Quantcast
Channel: Shavlik User Community : Document List - All Communities
Viewing all 1352 articles
Browse latest View live

How to View Detection Information for Patches in Protect and Understanding what it means

$
0
0

Purpose

 

This document is intended to show how to view and understand detection criteria for supported patches within Shavlik Protect.

 

Description

 

Viewing the reason that a patch is found missing within a Scan Result

 

If you want to see the specific detection criteria that Protect used to determine a patch was found missing, you can do so following these steps.

 

There are two methods of getting to point where you can view the scan result.

1) Within Operations Monitor, when a scan is complete - click on '6.View complete results' to open the scan result.

AfterScan.jpg

 

OR

 

2) Click the main drop-down menu for Protect (in the upper left corner), then choose 'Results'.

dropDown_results.jpg

Click on the specific scan result you wish to view.

dropDown_results2.JPG

Either option will bring you to a the scan result screen, such as seen below.

 

To view the reason a patch was found missing:

1) Open the scan result with the steps above.

2) In the 'Patches' section of the scan result, click and highlight the patch you wish to view.

3) Ensure the 'Patch Information' tab is selected in the bottom section of the scan result.

4) There is a section that will display the reason Protect found the patch as missing.

View_patch_information_result.jpg

Generally you will see one of the two following types of reasons:

  • "File version is less than expected: PathToFile\file.dll 1.0 < 2.0" indicating the file is found but not at the required version for the patch to be considered installed.
  • "File not found PathToFile\file.dll 2.0" indicating Protect detected the product to which the patch applies existing on the system, but a file that needs to be updated was not found on the system.
  • "The registry key 'xxx' does not exist. It is required for this patch to be considered installed." indicating Protect found the product to which the patch applies existing on the system, but the registry key indicating this patch is installed does not currently exist on the system as expected.
  • "The registry key 'xxx' should have a value of '1.1' It has a value of '1.0'." indicating Protect found the expeccted registry key, but the value of the registry key is not at the required value for the patch to be considered installed.
  • If no reason is shown for the missing patch - This indicates that Protect is using what we refer to as a "patch script" to determine if the patch is missing. When using a patch script Protect is unable to provide the reason within the scan results.

 

Viewing Detection Criteria by Looking Up patches in Patch View

 

You can also look up individual patches and see the basic detection criteria for a patch using Patch View in Protect.

 

1) Go to View > Patches.

view_patches.jpg

2) Search for the patch you want to find. In the example below I just searched "Firefox", then scrolled to FireFox 33.1 and expanded the view. You can also type a bulletin ID or KB number into the search box to be more specific.

3) Click and highlight the patch, and then ensure the bottom section is on the 'Patch Information' tab.

View_patch_information_patchview.jpg

4) Within the Patch Information tab you will see the detection criteria listed at the bottom. This may display one or all of the following:

  • Registry Key - The registry key required to determine the patch is installed
    • Registry Value - The corresponding value of the registry required for the patch to be considered installed. (Not always needed)
  • File Name - The name of a file required for the patch to be considered installed.
    • Version - The corresponding version number of the file for the patch to be considered installed.
    • File Location - The path where Protect is attempting to find the file. Generally listed using a variable path.

 

 

Additional Information

 

It is worth noting that Protect's detection logic is not the same as other patch scanners or even Windows Update. You should not expect the exact same results.

 

Refer to these documents for more information:

Explanation of how patch scanning detection works with Shavlik Protect

Why Shavlik Protect Patch Scan results differ from Windows Update

 

Affected Product(s)

 

Shavlik Protect, All Versions



Why Shavlik Protect Patch Scan results differ from Windows Update

$
0
0

Template

Purpose


An explanation of why Shavlik Protect patch scan results may show different patches needed than when running a Windows Update.

 

Solution


Shavlik Protect uses different detection logic to scan for patches than Windows Update and other patch vendors.A Windows Update scan has the ability to show missing Security Patches, Non-Security Patches, Security Tools, driver updates, and sometimes patches that aren't publicly downloadable.

 

Depending on what Scan Template you are using in Protect, the results will vary. The built-in security patch scan will only show missing security patches. The built-in WU scan will show missing security patches and non-security patches. And please note - we don't always include all non-security patches in our XML data right away either, as security patches take precedence.

 

You can always create a Custom Scan Template, and check security patches, non-security patches, and security tools for the most robust scan with Protect.

 

Shavlik uses a variety of methods to see if a target machine needs a patch.  The process is detailed in the document "Explanation of how patch scanning detection works with Shavlik Protect" which can be found here:http://community.shavlik.com/docs/DOC-2259.

 

Administrators can view files and registry entry criteria by searching for the patch in View > Patchesof the Shavlik Protect Console main menu.

 

See this online help file for more information on using Patch View:

http://www.shavlik.com/onlinehelp/Protect90HTMLHelp/Viewing_Patch_Details_(Patch_View).htm

 

There is also a difference in how Protect displays criticality and vendor severity. See this document for further information concerning this:
Understanding patch severity in a Shavlik Protect patch scan and why it may differ from Windows Update

 

Affected Product(s)


Shavlik Protect 9.x

Manually Downloading and Installing the Prerequisite Software for Shavlik Protect

$
0
0

Purpose

 

This document shows how to obtain the download links for any prerequisite software so you can download and install it manually in case you don't want Protect to automatically install or in case your system does not have access to the internet.

 

Description

 

During the installation process of Protect you will reach the 'Shavlik Protect Setup' screen. If you need to manually download any of the listed prerequisite software, just click on "View release notes", and a text file titled 'InstallReadMe.txt' will pop up.

Capture1.jpg

 

Within the InstallReadMe.txt scroll down to the section titled "MANUAL INSTALLATION OF PREREQUISITES". The download URLs are listed in this section.

 

Additional Information

 

It's worth noting that the prerequisite software often changes with newer versions of Protect. The InstallReadMe from an older version may no longer have the valid prerequisite software listed for the latest version of Protect.

 

Affected Product(s)

 

Shavlik Protect, All Versions


Bypassing the Prerequisite download screen during Installation of Shavlik Protect

$
0
0

Purpose

 

This document shows how to bypass the prerequisite download or "Shavlik Protect Setup" screen during the installation of Shavlik Protect.

 

Description

 

If necessary you can bypass the prerequisite download or "Shavlik Protect Setup" screen by simultaneously pressing CTRL + S on the keyboard.

 

Capture.JPG

 

Notes:

Generally this may only be useful if something in the list that is not mandatory has failed to download or install. Note that if you skip this screen and fail to manually install the prerequisite software the Protect installation will get to a point where it cannot continue.

 

Additional Information

 

Manually Downloading and Installing the Prerequisite Software for Shavlik Protect

 

Affected Product(s)

 

Shavlik Protect, All Versions


Re-release of MS14-066 (KB3018238) only affects Server 2008R2 and 2012

$
0
0

Symptoms

 

You do not see the re-release of MS14-066 (KB3018238) shown as missing on systems with the following operating systems:

Windows Server 2003

Windows Vista

Windows Server 2008

Windows 7

Windows 8

Windows 8.1

Windows Server 2012 R2

 

Cause

 

The re-release patch (KB3018238) does not apply to the above listed operating systems.

 

Resolution

 

The re-release patch (KB3018238) only applies to Windows Server 2008 R2 and Windows Server 2012.

 

According to the revision listed in: Microsoft Security Bulletin MS14-066 - Critical

 

"V2.0 (November 18, 2014): Bulletin revised to announce the reoffering of the 2992611 update to systems running Windows Server 2008 R2 and Windows Server 2012. The reoffering addresses known issues that a small number of customers experienced with the new TLS cipher suites that were included in the original release. Customers running Windows Server 2008 R2 or Windows Server 2012 who installed the 2992611 update prior to the November 18 reoffering should reapply the update. See Microsoft Knowledge Base Article 2992611 for more information."

 

 

Affected Product(s)

 

Shavlik Protect 9.x

How to configure your Windows Firewall for Shavlik Protect

$
0
0

Template

Purpose


The following article explains how to configure Windows Firewall to allow Shavlik Protect in every supported environment via the GUI, command prompt, and GPO. (Scroll to the bottom to see Protect's Port Requirements)

 

Description

 

Configuring Firewall

 

How to configure the Firewall in Windows XP and Windows Server 2003

 

  1. Click Start > Control Panel > Security Center
  2. In Windows Security Center, under Manage Security Settings click Windows Firewall
  3. Under Programs and Services, select the check box for File and Printer Sharing and click OK
  4. Navigate to the Exceptions tab and click on the Add Port.. button
  5. In the Name box, enter any name you wish (i.e. Protect1, Protect2, etc)
  6. In the Port number box, enter your desired port, Select TCP or UDP and hit OK
  7. Next, navigate back to the Add Ports.. button under the Firewall Exceptions and create a second rule
  8. Repeat Steps 5-6 for all desired Ports.

 

 

How to configure the Firewall in Windows Vista

 

  1. Click Start > Control Panel > Security > Windows Firewall
  2. Click Allow a program through Windows Firewall.  If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
  3. Click Add port
  4. In the Name box, enter any name you wish (i.e. Protect1, Protect2, etc)
  5. In the Port number box, enter your desired port, Select TCP or UDP and hit OK
  6. Repeat on steps 3-5 until all ports below have been entered.

 

 

How to configure the Firewall in Windows 7, Windows 8, Server 2008 and Windows Server 2012

 

  1. Click Start > Control Panel > Security > Windows Firewall
  2. Click Advanced Settings
  3. Select Inbound  rules
  4. Click New Rule.. in the right action window
  5. Select Port and hit Next
  6. Select TCP and Specific local ports:
  7. Add your desired ports into the port field and hit Next
  8. Select Allow the Connection, hit Next
  9. Check all three boxes: Domain, Private and Public, then hit Next
  10. Give the rule any name and description you wish, and hit Finish
  11. Click Advanced Settings again
  12. Select Outbound rules this time
  13. Repeat steps 4-10

 

Opening Ports Using GPO   

 

To create rules using Server 2003 GPO:

 

  1. Log on to a machine on the network with domain administrator privileges. The machine needs to be running Microsoft Windows XP SP1 or Microsoft Windows Server 2003.
  2. Download and install the .NET framework (Required for the next step)
  3. Download and install the Microsoft Group Policy Management Console (GPMC). The GPMC can be downloaded from:http://www.microsoft.com/downloads/details.aspx?FamilyID=0a6d4c24-8cbd-4b35-9272-dd3cbfc81887&displaylang=en
  4. To launch GPMC, click Start > Run and type in gpmc.msc
  5. Expand the tree under the forest you will be updating
  6. Expand the tree under Domains and expand the domain which you will be updating
  7. Right click Default Domain Policy or the GPO you will be applying the changes to, and select Edit…

 

Do the following in the Group Policy Object editor MMC:

 

  1. Go to Computer Configuration > Administrative Templates > Network > Network Connection > Windows Firewall > Domain Profile
  2. Double click the entry Windows Firewall: Define port exceptions
  3. Select Enabled
  4. Click the Show… button to bring up the port exception list dialog
  5. Select the Add… button
  6. Specify the required port using the following syntax/convention: <port>:<transport>:<scope>:<status>:<name>

 

For example, to allow connections on port 139 from the IP addresses in the local subnet, configure the rule as follows:  139:TCP:localsubnet:enabled:SMB

 

Repeat steps 5 & 6 to add the following ports:

 

How to create rules using Windows Server 2008 (including R2) GPO and Server 2012

 

To enable Firewall permissions on all domain clients:

 

  1. Click Start > Administrative Tools > Group Policy Management
  2. Expand Group Policy Management > Forest > Domains > <Domain name> > Group Policy Objects
  3. Right click Default Domain Policy and select Edit
  4. Expand Computer Configuration > Policies > Windows Settings > Security Settings > Windows Firewall with Advanced Security, then right click Inbound Rules and select New Rule…
  5. In the New Inbound Rule Wizard, select Port and click Next
  6. Select Specific Local Ports and type your desired Port numbers and click Next
  7. Select Allow the Connection and click Finish
  8. From Group Policy Management Editor, expand Computer Configuration > Policies > Windows Settings > Security Settings > Windows Firewall with Advanced Security, then right click Outbound Rules and select New Rule…
  9. Repeat Steps 5 to 7 and allow your desired ports.
  10. Close the Group Policy Management Editor
  11. From Group Policy Management, expand Group Policy Management > Forest > Domains > <Domain name> > Default Domain Controllers Policy
  12. Repeat steps 4 to 9
  13. Close Group Policy Management

 

 

Additional Information

 

Port Requirements for Protect. (taken from this documentPort requirements for Shavlik Protect)

 

This table outlines the port requirements for inbound ports:


                                                                                                                                                                             

InboundPort
Client System – Asset Scans

TCP 135

Client System – Patch Scans and Deployments

TCP 137-139 or TCP 445

Client System – Listening Agents

TCP 4155

Client System – Scheduler

TCP 5120

Client System – WOL

UDP 9

Protect Console – Traffic to Shavlik Console serviceTCP 3121
Distribution Server – HTTP configurationTCP 80
Distribution Server – HTTPS configurationTCP 443
Distribution Server – UNC configurationTCP 137-139 or TCP 445

 

This table outlines the port requirements for outbound ports:

 

                                                                                                                                     

OutboundPort
Client System – AgentsTCP 80
Client System – Agentless scansTCP 139 or TCP 445
Client System – Agents & Deployment TrackerTCP 3121
Protect Console – Patch and data downloadsTCP 80
Protect Console – Patch Scans and DeploymentsTCP 139 and TCP 445
Protect Console – SchedulerTCP 5120
Protect Console – WOL and error reportingUDP 9


***Some information may have been referenced fromhttp://kb.gfi.com/articles/SkyNet_Article/How-to-prepare-your-firewall-to-allow-proper-communication-between-agents-and-…

 

 

Affected Product(s)

 

Shavlik Protect 9.x

Shavlik Protect Downloading Incomplete Patch Files From Vendor

$
0
0

Symptoms

 

Shavlik Protect shows patch files are successfully downloaded in the logs. The resulting files show the correct file name and executable extension in the download directory but are in fact not fully downloaded.  These files are usually less than 5 kilobytes.

Failed execution of these file can hang whole patch jobs

 

Cause


A content filter or proxy is rejecting the download and returning HTML file messages that are renamed to the file name and extension of the patch.  Other network or internet connectivity issues could also cause incomplete downloads.

 

Resolution

 

Delete these files from the Protect server.

Add the sites listed at Shavlik Protect firewall and proxy exceptions URL list to the exception list of the device blocking the downloads.

Attempt to download the patch(es) and verify they are completely downloading.


Products

Protect 9.X


Information about the Digital Signatures of .CAB files used by Shavlik Protect

$
0
0

Purpose

 

This document is intended to provide information about how Shavlik signs the .cab files used for downloading patch definition files.

 

Description

 

Protect currently uses .cab files for downloading and extracting many of the data files and binaries.

 

Shavlik does sign the cab files.  We use a standard code signing certificate (from VeriSign).

 

The signature algorithm is sha1RSA.

The digest algorithm is md5.

The digest encryption algorithm is RSA.

 

Affected Product(s)

 

Shavlik Protect 9.0.x

Shavlik Protect 9.1.x



SQL Account Configuration - Privilege or Role Requirements for Protect Database

$
0
0

Purpose

 

This document covers the minimum account privilege requirements for using Protect's SQL database.

 

Description

 

Below are the privileges (roles) required within SQL for a user in possible scenarios:

 

Database Creation:
New installations of the Protect database require an account that has at least the DB_Creator role. 

 

If the account has nothing else but DB_Creator it will give the account the proper rights when it creates the database.  So for situations where you have a DBA involved you can have them add a windows user to SQL with DB_Creator, Protect can create the database, then after completion the DBA can remove DB_Creator from that user.

 

Protect User:
Any protect user must have the following roles assigned for the Protect database to use the product: 

STExec

DB_DataReader

DB_DataWriter 

 

This must be configured for each user who will authenticate with the Protect database.    

 

Upgrade Rights:
When we upgrade the product there are typically schema changes to the DB.  These changes require additional rights that are not required for day to day usage of the product.  Ensure the customer knows that for any upgrades they have to use an account with this level of rights otherwise the DB upgrade will fail.

 

To successfully perform an upgrade of the Protect database the following roles will be required:

db_securityadmin

db_ddladmin 

 

Example of how you would see this in SQL Server Management Studio:

CreatNewSQLUser_roles.gif

 

Additional Information

 

More information from the Shavlik Protect product documentation:

SQL Server Pre-Installation Notes

SQL Server Post-Installation Notes

 

The ability to check these privileges will require a DBA or the use of SQL Server Management Studio.

 

Affected Product(s)

 

Shavlik Protect, All Versions


Shavlik Protect Requirements Guide

$
0
0

 

Purpose

 

This document is meant to be a guide to link you to all requirements or pre-requisite information you may need for Shavlik Protect.

 

Description

 

Below is a list of links to the different requirements you may need to use Protect or certain features within Protect.

 

System Requirements v.9.xhttp://www.shavlik.com/onlinehelp/Protect90HTMLHelp/System_requirements.htm
Port Requirementshttp://community.shavlik.com/docs/DOC-2161
Local Admin Requirement to open Protecthttp://community.shavlik.com/docs/DOC-23159
Hardware Performance Guidelineshttp://community.shavlik.com/docs/DOC-2256
Agentless Patch Scanning Prerequisiteshttp://community.shavlik.com/docs/DOC-23019
http://www.shavlik.com/onlinehelp/Protect90HTMLHelp/Scanning_prerequisites.htm
Agentless Patch Deployment Prerequisiteshttp://www.shavlik.com/onlinehelp/Protect90HTMLHelp/Patch_deployment_prerequisites.htm
Agentless Asset Scan Requirementshttp://www.shavlik.com/onlinehelp/Protect90HTMLHelp/Asset_Scan_Requirements.htm
Virtual Machine Template Patching Requirementshttp://community.shavlik.com/docs/DOC-23054
Agentless Power Management Requirementshttp://www.shavlik.com/onlinehelp/Protect90HTMLHelp/Power_Management_Requirements.htm
http://community.shavlik.com/docs/DOC-23355
IT Scripts Requirementshttp://www.shavlik.com/onlinehelp/Protect90HTMLHelp/ITScripts_Requirements.htm
Virtual Infrastructure Requirementshttp://community.shavlik.com/docs/DOC-22971
Protect SQL Privilege RequirementsSQL Account Configuration - Privilege or Role Requirements for Protect Database
Agent Installationhttp://community.shavlik.com/docs/DOC-23004
Cloud Agent Prerequisiteshttp://community.shavlik.com/docs/DOC-23152


Affected Product(s)


Shavlik Protect 9.x

Scan Error 830 - Unable to connect to the virtual server

$
0
0


Symptoms

 

When performing a scan you get Error Code 830, unable to connect to the virtual server.

Error830.PNG

 

 

Cause

 

When scanning a virtual machine VMware Tools need to be installed and on a supported version.

VMToolsNotInstalled.PNG

 

 

 

Resolution

 

Install or update VMware Tools, and then refresh the ESXI Hypervisor in your machine group so it shows the VMware Tools current or supported. Run the scan again.

 

Product(s)

 

Shavlik Protect 9.x

Troubleshooting Shavlik Protect patch scan error messages

$
0
0

ShavlikIcon.png

Purpose

 

 

Many of the common Shavlik Protect scan errors can be corrected by changes to configuration or environment. This article lists the most common scan error messages and provides some guidance on correcting the issue.

 

Cause

 

Scan errors can occur:

 

  • If one or more of the Shavlik Protect Scanning Prerequisites have not been met 
  • If one or more configuration issues are present in Shavlik Protect 
  • Due to one or more environmental issues

 

Resolution

 

The table below lists the error codes with the known reason or solution. Most scan errors can be resolved by ensuring you are meeting requirements.
Note: You can see the scan errors listed by viewing your scan result under the 'Results' section and viewing the 'Machines Not Scanned' tab of the scan result.
Capture.JPG

 

Error Code

Description

Error Code 101:

Unable to determine System Language

The scan process reads the Windows ntdll.dll file to determine the language of the system. If this file is inaccessible, the prerequisite validation fails and the scan is aborted. See the following document for more information: http://community.shavlik.com/docs/DOC-23310
Error Code 105:
MS_UNABLE_TO_GET_SYSTEM_DATA
This issue occurs due to an access denied message at the root of the problem, or due to other enironmental or network related issues. See the following KB:
http://community.shavlik.com/docs/DOC-2233
Error Code 200:
System not found. Scan not performed.
This indicates that the specified computer was not located and could not be scanned.
Error Code 201:
System not found. <system error message>
A network problem is preventing the specified machine from being scanned. Check to see that your computer (the scanning machine) is properly connected to the network and that you can remotely logon to the specified machine.
Error Code 202:
System not found. Scan not performed.
A network or system error occurred while the scan was in process. Check to see that your scanning machine is properly connected to the network and that the machine being scanned is still connected to the network. Also ensure that the remote machine is running the Server service.
Error Code 230:
Scan not performed. <system error message>
A general network error has occurred. See the system documentation for more information.
Error Code 235:
System not found, or NetBIOS ports may be firewalled. Scan not performed.
Most likely, there is no machine with the specified IP address. If a machine does exist at this address, a personal firewall or port filtering device may be dropping packets destined for TCP ports 139 and 445.
See the following KB: http://community.shavlik.com/docs/DOC-2220
Error Code 261:
System found but it is not listening on NetBIOS ports. Scan not performed.
A machine exists at this IP address but it is either not listening on, or is blocking access to, TCP ports 139 and 445.

Error Code 270:

Connected to a machine with the wrong hostname or domain name.

Ensure that you are meeting all scanning prerequisites, and that you are able to resolve the target system properly by forward and reverse nslookup.

Example:

nslookup target_IP_address

nslookup target_NetBIOS_name

Error Code 301:
SystemRoot share access required to scan.

Unable to connect to the remote machine’s system share. This may occur if the administrator has unshared the systemroot (typically C$ or similar) or has disabled the AutoShareServer(Wks) via the registry.

 

See: Scan Error 301 - SystemRoot share access required to scan

 

For more information on restoring Admin Shares, see the Microsoft Knowledge Base article 318755.
Error Code 429:
DLL is not properly registered.
Error Code 430:
Incorrect version of MDAC.
Error Code 451:
Admin rights are required to scan. Scan not performed.
The current or specified user account performing the scan does not have administrative rights to the machine being scanned. Check to see that the specified account is a member of the local administrators group on the machine being scanned (or is a member of a group with local administrative rights).
Error Code 452:
NetChk is unable to scan this machine. Please check to see that you have administrative rights to this machine and are able to login to this machine from your workstation. Scan not performed.
Check to see that the Server service is enabled on the remote machine and that you can remotely logon to this machine. Ensure that the Workstation service is running on the machine performing the scan.
See the following KB: http://community.shavlik.com/docs/DOC-2218
Error Code 501:
Remote registry access denied. Scan not performed.
Check to see that the Remote Registry service is enabled on the machine being scanned.
See the following KB: http://community.shavlik.com/docs/DOC-2219
Error Code 502:
Scan not performed. Error reading Registry <system error message>
A general registry error has occurred. See the system documentation for more information.
Error Code 503:
Scan not performed. Error reading Registry.
A general registry error has occurred. No additional information is available.
Error Code 553:
Unable to read registry. Please ensure that the remote registry service is running. Scan not performed.
Check to see that the Remote Registry service is enabled on the machine being scanned.
Error Code 621:
OS of target is an unsupported version of Windows
The specified may be a non-Microsoft platform running SMB services or otherwise emulating a Microsoft product. Review the document: http://community.shavlik.com/docs/DOC-23052
Error Code 622:
Machine OS is not Recognized. Please run with tracing on and send to technical support. Scan not performed.
Unable to determine the operating system of the specified machine. This may occur when scanning beta or unreleased versions of Microsoft operating systems.
Error Code 623:
Machine Service pack is not Recognized. Please run with tracing on and send to technical support. Scan not performed.
Unable to determine the Service Pack of the specified machine. This may occur when scanning beta or unreleased versions of Microsoft Service Packs.
Error Code 701:
File http://download.microsoft.com/download/ ... secure.cab was NOT downloaded.
The signed, compressed CAB file containing the security patch information could not be obtained from the specified location. This may occur if the scanning machine is not connected to a network, or is otherwise unable to access the specified file or location. If the CAB file is not obtained, an attempt is made to access the uncompressed XML file via https.
Error Code 702:
File https://www.microsoft.com/technet/secur ... secure.xml was NOT downloaded. Attempting to find local copy of mssecure.cab.
The uncompressed XML file containing the security patch information could not be obtained from the specified location via https. This may occur if the scanning machine is not connected to a network, or is otherwise unable to access the specified file or location. If the XML file is not obtained from the network, an attempt is made to locate an existing version of this file on the local machine.
Error Code 799:
Itanium class servers are not supported by Protect.
Error Code 802:
Could not read boot.ini file in harddrive at '%s'
Unable to read the image's boot.ini file after successfully mounting the hard disk (non-Vista systems).
See: http://community.shavlik.com/docs/DOC-23104
Error Code 803:
Could not find windows install directory in boot.ini file in harddrive at '%s'
The virtual image hard drive was successfully mounted and the boot.ini file was read but the scan engine was unable to locate the %systemroot% folder at the specified location (non-Vista systems).
Error Code 804:
Could not find system32 directory for virtual system at '%s'
The virtual image hard drive was successfully mounted and the boot.ini file was read but the scan engine was unable to locate the %systemroot%\system32 folder at the specified location (non-Vista systems).
Error Code 805:
Timeout when mounting hard drive at '%s' to drive '%c'
An attempt to mount the virtual image was not successful. The mounting process timed out after 60 seconds. Try scanning this image individually to see if the mount succeeds.
Error Code 806:
Error mounting hard drive at '%s' to drive '%c'
An attempt to mount the virtual image was not successful. This can happen if the image being mounted is encrypted, is on a compressed drive, is a template or a linked clone, or any of the vmdk files are read-only. If this is a VMware Workstation or VMware Server image, this error occurs if the image is currently powered on or suspended.
Error Code 807:
Error mounting hard drive at '%s' to drive '%c' with exit code %d
An attempt to mount the virtual image was not successful. The mounting process returned an unknown error code. Contact support for assistance.
Error Code 808:
Could not get return code from mounting tool when mounting hard drive at '%s' to drive '%c' due to %s
The virtual image mounting process completed but the mount process was unable to determine if the mounting was successful.
Error Code 809:
Unknown virtual image type '%s' extracted from '%s'.
The scan engine was unable to determine the virtual image type. This may occur if scanning a currently unsupported virtual image platform.
Error Code 810:
Could not find system32 directory for virtual image: '%s'
The virtual image hard drive was successfully mounted but the scan engine was unable to locate the image's %systemroot%\system32 folder.
Error Code 811:
Could not get information about drive mounted at '%s' for system:'%s'
The scan engine was unable to determine the systemroot drive letter for the mounted image.
Error Code 812:
Could not open mounted registry key 'HKLM\\Software\\MountedDevices' for system: '%s'
The virtual image hard drive and registry was successfully mounted but the scan engine was unable to read the mounted registry.
Error Code 813:
Could not enumerate the values under the key HKLM\\Software\\MountedDevices for system: '%s'
The virtual image hard drive and registry was successfully mounted but the scan engine was unable to enumerate values from the mounted registry.
Error Code 814:
No path to vmware-mount.exe provided!
The scan engine was unable to locate the VMware mounting tool. Please make sure that the VMware Virtual Disk Development Kit has been properly installed.
Error Code 815:
Could not find mounting tool at '%s'
The scan engine was unable to locate the VMware mounting tool. Please make sure that the VMware Virtual Disk Development Kit has been properly installed.
Error Code 816:
Could not read system file at '%s'
The vmx configuration file does not exist for the specified VMware Workstation or VMware Server image.
Error Code 817:
Error parsing system file at '%s'
The scan engine was unable to read the vmx file for the specified VMware Workstation or VMware Server image. Check the vmx file and ensure that it can be read in a text viewer.
Error Code 818:
'%s'. Unable to mount the virtual image. The virtual image is currently powered on.
The scan engine was unable to mount the virtual image because the virtual image was powered on. The scan engine is only capable of scanning images that are offline (powered off).
Error Code 819:
'%s'. Unknown PowerStatus '%d'
The scan engine was unable to determine the current state of the image (powered on, suspended, powered off).
Error Code 820:
%s'. Scanning suspended or paused images is not currently supported.
The scan engine was unable to mount the virtual image because the virtual image was suspended (paused). The scan engine is only capable of scanning images that are offline (powered off).
Error Code 821:
Could not open Objects key in BCD for image at '%s'
The scan engine was unable to access the boot configuration data (BCD) for this image. This error message could indicate that there is a problem with the specified image. Try powering on this image to ensure that it is still valid. This error message applies to Vista images only.
Error Code 822:
Could not enumerate keys in 'BCD\\Objects' for image at '%s'
The scan engine was unable to enumerate information from the boot configuration data (BCD) for this image. This error message could indicate that there is a problem with the specified image. Try powering on this image to ensure that it is still valid. This error message applies to Vista images only.
Error Code 823:
Could find default boot section in the BCD for image at '%s'
The scan engine was unable to enumerate boot information from the boot configuration data (BCD) for this image. This error message applies to Vista images only.
Error Code 824:
Could not open key at 'BCD\\Objects\\%s\\Elements\\22000002' for image at '%s'
The scan engine was unable to open the boot information data from the boot configuration data (BCD) for this image. This error message applies to Vista images only.
Error Code 825:
Could find the Windows root in default boot section of the BCD for image at '%s'
The scan engine was unable to locate the value which stores the location of the windows directory in the boot configuration data (BCD) for this image. This error message applies to Vista images only.
Error Code 826:
Registry mount sentry is NULL!
The scan engine was enable to mount the virtual image's registry. The console may be running low on memory.
Error Code 827:
Hard-drive mount sentry list is NULL or empty!
The scan engine was unable to read the vmx file and/or this file had no hard drives configured for the image.
Error Code 828:
Could not mount registry for image '%s'. This could be caused by running a non supported configuration. Windows 2000 can't mount x64 registries.
The scan engine was unable to mount the registry for the virtual image. This may occur if using a Windows 2000 console and trying to mount x64 images (unsupported).
Error Code 829:

 

Error: 829 - Accessing disk ID
Error: 829 - Accessing disk ID, Code:16054 – Invalid connection

This error can occur due to a number of different reasons. This is an error that occurs prior to mounting the image - it is not related to mounting the image (like the errors above)

 

General errors:

 

VIX_E_FAIL = 1,
VIX_E_OUT_OF_MEMORY = 2,
VIX_E_INVALID_ARG = 3,
VIX_E_FILE_NOT_FOUND = 4,
VIX_E_OBJECT_IS_BUSY = 5,
VIX_E_NOT_SUPPORTED = 6,
VIX_E_FILE_ERROR = 7,
VIX_E_DISK_FULL = 8,
VIX_E_INCORRECT_FILE_TYPE = 9,
VIX_E_CANCELLED = 10,
VIX_E_FILE_READ_ONLY = 11,
VIX_E_FILE_ALREADY_EXISTS = 12,
VIX_E_FILE_ACCESS_ERROR = 13,
VIX_E_REQUIRES_LARGE_FILES = 14,
VIX_E_FILE_ALREADY_LOCKED = 15,
VIX_E_NOT_SUPPORTED_ON_REMOTE_OBJECT = 20,
VIX_E_FILE_TOO_BIG = 21,
VIX_E_FILE_NAME_INVALID

Error Code 1001:
IPv6 addresses are not supported.
IPv6 addresses are currently not supported. Ensure that IPv4 is enabled.

 

 

Affected Product(s)

 

Shavlik Protect All Versions

Scan Error 301 - SystemRoot share access required to scan

$
0
0

Symptoms

 

When performing a scan, you receive the message:

Error 301

SystemRoot share access required to scan

 

Cause

 

Protect is unable to connect to the remote machine’s system share. This may occur if the administrator has unshared the systemroot (typically C$ or similar) or has disabled the AutoShareServer(Wks) via the registry.

 

Resolution

 

1) Test connecting remotely to the admin shares to see if any additional error is given.

Examples:

 

From Windows explorer:

\\machine\C$

\\machine\ADMIN$

 

Or from command-line:

net use \\machine\IPC$ (optional specify user/pw)

See: Net use

 

Test opening a file to test read access.

Test creating a .txt file or editing a file to test write access.

 

If you are unable to connect to the admin shares or successfully perform the above tests you most likely need to review the Scanning Prerequisites.

 

2) You may need to restore administrative shares with the following steps:

  • Set Value from 0 to 1 in these registries:
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters\AutoShareServer
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters\AutoShareWks
  • More Information: HOW TO: Restore Administrative Shares That Have Been Deleted

 

Additional Information

 

If you receive the following error when testing access to admin shares:

“System Error 1130 not enough server storage”


We have previously seen this resolved by following steps in this third party documentation:

PChucks Network: Server Functionality Affected By IRPStackSize

Note: Following this documentation is at your own risk. Setting the IRPStackSize value larger than it needed can waste system resources and possibly cause other failures.

 

Affected Product(s)

 

Shavlik Protect, All Versions


How to locate the Patch Install filename in the Shavlik Protect Database

$
0
0

Purpose

 

This document explains how to locate the name of the patch install file for a particular patch in the Shavlik Protect Database. This is useful in troubleshooting when you are trying to determine if the patch was downloaded to the patches directory as part of a patch deployment. It is also useful to know the patch name when you are trying to run the patch manually from the target machine.

 

Procedure

 

Add the Vendor File Name to list  in the Patch View and/or Scanning Results using the Column Chooser. 

columnchooser.jpg

vendorfilename.png

 

 

You can view the filename when right click on the pach and select download

downloadfilename.JPG

 

Affected Product(s)

Protect 9.X




Agent Failing Registration at 50%

$
0
0

Symptoms

 

To diagnose this issue, there are many symptoms that may need to be considered:

 

Cause

 

There are many reasons the registration could fail, but generally the above symptoms indicate some sort of communication issue with the agent being able to reach the Protect console for registration.

 

Resolution

 

Start by first checking that some simple connection tests work from the agent system to the console system:

  • Ensure you can ping the console system.
    • If you can't ping the console system, either you have no connection from the agent to the console system, or (rarely) you may have ICMP disabled.
  • Ensure you are able to successfully resolve the console system by nslookup.
    • Make sure the results of both forward and reverse nslookup match. Ensure there is no problem with machine name resolution.
  • Can you telnet to the console system over port 3121 successfully?
    • Port 3121 is used for agent communication back to the console. This is a port requirement and is not configurable.

 

If the above tests are all successful, continue to the next steps in troubleshooting:

  • Ensure that the name, FQDN, or IP the agent is attempting to resolve exists in the Console Alias Editor within the Protect console.
  • In many of the log snippets above you can see that the agent attempts to register with https://Host.fqdn:3121/ST/Console/AgentRegistration/Registration
    • Test putting the URL from your log into an Internet Explorer window to see if you can successfully navigate to it. (On the agent system)
      • If the test is successful you would see a screen displayed stating something along the lines of, "A service was created".
        • If this test works the agent should by all means be able to successfully register successfully.
        • Follow the steps in this document: Agent - Complete Uninstall then attempt installation again.
        • Contact support if it still fails.
      • If the test fails with an "Internet Explorer cannot display the webpage" message, continue to the next step.
    • Run a test on the agent system to see what security protocols are enabled.
      • Qualys SSL Labs - Projects / SSL Client Test is a good site to test with.
      • You may not have a security protocol enabled or something is incorrect in the configuration.
      • If no protocols are enabled, a secure web connection cannot truly be established, thus causing the agent registration to fail.
        • The Microsoft article TLS/SSL Tools and Settings: Logon and Authentication covers how to ensure protocols are enabled or disabled.
        • Generally you may need to investigate settings in the following registry key:
          HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols

Additional Information

 

If the agent is failing to install at a different percentage mark or when manually installing, you may want to consider reviewing the following documents:

Agent Failing at 67% (Registration Failure)

Manual installation of agent fails on registration.

 

Affected Product(s)

 

Shavlik Protect 9.x


How To Scan For Only Microsoft Windows Operating System Patches

$
0
0

Purpose


Guide to create a custom scan template to scan only for Windows Operating Systems.

 

Steps

 

1. Create a "Patch Scan Template" by selecting New and Patch Scan Template.

 

2. Use the "Product filter" to "Scan selected" and select OS.

ProductfilterOS.PNG

3. Depending on what type of patches you would like to scan for you will select the corresponding options for Security, Non-Security and Security tool updates.

 

4. Save template.

 

5. Once saved you can start a scan and use the custom template you just created for OS scanning only.

 

Additional Information

 

It is always recommended to review the scan results to ensure that the patches shown as missing is what you expect to see as missing.

 

Affected Products

 

Shavlik Protect 9.x

Logs - Gathering Console, Client Side (agentless), and Agent log files for Protect

$
0
0

Purpose


This document outlines how to gather logs for troubleshooting issues with the Console, Agent, or Target systems.

 

Description

 

Here are some basic instructions on how to gather console, client (target) side logs, agent logs, and install logs for Protect.  These should work for most console and agent type issues.

 

Protect 9.X console logging:

 

1. Please open the Protect GUI and then go to Tools > Options > Logging and change logging to “All” for both user interface and services.

a. If you are unable to set logging via the GUI see this doc: http://community.shavlik.com/docs/DOC-22938

2. Close the Protect GUI.

3. Stop the following services

     a.Shavlik Protect Console Service

      b. ST Remote Scheduler Service

4. Delete all the logs from

     a.  Windows 7, 8, 2008, 2012 & Vista: C:\ProgramData\LANDesk\Shavlik Protect\Logs

     b.  Earlier OS’s:  C:\Documents and Settings\All Users\Application Data\LANDesk\Shavlik Protect\Logs

5.  Start the console service and open the Protect GUI.

6. Attempt to reproduce the issue. Please document steps to reproduce.

a. Collect the logs from the Logs folder mentioned earlier in step 4 (please zip if possible)

b. [Deployment issues only] On the target system please zip and send a copy of the entire C:\Windows\Propatches folder and its contents (you can leave out the Patches sub-folder).

7. Zip and send all the logs.


You can also obtain the "ST.FileVersions.log" which contains all file versions relevant to Protect by going to Help > About Shavlik Protect > Export Info.

 

Protect 9.x agent logging:

 

1. Open the agent policy assigned to the machine we are gathering logs from.

2. Change the logging level to ‘All’ and Save and update Agents.  Choose to update agents if prompted.

3. Go to the target machine, close the agent GUI and stop the services:

     o The services start with Shavlik or ST.

4. Delete all the logs from:

     o Vista & Later: C:\ProgramData\LANDesk\Shavlik Protect\Logs

     o Earlier OS’s:  C:\Documents and Settings\All Users\Application Data\ LANDesk\Shavlik Protect\Logs

5. Start services.

6. Attempt to reproduce the issue. Please note the steps to reproduce.

7. Take applicable screenshots.

8. Zip and send all the logs and screenshots. (from the previous specified folders above)

 

Deployment Logs (All current supported versions)

(For agentless deployment)

It is best to enable target side verbose logging before obtaining these logs. See the following document on how to do so:
http://community.shavlik.com/docs/DOC-23048

  1. On the machine you are deploying to navigate to C:\Windows\ProPatches
  2. Locate the CL5.log, dplyevts.log, and Safereboot.log and copy to a new folder on the desktop.
  3. Navigate to C:\Windows\ProPatches\Scheduler.
  4. Locate the Scheduler.log and add it to the folder created in step 2 so all logs are together.
  5. Zip and send all the logs.

 

Additional Logging for Threat Protection/Antivirus Issues:

There is additional logging that can be obtained for Threat Protection/Antivirus related issues, such as detection of false positives. See the following document for the steps to obtain this addtional logging:

http://community.shavlik.com/docs/DOC-23066


Installation Logs

Refer to; Obtaining Protect console and Agent installation logs

 

Product(s)


Shavlik Protect 9.x

How To: Uninstall & Reinstall The Shavlik (ST) Remote Scheduler Service On A Single Machine

$
0
0

Purpose


This article provides steps to perform a manual uninstall and re-install of the Shavlik (ST) Remote Scheduler service on a single machine.

 

Description

 

To uninstall the Shavlik Remote Scheduler service on a single machine:

 

  1. On the target machine:
    1. Open a command prompt as an administrator.
    2. Run this command:

           c. CD C:\Windows\ProPatches\scheduler

           d. Run this command:  stschedex.exe /remove

remove schedex.png

 

   2.  Open Windows Explorer and delete the C:\Windows\ProPatches folder and its contents.

   3.  Open Windows Registry Editor and verify that the following registry keys have been deleted:

  • 9.x key for 32bit: HKEY_LOCAL_MACHINE\SOFTWARE\LANDesk\Shavlik Protect\Scheduler
  • 9.x key for 64bit: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\LANDesk\Shavlik Protect\Scheduler

 

Further steps to ensure successful re-installation of the scheduler service:

  1. On the Protect console:
    • In Shavlik Protect 9.x:
      • Go to Manage> Credentials.
      • Add credentials that you want to use as default or edit existing credentials to ensure that the password is up-to-date.
      • Ensure to set the proper credentials as the default credentials.
      • Go to Tools > Options > Scheduling and ensure the Shavlik Scheduler is selected.

 

Alternatively, to uninstall the Scheduler from a target machine on the Protect console:

  1. Click Manage> Scheduled Tasks.
  2. Right-click the target machine name in the list on the left, and click Scheduler Service> Uninstall.

 

Installation of the scheduler service:

 

During next deployment to the target system, the scheduler is automatically reinstalled. If you prefer to force the install of the scheduler service prior to the next deployment you can do so in the Protect console by going to Manage > Scheduled Tasks, then right click on a target system name in the list on the left and choose Scheduler Service > Install.

 

If this issue exists on multiple systems:

 

If you are experiencing this problem on multiple systems and would like a way to resolve the issue for all machines affected, please refer to this document on how to set up a custom action to delete the scheduler service from target systems:

 

http://community.shavlik.com/docs/DOC-23009

 

Product(s)

 

Shavlik Protect 9.x

 

How to obtain XML data using a custom share or URL

$
0
0

Purpose


The purpose of this document is to outline how to obtain Shavlik XML definitions using a custom share or URL.

 

Symptoms

 

This practice is useful in the event the Console is installed on a server without internet access, however can access a machine that can obtain data definitions via UNC path or URL.

 

Resolution

 

To alter where the Protect Console attempts to get XML data definitions navigate to Tools > Operations.

 

oper.jpg

 

Within the 'Downloads' tab alter the 'Definition download source' to use a Custom share or URL as seen below.

 

unc.jpg

 

Product(s)

 

Shavlik Protect 9.x

Threat Data Shows Out of Date Following Scheduled Automatic Updates

$
0
0

Purpose

 

The purpose of this document is to provide information on why threat definitions may appear out of date following the completion of a scheduled automatic download operation within the Console.

 

Symptoms

 

Within Tools > Operations within the Console you have a scheduled automatic download of threat data as seen below:

v1.png

However when navigating to Help > About within the Console, the 'Threat definitions' show as being out of date as seen below:

v2.png

 

Cause

 

This is occurring due to the fact that there is a major version of the threat definitions and minor version of the threat definitions. The check that is done when accessing Help > About is looking for the major version which can only be downloaded by running 'Refresh Files' by navigating to Help > Refresh Files within the Console. The scheduled automatic download or agent download that occurs is only performing a minor version update. Within both scenarios the threat definitions would be considered at a viable 'up-to-date' version as long as automatic downloads are working. You can check the Event History from within the Console by navigating to View > Event History to ensure the automatic downloads are occurring alternately, you can check to see if there are new files within the C:\ProgramData\LANDesk\Shavlik Protect\Console\ThreatData directory on the console system each day.

 

Additional Information


Best Practices and FAQ on using Threat protection with Shavlik Protect agents

 

Product(s)


Shavlik Protect 9.x

Viewing all 1352 articles
Browse latest View live