Quantcast
Channel: Shavlik User Community : Document List - All Communities
Viewing all 1352 articles
Browse latest View live

How to increase the deployment timeout for offline hosted virtual machines

$
0
0

Purpose

 

This document includes instructions on how to increase the deployment timeout for offline hosted virtual machines.  Performing the steps in this document will be required when a deployment to an offline hosted virtual machine requires more than 120 minutes to complete.  The typical cause would include a deployment of a large number of patches to a single machine. 


Symptoms

You will see the following error message in the Deployment Tracker approximately 120 minutes into the deployment process.

A subsequent scan of the target offline hosted virtual machine will show fewer patches missing indicating some of the patches installed within that 120 time-frame.


Resolution


Manually increase the deployment timeout by editing the STEnvironment.config.


1.  Close Protect.

2.  Stop the Shavlik Protect Console Service.

3.  Navigate to the Protect installation folder. (C:\Program Files\LANDesk\Shavlik Protect by default)

4.  Make a backup STEnvironment.config.

5.  Edit the STEnvironment.config.

6.  Add the following text AFTER: threatDataDirectory="C:\ProgramData\LANDesk\Shavlik Protect\Console\ThreatData"


virtualDeploymentTimeout="4"


This is what it will look like after your change:


tempReportsDirectory="C:\ProgramData\LANDesk\Shavlik Protect\Console\TempReports"

threatDataDirectory="C:\ProgramData\LANDesk\Shavlik Protect\Console\ThreatData"

virtualDeploymentTimeout="4" >

 

7. Close and save the STEnvironment.config file.

8.  Start the Shavlik Protect Console Service.

9.  Launch Shavlik Protect and test.


Affected Products


Shavlik Protect 9.x


Error: "The e-mail service is currently not available.", following 9.1 Patch 1 Upgrade

$
0
0

1604_157_49_cache.png

 

Purpose

 

Following upgrading to Shavlik Protect version 9.1.4446 some users may encounter an error "The e-mail service is currently not available", and some users may find that their automated email reports are not sending. The purpose of this document is to provide a workaround for those who may encounter this issue and for those affected help restore proper function of automated email reports in Protect.

 

Symptoms

 

Following the installation of the Patch upgrade for Protect that takes the application from version 9.1.4334 to 9.1.4446, some users after completing a scan or initiating a deployment may receive a dialog box popup in the application containing the following error:

email error.PNG

"The e-mail service is currently not available."

 

The Protect.Managed log should show the following exception:

 

2014-XX-XXTXX:XX:XXXXXXX E EmailRecipientSelector.cs:205|ST.UI.UserViewableException: The e-mail service is currently not available. ---> System.ServiceModel.ProtocolException: The .Net Framing mode being used is not supported by 'net.pipe://localhost/ST/Console/Messaging/ResultsNotification'. See the server logs for more details.

   at System.Runtime.AsyncResult.End[TAsyncResult](IAsyncResult result)

   at System.ServiceModel.Channels.ServiceChannel.SendAsyncResult.End(SendAsyncResult result)

   at System.ServiceModel.Channels.ServiceChannel.EndCall(String action, Object[] outs, IAsyncResult result)

   at System.ServiceModel.Channels.ServiceChannelProxy.TaskCreator.<>c__DisplayClass2.<CreateTask>b__1(IAsyncResult asyncResult)

   at System.Threading.Tasks.TaskFactory`1.FromAsyncCoreLogic(IAsyncResult iar, Func`2 endFunction, Action`1 endAction, Task`1 promise, Boolean requiresSynchronization)

--- End of stack trace from previous location where exception was thrown ---

   at System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess(Task task)

   at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task)

   at ST.UI.Controllers.Configuration.MailController.<SendNotificationEmailAsync>d__d.MoveNext()

   --- End of inner exception stack trace ---

   at ST.UI.Controllers.Configuration.MailController.<SendNotificationEmailAsync>d__d.MoveNext()

--- End of stack trace from previous location where exception was thrown ---

   at System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess(Task task)

   at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task)

   at System.Runtime.CompilerServices.TaskAwaiter`1.GetResult()

   at ST.Protect.Forms.Email.EmailRecipientSelector.<SendEmailClickAsync>d__13.MoveNext()

 

Cause


Users should only see this error message after upgrading using the patch, not the full 9.1.4446 install. It appears that during the patch upgrade process, some of the necessary components may not upgrade successfully in some environments.

 

Resolution

 

We are working on the upgrade issue, and this will be fixed in an upcoming patch release. In the meantime, to correct the issue uninstall Shavlik Protect, download and re-install Protect using the full 9.1.4446 installer. Note: Uninstalling and re-installing Protect will not lose any user data or configuration, as this data is all contained within the database. Before re-installing Protect, to help ensure the product can point back to the database it would be a good idea to open the Database Setup Tool and verify the path to the SQL database and the credentials used. These will need to be entered after re-installation is completed.

 

The full installation package can be downloaded from the following link:

http://rs.shavlik.com/downloads/ShavlikProtect_9.1.4446.exe

 

 

Affected Product(s)

 

Shavlik Protect 9.1.4446

Windows Update service is required to install patches on Windows Vista and later Windows operating systems

$
0
0

Purpose

 

Microsoft patches fail to deploy on the following operating systems:

-Windows Vista

-Windows 2008

-Windows 7

-Windows 2008R2

-Windows 8

-Windows Server 2012

 

When attempting to manually run a patch file copied to a target machine in C:\Windows\Propatches\Patches you receive an error that the Windows Update service was not able to start or is not started.

 

Resolution

 

The Windows Update service must not be set to 'Disabled'. It does not explicitly need to be started, but it must be enabled - it can be set to 'Manual', 'Automatic-Delayed Start', or 'Automatic'.

 

Windows Vista/2008 changed patching behavior. Windows Vista and later patches are of a file type .MSU and this file type requires the Windows Update Service to be enabled to execute. The Windows update application is not required, but the standalone service handles extraction and execution of MSU patches and must remain enabled. For more details regarding this change go to  http://support.microsoft.com/kb/934307/en-us

Windows update can be disabled as long as the Windows Update Service remains enabled. You can configure this using GPOE under Computer Configuration\Administrator Templates\Windows Components\Windows Update.


From the workstation the automatic updates setting can be set to "Never check for updates" under Control Panel\All Control Panel Items\Windows Update\Change settings


The Window Update Security message can be turned off using  by unchecking "Windows Update" Control Panel\All Control Panel Items\Action Center\Change Action Center settings

 

Affected Products

 

Shavlik Protect 9.x

How Credentials work in Protect

$
0
0

Purpose


This document is meant to provide a full overview of how credentials are entered, used, and work within the Shavlik Protect product.

 

Description

 

Credential Precedence for Physical Machines and Online Virtual Machines

Initiating actions from the home page, from a machine group, or from a favorite

The home page, machine groups and favorites can be used to initiate actions, patch scans, asset scans, power management, and to execute scripts. When performing these actions, Shavlik Protect will attempt to authenticate to each machine using a variety of credentials and will do so using the following strategy:

  1.   If one or more of the following are available,  the credential with the highest precedence will be used. The precedence order is as follows: 

      a. Machine-level credentials

      b. Group-level credentials

      c. Integrated Authentication (Kerberos)

 

Example: If machine-level credentials are not available but group-level and default credentials are available, the program will use the group-level credentials.

  1.   If the credential used above does not work, then Integrated Windows Authentication (the credentials of the person currently logged on to the program) will be used.

If neither of these credentials work, the scans and the power management tasks will fail.

One suggestion is to make your default credentials the same as the account credentials you typically use to log on to the program. This will eliminate problems that may occur if you forget to assign credentials.

Initiating an agent installation from a machine group

When using a machine group to push install the Shavlik Protect Agent service to connected target machines, the credentials used by the program follows the same strategy as above with one major exception -- integrated credentials will not be used. So the agent installation must be successful using machine-level, group-level, default, or explicitly supplied credentials.

Initiating actions from Machine View or Scan View

When initiating a scan, a patch deployment or a power management action from Machine View or Scan View, the program will attempt to authenticate to the target machines using a variety of credentials and will do so using the following strategy:

  1.   If one or more of the following are available, the Protect console will try to authenticate using the credential with the highest precedence, where the precedence order is as follows: 
    1. Any manually or automatically assigned managed machine credentials (see the To Individual Machines in a Machine Group section in Supply Credentials for Machines (used if the scan credentials are invalid or missing, for example, if an agent performed the scan rather than the console)

  2.   If the credential used above does not work, then Integrated Windows Authentication (the credentials of the person currently logged on to the program) will be used.

Note: Integrated credentials will not work for deployments to offline virtual machines or for rescans.

If neither of these credentials work then the action will fail.

Initiating an agent installation from Machine View or Scan View

When using Machine View or Scan View to push install the Shavlik Protect Agent service to connected target machines, the credentials used by the program follows the same strategy as immediately above with one major exception -- integrated credentials will not be used. So the agent installation must be successful using managed machine credentials, default credentials, or explicitly supplied credentials.

 

Credential Precedence for Offline Hosted Virtual Machines

Initiating actions from the home page, from a machine group, or from a favorite

The home page, machine groups and favorites can be used to initiate patch scans, asset scans, and power management actions and to execute scripts. When performing these actions, Shavlik Protect will attempt to authenticate to each offline hosted virtual machine using the browse credentials.

Initiating actions from Machine View or Scan View

When initiating a scan, a patch deployment or a power management action from Machine View or Scan View, the credentials that will be used to authenticate to an offline virtual machine depends on the power state of the machine when it was initially scanned.

If a machine was originally scanned in offline mode

The program will attempt to authenticate using the browse credentials.

If a machine was originally scanned in online mode

The program will attempt to authenticate using a variety of credentials and will do so using the following strategy:

  1.   Try using any manually or automatically assigned managed machine credentials
  2. If the following are available, try to authenticate using the credential with the highest precedence, where the precedence order is as follows:

    1. The administrator credential from the machine group. If the administrator credential exists but fails, the default credentials will not be tried.

    2. Default Credentials (used if the scan credentials are invalid or missing (for example, if an agent performed the scan rather than the console))

  3.   If the credentials used above do not work, then Integrated Windows Authentication (the credentials of the person currently logged on to the program) will be used.

Note: Integrated credentials will not work for deployments to offline virtual machines or for rescans.

If none of these credentials work then the action will fail.

 

Defining Credentials

The Define Credential dialog can be accessed anywhere a credential is used within the Shavlik Protect interface (for example, from a machine group, from the Credentials Manager, etc.). It is used to specify a new user name and password pair that collectively define one credential. The credential is stored with strong encryption techniques. Only the administrator that creates the credential will be able to decrypt the credential and access it from within the program. If you elect to share the credential, however, it will be made available to other administrators as well as to Shavlik Protect service components.

 

Note: Credentials may be automatically defined for you during a product upgrade or when importing a machine group. Any credentials that are found during these processes are preserved and will be assigned friendly names according to their usage. The term Discovery filter is the friendly name assigned by the program to a machine group credential that it identifies during an upgrade or import process. Feel free to change the name to something that more closely reflects the usage of the credential in your organization.

 

define_cred.jpg

 

Name this credential so it can be used elsewhere

Provide a friendly name for this credential that describes exactly where it should be used.

User name

Type a user name that has access to the machine(s). When specifying the user name:

  • If you need to specify a domain as part of the credentials be sure to include the domain name as part of the user name. For example, if you enter User@<Domain>, <Domain>\User, or a fully qualified user name, Shavlik Protect will use the domain account rights.
  • If you enter <Target Machine>\User, Shavlik Protect will use the target's local account rights.

  • If you do not include a domain or machine as part of the user name, the name will be qualified to the target machine (<targetmachinename>\User).

  • Microsoft Windows .alias name formats (for example: '.\username') are supported by Shavlik Protect.

Password

Type the password for the user.

Verify password

Retype the password to verify you specified it correctly.

Share this with background tasks, agents, and other features

If enabled, this credential will be available to all Shavlik Protect administrators and can be used to specify credentials for service components within the program. The service components within Shavlik Protect that require a shared credential include the following:

  • Proxy service
  • Email service

  • Agent internet proxy

  • Distribution servers

  • TrustedHost list access when running remote scripts

Why is it necessary to share a credential? Credentials are encrypted, so you must share a credential so that the service components can decrypt and access it when needed.

Example: If you select Tools > Options > Proxy and attempt to assign Service credentials, only shared credentials are available for selection. The service must have a copy of the credential in order to decrypt it.

Note: It is recommended that you create a service account to perform these service functions rather than using a domain administrator account. See Potential Security Implications When Sharing Credentials for more information.

 

Supplying Scan Credentials for Target Machines

Note: Browse credentials are slightly different from the scan credentials described in this section. Browse credentials are used by servers, domains, and organizational units to enumerate machines but do not actually authenticate to the individual machines.

 

This section provides information on how to define new scan credentials and how to assign the credentials to target machines. Credentials consist of a user name and password pair used to authenticate the program to specified target machines. One credential can be associated with any number of operations or entities. The credentials are stored with strong encryption techniques and are not available to anyone except the user who provided them.

 

The scan credentials you supply will be used to access remote machines, perform any scans, and push any necessary files. The supplied credentials will NOT be used to:

  •   Authenticate to the local (console) machine

Rather, the program uses the credentials of the currently logged on user to authenticate to resources on the local machine. Therefore, in order to perform tasks on the local machine, make sure you log on using an account that has administrator and local machine access rights.

  •   Perform a patch deployment

The machine credentials that you supply are used to provide access to the remote machine and to push the necessary patch deployment files. The actual deployment, however, will be run under the remote machine's Local System account.

You use a machine group to initially assign scan credentials to target machines. You can assign credentials to individual machines, to all machines in a machine group, or both. After a machine has been scanned and is contained in Shavlik Protect 's database of managed machines, you can use the Machine Properties dialog to assign different credentials if desired.

 

Important! If there are two or more administrators using Shavlik Protect, each administrator should provide their own machine credentials.

Assigning Credentials to Individual Machines in a Machine Group

To assign credentials to one or more machines in a machine group, in the bottom pane select the machines and then select Credentials > Set Admin Credentials.

assigning_creds1.jpg

On the Assign Credentials dialog, select from the list of available credentials or click New to define new credentials.

assigning_creds2.jpg

When credentials are applied to the selected machines, the icon in the Admin Credentials column will become active. In addition, the name of the assigned credential is displayed next to the icon.

assign_creds_tiny.jpg

Assigning Credentials to All Machines in a Machine Group

To assign credentials to all machines in a machine group, in the top pane select Credentials > Set Credentials.

assigning_creds3.jpg

On the Assign Credentials dialog, select from the list of available credentials or click New to define new credentials.

assigning_creds2.jpg

When credentials are assigned the icon will contain a check mark:

assign_creds_tiny.jpg

In addition, the button name will change to the name of the assigned credential.

Assigning Credentials to Virtual Machines

There are several different tabs that can be used to add virtual machines to a machine group. The credentials that will be used to scan and/or deploy patches to these machines depends on how the machines are defined to the group and on the current power state of each machine.

  • Hosted Virtual Machines tab: Used to add virtual machines that are hosted by a server. The credentials used to scan each machine depends on the current power state of the machine.
    • A hosted virtual machine that is offline at the time of a scan will be accessed using the server's browse credentials. Any individual credentials supplied for the machine are ignored.

assigning_creds4.jpg

    • A hosted virtual machine that is online at the time of a scan will be accessed using scan credentials for that machine. See Assigning Credentials to Individual Machines in a Machine Group, above.

    assigning_creds5.jpg

    • Workstation Virtual Machines tab: Used to add offline virtual machines that reside on individual workstations. You should assign individual machine credentials for each virtual machine defined using this tab. If appropriate, credentials can also be assigned at the machine group level. The credentials are used during the mounting process and provide permission for Shavlik Protect to access the virtual machine files on the workstation. See Assigning Credentials to Individual Machines in a Machine Group, above.
    • Machine Name tab, Domain Name tab, or IP Address/Range tab: Used to add virtual machines that reside on individual workstations and that are online at the time of a scan. See Assigning Credentials to Individual Machines in a Machine Group, above.

    Assigning New Credentials to Machines After They Have Been Scanned

    After one or more machines have been scanned and are contained in Shavlik Protect 's database of managed machines, you can use the Machine Properties dialog to assign different credentials or to remove credentials.

     

    There may be several reasons for providing different credentials to machines after a scan has been performed. If you have multiple administrators in your organization and each is responsible for a different domain, they will need to set their own credentials before performing an action. Or, your organization's policy may be to separate scan (assessment) duties from deployment duties, in which case different credentials are probably required.

    assigning_creds6.jpg

     

    Managing Credentials

    Important! If there are two or more administrators using Shavlik Protect, each administrator should provide their own machine credentials.

    The Credentials Manager is used to manage all credentials used within the program. It is also used to set the default credential for the program.

    Although you can supply new credentials from several different areas of the program, all of the credentials can be edited and deleted from this single location. This greatly simplifies the credentials management process. For example, if a password that is used to authenticate a specific group of machines changes, you simply use the Credentials Manager to update the associated credential. All items assigned to that credential are automatically updated with the new password.

     

    To manage the credentials used by the program, select Manage > Credentials.

    manage_creds1.jpg

     

    Add

    Enables you to add a new credential.

    Edit

       Enables you to modify the selected credential.

    Delete

    Deletes the selected credential. You can delete multiple credentials at the same time.

    When you delete a credential the following occurs:

    • The credential itself is deleted
    • All usages of the credential throughout the program are deleted

    • If it is a shared credential, the shared credential and all its usages are deleted

    Caution! Any items using the deleted credential will no longer be assigned a credential. Before you delete a credential you should browse your machine groups to verify the credential is not being used.

    Merge

    Tip: This credential cleanup tool will typically be used immediately following an upgrade from an earlier version of Shavlik Protect that does not contain the Credentials Manager.

    Enables you to merge one or more credentials that contain the same user name and password with another credential entry that also contains the same user name and password. Or you can merge several different credentials into one new credential that is effective in all situations. By eliminating duplicate and unneeded credentials you reduce confusion and lessen the chance for human error.

    1. On the Credentials Manager dialog select the credential(s) you want to merge with another credential.
    2. Click Merge.

    The Merge Credentials dialog is displayed. For example:

    manage_creds2.jpg

    1. At the bottom of the dialog do one of the following:
    • Select an existing credential: The credential(s) specified in the Confirm credentials to merge list will be merged with the credential you select here.
    • Create a new credential: The credential(s) specified in the Confirm credentials to merge list will be merged with the new credential you create here.

    Note: A shared credential can only be merged with another shared credential. Therefore, if any of the credentials in the Confirm credentials to merge list are shared, then (1) only shared credentials will be offered for selection in the Existing box, and (2) any new credential you create will automatically be defined as a shared credential.

    1. Click Merge.
    2. Read the message on the confirmation dialog and if you agree with the merger, click Merge.

    View usages

    Enables you to see how and where the selected credentials are being used in the program. Only those credentials that are currently being used in the program will be displayed in the Credential Usages dialog. A credential may be listed multiple times if it is used in different areas of the program.

    manage_creds3.jpg

    You can right-click on any list item and perform a number of different actions.

    • Assign different credential: Enables you to assign a different credential to the selected item(s). You can assign a different credential to multiple items at once but only if they all have the same Shared Usage value (Yes or No).
    • Expand all: Expands all lists.

    • Collapse all: Collapses all lists.

    • Export selected credential usages to CSV: Export information about the selected items to a Comma Separated Values (CSV) file. The CSV file can then be used within a spreadsheet program.

    Set as default

    Assigns the selected credential as the default credential. The program will use the default credential if other credentials are missing or invalid.

    Clear default

    Removes the default credential assignment.

    User Name

    Displays the user name portion of each credential.

    Name

    Displays the unique name assigned to each credential.

    Shared

    Displays whether the credentials are shared credentials. The information in this column is directly related to the Share this with background tasks, Agents, and other features check box on the Define Credential dialog.

     

     

    Managing Individual Machine Properties (Explicitly supplied credentials)

    You can set explicit credentials for machines via View > Machines > Right Click a machine > Machine Properties.

     

    Manage_Machine_Properties.jpg

    Credential: Specifies the credential used when authenticating Shavlik Protect to the machine. The credential you supply here will override credentials specified in other areas of the program. If you select None you effectively remove the credential currently assigned to the machine.

     

    There may be several reasons for providing different credentials to a machine after a scan has been performed. If you have multiple administrators in your organization and each is responsible for a different domain, they will need to set their own credentials before performing an action. Or, your organization's policy may be to separate scan (assessment) duties from deployment duties, in which case different credentials are probably required.

     

    How Shavlik Protect Manages Multiple Administrators

    Shavlik Protect contains a number of built-in checks to guard against simultaneous and conflicting commands from different administrators. For example:

    • The program will not allow duplicate group names or template names
    • The program will not allow simultaneous updates to any groups, templates, distribution servers, or agent policies by different administrators. If this situation should occur the second administrator will receive a warning message similar to the following:

    another_user.jpg

    • Only one console will be authorized to use the Database Maintenance tool. If an administrator at another console wants to perform maintenance on the database, that administrator must take ownership of that task before the program will allow the administrator to continue.
      • Note: The 'Take Ownership' button is only displayed if you have two or more consoles that share one database. If your organization uses multiple Shavlik Protect consoles that share the same database, only one console will be authorized to use the Database Maintenance tool. If an administrator at another console wants to perform maintenance on the database, that administrator must take ownership of the task before the program will allow the administrator to continue. Any existing maintenance tasks will be allowed to complete before ownership is transferred to another administrator.

     

    Best Practices When Using Multiple Administrators

    Recommendations

    • You should upgrade your hardware platform by increasing the number of processors and the amount of installed memory on the console machine. This will increase performance in those instances when two or more administrators are logged on at the same time and performing tasks.
      • Minimum suggested hardware requirements for two administrators: 2 processor cores and 4 GB RAM

      • For each additional administrator, add 1 processor core and 1 GB RAM

      • For a high performance system, use 16 processor cores and 32 GB RAM

    • When two administrators log on to the same console they must use different accounts. The same account can be used only when logging on to different consoles.

    • If you edit a group that is typically used by another administrator you should notify that person about the change.

    • Each administrator should create their own credentials and assign them to machines.

    • Each administrator should define default credentials that are the same as their logon credentials. This will eliminate problems that may occur if the administrator forgets to assign machine credentials.

     

    Potential Issues When Using Multiple Administrators

    Usage Issues

    You must take a few common sense precautions when using multiple administrators.  Even though Shavlik Protect contains a number of built-in safety checks, it cannot guard against all possibilities. The program may act in unpredictable ways if the following occur:

    •   If two administrators try to scan the same machine group or ESXi Hypervisor at the same time.

    The machines will be scanned twice, causing potential performance issues. In addition, there may be administrative rights errors due to the multiple connections.

    •   If two or more administrators try to deploy patches or bulletins to the same machine at the same time.

    The most likely result is that one deployment task will succeed and the other will fail. But because the deployment that succeeds will likely perform a restart of the target machines, the machines may be in an unknown state when the other deployment fails.

    Credential Issue

    When you create credentials and assign them to machines, those credentials belong to your administrator account. If a different administrator (Administrator B) logs on and uses Shavlik Protect, they will not have access to the machine credentials you provided. The second administrator must provide their own machine credentials.

    One of the ways this can be confusing is if Administrator B fails to provide their own machine credentials and tries to schedule a patch deployment from a scan that was performed by Administrator A. The deployment can be successfully scheduled if default credentials are available, but the actual patch deployment will likely fail because the patch deployment requires machine credentials -- credentials that were provided by Administrator A but that are not available to Administrator B.

    Recommendations:

    • Each administrator should create their own credentials and assign them to machines
    • Each administrator should define default credentials that are the same as their logon credentials. This will eliminate some of the problems that may occur if the administrator forgets to assign machine credentials.

    Virtual Inventory Consideration

    Unlike machine groups (which can be viewed by all administrators), vCenter Servers and ESXi Hypervisors can only be viewed by the administrator that added them to Shavlik Protect. If two different administrators want to manage the same vCenter Server or ESXi Hypervisors, both administrators must add the item to the Virtual Inventory list.

     

    Additional Information

     

    More information concerning credentials usage in Protect and possible known issues can be found in the following community documents:

     

    Shavlik Protect Encryption Q&A

    How-To troubleshoot Error 5 - Access is denied

    Change Machine Credentials on Multiple Machines at Once

    Account Lockout - Scheduler Service using Credentials

     

    Affected Products

     

    Shavlik Protect 9.x

    Updates published using Shavlik Patch are not showing up in 'All Software Updates'

    $
    0
    0

    Symptoms

    Updates published using Shavlik Patch are not showing up in 'All Software Updates' within the Configration Manager console.

     

    Cause

     

    There are two possible causes.

     

    1) You have not performed synchronization with the WSUS server.

     

    2) In System Center 2012 R2 Configuration Manager you need to update your Software Update Point to ensure you're syncing required vendors and locally published packages.

     

    Resolution

    There are two possible resolutions.

     

    1) You need to ensure you've successfully performed synchronization with the WSUS server.

     

    You may just need to perform the sync, or there may be a problem during the synchronization process that is causing the failure.

     

    Refer to the wsyncmgr.log from C:\Program Files\Microsoft Configuration Manager\Logs.

     

    Log on to the WSUS server, go to Admin Tools > Windows Server Update Services. Expand the WSUS server, then click on Synchronizations. You should be able to see a history of synchronizations here. (It may take quite some time to load.)

     

    2) In System Center 2012 R2 Configuration Manager you need to update your Software Update Point to ensure you're syncing required vendors and locally published packages.

     

    To check this:

     

    • Within the System Center Configuration Manager console:
      • Go to Administration
      • Expand Site Configuration
        • Click Sites
        • Right click on your primary site > Configure Site Components > Software Update Point
          sup1.JPG
      • Go to the Products tab.
        • Ensure to put a tick next to any newly added products and Local Publisher.
        • While in here it's worth double checking what you have set up under Classifications, Languages, Sync Settings, and Sync schedule as well.
          sup.JPG
        • Perform synchronization with WSUS again.

     

     

    Affected Products

     

    Shavlik Patch for Microsoft System Center

    (Formerly SCUPdates)

    Obtaining Protect console and Agent installation logs

    $
    0
    0

    Purpose

     

    This document shows how to find the installation and setup logs for Shavlik Protect. This can be useful if attempting to troubleshoot an installation failure.

     

    Description

     

    The setup and install logs for Shavlik Protect can be found by doing the following:

     

    Go to Start > Run (or search) > Type: %temp%

     

    or

     

    C:\Users\*your_user*\AppData\Local\Temp

     

    Either option brings you to the same directory. You will need to search the temp directory for the following naming of files. There may be multiple of each depending how many times you have attempted installation. The newest log files would be the best to collect for support.

     

    ProtectSetup_xxx.log - This contains the logging of prerequisite checks during installation of the Protect console.

     

    ProtectInstall_xxx.log -  Protect console main installation log file.

     

    STPlatformInstall_xxx.log - Agent main installation log file.

     

    STPlatformUpdater_xxx.log - Additional logging for agent setup/install.

     

     

    Additional Information

     

    For information on collecting other/additional logging please see the document, Logs - Gathering Console, Client Side (agentless), and Agent log files for Protect

     

     

    Affected Product(s)

     

    Shavlik Protect 9.x

    Logs - Gathering Console, Client Side (agentless), and Agent log files for Protect

    $
    0
    0

    Template

    1604_157_49_cache.png

     

    Purpose


    This document outlines how to gather logs for troubleshooting issues with the Console, Agent, or Target systems.

     

     

    Description

     

    Here are some basic instructions on how to gather console, client (target) side logs, agent logs, and install logs for Protect.  These should work for most console and agent type issues.

     

    Protect 9.X console logging:

     

    1. Please open the Protect GUI and then go to Tools > Options > Logging and change logging to “All” for both user interface and services.

    a. If you are unable to set logging via the GUI see this doc: http://community.shavlik.com/docs/DOC-22938

    2. Close the Protect GUI.

    3. Stop the following services

         a.Shavlik Protect Console Service

          b. ST Remote Scheduler Service

    4. Delete all the logs from

         a.  Windows 7, 8, 2008, 2012 & Vista: C:\ProgramData\LANDesk\Shavlik Protect\Logs

         b.  Earlier OS’s:  C:\Documents and Settings\All Users\Application Data\LANDesk\Shavlik Protect\Logs

    5.  Start the console service and open the Protect GUI.

    6. Attempt to reproduce the issue. Please document steps to reproduce.

    a. Collect the logs from the Logs folder mentioned earlier in step 4 (please zip if possible)

    b. [Deployment issues only] On the target system please zip and send a copy of the entire C:\Windows\Propatches folder and its contents (you can leave out the Patches sub-folder).

    7. Zip and send all the logs.


    You can also obtain the "ST.FileVersions.log" which contains all file versions relevant to Protect by going to Help > About Shavlik Protect > Export Info.

     

    Protect 9.x agent logging:

     

    1. Open the agent policy assigned to the machine we are gathering logs from.

    2. Change the logging level to ‘All’ and Save and update Agents.  Choose to update agents if prompted.

    3. Go to the target machine, close the agent GUI and stop the services:

         o The services start with Shavlik or ST.

    4. Delete all the logs from:

         o Vista & Later: C:\ProgramData\LANDesk\Shavlik Protect\Logs

         o Earlier OS’s:  C:\Documents and Settings\All Users\Application Data\ LANDesk\Shavlik Protect\Logs

    5. Start services.

    6. Attempt to reproduce the issue. Please note the steps to reproduce.

    7. Take applicable screenshots.

    8. Zip and send all the logs and screenshots. (from the previous specified folders above)

     

    Deployment Logs (All current supported versions)

    (For agentless deployment)

    It is best to enable target side verbose logging before obtaining these logs. See the following document on how to do so:
    http://community.shavlik.com/docs/DOC-23048

    1. On the machine you are deploying to navigate to C:\Windows\ProPatches
    2. Locate the CL5.log, dplyevts.log, and Safereboot.log and copy to a new folder on the desktop.
    3. Navigate to C:\Windows\ProPatches\Scheduler.
    4. Locate the Scheduler.log and add it to the folder created in step 2 so all logs are together.
    5. Zip and send all the logs.

     

    Additional Logging for Threat Protection/Antivirus Issues:

    There is additional logging that can be obtained for Threat Protection/Antivirus related issues, such as detection of false positives. See the following document for the steps to obtain this addtional logging:

    http://community.shavlik.com/docs/DOC-23066


    Installation Logs

    Refer to; Obtaining Protect console and Agent installation logs

     

     

    Affected Product(s)


    Shavlik Protect 9.x

    Resolution mismatch, found 'machine name x' for 'machine name y' when attempting to install the agent

    $
    0
    0

    1604_157_49_cache.png

     

    Purpose

     

    The purpose of this document is to provide additional information on the 'Resolution mismatch, found 'machine name x' for 'machine name y' error when attempting to install an agent from the Console.

     

    Symptoms

     

    The following error will be displayed within the Operation Monitor when attempting to install the agent from the Console:

     

    mismatch.png

    You may see the above error in conjunction with the following string in the ST.Protect.Managed.log file:

     

    2014-06-12T15:26:39.0921766Z 0017 V ResolvableMachine.cs:215|Resolved by FQDN 'FSBXM2.shavlik.com' - 192.168.1.73, 192.168.1.74.

    2014-06-12T15:26:39.7785993Z 0004 E ResolvableMachine.cs:644|Name mismatch: expected FSBXM2, found hostname FSBXM1, netbios name FSBXM1

    2014-06-12T15:26:39.7785993Z 0004 W ResolvableMachineWorkflow.cs:209|FSBXM2 192.168.1.73 270

     

    Cause

     

    This message is typically caused by a DNS resolution issue. Protect is using .net (System.Net.Dns class) to query the DNS. Upon doing this the DNS is returning two IP addresses for the machine in question. Protect will take the first one and verify it is the correct machine. When we verify using the IP address, the return result is for that of the other machine listed. This is causing the error that is being seen with the machine resolution when attempting to install agents.

     

    Resolution

     

    Based on this information there appears to be a DNS resolution issue related to FQDN. We suggest working with your network team to resolve this issue as it appears to be directly related to the FQDN's returning multiple IP addresses.

     

    Affected Product(s)

     

    Shavlik Protect 9.x


    SSL3.0 vulnerability CVE-2014-3566 Poodle

    $
    0
    0

    Purpose

     

    This document contains information about the SSL3.0 vulnerability CVE-2014-3566 and whether is affects Shavlik Products or infrastructure.

     

    Details

     

    The CVE-2014-3566 SSL 3.0 (POODLE) vulnerability does not affect Shavlik products or infrastructure directly.


    The vulnerability is in the SSL 3.0 protocol.  If you disable this protocol on systems running Shavlik products you will effectively resolve the vulnerability.  Guidance on how to disable SSL 3.0 is available from OS and browser vendors.  Several are listed out inthis blog article.   Disabling SSL 3.0 on servers running web services in your environment will prevent exposure to those specific services.  You should also disable SSL 3.0 on client machines in your environment to protect them from connecting to services that are still exposed.  Again, documentation from Microsoft and other vendors describe how to do this at the OS and browser level. 

     

    Finally, the Shavlik team has already taken steps to secure Shavlik content and cloud services to ensure that all web services hosting Shavlik content and resources are protected from this vulnerability.


    Products

     

    Protect 9.x

    Shavlik Patch


    Preparing for Upgrade of Protect and Resolving Common Upgrade Issues

    $
    0
    0

    Purpose

     

    The purpose of this document is to help to prepare a current Protect console and database for upgrade to a newer version of Protect, and also to provide some information about how to resolve common upgrade issues.

     

    Description

     

    Preparing for Upgrade of Protect

     

    Most issues with upgrading Protect can be avoided by ensuring that you are meeting system requirements and that proper database maintenance has been performed prior to upgrade. The list below can be used as a guide to ensure you have a successful upgrade:

    • Review the System Requirements for the version of Protect you plan to install.
      Refer to the document - Shavlik Protect Requirements Guide
    • Review the Shavlik Protect Upgrade Guide.
    • Prior to upgrade, it is recommended that you clean out as much old results as possible and perform database maintenance.
      This document covers the full steps for database maintenance: DOC-23430
    • The user who will perform the upgrade of the database should either be the SA for the database in SQL, or the user should at least have the following privileges for the Protect database:
      Privileges required for upgrade purposes: db_securityadmin, db_ddladmin
      Privileges required for all Protect users: STExec, DB_DataReader, DB_DataWriter
    • If your Protect database is hosted on SQL 2005, review the document; Authentication Limitation with Protect 9.0+ and SQL 2005.
    • If you plan to move/migrate your console to a different system, review the document; Migrate Shavlik Protect Console.
      • There is a Migration Tool that can be used in some scenarios to move the console. Make sure to closely follow the Guide for this.

     

    Resolving Common Upgrade or Post-Upgrade Issues

     

    If you do have an issue during the upgrade process, it's possible the issue can be resolved based on some common issues listed below:

     

    Upgrade/Install Failure

      Post-Upgrade 

     

    What to do if you face an upgrade failure you cannot resolve

     

    If you receive an upgrade or installation failure, and you are not able to use the above resources to resolve the issue it's time to open a support case.

     

    Affected Product(s)

     

    Shavlik Protect 9.x

    vCenter Protect 8.x

    How to Locate and Transfer the License Key to New Protect Console Machine

    $
    0
    0

    Template

     

    Purpose

     

    This document outlines how to locate the Shavlik Protect license activation key in the console and transfer this key to a new or additional Protect console.

     

    Description

     

    When migrating to a new Shavlik Protect server or setting up an additional Protect console machine- understanding where to find the license key and how to input it in to the new console is vital to maintaining Shavlik Protect functionality through this transition. As this process may not frequently performed by administrators, a reference/guide for this process may prove to be helpful.

     

    Locating the License Key on Existing Protect Console

     

    Follow the process below to obtain your license key from your console machine. After locating the key in order to prepare to transfer the key to the new console machine, copy this 25-digit license key and make it readily available.

     

    In Shavlik Protect 9.x:

         Help>About Shavlik Protect Advanced

     

    protect9_1.bmp

    In the About Shavlik Protect window, the license key can be found in the main text display under

     

         License Key:

              Activation Key: xxxxxxxxxxxxxxxxxxxxxxxxxx


    Protect9_2_1.bmp

     

    In vCenter Protect 8:

    This process is nearly identical to the process in Shavlik Protect 9.x. Refer to the images above.

     

    To locate the license key follow this path:

              Help>About VMware vCenter Protect

     

    In the About VMware vCenter Protect window, the license key can be found in the main text display under:

              License Key:

                   Activation Key: xxxxxxxxxxxxxxxxxxxxxxxxx

     

     

    Note: In the event the Protect Console is no longer installed, it may still be possible to obtain the license key from the following registry entry:

    HKEY_LOCAL_MACHINE\SOFTWARE\LANDesk\Shavlik Protect\Console\Activation

    The AK Value will contain the Activation Key/License key.

     

     

    Activating the License Key in New Console

     

    Activation is the process by which the Protect software is validated as having been purchased.  In order for the new Protect console to fully function activation is required. Users are prompted after installing and opening Shavlik Protect to input their activation key, through the Shavlik Protect Activation window.

     

    Protect9Install_1.bmp

     

     

    To transfer the license key from your previous console machine follow the directions in the window as ordered by number:

     

         1. Select an activation mode (on left portion of window)

              Select "Product or bundle license"

         2. Enter your activation key(s) (in center of window)

              In the text field below, paste or manually input your 25-digit Protect license key

              Click the "Add" button right of the text field.

         3. Select activation method (lower-center of window)

              Choose "Online activation" if you have an internet connection.

              Click "Activate online now"(at the lower-right corner)

            

    If you require "Offline activation" see the following article- How to process a Manual (offline) Activation for Shavlik Protect

     

    If the software was previously launched and activated by selecting Trial mode, this window can be accessed through Protect by navigating to:

         Help>Enter/refresh license key...

     

    Protect9window.bmp

     

     

    Additional Information

     

     

    Affected Product(s)

     

    Shavlik Protect 9.x
    vCenter Protect 8.x

    Best Practices and FAQ on using Threat protection with Shavlik Protect agents

    $
    0
    0

    Purpose

     

    This document is meant to help understand why a threat may not have been detected by the Shavlik Protect agent and what actions to take in such a scenario as well as best practices for using/configuring threat protection with Shavlik Protect agents.

     

    Description

     

    Why didn’t Shavlik Protect agent catch 'xxx' threat?

     

    While this sounds like a straight-forward question, the reality is there are so many variables that come into play when you try to protect a machine against malware that it is almost impossible to give any one reason.

     

    The most likely cause is improper configuration or outdated threat definitions being used. We will go into how to ensure you've configured everything correctly and how to check the threat definitions version later. First, some background.

     

    The Shavlik Protect agent's Threat Protection engine is based on the Vipre SDK engine and uses threat definitions created by GFI's ThreatTrack Security (formerly Sunbelt Software). At this point there are over 13 million detections in the Vipre signature files. There are hundreds of generic detections that can catch some new malcode before the Vipre analysts even see it. Also the Vipre threat engine has the ability to detect and stop a great deal of virus-like behavior. However, it is worth noting that there may be as many as 50,000 new pieces of malcode arriving somewhere on the Internet EVERY day. The Vipre team see cases in which new malcode does make it through the threat protection defenses, but it is not a common occurrence.

     

    Is there a place I can check if a certain threat should be detected?

     

    Since the Shavlik Protect agent uses Vipre (ThreatTrack) threat definitions you can search the database, here:

    http://sunbeltsecurity.com/BrowseCategories.aspx

     

    How to verify your threat definitions are up-to-date

     

    There are a few places you may need to check to verify the threat definitions in-use by Shavlik Protect agents in your environment are up-to-date.

     

    1. Ensure that the threat definitions downloaded on the Protect console system are current. (This is especially important if you are using distribution servers.)

    -Go to Help > About within Protect. If your definitions are current you should see a green check under 'Data versions' next to Threat definitions.

         Capture.JPG

    -If the threat definitions displays a red x you should run Help > Refresh Files to perform the update of definitions.

    -When running Help > Refresh Files you will see that the 'Threat Definitions download will complete in the background.'

         Capture1.JPG

    -Make sure to give it a few minutes to update. Then you should see a green check next to Threat definitions in Help > About.

     

    2. You can use Machine View to see some threat definition information from your agents.

    -Go to View > Machines.

    -You can use the columns 'Threat Definition', 'Threat Definition Age', and 'Latest Threat Scan Date' to help in determining if your agents are current.

         Capture2.JPG

    -Keep in mind that these columns only update when the agent reports back results of a threat scan. That's why 'Latest Threat Scan Date' is important.

    -It is also worth noting that if the agent uses vendor-over-internet download settings the definition number may be slightly off from the console definition version from Help > About. It's nothing to worry about - just a difference in Major vs Minor versions.

    -Some of these columns are not shown by default - you can add them by right-clicking on a column title and clicking 'Column Chooser'.

         capture3.jpg

    3. If necessary, you can check the definition version on the agent itself.

    -Open the agent by double clicking the taskbar tray icon, or by going to Start > All Programs > Shavlik Protect > Shavlik Protect Agent.

    -Go to the Overview tab if you are not brought there by default. Here you can see the threat definition version used during the last threat scan.

         Capture4.JPG

    -If you have not recently run a threat scan this can be misleading. You can run a threat scan via the Threat tab, if configured.

    -To update the threat definitions from the agent GUI or run a threat scan, use the tasks in the upper left when on the Threat tab.

         Capture5.JPG

    -Note: Depending on the settings in the agent policy you may not be able to access the agent or access certain tabs. To change these settings go to the Protect console, and edit the agent policy. The settings are under General Settings > 'Allow the user to'.

     

    *Note: For offline or disconnected environments refer to this document for instructions on manually updating threat definition files:

    DOC-23162: Manually downloading threat definitions for Protect

     

    Why does the console (Help > About) threat definition version differ from the latest threat definition version on an agent?

     

    There can be a slight variation in the version numbers due to a minor and major version number system that the Vipre threat engine uses. The major, or 'Package Version' in the examples above is 27274 where the Minor or 'MinVersion' is 27270. Both versions are the current definition versions. These can be manually found by looking at the latest entry in the ThreatManifest.xml on the console sytem. Before checking this make sure the console threat definitions are up-to-date (step one above).

     

    The ThreatManifest.xml can be found in the Datafiles folder, most commonly:

    C:/ProgramData/LANDesk/Shavlik Protect/Console/ThreatData/ThreatManifest.xml

     

    Generally the latest will be the last entry, but it's best to base it on highest version number found or newest date. The entry in the xml will look something like this:

     

    <SpursPackage MinVersion="27270" PackageVersion="27274" URL="http://av.shavlik.com/av/CSE39-EN-27274-I.sbr.sgn" MD5="62FF771EAAE285B172A3A5EA2C8E7DB2" FileSize="103114" ReleaseDate="2014-03-10T16:12:48.250" IsIncrementalPackage="1"><SpursPackageType PackageType="ThreatDef" Language="EN" PackageTypeData=""/></SpursPackage>

     

    Notice the MinVersion and PackageVersion numbers. Note the ReleaseDate value - this will help determine the latest entry in the ThreatManifest.xml.

       

    Ensuring the Agent Policy, Distribution Server(s), and other settings are configured correctly

     

    Here are the best practices for ensuring the threat protection is configured correctly. You may need to verify agent policy settings in each agent policy you are using.

     

    1. Open the agent policy.

    2. Go to the General Settings tab.

    -Check on how your agent policy is set for the agent to obtain its definitions under 'Engines, data, and patch download location'.

    -If this is set to vendor over internet the agent will attempt to obtain definitions directly from the vendor site, so you may need to ensure that the internet connection is working properly and that the vendor site(s) are not blocked.

    -See this document for the URL exception list: DOC-2155: Shavlik Protect firewall and proxy exceptions URL list

    -Additionally if the agent policy is set to use vendor over internet and you use a proxy in your environment, it is pertinent that you verify your proxy settins and provide any required proxy credentials to authenticate. This can be done under the 'Network' section of the General Settings tab.

         Capture6.JPG

    3. Go to the Threat Tab

    -In the tabs above go to 'Threat Tasks'

    -Ensure that you have at least one threat task set up. There are options of quick or full scan.

    -Note: Quick scan covers common locations and runs within a few minutes. Full scan will scan all files on the system and may take up to an hour.

          Capture7.JPG

    4. Once you have your Threat Task(s) set up, go to the Active Protection tab.

    -Ensure to have a check next to 'Enable Active Protect'

    -Set the file access level that you would like active protection to use. Using the 'limit to high risk file types' or 'on execute' settings will increase performance but not all things will be checked by active protection.

         Capture8.JPG

    5. Check your settings on all other Threat tabs - Threat Actions, Allowed Threats, Exceptions to ensure they are set correctly.

    6. Save the changes to your policy.

     

    Ensuring Distribution Servers are configured correctly and synchronizing

     

    This section only applies if your agent policy is currently set to use a distribution server under 'Engine, data, and patch download location'.

     

    Capture9.JPG

     

    1. Verify the distribution server settings in-use by your agent policy or policies. If you have multiple distribution servers in-use you may need to perform the following steps for each distribution server. If your agent systems have internet connectivity available it's recommended to allow the 'Use vendor as backup source' setting.

    2. Go to Tools > Operations > Distribution Servers to verify the setup and sync of your distribution server(s).

         capture10.jpg

    3. Make sure to verify the paths to each distribution server is still valid, and verify there are valid credentials set on each distribution server.

    4. Make sure that automatic synchronization is set up for each distribution server.

    -You can add a scheduled sync by highlighting the distribution server, choose 'Threat engines/definitions' from the drop-down above, then click on the '+ Add scheduled sync' button.

    -You will see the scheduled sync added to the list of 'Scheduled automatic synchronization' below.

    5. Manually run the synchronization to make sure it completes successfully.

    -To do this, highlight the scheduled sync for threat data, then click 'Run now' above it.

    6. If you want to manually verify the files are synchronizing properly you can compare the files in your share to what exists on your Protect console.

    -The ThreatData directory of the console is: C:\ProgramData\LANDesk\Shavlik Protect\Console\ThreatData

    -If the sync has worked correctly you should have a ThreatData folder on your distribution server share with the same files in it as the above directory.

     

    For more information about configuring distribution servers, see this Protect Help article:
    Configuring a New or Existing Distribution Server

     

    Setting up automatic recurring download of threat definitions

     

    Follow these steps if you would like to set up the automatic download of threat definitions. This will help to ensure your definitions are always at the latest.

     

    1. Go to Tools > Operations > Downloads.

    2. Under the 'Schedule automatic downloads' section choose 'Threat engines/definitions' from the drop-down, then click '+Add'.

    3. You'll be brought to the Schedule Download screen where you can set up a recurring schedule to automatically download new definitions.

         Capture12.JPG

    4. Once you have this set up how you like, click 'Save.'

    5. You should now see a task for 'Download threat data' showing the next run time and recurrence. You can also highlight this and click 'Run now'.

         Capture13.JPG

     

    Other Considerations

     

    1. Use of Protect Cloud Agents

    -If you are using the Protect Cloud agent functionality you may need to ensure that your Protect cloud account is set up correctly.

    -Go to Tools > Operations > Protect Cloud Sync for these settings.

    -Make sure the Protect Cloud account credentials are correct, and you may need to run a 'Force full update now'.

         capture11.jpg

    -You may also need to go into your agent policy or policies and ensure the policy is set to sync with Protect Cloud if using this feature.

    -This setting is a checkbox found in agent policy > General Settings > Network > Sync with the Protect Cloud.

         Capture14.JPG

    For more information about Protect Cloud Sync see the following Protect Help articles:

    -Requirements and Usage Notes

    -Protect Cloud Sync Operations

     

     

    What do I do if I have verified everything appears to be working properly and threat definitions are current, but a threat is still not detected by the Shavlik Protect Agent?

     

    Here is what to do:

     

    1. Obtain as much of the following information as possible to provide to support:

    -Threat definition version currently used. (See above on how to find this)

    -   

    -Any applicable screenshots, a link to threat download if from a website, or a zipped copy of files that are suspected to be infected.

    -Logs from the agent. Make sure logging is set to 'All' in your agent policy. Follow steps for agent logging in DOC-22921.

    2. Submit the information to support by creating a case at https://support.shavlik.com/.

    3. The Shavlik support team will work with ThreatTrack (Vipre) to ensure the threat is assessed and added to future threat definitions.

       

     

    Additional Information

     

    More information about Shavlik Protect agents and threat protection can be found at the following resources:

     

    -Preparing to use Agents

    -Creating and Configuring a Threat Task

    -Configuring Active Protection

     

    Affected Product(s)

     

    Shavlik Protect 9.x

    Best Practice & Q/A - Using Security Tools

    $
    0
    0

    Purpose

     

    The purpose of this document is to provide some Q&A and cover best practices on using the 'Security Tools' patch type filter within Protect.


     

    Description


    What are Security Tools?

    Within Protect it's possible to enable scanning for a patch type filter of "Security Tools". Security Tools are updates and security advisories such as Windows Defender updates and Windows Malicious Software Removal Tool. This also includes certificate updates and hotfixes for known security risks that are not yet fully supported by a security bulletin.

     

    Scanning for Security Tools is enabled within a custom Patch Scan Template. (Figure 1)

     

    Figure 1: Example of Filtering tab within a custom Patch Scan Template using the Security Tools filter:

    Capture.JPG

     

    Best Practice for Scanning/Deploying Security Tools

     

    The best practice for using Security Tools is to only apply these when necessary and when proper testing has been done in your environment. Most items in set as a Security Tool in Protect apply only for specific scenarios. Make sure to read the corresponding Bulletin or KB article from the vendor prior to applying these updates.

     

    Why do some Security Tools always show as missing?

     

    There are some items classifed as security tools that will always show as missing due to the nature of the update. Please see the following document concerning these updates: http://community.shavlik.com/docs/DOC-23049

     

     

    Affected Product(s)

     

    Shavlik Protect 9.x

    vCenter Protect 8.x

    Shavlik SDK

    Shavlik Rebrands

    Best Practice - Order In Which To Apply Updates And Service Packs For Agentless Patch Acanning And Deployment

    $
    0
    0


    Purpose

     

    This document is meant to describe the best practices for the order in which to apply updates with Protect when using agentless patch scanning and deployment.

     

    Description

     

    When preparing to deploy updates to your systems with Shavlik Protect, it is best to follow the order listed below:

     

    1. If you wish to deploy software using the software distribution feature of Protect, do so first.
      See the following document for more information on software distribution: http://community.shavlik.com/docs/DOC-23116
    2. Run a patch scan for Security Patches and/or (optional) Non-Security Patches and Security Tools.
      More info about creating a patch scan template can be found here:
      http://www.shavlik.com/onlinehelp/Protect90HTMLHelp/Creating_or_editing_a_patch_scan_template.htm
    3. View scan results. How many service packs show missing? These should be applied prior to patches/hotfixes.
    4. Deploy operating system level service packs first.
    5. Run your patch scan again after applying OS level SPs.
    6. Deploy any remaining service packs. Take into account that each service pack must be deployed separately, and each service pack will require a reboot.
      This can seem tedious, however, it's important that you do service packs first. Service packs may update the base code for the application as well as apply currently missing updates during the process. New updates may be required once the service pack is applied as well.
    7. After all service packs have been applied, run a patch scan on the systems once more, and then deploy missing patches.

     

    Additional Information

     

    More information about agentless deployment of service packs and patches can be found in Protect's online Help under "Agentless Patch Management Tasks".

     

    Protect Online Help:

    http://www.shavlik.com/onlinehelp/Protect90HTMLHelp/HFN.htm

     

    Additional Information from Microsoft about best practices for applying updates can be found here:

    http://technet.microsoft.com/en-us/library/cc750077.aspx

    http://technet.microsoft.com/en-us/library/cc512589.aspx

     

    Affected Product(s)

     

    Shavlik Protect 9.x

    vCenter Protect 8.x

    Contact Information For License Renewals\Sales

    $
    0
    0

                                                                                                          

    Purpose

     

    The purpose of the this document is to provide the current contact information for Shavlik's licensing renewals\sales teams.

     

    Description


    Contact Information:


    Phone:

    800-690-6911 (Option 1)


    Email:

    New customers:

    sales@shavlik.com

    Renewals:

    renew@shavlik.com

     

    Additional contact information can be found at http://www.shavlik.com/contact/.


    Affected Product(s)

     

    All Shavlik Products


    How To Process A Manual (Offline) Activation For Shavlik Protect

    $
    0
    0

                                                                                                              

    Purpose

     

    This document is meant to provide the steps on how to perform an offline or 'manual' activation of the Protect application.

     

    Description

     

    If you are unable to activate Shavlik Protect over an internet connection for any reason, you have to option to choose the 'Manual Activation' function. Here is the full process on how to use the manual (or offline) activation function:

     

    1. Select an activation mode (either Product or bundle license or Trial mode).

    2. Paste or type your key into the Enter your activation key(s) box.

    3. Select Manual activation.

    4. Click Create request.

    5. An XML file named LicenseInfo.xml is generated and saved to the desktop of your console computer. This file contains the information needed to make an offline activation request.

    6. Move the XML file to a computer that has an Internet connection.

    7. On the Internet-connected computer, open a browser and go to https://license.shavlik.com/OfflineActivation.

    8. Upload the LicenseInfo.xml file.

    9. The web portal will process the license information and generate a license file.

    10. Download the processed license file and move it to the console computer.

    11. Within Shavlik Protect, select Help > Enter/refresh license key.

    12. On the Shavlik Protect Activation dialog click Import manual license.

    13. Go to the location of the processed license file and then click Open.

    14. Shavlik Protect will process the file and the program will be activated.

     

    If for some reason you are unable to activate using the offline activation portal mentioned above, please open a case with support and send your manual activation file in using the support portal: https://www.support.shavlik.com.

     

    Please see this article if you need assistance registering: http://community.shavlik.com/docs/DOC-2265

     

    Further details about activating the program can be found in the following Help document within Shavlik Protect:

    Help > Contents > Installation and Setup > Getting Started > Activating the Program

     

    Affected Product(s)

     

    Shavlik Protect 9.x

    vCenter Protect 8.x (except build 3756)

    Shavlik Protect Standard/Advanced 9.1 Patch 2 Release Notes

    $
    0
    0

    Overview


    These release notes support Patch 2 for Shavlik Protect 9.1. The patch can be downloaded from this link:

    http://www.shavlik.com/downloads/protect/


    The patch can be applied to Shavlik Protect build 9.1.4334.0 and 9.1.4446.


    Resolved Issues


    • Updated content feed to allow for new format change for CVE.

    • Resolved an issue where deployment email notifications were not being sent if send mail in hours was set to 0 and deployment fails on any system in the deployment.

    • Resolved an issue ST.ServiceHost.exe.config is not overwritten on upgrade from previous version if the config file was modified manually resulting in ‘email service is currently unavailable’ error.

    Custom Action - Remove the Propatches folder

    $
    0
    0

    Overview


    This document outlines how to use a Custom Action to remove the ProPatches folder.  A Custom Actionmay include executing a specific command or invoking a custom batch file at specified time(s) during the deployment process. You can specify custom files and actions that occur during every deployment that uses the template, or only for those deployments that install a specific patch or service pack.

     

    Configuration Setup


    A Custom Action will only run if a deployment occurs. If there are no missing patches selected to deploy to a target machine, the Custom Action will NOT occur.

     

    1. Create a New Scan Template; enter a Name for the Template, and Save it.
      1. Alternatively - open an existing Scan Template you wish to modify.
      2. Select CustomActions under the Patch Properties tab.
      3. Save and close.


    1.png

     

    2.  Create a new Deployment Template.

         -     Give it a Name

         -     Uncheck Send Tacker Status

     

    2.png

     

    3.     Go to the Post-Deploy Reboot tab and choose "Never Reboot After Deployment".

     

    3.png

     

    4.     Go to the Custom Action tab and click New.

            -    Step 1 - Leave default

            -    Step 3 - Change to 'After all Patches"

            -    Step 4 - Enter the following: rmdir /s /q %pathtofixes

            -    Click Ok

     

     

    4.png

     

     

    5.     Save and close the Deployment Template.

    6.     Use the new Scan Template to scan all your machines

    7.     Use the new Deployment Template to deploy the QSK2745 MSST-001 patch. This patch is used for Custom Actions.

     

    Related Documents

     

     

    Products

     

    Protect Version: All

    Error: "The e-mail service is currently not available.", following 9.1 Patch 1 Upgrade

    $
    0
    0

    1604_157_49_cache.png

     

    Purpose

     

    Following upgrading to Shavlik Protect version 9.1.4446 some users may encounter an error "The e-mail service is currently not available", and some users may find that their automated email reports are not sending. The purpose of this document is to provide a workaround for those who may encounter this issue and for those affected help restore proper function of automated email reports in Protect.

     

    Symptoms

     

    Following the installation of the Patch upgrade for Protect that takes the application from version 9.1.4334 to 9.1.4446, some users after completing a scan or initiating a deployment may receive a dialog box popup in the application containing the following error:

    email error.PNG

    "The e-mail service is currently not available."

     

    The Protect.Managed log should show the following exception:

     

    2014-XX-XXTXX:XX:XXXXXXX E EmailRecipientSelector.cs:205|ST.UI.UserViewableException: The e-mail service is currently not available. ---> System.ServiceModel.ProtocolException: The .Net Framing mode being used is not supported by 'net.pipe://localhost/ST/Console/Messaging/ResultsNotification'. See the server logs for more details.

       at System.Runtime.AsyncResult.End[TAsyncResult](IAsyncResult result)

       at System.ServiceModel.Channels.ServiceChannel.SendAsyncResult.End(SendAsyncResult result)

       at System.ServiceModel.Channels.ServiceChannel.EndCall(String action, Object[] outs, IAsyncResult result)

       at System.ServiceModel.Channels.ServiceChannelProxy.TaskCreator.<>c__DisplayClass2.<CreateTask>b__1(IAsyncResult asyncResult)

       at System.Threading.Tasks.TaskFactory`1.FromAsyncCoreLogic(IAsyncResult iar, Func`2 endFunction, Action`1 endAction, Task`1 promise, Boolean requiresSynchronization)

    --- End of stack trace from previous location where exception was thrown ---

       at System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess(Task task)

       at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task)

       at ST.UI.Controllers.Configuration.MailController.<SendNotificationEmailAsync>d__d.MoveNext()

       --- End of inner exception stack trace ---

       at ST.UI.Controllers.Configuration.MailController.<SendNotificationEmailAsync>d__d.MoveNext()

    --- End of stack trace from previous location where exception was thrown ---

       at System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess(Task task)

       at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task)

       at System.Runtime.CompilerServices.TaskAwaiter`1.GetResult()

       at ST.Protect.Forms.Email.EmailRecipientSelector.<SendEmailClickAsync>d__13.MoveNext()

     

    Cause


    Users should only see this error message after upgrading using the patch, not the full 9.1.4446 install. It appears that during the patch upgrade process, some of the necessary components may not upgrade successfully in some environments.

     

    Resolution

     

    The issue can be resolved by upgrading Protect its newest release, Patch 2 (build 4472). Installing this patch over affected console machines will totally resolve the issue.

     

    Shavlik Protect 9.1 Patch 2 can be downloaded from the following link:

    http://rs.shavlik.com/downloads/ShavlikProtectPatch_9.1.4472.exe

     

     

    Affected Product(s)

     

    Shavlik Protect 9.1.4446

    Another version of this product is already installed. Installation of this version cannot continue.

    $
    0
    0

    Symptoms

     

    When running the Shavlik Protect Install Program, The following error is returned:

    Another version of this product is already installed.  Installation of this version cannot continue.  To configure or remove the existing version of this product, use Add/Remove Programs on the Control Panel

    upgradeerror.png

     

    Cause

     

    Download Version 9.1.4472 - 84 MB full installer for new installs is being used on a machine with an existing version of protect 9.1 or with remnants of a previous Protect 9.1 installation

     

    Resolution

     

    If Protect 9.1 build .4334 or .4446 is already installed,  use Download Protect v9.1 Patch 2 - 18 MB (.exe)  to upgrade the existing 9.1 version to build .4472

    If the patch 2 fails remove the remnants of the previously failed 9.1 installation using instructions found at Install/Uninstall - How to clean up broken installs of Shavlik Protect with the Microsoft Fixit Tool , https://community.shavlik.com/docs/DOC-23613

     

    Affected Product(s)

     

    Shavlik Protect 9.X

    Viewing all 1352 articles
    Browse latest View live