Quantcast
Channel: Shavlik User Community : Document List - All Communities
Viewing all 1352 articles
Browse latest View live

How To: Use Machine Group Search to find machines and their associated Machine Groups in Patch for Windows Servers 9.3

$
0
0

Purpose

 

The purpose of this document is to show how to use the Machine Group search feature to find which machine groups a machine is associated with.

 

Description

 

  • To search through machine groups for a specific machine, start by right-clicking any machine group name in the left navigation pane. Click on 'Search Machine Groups'.

 

 

  • In the Search Machine Groups window, you can type in the machine name that you're looking for. The search will automatically display the results of the search.

 

 

  • You can highlight one or more line items to enable additional options such as, removing the machine from the group, including or excluding them from the group, or edit the source machine group.

 

Additional Information

 

How To: Organize Machine Groups and Templates into Folders and Sub-Folders in IPWS 9.3

 

Affected Product(s)

 

Patch for Windows Servers 9.3


Publishing Fails With Failed to sign Package: error was: 2147942403

$
0
0

Symptoms

 

Unable to publish updates.

 

Following entry could be found in the AutoPublish.log:

 

Error Publishing 'Adobe Flash Player 22.0.0.210 Internet Explorer' : Failed to sign package; error was: 2147942403

 

When running Configuration Checker under Shavlik Patch settings you are getting the error below:

 

 

Cause

 

 

Resolution

 

You can verify where WSUS believes the folders are by running this at a CMD prompt on the Shavlik Patch server:

 

net share

 

This will show the location of the UpdateServicePackages shares.

You will need to use this command to point WSUS to the correct location of:

 

  • \WSUS\WsusContent
  • \WSUS\UpdateServicesPackages

 

WSUSUtil.exe movecontent <content path> <log path>

 

To use this command without actually copying your content over, use the following command:
wsusutil.exe movecontent contentpath logfile [-skipcopy]

 

More information:  WSUSUtil.exe

 

Affected Product(s)

 

Shavlik Patch Plugin 2.x

Update to patching Citrix Receiver

$
0
0

Overview

 

We are changing how we handle patching for Citrix Receiver to better match up with Citrix's lifecycle process. The changes we are making are:

 

Versions less than 4.9: Systems running versions of Citrix Receiver prior to version 4.9 will detect as previously, with the newest patch being offered updating the software to version 4.9 which is the Long Term Service Release (LTSR) of Citrix Receiver.

 

Version 4.9: As this is the LTSR release it will have any Cumulative Updates marked as applicable for it, but it will not have the update to version 4.10 marked as applicable. If you want to upgrade to 4.10 from 4.9, 4.10 will be available as a Software Distribution as a separate branch, similar to how major version updates are handled currently of Java Runtime Environment.

 

Version 4.10: As this is the current release, and the start of a new branch, it will have updates marked as applicable as they are released up to the point of the next LTSR release of Citrix Receiver. At this point a new branch will be created, with versions between 4.10 and the next LTSR being offered updates to the LTSR version.

 

Additional Information

 

 

Affected Product(s)

 

Shavlik Protect 9.2.x

Protect SDK 9.2.x

Ivanti Patch for Windows Servers 9.3.x

Unable to Scan Machines - Error 201 despite meeting common prerequisites

$
0
0

Symptoms

 

When attempting performing scan, you may receive error "Error code 201: Network connection error. Verify that you can logon to the specified machine " even though the most common prerequisites have been met, e.g.

 

  • DNS resolution: nslookup machinename resolves correct IP
  • Admin share access: net use \\machinename\IPC$ succeeds
  • Remote registry connection: Able to connect to the machine from Regedit by going to File > Connect Network Registry...
  • Windows Firewall is not configured.
  • Have admin access to VM's, can map to VM's remotely C$ & IPC$.

 

Troubleshooting

 

On the target machine, the "Operational" log located under the Applications and Services Log/Microsoft/Windows/NTLM records warnings “NTLM server blocked: Incoming NTLM traffic to servers that is blocked”, "NTLM authentication requests to this server have been blocked."

 

Cause

 

NTLM Traffic is blocked on the target machine. Local Group Policy "Network Security: Restrict NTLM: Incoming NTLM Traffic" is configured as "Deny all domain accounts" or "Deny all accounts".

 

Resolution

 

Set "Network Security: Restrict NTLM: Incoming NTLM Traffic" to "Allow all".

 

Affected Products

 

Shavlik Protect 9.2.x

Ivanti Patch for Windows Servers 9.3.x

Ivanti Patch for SCCM (Formerly Shavlik Patch for SCCM) Documentation

$
0
0

***PLEASE NOTE THIS PAGE IS NO LONGER BEING MAINTAINED.***

Please go to the following URL for the latest builds.

https://go.ivanti.com/Web-Download-Patch-SCCM.html

 

OLD INFO:

Microsoft System Center Configuration Manager 2012

 

Download

Download the installation file for Shavlik Patch for System Center to install this add-on into SCCM 2012. The install file includes the Shavlik Patch plug-in console for SCCM. You must have a functional copy of SCCM 2012 to run the install successfully.

 

You can download the installer here Product Download.

 

Training Videos

Ivanti Patch for SCCM Product Training (Formerly Shavlik Patch for SCCM)

 

Documentation

You can find documentation such as the product User Guide and Release Notes under Patch for SCCM here Product Documentation.

 

Version History

You can find the version history for this release here Version History.

 

Additional Information

A license key is required to activate Shavlik Patch 2.3 or later. Existing customers who are upgrading from Shavlik Patch 2.2 should automatically receive a license key in an email message from Shavlik. If you don’t have a license key, contact your Shavlik representative or visit: www.shavlik.com/company/contact.

 

 

Microsoft System Center Configuration Manager 2007

 

Shavlik Patch for Microsoft System Center Configuration Manager 2007 has limited functionality and requires Microsoft System Updates Publisher (SCUP) to import the Shavlik patch catalog. In this download, you will only get the CAB file needed to import into SCUP. Please see Ivanti Patch for SCCM Product Training (Formerly Shavlik Patch for SCCM) under the Shavlik Patch for Microsoft System Center Configuration Manager 2007 section for training regarding this product.

 

You must have a valid protectcloud.shavlik.com account in order to use SCUP.

Deployment Error - "File Download Failed"

$
0
0

Purpose

 

To troubleshoot the cause of the deployment error "File download failed"

 

Symptoms

 

When deploying a patch, the deployment fails with the Patch progress state of "File download failed"

 

 

Cause

 

This error occurs when the console attempts to download the necessary patch, but is unable to do so.  Some of the most common reasons you might see this include:

  • The console is offline, not connected to the internet.
  • The console is blocked from accessing the patch vendor's site (proxy, firewall, etc.)
  • The console is set to download patches from a distribution server, but the patch in question is not there (possibly not yet synced from a main console, etc.)

 

You can get more information about the failure in C:\ProgramData\LANDESK\Shavlik Protect\Logs\ST.Protect.managed.<username>@<domain>.log.  Look for an entry that states "Download Error" like this example:

2017-12-29T22:12:09.2522976Z 0006 W SingleFileDownload.cs:554|Download Error 'file://<DistributionServerPath>/windows8.1-kb4051956-x64.msu': System.Net.WebException: Could not find file '\\<DistributionServerPath>\windows8.1-kb4051956-x64.msu'. ---> System.Net.WebException: Could not find file '\\<DistributionServerPath>\windows8.1-kb4051956-x64.msu'. ---> System.IO.FileNotFoundException: Could not find file '\\<DistributionServerPath>\windows8.1-kb4051956-x64.msu'.

 

Resolution

 

If the patch is supposed to be downloaded from the vendor, copy the download address from the error and enter it into a browser to shed more light on what's blocking access, then resolve whatever that block is.

 

If using a distribution server, make sure the patch is synced from its source so the console can access it.

 

If you are unable to make the download available using either of the methods described above, you can manually place the patch in the console's patch download location following the steps outlined in this doc:

How To: Supply and Deploy Patches That Can No Longer Be Downloaded

 

If you need any assistance determining what the block is or how to resolve it, please open a support case.

 

Affected Product(s)

 

Shavlik Protect 9.x

Ivanti Patch for Windows Servers 9.3+

Important information on detection logic for the Intel 'Meltdown' security vulnerability

$
0
0

Overview

 

Microsoft has identified a severe compatibility issue with a small number of anti-virus software products.

We highly suggest all customers review these issues here:  https://support.microsoft.com/en-us/help/4072699

Due to to possible BSOD issues that may occur when installing this update on system with out of date AV software, we will be adding a detection prerequisite:

Key="HKEY_LOCAL_MACHINE" Subkey="SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat"

Value="cadca5fe-87d3-4b96-b7fb-a231484277cc"

Type="REG_DWORD”

 

  • The patches will be offered for deployment if the key exists.
  • If key does not exist you will be offered the detection only version of this patch.

 

Affected patches:

 

  • MS18-01-IE Q4056568
  • MS18-01-SO7 Q4056897
  • MS18-01-SO8 Q4056899
  • MS18-01-SO81 Q4056898
  • MS18-01-W10 Q4056888, Q4056890, Q4056891, Q4056892, Q4056893

 

Affected CVEs:

 

  • CVE-2017-5753
  • CVE-2017-5715
  • CVE-2017-5754

 

Link to Security bulletin advisory:  https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002

 

Affected Products

 

Ivanti Patch for Windows Servers 9.3.x

Shavlik Protect 9.2.x

Support for the Intel 'Meltdown' security vulnerability KB4058702

$
0
0

Purpose

 

To provide information regarding KB4058702, an out-of-band release from Microsoft to address critical security vulnerabilities

 

Information

 

Microsoft released KB4058702 late the night of 1/3/18 (out of band) to address an Intel CPU firmware vulnerability.  The patches released will be added to our patch definition XML update to be released later today, 1/4/18.

 

List of patches from Microsoft:

https://www.catalog.update.microsoft.com/Search.aspx?q=2018-01

 

Additional Information

 

 

Affected Product(s)

 

Shavlik Protect 9.2.x

Ivanti Patch for Windows Server 9.3.x


How To: Use a Custom Action to add required registry key for deploying Windows Security OOB updates release January 3, 2018

$
0
0

Purpose

 

As of January 3rd 2018, Microsoft is now requiring a registry key to be added to machines for addressing compatibility issues with a small number of anti-virus software products.

More information on this can be found here: Important information on detection logic for the Intel 'Meltdown' security vulnerability

 

Description

Adding this registry key on machines that have out-of-date AV could cause BSOD's. Please use this custom action at your own risk.

See Microsoft link for further details: https://support.microsoft.com/en-us/help/4072699/important-information-regarding-the-windows-security-updates-released

1.  Download and extract the attached zip below or here to get the batch file used for adding the registry key.

 

2.  Create a new Patch Scan Template that scans for only Custom Actions. (this will allow you run this against machine with no missing patches)

 

 

 

3.  Create a new Deployment Template.

 

 

4.  Name the template. Ex: Intel Meltdown Registry Key

 

 

4.  Click on Post-deploy Reboot. Change the reboot option to 'Never reboot after deployment'.

 

 

5. Click on Custom Actions. Click 'New'. A prompt to save the template will be presented. Click 'Save'.

 

 

6. The first action will push the batch file. Ensure that step 3 states 'Push File', and then select the batch file from the local machine. Click 'Save' when completed.

 

 

7. Click 'New' once more. Change Step 3 to 'After All Patches' and use the following command in Step 4: Call %pathtofixes%addregkey.bat

 

 

8. Click 'Save' twice to finish creating the Deployment Template.

 

9. Use the new Scan Template to scan your target machines.

 

 

10. Once the scan is completed, click 'View Results'

 

 

11. The results will offer our nullpatch.exe for deployment. Proceed by right-clicking the patch and clicking 'Deploy all missing patches'.

 

 

12. Select the new Deployment Template created earlier. Click 'Deploy' to start the deployment.

 

 

13. Open regedit to validate the registry key was added.

 

 

Additional Information

 

How To: Perform a Custom Action Complete Tutorial with Custom Actions

 

Affected Product(s)

 

Shavlik Protect 9.2

Ivanti Patch for Windows Servers 9.3

How To: Deploy Windows Security OOB updates released January 3, 2018

$
0
0

Purpose

 

The purpose of this document is to discuss the behaviors when deploying the Windows Security out-of-band updates that were released on January 3, 2018.

The following document contains information on the changes to detection for the applicable patches: Important information on detection logic for the Intel 'Meltdown' security vulnerability

 

Description

 

Microsoft is requiring a registry to be on every machine that has no Anti-Virus or outdated Anti-Virus. The following Windows Security OOB updates released January 3, 2018 are affected by this:

 

  • MS18-01-IE Q4056568
  • MS18-01-SO7 Q4056897
  • MS18-01-SO8 Q4056899
  • MS18-01-SO81 Q4056898
  • MS18-01-W10 Q4056888, Q4056890, Q4056891, Q4056892, Q4056893

 

Below is what the expected behavior when scan and deploying these patches without and with the registry key in place.

See Additional Information for help creating the registry key using a custom action.

This is what to expect for scan and deployments when the registry key does not exist on the target machine:

 

When scanning machines without the registry key in place, you will be offered detection of the updates, but will not be able to download or deploy the update. This will be noted in the Ivanti Comments section for the patch:

 

 

Detection only support means the following:

 

The patch is not downloadable. If you try to download the patch, a message stating 'None of the selected patches need to be downloaded'.

 

This patch cannot be deployed, this is what the  Deployment Tracker will look like during the attempt. The download patches will not turn green as the patch cannot be downloaded and deployed until the registry key is detected.

 

 

This is what to expect for scan and deployments when the registry key exists on the target machine:

 

When scanning a machine that has the required registry key in place, the patches will be offered with full deployment support. This means the patch is now able to be downloaded from Microsoft and to be deployed to the endpoints.

 

 

The patch will now be downloaded and then packaged as normal.

 

 

The patch will now be scheduled and then start the deployment execution process.

 

 

 

Additional Information

 

How To: Use Custom Action To Add Required Registry Key For Deploying Microsoft Patches as of January 3rd, 2018

 

Affected Product(s)

 

Shavlik Protect 9.2

Ivanti Patch for Windows Servers 9.3

Snapshot Maintenance in Ivanti Patch for Windows Servers 9.3

$
0
0

Purpose

 

This document will discuss the different methods of snapshot maintenance in Ivanti Patch for Windows Server 9.3. Snapshot Maintenance applies only if you have virtual machines in your network that are hosted on one or more VM servers.

 

Overview

 

Scheduled Snapshot Maintenance through the Console Task Scheduler

 

This allows you to configure a one-time or recurring task that will remove old virtual machine snapshots from the server. It will also require you to have a proper scheduler credential set in Manage > Scheduled Console Tasks as is mentioned here Manual scans work, scheduled scans fail: Scheduler Credential

 

1. Go to Tools > Options > Snapshot Maintenance.

 

Go to Snapshot Maintenance.PNG

 

2. When you click Add or Edit, the Scheduled Snapshot Maintenance dialog is displayed. This dialog is used to configure the snapshot maintenance task.

 

 

Snapshot Maintenance through your deployment template

 

1. Go to your deployment template and navigate to the Hosted VMs/Templates tab.

 

2. Select the amount of days that you would like to keep snapshots or the maximum amount of snapshots that Ivanti Patch for Windows Servers will keep and save your deployment template.

 

 

3. Use this deployment template in your next deployment to your hosted virtual machines.

 

Ivanti Patch for Windows Servers will now delete snapshots according to the rules set in step 2 during the next deployment. Unlike the first method of Snapshot Maintenance, this method does not run on a schedule and will not execute the rules set above until the next deployment. During the next deployment Ivanti Patch for Windows Servers will check the rules and delete snapshots accordingly if they meet the qualifications to be deleted.

 

For instance, if you have specified that snapshots should be deleted after two days, each deployment, Ivanti Patch for Windows Servers will check to determine if any snapshots are two or more days old.

 

You can automate this process using How To: Setup Automatic Removal of Vmware Snapshots in Protect 9.2 .

 

Affected Product(s)

 

Ivanti Patch for Windows Servers 9.3

URL Exception List For Shavlik Patch For Microsoft System Center (01-09-2018)

$
0
0

Purpose

 

This article provides a list of web addresses that may be required to download content or patches when using Shavlik Patch for Microsoft System Center.

 

Description

 

Ensure that these web addresses required by Shavlik Patch are accessible and allowed through firewalls, proxies, or web filters.

 

ftp://archive.mozilla.org
ftp://ftp.adobe.com
ftp://ftp.attglobal.net
ftp://ftp.hp.com
ftp://ftp.mozilla.org
http://34e34375d0b7c22eafcf-c0a4be9b34fe09958cbea1670de70e9b.r87.cf1.rackcdn.com
http://aimp.su
http://airdownload.adobe.com
http://apache.cs.utah.edu
http://apache.mesi.com.ar
http://apache.mirrors.ionfish.org
http://apache.mirrors.lucidnetworks.net
http://apache.mirrors.pair.com
http://apache.mirrors.tds.net
http://apache.osuosl.org
http://apache.spinellicreations.com
http://app.oldfoss.com
http://appldnld.apple.com
http://appldnld.apple.com.edgesuite.net
http://archive.apache.org
http://ardownload.adobe.com
http://audacity.googlecode.com
http://bitbucket.org
http://cache.lumension.com
http://cache-download.real.com
http://ccmdl.adobe.com
http://cdn01.foxitsoftware.com
http://cdn02.foxitsoftware.com
http://cdn09.foxitsoftware.com
http://cdn1.evernote.com
http://classicshell.net
http://content.ivanti.com
http://d.7-zip.org
http://dl.google.com
http://dl.notepad-plus-plus.org
http://dl2.xmind.net
http://download.adobe.com
http://download.cdburnerxp.se
http://download.documentfoundation.org
http://download.dymo.com
http://download.filezilla-project.org
http://download.gimp.org
http://download.imgburn.com
http://download.macromedia.com
http://download.microsoft.com
http://download.nullsoft.com
http://download.oldfoss.com
http://download.oldfoss.com:81
http://download.oracle.com
http://download.pdfforge.org
http://download.piriform.com
http://download.royalapplications.com
http://download.services.openoffice.org
http://download.skype.com
http://download.splunk.com
http://download.techsmith.com
http://download.tuxfamily.org
http://download.videolan.org
http://download.virtualbox.org
http://download.windowsupdate.com
http://download.winzip.com
http://download1.operacdn.com
http://download2.operacdn.com
http://download3.operacdn.com
http://download3.vmware.com
http://download3.xnview.com
http://download4.operacdn.com
http://downloadarchive.documentfoundation.org
http://download-installer.cdn.mozilla.net
http://download-origin.cdn.mozilla.net
http://downloads.hpe.com
http://downloads.pdf-xchange.com
http://downloads.sourceforge.net
http://downloadus1.teamviewer.com
http://downloadus2.teamviewer.com
http://en.community.dell.com
http://files2.zimbra.com
http://fpdownload.macromedia.com
http://ftp.adobe.com
http://ftp.df.lth.se
http://ftp.hp.com
http://ftp.mozilla.org
http://ftp.opera.com
http://ftp.osuosl.org
http://ftp.ussg.indiana.edu
http://ftp.utexas.edu
http://get.geo.opera.com
http://get.geo.opera.com.global.prod.fastly.net
http://gigenet.dl.osdn.jp
http://heanet.dl.sourceforge.net
http://hivelocity.dl.sourceforge.net
http://install.nitropdf.com
http://iweb.dl.sourceforge.net
http://jaist.dl.sourceforge.net
http://javadl.oracle.com
http://javadl.sun.com
http://jsimlo.sk
http://majorgeeks.mirror.internode.on.net
http://master.dl.sourceforge.net
http://mirror.cc.columbia.edu
http://mirror.nexcess.net
http://mirror.reverse.net
http://mirror2.layerjet.com
http://mirror6.layerjet.com
http://mirrors.advancedhosters.com
http://mirrors.gigenet.com
http://mirrors.ibiblio.org
http://mirrors.syringanetworks.net
http://mozy.com
http://notepad-plus-plus.org
http://olive.download.pdfforge.org
http://operasoftware.pc.cdn.bitgravity.com
http://orange.download.pdfforge.org
http://osdn.dl.osdn.jp
http://packages.vmware.com
http://pilotfiber.dl.sourceforge.net
http://pnotepad.googlecode.com
http://psg.mtu.edu
http://pspad.poradna.net
http://pumath.dl.osdn.jp
http://purple.download.pdfforge.org
http://realvnc.com
http://releases.mozilla.org
http://skylineservers.dl.sourceforge.net
http://softlayer-dal.dl.sourceforge.net
http://software-dl.real.com
http://sourceforge.net
http://superb-dca2.dl.sourceforge.net
http://superb-dca3.dl.sourceforge.net
http://superb-sea2.dl.sourceforge.net
http://supergsego.com
http://support.citrix.com
http://support.citrixonline.com
http://support1.uvnc.com
http://supportdownload.apple.com
http://tchspt.com
http://tdf.mirror.rafal.ca
http://teal.download.pdfforge.org
http://tenet.dl.sourceforge.net
http://ufpr.dl.sourceforge.net
http://upgrade.skype.com
http://videolan-mirror.vpsserver.com
http://videolan-nyc.defaultroute.com
http://vorboss.dl.sourceforge.net
http://wireshark.askapache.com
http://wiresharkdownloads.riverbed.com
http://www.7-zip.org
http://www.apache.org
http://www.carfab.com
http://www.coreftp.com
http://www.cutepdf.com
http://www.fosshub.com
http://www.goodsync.com
http://www.gtlib.gatech.edu
http://www.jam-software.com
http://www.mirrorservice.org
http://www.namesdir.com
http://www.oldfoss.com
http://www.peazip.org
http://www.piriform.com
http://www.rarlab.com
http://www.realvnc.com
http://www.tightvnc.com
http://www.uvnc.com
http://www.uvnc.eu
http://www.wireshark.org
http://www-us.apache.org
http://xh.yimg.com
http://xml.shavlik.com
https://1.na.dl.wireshark.org
https://2.na.dl.wireshark.org
https://airdownload.adobe.com
https://allwaysync.com
https://atlassian.jfrog.io
https://bitbucket.org
https://cdn.gomlab.com
https://cdn1.evernote.com
https://clientupdates.dropboxstatic.com
https://content.ivanti.com
https://cytranet.dl.sourceforge.net
https://d1ilhw0800yew8.cloudfront.net
https://data-cdn.mbamupdates.com
https://desktopassets.prezi.com
https://dl.bandicam.com
https://dl.google.com
https://dl.tvcdn.de
https://dl3.xmind.net
https://download.cdburnerxp.se
https://download.gimp.org
https://download.microsoft.com
https://download.royalapplications.com
https://download.skype.com
https://download.splunk.com
https://download.sublimetext.com
https://download.teamviewer.com
https://download.techsmith.com
https://download.tortoisegit.org
https://download3.vmware.com
https://download3.xnview.com
https://downloadplugins.citrix.com
https://downloads.hpe.com
https://downloads.plex.tv
https://downloads.sourceforge.net
https://downloadus2.teamviewer.com
https://downloadus4.teamviewer.com
https://e3.boxcdn.net
https://endpoint920510.azureedge.net
https://fpdownload.macromedia.com
https://ftp.mozilla.org
https://get.geo.opera.com
https://gigenet.dl.sourceforge.net
https://github.com
https://hipchat-ops.s3.amazonaws.com
https://iweb.dl.sourceforge.net
https://knowledge.autodesk.com
https://launch.getgo.com
https://managedway.dl.sourceforge.net
https://master.dl.sourceforge.net
https://media.inkscape.org
https://meetings.webex.com
https://neevia.com
https://nmap.org
https://nodejs.org
https://notepad-plus-plus.org
https://packages.vmware.com
https://phoenixnap.dl.sourceforge.net
https://pilotfiber.dl.sourceforge.net
https://s3.amazonaws.com
https://secure.logmein.com
https://secure.mozy.com
https://secure-appldnld.apple.com
https://slack-ssb-updates.global.ssl.fastly.net
https://superb-dca2.dl.sourceforge.net
https://superb-sea2.dl.sourceforge.net
https://svwh.dl.sourceforge.net
https://swdl.bluejeans.com
https://telerik-fiddler.s3.amazonaws.com
https://the.earth.li
https://versaweb.dl.sourceforge.net
https://web.mit.edu
https://www.fosshub.com
https://www.goodsync.com
https://www.hipchat.com
https://www.jam-software.com
https://www.mozypro.com
https://www.piriform.com
https://www.realvnc.com
https://www.scootersoftware.com
https://www.uvnc.eu
https://www.wireshark.org

 

Additional Information

 

If using the Shavlik Patch pluginwith SCCM, you may also want to review Certificate verification sites to allow for Shavlik Patch

If you require the IP addresses to create exceptions you can find the IP addresses used for xml.shavlik.com or content.ivanti.com here. To obtain the IP for vendor sites you can ping the site for the current IP address or contact the vendor to obtain this information.

 

If you want to create an exception for an entire domain rather than entering all specific URLs, you can usually do so by entering the exception in this format:

*.domain.com

Example: *.Shavlik.com

 

Affected Product(s)

 

Ivanti Patch for SCCM

Shavlik Patch for Microsoft System Center

(Shavlik SCUPdates)

Firewall and Proxy Exceptions URL List - Shavlik Protect/Ivanti Patch for Windows Servers (01/09/2018)

$
0
0

Overview

 

This article provides a list of required web addresses for the Protect application to allow:

 

  • Patch files fail to download
  • Patch definitions fail to update
  • Activation or License Refresh fails
  • Home page RSS feed fails to load
  • Product check for update fails

 

URL List

 

Protect and Patch for Windows Servers require these URLs to be accessible through firewalls, proxies and web filters:

 

ftp://ftp.adobe.com
ftp://ftp.attglobal.net
ftp://ftp.winzip.com
ftp://mozilla.stu.edu.tw
ftp://releases.mozilla.org
http://34e34375d0b7c22eafcf-c0a4be9b34fe09958cbea1670de70e9b.r87.cf1.rackcdn.com
http://a1540.g.akamai.net
http://aimp.su
http://airdownload.adobe.com
http://app.oldfoss.com
http://app.oldfoss.com:81
http://appldnld.apple.com
http://appldnld.apple.com.edgesuite.net
http://archive.apache.org
http://ardownload.adobe.com
http://au.v4.download.windowsupdate.com
http://azure.download.pdfforge.org
http://bitbucket.org
http://cache.lumension.com
http://cache.pack.google.com
http://cache-download.real.com
http://ccmdl.adobe.com
http://cdn01.foxitsoftware.com
http://cdn02.foxitsoftware.com
http://cdn04.foxitsoftware.com
http://cdn09.foxitsoftware.com
http://cdn1.evernote.com
http://classicshell.net
http://content.ivanti.com
http://content.rim.com.edgesuite.net
http://d.7-zip.org
http://dist.divx.com
http://dl.google.com
http://dl2.xmind.net
http://dl3.xmind.net
http://download.accusoft.com
http://download.adobe.com
http://download.autodesk.com
http://download.betanews.com
http://download.cdburnerxp.se
http://download.documentfoundation.org
http://download.dymo.com
http://download.filezilla-project.org
http://download.gimp.org
http://download.imgburn.com
http://download.macromedia.com
http://download.microsoft.com
http://download.newaol.com
http://download.nullsoft.com
http://download.oldfoss.com
http://download.oldfoss.com:81
http://download.pdfforge.org
http://download.piriform.com
http://download.royalapplications.com
http://download.skype.com
http://download.splunk.com
http://download.teamviewer.com
http://download.techsmith.com
http://download.videolan.org
http://download.virtualbox.org
http://download.windowsupdate.com
http://download.winzip.com
http://download1.operacdn.com
http://download2.operacdn.com
http://download3.operacdn.com
http://download3.vmware.com
http://download3.xnview.com
http://download4.operacdn.com
http://download-akm.skype.com
http://downloadarchive.documentfoundation.org
http://download-origin.cdn.mozilla.net
http://downloads.hpe.com
http://downloads.pdf-xchange.com
http://downloads.sourceforge.net
http://downloadus1.teamviewer.com
http://downloadus2.teamviewer.com
http://en.community.dell.com
http://files2.zimbra.com
http://fpdownload.macromedia.com
http://ftp.adobe.com
http://ftp.gimp.org
http://ftp.opera.com
http://ftp.osuosl.org
http://g.live.com
http://get.geo.opera.com
http://get.geo.opera.com.global.prod.fastly.net
http://get.videolan.org
http://gigenet.dl.osdn.jp
http://hotfixv4.microsoft.com
http://install.nitropdf.com
http://jaist.dl.sourceforge.net
http://javadl.oracle.com
http://javadl.sun.com
http://jsimlo.sk
http://knowledge.autodesk.com
http://localhost
http://localhostnt4w
http://mirror.clarkson.edu
http://mirror.nexcess.net
http://mirror6.layerjet.com
http://mirrors.syringanetworks.net
http://mozilla.stu.edu.tw
http://mozy.com
http://olive.download.pdfforge.org
http://openoffice.cs.utah.edu
http://operasoftware.pc.cdn.bitgravity.com
http://orange.download.pdfforge.org
http://osdn.dl.osdn.jp
http://packages.vmware.com
http://pnotepad.googlecode.com
http://prodesigntools.com
http://pspad.poradna.net
http://pumath.dl.osdn.jp
http://purple.download.pdfforge.org
http://qtinstall.info.apple.com
http://releases.mozilla.org
http://silverlight.dlservice.microsoft.com
http://software-dl.real.com
http://sourceforge.net
http://superb-dca2.dl.sourceforge.net
http://support.citrix.com
http://support.citrixonline.com
http://supportdownload.apple.com
http://swupdl.adobe.com
http://tcpdiag.dl.sourceforge.net
http://teal.download.pdfforge.org
http://tenet.dl.sourceforge.net
http://ufpr.dl.sourceforge.net
http://up.autodesk.com
http://upgrade.skype.com
http://us.download.nvidia.com
http://videolan-mirror.vpsserver.com
http://white.download.pdfforge.org
http://wl.dlservice.microsoft.com
http://www.7-zip.org
http://www.aimp.ru
http://www.coreftp.com
http://www.cutepdf.com
http://www.dotpdn.com
http://www.download.windowsupdate.com
http://www.filesetups.com
http://www.fosshub.com
http://www.getpaint.net
http://www.goodsync.com
http://www.jam-software.com
http://www.microsoft.com
http://www.mirrorservice.org
http://www.oldfoss.com
http://www.peazip.org
http://www.piriform.com
http://www.rarlab.com
http://www.realvnc.com
http://www.tightvnc.com
http://www.uvnc.com
http://www.uvnc.eu
http://www.wireshark.org
http://xh.yimg.com
http://xml.shavlik.com
https://2.na.dl.wireshark.org
https://airdownload.adobe.com
https://allwaysync.com
https://assets.cdngetgo.com
https://astuteinternet.dl.sourceforge.net
https://atlassian.jfrog.io
https://ayera.dl.sourceforge.net
https://bitbucket.org
https://cdn.gomlab.com
https://cdn1.evernote.com
https://clientupdates.dropboxstatic.com
https://cytranet.dl.sourceforge.net
https://d1ilhw0800yew8.cloudfront.net
https://data-cdn.mbamupdates.com
https://desktopassets.prezi.com
https://dl.bandicam.com
https://dl.google.com
https://dl.tvcdn.de
https://dl3.xmind.net
https://download.cdburnerxp.se
https://download.gimp.org
https://download.microsoft.com
https://download.royalapplications.com
https://download.skype.com
https://download.splunk.com
https://download.sublimetext.com
https://download.teamviewer.com
https://download.techsmith.com
https://download.tortoisegit.org
https://download.visualstudio.microsoft.com
https://download3.vmware.com
https://download3.xnview.com
https://downloadmirror.intel.com
https://downloadplugins.citrix.com
https://downloads.arduino.cc
https://downloads.bluebeam.com
https://downloads.hpe.com
https://downloads.plex.tv
https://downloads.sourceforge.net
https://downloadus1.teamviewer.com
https://downloadus2.teamviewer.com
https://downloadus4.teamviewer.com
https://e3.boxcdn.net
https://endpoint920510.azureedge.net
https://files.zimbra.com
https://fpdownload.macromedia.com
https://get.geo.opera.com
https://gigenet.dl.sourceforge.net
https://github.com
https://hipchat-ops.s3.amazonaws.com
https://iweb.dl.sourceforge.net
https://knowledge.autodesk.com
https://launch.getgo.com
https://managedway.dl.sourceforge.net
https://master.dl.sourceforge.net
https://media.inkscape.org
https://meetings.webex.com
https://na19.salesforce.com
https://neevia.com
https://nmap.org
https://nodejs.org
https://notepad-plus-plus.org
https://packages.vmware.com
https://phoenixnap.dl.sourceforge.net
https://pilotfiber.dl.sourceforge.net
https://pkware.cachefly.net
https://s3.amazonaws.com
https://secure.logmein.com
https://secure.mozy.com
https://secure-appldnld.apple.com
https://slack-ssb-updates.global.ssl.fastly.net
https://sourceforge.net
https://storage.googleapis.com
https://superb-dca2.dl.sourceforge.net
https://superb-sea2.dl.sourceforge.net
https://support.citrix.com
https://support.microsoft.com
https://svwh.dl.sourceforge.net
https://swdl.bluejeans.com
https://technet.microsoft.com
https://telerik-fiddler.s3.amazonaws.com
https://the.earth.li
https://vorboss.dl.sourceforge.net
https://web.mit.edu
https://www.citrix.com
https://www.dotpdn.com
https://www.fosshub.com
https://www.goodsync.com
https://www.hipchat.com
https://www.jam-software.com
https://www.microsoft.com
https://www.mozypro.com
https://www.piriform.com
https://www.rarlab.com
https://www.realvnc.com
https://www.scootersoftware.com
https://www.telerik.com
https://www.tracker-software.com
https://www.uvnc.eu
https://www.wireshark.org
vhttps://www.microsoft.com

 

If you require the IP addresses to create exceptions you can find the IP addresses used for content.ivanti.com here. To obtain the IP for vendor sites you can ping the site for the current IP address or contact the vendor to obtain this information.

Affected Product(s)

 

Shavlik Protect, All versions

Ivanti Patch For Windows Servers, All versions

Security Tool: Implement registry keys per Windows Server guidance to protect against speculative execution side-channel vulnerabilities

$
0
0

Purpose

 

The Ivanti Content Team created a Security Tool to help implement the required registry keys discussed in the Microsoft article linked below.  This document will step through the configuration to specifically target the new Security Tool and deploy it your clients.

 

Windows Server guidance to protect against speculative execution side-channel vulnerabilities

 

"Microsoft is aware of a new publicly disclosed class of vulnerabilities that are referred to as “speculative execution side-channel attacks” that affect many modern processors and operating systems, including chipsets from Intel, AMD, and ARM. Microsoft has not yet received any information to indicate that these vulnerabilities have been used to attack customers. Microsoft continues working closely with industry partners including chip makers, hardware OEMs, and app vendors to protect customers. To get all available protections, hardware or firmware updates and software updates are required. This includes microcode from device OEMs and, in some cases, updates to antivirus software."
As we are unable to completely test the impact of adding these registry keys per Microsoft guidance, we highly recommend testing this in your test labs before pushing to production.  One known side affect of implementing this will be a performance decrease.

 

Instructions

 

You will be creating a Scan Template and Patch Group to specifically target this Security Tool.  This will allow you to scan with automatic deployment without having to worry about installing other Security Tools we offer.  We will be offering 2 Security Tools, one to implement the registry keys and another to remove the registry keys.

 

  • IVA18-001 Q4072698: This tool enables the fix for ADV180002
  • IVA18-001 Q4072698U: This tool disables the fix for ADV180002

 

Creating the Patch Group

 

A Patch Group contains a list of patches you can use to use as a baseline (to scan for) or use to exclude from scan results. We will be using a Patch Group as a baseline to scan for IVA18-001 Q4072698.

 

1. Navigate to New > Patch Group.  Enter a Name for the Patch Group and optionally a Description. Click Save.

 

2. Search for IVA18-001 or 4072698. Right-click on the Security Tool IVA18-001 Q4072698 and choose Add to Patch Group then choose the Patch Group you created.

 

3. The Patch Group is created and can be added to the Patch Scan Template, close the Patches window.

 

Creating the Patch Scan Template

 

The Scan Template, along with your new Patch Group will help you scan for the new Security Tool.

 

1. Navigate to New > Patch Scan Template

 

2. Give the Scan Template a Name, matching the Patch Group Name is advisable.

 

3. In the Baseline or Exceptions section, choose Baseline and check-mark your Patch Group. (no other filtering is needed)

 

4. The Scan Template should look similar to this:

 

 

5. The Patch Scan Template is created, Click Save.

 

Scanning for the Security Tool

 

The setup is complete, you can use your new Patch Scan Template to scan for the new Security Tool IVA18-001 Q4072698. The Security Tool will show missing on systems that do not have the registry keys on them and can be deployed like a regular update.  A reboot is required.

 

Additional Information

 

  • The target systems need to be restarted after running the Security Tools to enable or disable the registry keys for the changes to take effect.
  • You can follow these instructions to scan for the uninstall Security Tool by creating a Patch Group including the IVA18-001 Q4072698U version of the tool.

 

Affected Product(s)

 

Ivanti Patch for Windows Servers 9.3.x

Shavlik Protect 9.2.x

MS12-001 KB2644615 Showing as Missing After the Installation of MS15-A02 KB3033929

$
0
0

Symptoms

 

After applying MS15-A02 KB3033929, the patch MS12-001 KB2644615 is now showing as missing.

 

Cause

 

The introduction of MS15-A02 in March 2015 opened up a security hole that is addressed by the installation of MS12-001 KB2644615 or MS13-063  KB2859537.

Resolution

 

Deploy MS12-001 KB2644615 based on the scan results from Shavlik Protect or download the install file for MS13-063 KB2859537 and manually run the file on the target machine

 

Affected Product(s)

 

Protect 9.X


Security Tool: Implement the QualityCompat registry key that enables Windows security updates released on January 3, 2018

$
0
0

Purpose

 

The Ivanti Content Team has created a Security Tool to help implement the QualityCompat registry key that enables deployment of the Windows security updates released on January 3, 2018. This document will step through the configuration to specifically target the new Security Tool and deploy it your clients.

Adding this registry key on machines that have out-of-date AV could cause BSOD's. As we are unable to completely test the impact of adding these registry keys or installing the OOB security updates per Microsoft guidance, we highly recommend testing this in your test labs before pushing to production.

 

 

Instructions

 

You will be creating a Scan Template and Patch Group to specifically target this Security Tool. This will allow you to scan with automatic deployment without having to worry about installing other Security Tools we offer.  We will be offering 2 Security Tools, one to implement the registry key and another to remove the registry key.

 

  • IVA18-002 Q4072699: This tool adds the QualityCompat registry key
  • IVA18-002 Q4072699U: This tool removes the QualityCompat registry key

 

Creating the Patch Group

 

A Patch Group contains a list of patches you can use to use as a baseline (to scan for) or use to exclude from scan results. We will be using a Patch Group as a baseline to scan for IVA18-002 Q4072699.

 

1. Navigate to New > Patch Group.  Enter a Name for the Patch Group and optionally a Description. Click Save.

2. Search for IVA18-002 or 4072699 as shown. Right-click on the Security Tool IVA18-002 Q4072699 and choose Add to Patch Group then choose the Patch Group you created.

 

3. The Patch Group is created and can be added to the Patch Scan Template, close the Patches window.

 

Creating the Patch Scan Template

 

The Scan Template, along with your new Patch Group will help you scan for the new Security Tool.

 

1. Navigate to New > Patch Scan Template

 

2. Give the Scan Template a Name, matching the Patch Group Name is advisable.

 

3. In the Baseline or Exceptions section, choose Baseline and check-mark your Patch Group. (no other filtering is needed)

 

4. The Scan Template should look similar to this:

 

5. The Patch Scan Template is created, Click Save.

 

Scanning for the Security Tool

 

The setup is complete, you can use your new Patch Scan Template to scan for the new Security Tool IVA18-002 Q4072699. The Security Tool will show missing on systems that do not have the registry key on them and can be deployed like a regular update.

 

Additional Information

 

  • You can follow these instructions to scan for the uninstall Security Tool by creating a Patch Group including the IVA18-002 Q4072699U version of the tool.

 

Affected Product(s)

 

Ivanti Patch for Windows Servers 9.3.x

Shavlik Protect 9.2.x

How To: Use a Custom Action to add required registry key for deploying Windows Security OOB updates release January 3, 2018

$
0
0
We have released a Security Tool to add the registry key to your target systems.  A Custom Action is no longer needed.  For more information:
Security Tool: Implement the QualityCompat registry key that enables Windows security updates released on January 3, 2018


Purpose

 

As of January 3rd 2018, Microsoft is now requiring a registry key to be added to machines for addressing compatibility issues with a small number of anti-virus software products.

More information on this can be found here: Important information on detection logic for the Intel 'Meltdown' security vulnerability

 

Description

Adding this registry key on machines that have out-of-date AV could cause BSOD's. Please use this custom action at your own risk.

See Microsoft link for further details: https://support.microsoft.com/en-us/help/4072699/important-information-regarding-the-windows-security-updates-released

1.  Download and extract the attached zip below or here to get the batch file used for adding the registry key.

 

2.  Create a new Patch Scan Template that scans for only Custom Actions. (this will allow you run this against machine with no missing patches)

 

 

 

3.  Create a new Deployment Template.

 

 

4.  Name the template. Ex: Intel Meltdown Registry Key

 

 

4.  Click on Post-deploy Reboot. Change the reboot option to 'Never reboot after deployment'.

 

 

5. Click on Custom Actions. Click 'New'. A prompt to save the template will be presented. Click 'Save'.

 

 

6. The first action will push the batch file. Ensure that step 3 states 'Push File', and then select the batch file from the local machine. Click 'Save' when completed.

 

 

7. Click 'New' once more. Change Step 3 to 'After All Patches' and use the following command in Step 4: Call %pathtofixes%addregkey.bat

 

 

8. Click 'Save' twice to finish creating the Deployment Template.

 

9. Use the new Scan Template to scan your target machines.

 

 

10. Once the scan is completed, click 'View Results'

 

 

11. The results will offer our nullpatch.exe for deployment. Proceed by right-clicking the patch and clicking 'Deploy all missing patches'.

 

 

12. Select the new Deployment Template created earlier. Click 'Deploy' to start the deployment.

 

 

13. Open regedit to validate the registry key was added.

 

 

Additional Information

 

How To: Perform a Custom Action Complete Tutorial with Custom Actions

 

Affected Product(s)

 

Shavlik Protect 9.2

Ivanti Patch for Windows Servers 9.3

Update to patching Citrix Receiver

$
0
0

Overview

 

We are changing how we handle patching for Citrix Receiver to better match up with Citrix's lifecycle process. The changes we are making are:

 

Versions less than 4.9: Systems running versions of Citrix Receiver prior to version 4.9 will detect as previously, with the newest patch being offered updating the software to version 4.9 which is the Long Term Service Release (LTSR) of Citrix Receiver.

 

Version 4.9: As this is the LTSR release it will have any Cumulative Updates marked as applicable for it, but it will not have the update to version 4.10 marked as applicable. If you want to upgrade to 4.10 from 4.9, 4.10 will be available as a Software Distribution as a separate branch, similar to how major version updates are handled currently of Java Runtime Environment.

 

Due to the fact that Citrix only provides links for token based downloads of previous versions of Citrix Receiver we are unable to automatically download the files for the LTSR updates. The patches will need to be manually downloaded and added to the patch repository as detailed in the following document: How To: Supply and Deploy Patches That Can No Longer Be Downloaded

 

For Citrix Receiver 4.9, the latest version can be found here: https://www.citrix.com/downloads/citrix-receiver/windows-ltsr/receiver-for-windows-ltsr_4_9_1000.html

Version 4.10: As this is the current release, and the start of a new branch, it will have updates marked as applicable as they are released up to the point of the next LTSR release of Citrix Receiver. At this point a new branch will be created, with versions between 4.10 and the next LTSR being offered updates to the LTSR version.

 

Additional Information

 

 

Affected Product(s)

 

Shavlik Protect 9.2.x

Protect SDK 9.2.x

Ivanti Patch for Windows Servers 9.3.x

Update to Patching Citrix Receiver

$
0
0

Overview

 

We are changing how we handle patching for Citrix Receiver to better match up with Citrix's lifecycle process. The changes we are making are:

 

Versions less than 4.9: Systems running versions of Citrix Receiver prior to version 4.9 will detect as previously, with the newest patch being offered updating the software to version 4.9 which is the Long Term Service Release (LTSR) of Citrix Receiver.

 

Version 4.9: As this is the LTSR release it will have any Cumulative Updates marked as applicable for it, but it will not have the update to version 4.10 marked as applicable. If you want to upgrade off of the LTSR version, you will need to install the desired version on your Endpoints. We are currently working on an upgrade package, and will update this article regarding it.

Due to the fact that Citrix only provides links for token based downloads of previous versions of Citrix Receiver we are unable to automatically download the files for the LTSR updates. The patches will need to be manually downloaded and placed in the Local Source Folder, which must be enabled as detailed in the Product Help here: https://help.ivanti.com/sh/help/en_US/PAT/23/Topics/Offline_Options_Tab.htm

 

For Citrix Receiver 4.9, the latest version can be found here: https://www.citrix.com/downloads/citrix-receiver/windows-ltsr/receiver-for-windows-ltsr_4_9_1000.html

Version 4.10: As this is the current release, and the start of a new branch, it will have updates marked as applicable as they are released up to the point of the next LTSR release of Citrix Receiver. At this point a new branch will be created, with versions between 4.10 and the next LTSR being offered updates to the LTSR version.

 

Additional Information

 

 

Affected Product(s)

 

Shavlik Patch for SCCM 2.3.x

Ivanti Patch for SCCM 2.3.x

Patches That Always Show Missing In Results - Install/Uninstall Loops

$
0
0

Symptoms

 

  • Detected patch continues to show as missing after successfully deploying.
  • Patch that shows missing ends with 'U' every other deployment.

 

Cause

 

Certain patches exist as an installer and an uninstaller; these patches can cause a loop when scanning and deploying. When the installation patch is deployed it makes the uninstall patch considered to be missing. These patches are designed by their vendor in this manner to facilitate adding/removing the patch according to environmental needs. If scanning/deploying these types of patches it may appear that the patch continually is missing as it continues to add/remove per deployment. The uninstall patch will end with 'U'. These patches tend to belong to the 'Security Tools' patch type.

 

Example: Missing the Installation Patch

Missing Install Patch.png

 

Example: After Installed, Now Missing Uninstall Patch

missing uninstaller.png

 

Resolution

 

Exclude the specific patch utilizing a patch group, or choose not to deploy the patches installer/uninstaller after scanning.

 

Refer to the following document:

How To:  Include or Exclude Specific Patches in Scan Results

How To: Include or Exclude Specific Patches in Scan Results

 

These are known patches that offer an uninstaller.

  • Q2719615(U) - MS12-A04
  • Q2719662(U) - MS12-A06
  • Q2794220(U) - MS12-A10
  • Q2847140(U) - MS13-A02
  • Q2887505(U) - MS13-A08
  • Q2896666(U) - MS13-A09
  • QIE9001(U) - MSIE-002
  • Q4072698(U) - IVA18-001
  • Q4072699(U) - IVA18-002

 

Affected Product(s)

 

Shavlik Protect 9.x

Viewing all 1352 articles
Browse latest View live