MaintainServerList value should be set to Yes or Auto. If this Value is No then the computer browser service will not start.

     

     

    6) Check to make sure netbios ports are open. (139 & 445)

     

     

    7) A couple other things that may help troubleshoot:

     

    -Check if the "Browse Network" button in the Machine Group configuration dialog on the Machine Name tab functions as expected.

     

    -Make sure you can browse your network (Network Places) using Windows Explorer.

     

     

    Additional Information

     

    The following Microsoft articles may also prove helpful:

     

    Troubleshooting Active Directory (2003):

    http://technet.microsoft.com/en-us/library/cc776795(v=ws.10).aspxhttp://technet.microsoft.com/en-us/library/cc737561(v=WS.10).aspx

     

    Troubleshooting Active Directory Domains & Trusts (2008 R2):

    http://technet.microsoft.com/en-us/library/cc770264.aspx#BKMK_1

     

     

    Affected Products

     

    Shavlik Protect 9.x

    vCenter Protect 8.x

    Does Protect's Anti Virus and Active Protection scan for "..." Virus?

    $
    0
    0

    Template

    1604_157_49_cache.png

     

     

    Purpose


    This document explains how to tell if Protect is scanning for a specific Virus?

     

     

    Solution

     

    The Shavlik Protect Threat Protection engine is based on the Vipre SDK engine, and uses threat definitions created by GFI's ThreatTrack Security (formerly Sunbelt Software). You can do browse for or search for specific viruses on the following website.

     

    http://sunbeltsecurity.com/BrowseCategories.aspx

     

    Affected Product(s)


    Shavlik Protect 8.x
    Shavlik Protect 9.x

    Manually Configuring a Remote SQL Server to Accept Machine Account Credentials

    $
    0
    0

    1604_157_49_cache.png

     

     

     

    Purpose

     

    How to manually configure a remote SQL Server to accept machine account credentials

     

     

    Description

    Manually Configuring a Remote SQL Server to Accept Machine Account Credentials

    Note: The manual process described here is required only if the automated account creation process failed during product installation.

    If you are using Integrated Windows Authentication to access a remote SQL Server, in order for Shavlik Protect to interact properly with the server you must configure the server to accept machine account credentials. The best time to do this is immediately after you have installed Shavlik Protect but before you actually start the program. You can, however, perform these steps after starting the program. Any scans you initiate prior to this that require interaction with a remote SQL Server database will probably fail.

    This section describes how to configure a remote SQL Server to accept Windows authentication (machine account) credentials from the Shavlik Protect console. For security purposes, Shavlik recommends using Windows authentication where possible. Microsoft SQL Server Management Studio is used as the editor in the following examples but you can use a different tool if you prefer.

    1. The Shavlik Protect console and SQL Server must be joined to the same domain or reside in different domains that have a trusted relationship.

    This is so the console and the server can compare credentials and establish a secure connection.

    1. On SQL Server, create a new login account for Shavlik Protect to use.

    You must have securityadmin privileges in order to create an account.To do this: Within the Security node, right-click Logins and select New Login. Type the login name using a SAM-compatible format (domain\machine name). The machine account is your console's machine name and must contain a trailing $.Note: Do not use the Search option. You must manually type the name because it is a special name.Make sure you choose Windows Authentication and that the Default database box specifies the Shavlik Protect database. For example:

    1. For your Shavlik Protect database, create a new user login using the console machine account.

    Right-click the Users folder, select New User, browse to find the Login name, and then paste the name in the User name box. Assign the user the db_datareader,db_datawriter, STCatalogUpdate, and STExec roles. For example:

    1. Start Shavlik Protect.
    2. Perform any troubleshooting as necessary.
    • You can use the SQL Server activity monitor to determine if connection attempts are successful when performing a patch scan.
    • If you ran Shavlik Protect before creating the SQL Server user account, some services may fail to connect to SQL Server. You should select Control Panel > Administrative Tools > Services and try restarting the services.
    • If the connection attempts are failing you can view the messages in the SQL Server logs to determine why the failures are occurring.

     

    Additional Information

    Allowing Other Users Access to the Program

    Note: This section also applies if you are using the role-based administration feature.

    If you wish to allow other users access to the program, you may need to configure SQL Server so that those users have the necessary database permissions. Specifically, when using Windows integrated authentication, users without administrative rights on the database machine must be granted read and write permission to all tables and views. They must also be granted execute permission to all stored procedures in the Shavlik Protect application database. They may not otherwise be able to start Shavlik Protect.

    One way to grant these permissions is to assign your users the db_owner role. For security reasons, however, this may not be the best solution. A safer alternative is to grant execute permission at the database level. You do this by assigning the users in question to the STExec role.

    For an explanation of the permissions specified above, reference Protect SQL Account Configuration for least privilege requirements http://community.shavlik.com/docs/DOC-1463

     

    Affected Product(s)

    Protect 9.X

    Protect 8.X

    How to Cancel / Delete Scheduled Tasks

    $
    0
    0

    1604_157_49_cache.png

     

                     

    Purpose


    This document outlines how to cancel a scheduled task.

     

                     

    Steps


    In Protect choose Manage> Scheduled Tasks.

     

    1-scheduled tasks.png

     

     

    For Deployments

    Select the target machine in the tree on the left. Deployments are scheduled on the target machine.

    For Scans

    Select the Console machine in the tree on the left. All agent-less scans are stored in the Console's scheduler. This means that even if you are scanning a different target machine, you still select the Console machine from the tree.

     

    2-select console.png

     

    When the intended machine has been selected, the Scheduled Jobs should automatically populate in the list on the right.

     

    3-scheduled job.png

     

    Right click the desired job, and choose Delete.

     

    4-delete.png

     

    When prompted to confirm, choose Delete.

     

    5-delete prompt.png

     

    After the job is deleted the Scheduler for the selected machine should refresh, and the scheduled task should no longer be displayed.

     

    6-no jobs.png

     

     

                     

    Affected Product(s)


    Shavlik Protect 9.x
    vCenter Prtoect 8.x

     

     

    How to Schedule Patch Scans

    $
    0
    0

    Template

    1604_157_49_cache.png

     

                     

    Purpose


    This document outlines how to schedule a patch scan to take place at a future date/time.

     

                     

    Once vs. Recurring     


    A scan can be scheduled to run a single time at a specified date/time. Alternatively the scan may be scheduled to run at the same time on different days, or on a desginated day each month; these scheduled scans occur until removed from the scheduler.

    Related Document: How to Cancel / Delete Scheduled Tasks

    Once

    Scheduling a scan using the 'Once' option will cause a scan to be run a single time at the designated date/time.

     

    Example: The image shows a scheduled scan that will begin on February 1, 2014 at 6:00 PM. Because this is a 'Once' type scan, it will not occur again.

     

    1-once.png

     

     

    Recurring - Daily

    Scheduling a scan to be 'Recurring Daily' will cause the scan to be run at the designated time on the specified days. To stop the jobs from continuing to run, the scheduled task must be deleted.

    Example
    : The image shows a scheduled scan that will occur Weekdays (Monday, Tuesday, Wednesday, Thursday, Friday) at 6:00 PM. Because this is recurring, this will happen every week at the same time on the same days.

     

     

    2-recurring daily.png

    Recurring - Monthly

    Scheduling a scan to be 'Recurring Monthly' will cause the scan to be run at the designated time on the specified day each month. To stop the jobs from continuing to run, the scheduled task must be deleted.

    Day of Month to Run

    Example: The image shows a scheduled scan that will occur the 21st day of every month at 6:00 PM. Because this is recurring, this will happen every month on the 21st at the same time.

     

    3-monthly days.png

    The First, Second, Third, Fourth, Last Occurance of Day

     

    Example: The image shows a scheduled scan that will occur the SecondTuesday each month at 6:00 PM. Because this is recurring, this will happen every month on the 2nd Tuesday at the same time.

     

    4-monthly second tuesday.png

     

     

     

                     

    Scan Settings


    When scheduling a scan there are 4 options to define.

    1. Name this operation (optional):
      • This will be displayed in the scheduled task manager, scan results, and logging.
    2. Select/confirm targets:
      • Define the machine groups that will be part of the scheduled scan by adding checkmarks to them.
    3. Select schedule:
      • Select the scheduling options. More information on this in beggining of this document.
    4. Select/confirm operation:
      • Identify the scan template to be utilized.
    5. After setting up the the scan to use the template desired, the machines needing to be scanned, and the frequency of the scan to occur, click the Schedule button.

    7-scan options.png

     

    If the job is scheduled successfully you will see a toast popup indicating such.

     

    6-toast.png

                     

    Method 1 - From Home Screen


    Within Protect, click the Home button in the upper left corner of the GUI. The Home screen will display options to setup a scheduled scan.

     

    Note: One or more groups may be selected to have the scheduled job ran against them.

     

    5-home screen.png

     

     

     

     

                     

    Method 2 - From Machine Group


    Within Protect, in the navigation panel on the left of the interface, select to view Machine Groups.

     

    1-view machine group.png

     

    Click on the intended Machine Group.

     

    2-select machine.png

     

    Within the Machine Group editing window, choose Run Operation.

     

    3-run op.png

     

    The Run Operation screen will display options to setup a scheduled scan.

     

    4-run operation window.png

     

     

                     

    Method 3 - From Machine View


    In Protect choose View> Machines.

     

    1-view machines.png

     

    In Machine View, select the Machine(s) to schedule the scan against.
    Right Click
    Choose Patch Scan
    Select the desired Scan Template

     

    2-machine view.png

     


    The Run Operation screen will display options to setup a scheduled scan.

     

    3-run operation.png

     

     

                     

    Affected Product(s)


    Shavlik Protect 9.x


    Protect doesn't recognize a patch that was manually downloaded

    $
    0
    0

    1604_157_49_cache.png

     

     

    Symptoms


    A patch that was manually downloaded and placed in the patch repository, does not show as downloaded in protect.

     

     

    Cause


    This is often caused by the patch not having the Shavlik Name.
    Some vendors will update their patches but utilize the same file name. When the file has the same name, it causes issues with Protect's ability to delineate between different files. To resolve this, Protect utilizes a 'Shavlik Name'. A Shavlik Name is the unique file name given to a file when the vendor chooses to not give one. The name is the only change that occurs on the file, and will typically consist of append the name with the file version, and language of the patch where applicable.

     

    Example:
    Adobe Flash patches are hosted under a generic name: install_flash_player_11_plugin.exe
    To differentiate between files, a Shavlik Name is given to the file that specifies version, and bit version: install_flash_player_11_plugin_64bit119900170.exe

     

     

     

    Solution


    Modify the patches file name, by giving it the corresponding Shavlik Name.
    To identify the Shavlik File name of the patch:

    • Open Patch View (View> Patch View)
    • Right click the column headers and select 'Column Chooser'

     

    column chooser.png

     

    • In the Customization window, drag the 'Download File Name' option into the Patch View window.

     

    download file name.png

     

    • Search for the Q# of the patch
    • When the patch is found in Patch view, expand its view and the Shavlik Name will be displayed under the Download File Name column.

     

    Note:
    You can also enable the Vendor File Name option in the Customization window to see what the files default name is when hosted by the Vendor.

     

     

    shavlik name.png

     

    Affected Product(s)


    Shavlik Protect 9.x
    vCenter Prtoect 8.x

     

     

    What is Meant by the "Informational" Items in Shavlik Protect?

    $
    0
    0

    1604_157_49_cache.png

     

    Purpose

     

    This document explains what is meant by "informational" items under patch status in Shavlik Protect.

     

    Description

     

    Some users may be unsure what "Informational" items are in Protect. These items can sometimes be found under the "Current Patch Status" column in the patches tab when viewing scan results or individual machine listings in the machines view. This article explains what "informational" means and why it can be found in the scan results.

     

    What are "Informational" items?

     

    After running a scan in Shavlik Protect, under the default view- under original patch status, in addition to patch installed, and patch missing- there can often be found informational items.

     

    informational3.PNG

     

    Informational status identifies products on the target machine that have been fully patched or for which there exists no applicable patches. This informational status is meant to be an indicator that all available patches have been applied for the designated products.

     

    Informational2.PNG

     

    In this example above, all of the products on the right (Internet Explorer 11, Direct X 9.0c, etc.) have been fully patched on the target machine, and do not currently require patching.

     

    Informational items cannot have actions performed on them as they do not reference a particluar patch- but rather a fully patched product.

     

     

    Affected Product(s)

     

    Shavlik Protect 9.x
    vCenter Protect 8.x

    Recurring Scheduled Tasks are being deleted

    $
    0
    0

    Template

    1604_157_49_cache.png

     

     

    Symptoms

     

    Recurring Scheduled Tasks are being deleted.

     

    The Scheduled Tasks log tab shows a status 1326 when the deleted task was last attempted.

    The ST.Activation.managed.SYSTEM@NT AUTHORITY log shows the following error:"Failed to check access to '192.0.7.18', error: 1326".

    System error code 1326 means "Logon failure: The user name or password is incorrect." This error code may also display as "ERROR_LOGON_FAILURE" or as the value 0x52E.

     

     

    The Scheduled Tasks log tab shows a status 1331 when the deleted task was last attempted.

    The ST.Activation.managed.SYSTEM@NT AUTHORITY log shows the following error:"Failed to check access to '192.0.7.18', error: 1331".

    System error code 1331 means "Logon failure: account currently disabled." This error code may also display as "ERROR_ACCOUNT_DISABLED" or as the value 0x533.

     

     

    Shavlik Protect will delete a recurring task after credentials fail.  A new task will need to be created with proper credentials.

     

     

     

    Solution

     

    Verify that Credentials are correct for the target machine in the scan task using the following steps:

    • Verify which user was logged into the console machine when the scan task was created and log in to the console machine as that user.
    • Verify the credential listed as default credential under Manage Credentials
    • Login to the console as the user listed as default credential under Manager Credential in the last login.
    •  
         
      • Make sure that you can access the default administrative share (c$) on the target machine.
      •  

     

    For other scanning prequisities please visit the following link to online help:

    http://www.shavlik.com/onlinehelp/Protect90HTMLHelp/Scanning_prerequisites.htm

     

     

     

    Affected Product(s)


    Protect Version: All

    Manual installation of agent fails on registration.

    $
    0
    0
    Symptoms

     

    Manually installing an agent fails during the registration process.

      Error found in registration.log

    • 'Error during registration. Error: Error 1300: Not all privileges or groups referenced are assigned to the caller'

      Error found  in the STAgentUI.log

    • 'Error 1314: A required privilege is not held by the client'

     

    Cause

     

    This error is seen if the user account used to install the agent does not have the correct permissions.

     

    Resolution

     

    Add required rights in User Rights Assignments.

     

         Known rights needed to install and register agents.

      • "Act as Operating System"
      • "Take Ownership"

     

    1. Open Local Security Settings.
    2. In the console tree, click User Rights Assignment.
       - Security Settings/Local Policies/User Rights Assignments
    3. In the details pane, double-click the user right you want to change.
    4. In UserRight Properties, click Add User or Group.
    5. Add the user or group and click OK.

    *Note: To open Local Security Policy, click Start, point to Settings, click Control Panel, double-click Administrative Tools, and then double-click Local Security Policy.

    You can also check what rights the current user has by running the following command from a Windows Command Prompt.

    >whoami /priv

     

    Additional Information

     

    Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update:

    Local policy settings
    Site policy settings
    Domain policy settings
    OU policy settings

    *Note: When a local setting is greyed out, it indicates that a GPO currently controls that setting.

     

    Affected Product(s)


    Shavlik Protect 9.x


    Troubleshooting Shavlik Protect patch scan error messages

    $
    0
    0
    Purpose

     

    Many of the common Shavlik Protect scan errors can be corrected by changes to configuration or environment. This article lists the most common scan error messages and provides some guidance on correcting the issue.

     

     

    Cause

     

    Scan errors can occur:

     

    • If one or more of the Shavlik Protect Scanning Prerequisites have not been met 
    • If one or more configuration issues are present in Shavlik Protect 
    • Due to one or more environmental issues

     

     

    Resolution

     

    The table below lists the error codes with the known reason or solution. Most scan errors can be resolved by ensuring you are meeting requirements.
    Note: You can see the scan errors listed by viewing your scan result under the 'Results' section and viewing the 'Machines Not Scanned' tab of the scan result.
    Capture.JPG

     

    Error Code

    Description

    Error Code 101:

    Unable to determine System Language

    The scan process reads the Windows ntdll.dll file to determine the language of the system. If this file is inaccessible, the prerequisite validation fails and the scan is aborted. See the following document for more information: http://community.shavlik.com/docs/DOC-23310
    Error Code 105:
    MS_UNABLE_TO_GET_SYSTEM_DATA
    This issue occurs due to an access denied message at the root of the problem, or due to other enironmental or network related issues. See the following KB:
    http://community.shavlik.com/docs/DOC-2233
    Error Code 200:
    System not found. Scan not performed.
    This indicates that the specified computer was not located and could not be scanned.
    Error Code 201:
    System not found. <system error message>
    A network problem is preventing the specified machine from being scanned. Check to see that your computer (the scanning machine) is properly connected to the network and that you can remotely logon to the specified machine.
    Error Code 202:
    System not found. Scan not performed.
    A network or system error occurred while the scan was in process. Check to see that your scanning machine is properly connected to the network and that the machine being scanned is still connected to the network. Also ensure that the remote machine is running the Server service.
    Error Code 230:
    Scan not performed. <system error message>
    A general network error has occurred. See the system documentation for more information.
    Error Code 235:
    System not found, or NetBIOS ports may be firewalled. Scan not performed.
    Most likely, there is no machine with the specified IP address. If a machine does exist at this address, a personal firewall or port filtering device may be dropping packets destined for TCP ports 139 and 445.
    See the following KB: http://community.shavlik.com/docs/DOC-2220
    Error Code 261:
    System found but it is not listening on NetBIOS ports. Scan not performed.
    A machine exists at this IP address but it is either not listening on, or is blocking access to, TCP ports 139 and 445.
    Error Code 301:
    SystemRoot share access required to scan.
    Unable to connect to the remote machine’s system share. This may occur if the administrator has unshared the systemroot (typically C$ or similar) or has disabled the AutoShareServer(Wks) via the registry. Set Value from 0 to 1 in these registries:

     

    HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\
    parameters\AutoShareServer

     

    HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\
    parameters\AutoShareWks

     

    For more information on restoring Admin Shares, see the Microsoft Knowledge Base article 318755.
    Error Code 429:
    DLL is not properly registered.

    Error Code 430:
    Incorrect version of MDAC.

    Error Code 451:
    Admin rights are required to scan. Scan not performed.
    The current or specified user account performing the scan does not have administrative rights to the machine being scanned. Check to see that the specified account is a member of the local administrators group on the machine being scanned (or is a member of a group with local administrative rights).
    Error Code 452:
    NetChk is unable to scan this machine. Please check to see that you have administrative rights to this machine and are able to login to this machine from your workstation. Scan not performed.
    Check to see that the Server service is enabled on the remote machine and that you can remotely logon to this machine. Ensure that the Workstation service is running on the machine performing the scan.
    See the following KB: http://community.shavlik.com/docs/DOC-2218
    Error Code 501:
    Remote registry access denied. Scan not performed.
    Check to see that the Remote Registry service is enabled on the machine being scanned.
    See the following KB: http://community.shavlik.com/docs/DOC-2219
    Error Code 502:
    Scan not performed. Error reading Registry <system error message>
    A general registry error has occurred. See the system documentation for more information.
    Error Code 503:
    Scan not performed. Error reading Registry.
    A general registry error has occurred. No additional information is available.
    Error Code 553:
    Unable to read registry. Please ensure that the remote registry service is running. Scan not performed.
    Check to see that the Remote Registry service is enabled on the machine being scanned.
    Error Code 621:
    OS of target is an unsupported version of Windows
    The specified may be a non-Microsoft platform running SMB services or otherwise emulating a Microsoft product. Review the document: http://community.shavlik.com/docs/DOC-23052
    Error Code 622:
    Machine OS is not Recognized. Please run with tracing on and send to technical support. Scan not performed.
    Unable to determine the operating system of the specified machine. This may occur when scanning beta or unreleased versions of Microsoft operating systems.
    Error Code 623:
    Machine Service pack is not Recognized. Please run with tracing on and send to technical support. Scan not performed.
    Unable to determine the Service Pack of the specified machine. This may occur when scanning beta or unreleased versions of Microsoft Service Packs.
    Error Code 701:
    File http://download.microsoft.com/download/ ... secure.cab was NOT downloaded.
    The signed, compressed CAB file containing the security patch information could not be obtained from the specified location. This may occur if the scanning machine is not connected to a network, or is otherwise unable to access the specified file or location. If the CAB file is not obtained, an attempt is made to access the uncompressed XML file via https.
    Error Code 702:
    File https://www.microsoft.com/technet/secur ... secure.xml was NOT downloaded. Attempting to find local copy of mssecure.cab.
    The uncompressed XML file containing the security patch information could not be obtained from the specified location via https. This may occur if the scanning machine is not connected to a network, or is otherwise unable to access the specified file or location. If the XML file is not obtained from the network, an attempt is made to locate an existing version of this file on the local machine.
    Error Code 799:
    Itanium class servers are not supported by Protect.

    Error Code 802:
    Could not read boot.ini file in harddrive at '%s'
    Unable to read the image's boot.ini file after successfully mounting the hard disk (non-Vista systems).
    See: http://community.shavlik.com/docs/DOC-23104
    Error Code 803:
    Could not find windows install directory in boot.ini file in harddrive at '%s'
    The virtual image hard drive was successfully mounted and the boot.ini file was read but the scan engine was unable to locate the %systemroot% folder at the specified location (non-Vista systems).
    Error Code 804:
    Could not find system32 directory for virtual system at '%s'
    The virtual image hard drive was successfully mounted and the boot.ini file was read but the scan engine was unable to locate the %systemroot%\system32 folder at the specified location (non-Vista systems).
    Error Code 805:
    Timeout when mounting hard drive at '%s' to drive '%c'
    An attempt to mount the virtual image was not successful. The mounting process timed out after 60 seconds. Try scanning this image individually to see if the mount succeeds.
    Error Code 806:
    Error mounting hard drive at '%s' to drive '%c'
    An attempt to mount the virtual image was not successful. This can happen if the image being mounted is encrypted, is on a compressed drive, is a template or a linked clone, or any of the vmdk files are read-only. If this is a VMware Workstation or VMware Server image, this error occurs if the image is currently powered on or suspended.
    Error Code 807:
    Error mounting hard drive at '%s' to drive '%c' with exit code %d
    An attempt to mount the virtual image was not successful. The mounting process returned an unknown error code. Contact support for assistance.
    Error Code 808:
    Could not get return code from mounting tool when mounting hard drive at '%s' to drive '%c' due to %s
    The virtual image mounting process completed but the mount process was unable to determine if the mounting was successful.
    Error Code 809:
    Unknown virtual image type '%s' extracted from '%s'.
    The scan engine was unable to determine the virtual image type. This may occur if scanning a currently unsupported virtual image platform.
    Error Code 810:
    Could not find system32 directory for virtual image: '%s'
    The virtual image hard drive was successfully mounted but the scan engine was unable to locate the image's %systemroot%\system32 folder.
    Error Code 811:
    Could not get information about drive mounted at '%s' for system:'%s'
    The scan engine was unable to determine the systemroot drive letter for the mounted image.
    Error Code 812:
    Could not open mounted registry key 'HKLM\\Software\\MountedDevices' for system: '%s'
    The virtual image hard drive and registry was successfully mounted but the scan engine was unable to read the mounted registry.
    Error Code 813:
    Could not enumerate the values under the key HKLM\\Software\\MountedDevices for system: '%s'
    The virtual image hard drive and registry was successfully mounted but the scan engine was unable to enumerate values from the mounted registry.
    Error Code 814:
    No path to vmware-mount.exe provided!
    The scan engine was unable to locate the VMware mounting tool. Please make sure that the VMware Virtual Disk Development Kit has been properly installed.
    Error Code 815:
    Could not find mounting tool at '%s'
    The scan engine was unable to locate the VMware mounting tool. Please make sure that the VMware Virtual Disk Development Kit has been properly installed.
    Error Code 816:
    Could not read system file at '%s'
    The vmx configuration file does not exist for the specified VMware Workstation or VMware Server image.
    Error Code 817:
    Error parsing system file at '%s'
    The scan engine was unable to read the vmx file for the specified VMware Workstation or VMware Server image. Check the vmx file and ensure that it can be read in a text viewer.
    Error Code 818:
    '%s'. Unable to mount the virtual image. The virtual image is currently powered on.
    The scan engine was unable to mount the virtual image because the virtual image was powered on. The scan engine is only capable of scanning images that are offline (powered off).
    Error Code 819:
    '%s'. Unknown PowerStatus '%d'
    The scan engine was unable to determine the current state of the image (powered on, suspended, powered off).
    Error Code 820:
    %s'. Scanning suspended or paused images is not currently supported.
    The scan engine was unable to mount the virtual image because the virtual image was suspended (paused). The scan engine is only capable of scanning images that are offline (powered off).
    Error Code 821:
    Could not open Objects key in BCD for image at '%s'
    The scan engine was unable to access the boot configuration data (BCD) for this image. This error message could indicate that there is a problem with the specified image. Try powering on this image to ensure that it is still valid. This error message applies to Vista images only.
    Error Code 822:
    Could not enumerate keys in 'BCD\\Objects' for image at '%s'
    The scan engine was unable to enumerate information from the boot configuration data (BCD) for this image. This error message could indicate that there is a problem with the specified image. Try powering on this image to ensure that it is still valid. This error message applies to Vista images only.
    Error Code 823:
    Could find default boot section in the BCD for image at '%s'
    The scan engine was unable to enumerate boot information from the boot configuration data (BCD) for this image. This error message applies to Vista images only.
    Error Code 824:
    Could not open key at 'BCD\\Objects\\%s\\Elements\\22000002' for image at '%s'
    The scan engine was unable to open the boot information data from the boot configuration data (BCD) for this image. This error message applies to Vista images only.
    Error Code 825:
    Could find the Windows root in default boot section of the BCD for image at '%s'
    The scan engine was unable to locate the value which stores the location of the windows directory in the boot configuration data (BCD) for this image. This error message applies to Vista images only.
    Error Code 826:
    Registry mount sentry is NULL!
    The scan engine was enable to mount the virtual image's registry. The console may be running low on memory.
    Error Code 827:
    Hard-drive mount sentry list is NULL or empty!
    The scan engine was unable to read the vmx file and/or this file had no hard drives configured for the image.
    Error Code 828:
    Could not mount registry for image '%s'. This could be caused by running a non supported configuration. Windows 2000 can't mount x64 registries.
    The scan engine was unable to mount the registry for the virtual image. This may occur if using a Windows 2000 console and trying to mount x64 images (unsupported).
    Error Code 829:

     

    Error: 829 - Accessing disk ID
    Error: 829 - Accessing disk ID, Code:16054 – Invalid connection

    This error can occur due to a number of different reasons. This is an error that occurs prior to mounting the image - it is not related to mounting the image (like the errors above)

     

    General errors:

     

    VIX_E_FAIL = 1,
    VIX_E_OUT_OF_MEMORY = 2,
    VIX_E_INVALID_ARG = 3,
    VIX_E_FILE_NOT_FOUND = 4,
    VIX_E_OBJECT_IS_BUSY = 5,
    VIX_E_NOT_SUPPORTED = 6,
    VIX_E_FILE_ERROR = 7,
    VIX_E_DISK_FULL = 8,
    VIX_E_INCORRECT_FILE_TYPE = 9,
    VIX_E_CANCELLED = 10,
    VIX_E_FILE_READ_ONLY = 11,
    VIX_E_FILE_ALREADY_EXISTS = 12,
    VIX_E_FILE_ACCESS_ERROR = 13,
    VIX_E_REQUIRES_LARGE_FILES = 14,
    VIX_E_FILE_ALREADY_LOCKED = 15,
    VIX_E_NOT_SUPPORTED_ON_REMOTE_OBJECT = 20,
    VIX_E_FILE_TOO_BIG = 21,
    VIX_E_FILE_NAME_INVALID

    Error Code 1001:
    IPv6 addresses are not supported.
    IPv6 addresses are currently not supported. Ensure that IPv4 is enabled.

     

     

    Affected Product(s)

     

     

    Shavlik NetChk Protect 7.x

    Shavlik Protect 9.x

    Viewing all 1352 articles
    Browse latest View live