Quantcast
Channel: Shavlik User Community : Document List - All Communities
Viewing all 1352 articles
Browse latest View live

Deployment Configuration screen: Temporary vs. Permanent Template Configuration Changes

$
0
0

Description

 

During setup of a patch deployment within Protect you will eventually get to the "Deployment Configuration" screen (Figure 1). The deployment templates that you already have configured can be modified while you are at this screen. However, it is important to know the difference between using the "Edit" button vs. the "Change" button.

 

  • The "Edit" button on the upper right will make permanent changes to the chosen template. You will not be able to modify built-in templates from this option.
  • The "Change" button on the lower right will make temporary changes to the chosen template. The temporary template will only be used for this deployment. You will also see "(Temporary)" in the name of the chose template.

 

Figure 1: Deployment Configuration Screen showing a Temporary template currently chosen.

 

 

 

Affected Product(s)

 

Shavlik Protect 9.x


Deployment Stays at Files Copied And No Patches Are Installed

$
0
0

Purpose

 

The purpose of this document is to explain what causes deployments to stay at the status of 'Files Copied' but never install any patches after all files are copied to the target machines.

 

Symptoms

 

Deployment tracker will show both the machine status and the patch status as Files Copied.

 

 

Cause

 

The deployment was configured to be a copy only operation. When configuring the deployment, the 'Execute deployment package' option was selected as 'Do not schedule execution'.

 

 

 

This is further validated by looking at the View Deploy Rules in the deployment tracker. This will show the deployment type as 'Copy files only and do no execute deployment'.

 

 

Resolution

 

To ensure that the deployment installs the patches, make sure to select the Install the patch(es) option and configure the deployment to either install the patches 'Immediately after staging' or scheduled for a later time or next reboot.

 

 

Additional Information

 

How To: Schedule and Configure a Deployment in Patch for Windows Servers 9.3

 

Affected Product

 

Ivanti Patch for Windows Servers 9.3

Protect Detects A Patch That Should Not Be Detected As Missing

$
0
0

Symptoms


Protect is detecting a Patch that should not be detected as missing.

  

Resolution

 

NOTE: Before performing the following, please update to the latest XML data by going to Help > Refresh Files, close and reopen Shavlik Protect and then perform another scan against the machine(s) using a Security Patch or WUScan Template. The root cause of the issue may stem from custom filtering in a Scan Template or could already be fixed in a later XML release.

 

From The Protect Console:

 

1. Click on Results tab.

2. Choose the most recent scan containing the specific patch.

3. Click on the machine containing the specific patch.

4. Click on the specific patch.

5. View why Protect detects the patch as missing (Patch Information Tab).

6. Click on the linked Qnumber to be taking to documentation regarding this patch. Most of the time this will include the detection logic.

7. Browse to the location referenced in step 5 to verify the information found in step 5 and 6.

 

See below for more information:

new detection logic.PNG

 

 

 

Also note the Downloaded File name.

new detection 2.PNG

 

On the Target:

 

Browse to C:\Windows\ProPatches\Patches and find the specific patch. If you have previously deployed this patch and it failed, manually try to run the patch.

 

new detection 3.PNG

 

Take any screenshots of any errors such as the one below.

does not apply.jpg

  

Information to Send to Support

 

If you experience these errors, please create a support case at support.shavlik.com or by calling into support.

NOTE: If you choose to call into support, please gather this information before calling in: Obtaining Support

 

Gather the following information:

 

  1. Before doing the following, please download the latest XML data by going to Help > Refresh Files.
  2. The Bulletin ID & Qnumber of the patch in question. This information can be found in Step 4 above.
  3. Clear your logs, and do a rescan and/or deployment.then gather the log. Please do this by following this guide for console logs: How To: Collect Shavlik Protect - Ivanti Patch for Windows Servers console, patch deployment and agent logs
  4. A DPDTrace gives more information on how Protect detects certain patches. Please gather a DPD trace on the target machine by following this guide: DPDTrace command line logging tool used for patch detection issues
  5. Screenshots from Step 5 from the console, Step 7 from the target and if applicable, the error when the patch is manually installed.

 

Include the following registry exports from the same target machine that ran the DPDTrace.  This will not only save time, it will also greatly increase our chances of determining the root cause of the detection issue and correcting it:

 

NOTE: This document has a batch file that retrieves the needed registry keys: Batch File for Obtaining Registry Exports for Detection Related Issues

  • HKLM\SOFTWARE\WOW6432\Microsoft\Windows\CurrentVersion\Uninstall

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall

  • HKLM\SOFTWARE\Classes\Installer\Products

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages

  • HKLM\SOFTWARE\Classes\Installer\Patches

 

Please zip all files into one archive file before emailing or attaching them to the case.

NOTE: You will not be able to email the registry keys to the case as .reg files. They must be either uploaded to the case through the support portal or changed into .txt files.

  

Affected Product(s)

 

Shavlik Protect 9.x

Expired SSL Certificate - Failed To Retrieve Updates From Specified WSUS Server

$
0
0

Purpose

 

This document will help you identify and correct WSUS connection issues caused by an expire self-signed SSL certificate.

 

Symptoms

 

1.  You see the following popup message when you navigate to Software Library > Software Updates >  Shavlik Patch.

"Failed to retrieve updates from specified WSUS server. The server could not be contacted. Please confirm the server name and port number."

 

2. You see the following popup message when you navigate to Shavlik Patch > Setting.

"Failed to connect to the WSUS server. Please verify the server name, port number and SSL setting."

 

3.  You see the following popup message when clicking on the Test Connection button in the Shavlik Patch > Settings > WSUS Server tab.

"The WSUS server could not be contacted. Please confirm the server name and port number.  Verify that your account is a member of the WSUS Administrator group on the WSUS server."

 

Cause

 

Your self-signed SSL certificate has expired.

 

Resolution

 

The resolution to this issue will vary depending who you originally created your SSL certificate.  We will be covering one possible fix in this document.

 

1.  Open IIS on the SCCM/WSUS server and click on your server name under Connections.

2.  Answer the popup.  Choosing 'No' is a viable answer.

3.  Double-click on Server Certificates in the middle pane.

4.  Click on Create Self-Signed Certificate.

5.  Enter a friendly name for the new certificate.

6.  Choose Web Hosting in the drop down menu then click OK.

7.  Under the Connections pane, expand the tree under your server name then expand Sites.

8.  Click on WSUS Administration and then Bindings... in the far right pane.

9.  Click on the HTTPS binding and then click Edit.

10.  Choose the new SSL certificate under the SSL certificate drop down menu.

11.  Click OK and then Close on the next screen.

12.  Open SCCM and monitor for any issues described in the Symptoms section.

 

Affected Products

 

Shavlik Patch

 

Updating Patch Definition And Install files To A Non-internet Facing Console Using Read Only Media

$
0
0

Purpose

 

This document explains how to transfer data and patch files manually from a Shavlik Protect Console on a Internet facing network, to a Protect Console on a Secure network with no internet connection using Write Once/Read Only Media .  This procedure is used when data from re-writable media is not allowed to be copied to machines in a secure zone.

 

Procedure

 

Setup a separate Distribution Share for Internet Connected and Offline Protect Consoles as a data file and patch repository

  • Setup a separate shared folder for each security zone for the Internet Connected and offline facing consoles that is accessible from the console to be used as the path for Distribution Server configuration.
  • Make sure that patch definitions downloads are scheduled so that current patch definitions are synced to the Distribution Server share
  • Configure a Distribution Server on each console using the document, Configuring Authenticated SMB Distribution Servers
  • Configure the Distribution Server on the Connected Protect Console to Sync All engines, definitions, and patch downloads.
  • Under Tools > Operations > Downloads on the Secure Network Protect Console, select the Specific Distribution Server for the "Definition download source" and the "Patch and Service Pack" download source.

 

Copy files to a DVD to be delivered to the Protect Console on the Secure Network 

  • Sync data files and patches to the Distribution Server share manually using information the document How To: Manually Synchronize Distribution Servers
  • Burn contents of the Distribution Server Share from the Internet Connected Console to a write one DVD-R
  • Walk the DVD-R to the Secure non-internet facing network and copy the contents to the Distribution Share on the Secure Network Protect Console

SneakerNet Distribution Server2.jpg

Using the copied files

After the data files and patches have been downloaded to the Secure Network Protect Console Distribution share, data files will be transferred to the correct folder when files are refreshed automatically during a scan or manually using Help > Refresh files.  Patch downloads will go to the Downloads folder when the console requests a patch download during deployment.

 

Additional Information

This Procedure is simplified by using the existing Download folder as specified under Tools > Operations > Downloads as the Distribution Share for the internet console.  This eliminates the need to sync the Patch downloads.  You would only need to sync the Core engines/definitions and Threat engines/definitions if you are using agents.

 

Affected Product(s)

 

Protect 9.X

URL exception list for Shavlik Patch For Microsoft System Center - Patch for SCCM (08-15-2018)

$
0
0

Purpose

 

This article provides a list of URLs that may be required to download catalog content and patches when using Shavlik Patch for Microsoft System Center and Ivanti Patch for SCCM.

 

Description

 

The following URLs may be used to download updates and must allowed through firewalls, proxies and web filters.

 

ftp://ftp.mozilla.org
http://34e34375d0b7c22eafcf-c0a4be9b34fe09958cbea1670de70e9b.r87.cf1.rackcdn.com
http://aimp.su
http://airdownload.adobe.com
http://app.oldfoss.com
http://appldnld.apple.com
http://ardownload.adobe.com
http://cache.lumension.com
http://cache-download.real.com
http://ccmdl.adobe.com
http://cdn01.foxitsoftware.com
http://cdn02.foxitsoftware.com
http://cdn09.foxitsoftware.com
http://cdn1.evernote.com
http://classicshell.net
http://content.ivanti.com
http://d.7-zip.org
http://dl.google.com
http://dl2.xmind.net
http://download.adobe.com
http://download.betanews.com
http://download.ccleaner.com
http://download.cdburnerxp.se
http://download.documentfoundation.org
http://download.filezilla-project.org
http://download.gimp.org
http://download.imgburn.com
http://download.macromedia.com
http://download.microsoft.com
http://download.nullsoft.com
http://download.oldfoss.com
http://download.oldfoss.com:81
http://download.pdfforge.org
http://download.piriform.com
http://download.royalapplications.com
http://download.skype.com
http://download.splunk.com
http://download.teamviewer.com
http://download.techsmith.com
http://download.videolan.org
http://download.virtualbox.org
http://download.windowsupdate.com
http://download.winzip.com
http://download2.operacdn.com
http://download3.operacdn.com
http://download3.vmware.com
http://download3.xnview.com
http://download4.operacdn.com
http://downloadarchive.documentfoundation.org
http://download-origin.cdn.mozilla.net
http://downloads.hpe.com
http://downloads.pdf-xchange.com
http://downloads.sourceforge.net
http://downloadus2.teamviewer.com
http://files2.zimbra.com
http://fpdownload.macromedia.com
http://ftp.adobe.com
http://ftp.mozilla.org
http://ftp.opera.com
http://ftp.utexas.edu
http://get.geo.opera.com
http://gigenet.dl.osdn.jp
http://install.nitropdf.com
http://jaist.dl.sourceforge.net
http://javadl.oracle.com
http://javadl.sun.com
http://jsimlo.sk
http://mirror.clarkson.edu
http://mirror.nexcess.net
http://mirror2.layerjet.com
http://mirror6.layerjet.com
http://mirrors.syringanetworks.net
http://mozy.com
http://olive.download.pdfforge.org
http://openoffice.cs.utah.edu
http://orange.download.pdfforge.org
http://osdn.dl.osdn.jp
http://packages.vmware.com
http://pspad.poradna.net
http://pumath.dl.osdn.jp
http://purple.download.pdfforge.org
http://releases.mozilla.org
http://sourceforge.net
http://support.citrix.com
http://support.citrixonline.com
http://support1.uvnc.com
http://supportdownload.apple.com
http://tdf.mirrors.tds.net
http://teal.download.pdfforge.org
http://tenet.dl.sourceforge.net
http://ufpr.dl.sourceforge.net
http://updates-http.cdn-apple.com
http://www.7-zip.org
http://www.coreftp.com
http://www.cutepdf.com
http://www.fosshub.com
http://www.goodsync.com
http://www.gtlib.gatech.edu
http://www.jam-software.com
http://www.mirrorservice.org
http://www.peazip.org
http://www.piriform.com
http://www.rarlab.com
http://www.realvnc.com
http://www.tightvnc.com
http://www.uvnc.com
http://www.uvnc.eu
http://www.wireshark.org
http://xh.yimg.com
http://zoom.us
https://2.na.dl.wireshark.org
https://airdownload.adobe.com
https://allwaysync.com
https://archive.apache.org
https://assets.cdngetgo.com
https://astuteinternet.dl.sourceforge.net
https://atlassian.jfrog.io
https://ayera.dl.sourceforge.net
https://az764295.vo.msecnd.net
https://bitbucket.org
https://cdn.gomlab.com
https://cdn1.evernote.com
https://cfhcable.dl.sourceforge.net
https://clientupdates.dropboxstatic.com
https://content.ivanti.com
https://d11yldzmag5yn.cloudfront.net
https://d1ilhw0800yew8.cloudfront.net
https://data-cdn.mbamupdates.com
https://desktopassets.prezi.com
https://dl.bandicam.com
https://dl.google.com
https://dl.tvcdn.de
https://dl1.cdn.filezilla-project.org
https://dl3.cdn.filezilla-project.org
https://dl3.xmind.net
https://download.ccleaner.com
https://download.cdburnerxp.se
https://download.gimp.org
https://download.microsoft.com
https://download.royalapplications.com
https://download.skype.com
https://download.splunk.com
https://download.sublimetext.com
https://download.teamviewer.com
https://download.techsmith.com
https://download.tortoisegit.org
https://download.virtualbox.org
https://download1.operacdn.com
https://download3.vmware.com
https://download3.xnview.com
https://downloadplugins.citrix.com
https://downloads.hpe.com
https://downloads.plex.tv
https://downloads.sourceforge.net
https://downloadus2.teamviewer.com
https://downloadus4.teamviewer.com
https://e3.boxcdn.net
https://endpoint920510.azureedge.net
https://fpdownload.macromedia.com
https://ftp.mozilla.org
https://ftp.opera.com
https://ftp.osuosl.org
https://github.com
https://hipchat-ops.s3.amazonaws.com
https://iweb.dl.sourceforge.net
https://knowledge.autodesk.com
https://launch.getgo.com
https://master.dl.sourceforge.net
https://media.inkscape.org
https://meetings.webex.com
https://neevia.com
https://nmap.org
https://notepad-plus-plus.org
https://packages.vmware.com
https://phoenixnap.dl.sourceforge.net
https://s3.amazonaws.com
https://secure.logmein.com
https://secure.mozy.com
https://secure-appldnld.apple.com
https://slack-ssb-updates.global.ssl.fastly.net
https://storage.googleapis.com
https://superb-dca2.dl.sourceforge.net
https://superb-sea2.dl.sourceforge.net
https://support.citrix.com
https://swdl.bluejeans.com
https://telerik-fiddler.s3.amazonaws.com
https://the.earth.li
https://web.mit.edu
https://www.7-zip.org
https://www.citrix.com
https://www.fosshub.com
https://www.goodsync.com
https://www.hipchat.com
https://www.jam-software.com
https://www.mozypro.com
https://www.piriform.com
https://www.rarlab.com
https://www.realvnc.com
https://www.scootersoftware.com
https://www.tightvnc.com
https://www.uvnc.eu
https://www.wireshark.org

 

Additional Information

 

  • license.shavlik.com is required for activation the license on the product.
  • If using the Shavlik Patch plugin with SCCM or Ivanti Patch for SCCM, you may also want to review the following for certificate site requirements:  Certificate verification sites to allow for Shavlik Patch
  • To obtain the IP for vendor sites you can ping the vendor site or contact the vendor to obtain this information. It may be easier to create an exception for an entire domain rather than entering all specific URLs, you can usually do so by entering the exception in this format: *.domain.com.

 

Affected Product(s)

 

Ivanti Patch for SCCM

Shavlik Patch for Microsoft System Center

URL exception list for Shavlik Protect - Ivanti Patch for Windows Servers (08-15-2018)

$
0
0

Overview

 

This document provides a list of required URL addresses for Shavlik Protect and Ivanti Patch for Windows Servers to allow:

 

  • Patch executable download.
  • Patch content definition download.
  • Online license activation or license refresh.
  • Home page RSS feed.
  • Product check for update.

 

URL List

 

The following URLs may be used to download updates and must allowed through firewalls, proxies and web filters:

 

ftp://ftp.attglobal.net
ftp://mozilla.stu.edu.tw
ftp://releases.mozilla.org
http://34e34375d0b7c22eafcf-c0a4be9b34fe09958cbea1670de70e9b.r87.cf1.rackcdn.com
http://a1540.g.akamai.net
http://aimp.su
http://airdownload.adobe.com
http://app.oldfoss.com
http://app.oldfoss.com:81
http://appldnld.apple.com
http://appldnld.apple.com.edgesuite.net
http://archive.apache.org
http://ardownload.adobe.com
http://au.v4.download.windowsupdate.com
http://azure.download.pdfforge.org
http://bitbucket.org
http://cache.lumension.com
http://cache.pack.google.com
http://cache-download.real.com
http://ccmdl.adobe.com
http://cdn01.foxitsoftware.com
http://cdn02.foxitsoftware.com
http://cdn04.foxitsoftware.com
http://cdn09.foxitsoftware.com
http://cdn1.evernote.com
http://citrixreceiver491000.html
http://citrixreceiver492000.html
http://classicshell.net
http://content.ivanti.com
http://content.rim.com.edgesuite.net
http://d.7-zip.org
http://dist.divx.com
http://dl.google.com
http://dl2.xmind.net
http://dl3.xmind.net
http://download.accusoft.com
http://download.adobe.com
http://download.autodesk.com
http://download.betanews.com
http://download.ccleaner.com
http://download.cdburnerxp.se
http://download.documentfoundation.org
http://download.dymo.com
http://download.filezilla-project.org
http://download.gimp.org
http://download.imgburn.com
http://download.macromedia.com
http://download.microsoft.com
http://download.newaol.com
http://download.nullsoft.com
http://download.oldfoss.com
http://download.oldfoss.com:81
http://download.pdfforge.org
http://download.piriform.com
http://download.royalapplications.com
http://download.skype.com
http://download.splunk.com
http://download.teamviewer.com
http://download.techsmith.com
http://download.videolan.org
http://download.virtualbox.org
http://download.windowsupdate.com
http://download.winzip.com
http://download2.operacdn.com
http://download3.operacdn.com
http://download3.vmware.com
http://download3.xnview.com
http://download4.operacdn.com
http://download-akm.skype.com
http://downloadarchive.documentfoundation.org
http://download-origin.cdn.mozilla.net
http://downloads.hpe.com
http://downloads.pdf-xchange.com
http://downloads.sourceforge.net
http://downloadus1.teamviewer.com
http://downloadus2.teamviewer.com
http://en.community.dell.com
http://files2.zimbra.com
http://fpdownload.macromedia.com
http://ftp.adobe.com
http://ftp.gimp.org
http://ftp.opera.com
http://g.live.com
http://get.geo.opera.com
http://get.videolan.org
http://gigenet.dl.osdn.jp
http://hotfixv4.microsoft.com
http://install.nitropdf.com
http://jaist.dl.sourceforge.net
http://javadl.oracle.com
http://javadl.sun.com
http://jsimlo.sk
http://knowledge.autodesk.com
http://localhost
http://localhostnt4w
http://mirror.clarkson.edu
http://mirror.nexcess.net
http://mirror2.layerjet.com
http://mirror6.layerjet.com
http://mirrors.syringanetworks.net
http://mozilla.stu.edu.tw
http://mozy.com
http://olive.download.pdfforge.org
http://openoffice.cs.utah.edu
http://orange.download.pdfforge.org
http://osdn.dl.osdn.jp
http://pnotepad.googlecode.com
http://prodesigntools.com
http://pspad.poradna.net
http://pumath.dl.osdn.jp
http://purple.download.pdfforge.org
http://qtinstall.info.apple.com
http://releases.mozilla.org
http://silverlight.dlservice.microsoft.com
http://software-dl.real.com
http://sourceforge.net
http://superb-dca2.dl.sourceforge.net
http://support.citrix.com
http://support.citrixonline.com
http://support1.uvnc.com
http://supportdownload.apple.com
http://swupdl.adobe.com
http://tcpdiag.dl.sourceforge.net
http://tdf.mirrors.tds.net
http://teal.download.pdfforge.org
http://tenet.dl.sourceforge.net
http://ufpr.dl.sourceforge.net
http://up.autodesk.com
http://updates-http.cdn-apple.com
http://upgrade.skype.com
http://us.download.nvidia.com
http://white.download.pdfforge.org
http://wl.dlservice.microsoft.com
http://www.7-zip.org
http://www.aimp.ru
http://www.coreftp.com
http://www.cutepdf.com
http://www.dotpdn.com
http://www.download.windowsupdate.com
http://www.filesetups.com
http://www.fosshub.com
http://www.getpaint.net
http://www.goodsync.com
http://www.gtlib.gatech.edu
http://www.jam-software.com
http://www.microsoft.com
http://www.mirrorservice.org
http://www.peazip.org
http://www.piriform.com
http://www.rarlab.com
http://www.realvnc.com
http://www.tightvnc.com
http://www.uvnc.com
http://www.uvnc.eu
http://www.wireshark.org
http://xh.yimg.com
http://xml.shavlik.com
http://zoom.us
https://2.na.dl.wireshark.org
https://airdownload.adobe.com
https://allwaysync.com
https://archive.apache.org
https://assets.cdngetgo.com
https://astuteinternet.dl.sourceforge.net
https://atlassian.jfrog.io
https://ayera.dl.sourceforge.net
https://az764295.vo.msecnd.net
https://bitbucket.org
https://cdn.gomlab.com
https://cdn1.evernote.com
https://cfhcable.dl.sourceforge.net
https://clientupdates.dropboxstatic.com
https://cloud.r-project.org
https://content.ivanti.com
https://cytranet.dl.sourceforge.net
https://d11yldzmag5yn.cloudfront.net
https://d1ilhw0800yew8.cloudfront.net
https://data-cdn.mbamupdates.com
https://desktopassets.prezi.com
https://dl.bandicam.com
https://dl.google.com
https://dl.tvcdn.de
https://dl1.cdn.filezilla-project.org
https://dl3.cdn.filezilla-project.org
https://dl3.xmind.net
https://docs.microsoft.com
https://download.ccleaner.com
https://download.cdburnerxp.se
https://download.gimp.org
https://download.microsoft.com
https://download.royalapplications.com
https://download.skype.com
https://download.splunk.com
https://download.sublimetext.com
https://download.teamviewer.com
https://download.techsmith.com
https://download.tortoisegit.org
https://download.virtualbox.org
https://download.visualstudio.microsoft.com
https://download1.operacdn.com
https://download3.vmware.com
https://download3.xnview.com
https://downloadmirror.intel.com
https://downloadplugins.citrix.com
https://downloads.arduino.cc
https://downloads.bluebeam.com
https://downloads.hpe.com
https://downloads.plex.tv
https://downloads.sourceforge.net
https://downloadus1.teamviewer.com
https://downloadus2.teamviewer.com
https://downloadus4.teamviewer.com
https://e3.boxcdn.net
https://endpoint920510.azureedge.net
https://files.zimbra.com
https://fpdownload.macromedia.com
https://ftp.opera.com
https://github.com
https://hipchat-ops.s3.amazonaws.com
https://iweb.dl.sourceforge.net
https://knowledge.autodesk.com
https://launch.getgo.com
https://master.dl.sourceforge.net
https://media.inkscape.org
https://meetings.webex.com
https://na19.salesforce.com
https://neevia.com
https://nmap.org
https://nodejs.org
https://notepad-plus-plus.org
https://packages.vmware.com
https://phoenixnap.dl.sourceforge.net
https://pilotfiber.dl.sourceforge.net
https://pkware.cachefly.net
https://s3.amazonaws.com
https://secure.logmein.com
https://secure.mozy.com
https://secure-appldnld.apple.com
https://slack-ssb-updates.global.ssl.fastly.net
https://sourceforge.net
https://storage.googleapis.com
https://superb-dca2.dl.sourceforge.net
https://superb-sea2.dl.sourceforge.net
https://support.citrix.com
https://support.microsoft.com
https://swdl.bluejeans.com
https://technet.microsoft.com
https://telerik-fiddler.s3.amazonaws.com
https://the.earth.li
https://vorboss.dl.sourceforge.net
https://web.mit.edu
https://welcome.webex.com
https://www.7-zip.org
https://www.citrix.com
https://www.dotpdn.com
https://www.fosshub.com
https://www.goodsync.com
https://www.hipchat.com
https://www.jam-software.com
https://www.microsoft.com
https://www.mozypro.com
https://www.piriform.com
https://www.rarlab.com
https://www.realvnc.com
https://www.scootersoftware.com
https://www.telerik.com
https://www.tightvnc.com
https://www.tracker-software.com
https://www.uvnc.eu
https://www.wireshark.org
vhttps://www.microsoft.com

 

Additional Information

 

  • To obtain the IP for vendor sites you can ping the vendor site or contact the vendor to obtain this information. We are unable to provide a list of IP addresses due to the varied dynamic IP addresses being used by the vendors. It may be easier to create an exception for an entire domain rather than entering all specific URLs, you can usually do so by entering the exception in this format:
    • *.domain.com.

 

Affected Product(s)

 

Shavlik Protect

Ivanti Patch for Windows Servers

Error 106 - Access Denied; Credentials may be invalid Windows 10 - 1709, 1803

$
0
0

Overview

 

You receive this error when scanning Error 106 when scanning a Windows 10 machine after upgrading to 1709 or newer version.  Microsoft changed the way Windows 1709+ handles SPN's for CIFS.

Microsoft network server: Server SPN target name validation level

Cause

 

Starting in Windows 10 build 1709, how Windows handles SPN's for CIFS: Microsoft network server: Server SPN target name validation level

By default this is set to Off in Windows, however customers that have configurations for higher security such as CIS they will experience this issue.

 

Resolution

 

Microsoft has released an update addressing that issue: KB4343909An alternate fix would be to change the Microsoft network server: Server SPN target name validation level security policy setting to Off.

 

Affected Product

 

Shavlik Protect 9.2.x

Ivanti Patch for Windows Server 9.x


"Pre-deploy Snapshot Failed" with ESXi License/Version Error

$
0
0

Symptoms

 

When your deployment options are set to take a pre-deploy snapshot of a hosted VM, the deployment fails with error "Pre-deploy snapshot failed":

Deployment logs show the following error:

HostedVirtualDeployment.cs:555|VMware.Vim.VimException: Current license or ESXi version prohibits execution of the requested operation. ---> System.Web.Services.Protocols.SoapException: Current license or ESXi version prohibits execution of the requested operation.

 

Cause

 

All versions of ESXi licensing allow you to take manual snapshots.  However, the free version of ESXi has locked APIs, so with that free version you are unable to initiate that task remotely even though you can take snapshots manually.

 

Resolution

 

The only way to unlock the ESXi APIs is to purchase licensing for it.  As of the publication of this doc, any level of paid licensing will unlock the APIs, so any license tier will suffice for this operation.

Licensing is always subject to change - please consult VMWare if you have further questions about their licensing for ESXi or other products

 

Affected Products

 

Shavlik Protect 9.2.x

Ivanti Patch for Windows Servers 9.3.x

*.MSU files cannot be downloaded from HTTP-configured distribution servers and agents cannot patch machines (2021621)

$
0
0

Symptoms

 

  • Agents attempting to patch machines fail.
  • The agents are unable to find and download the .MSU patch files from HTTP-configured distribution servers.
  • On the UI of the target machine in the Patch tab, you see the error:

    Cannot download patch

 

Cause

This issue caused by the IIS MIME type extension for MSU not being configured correctly.

Resolution

To resolve this issue, configure the MIME Type extension for MSU on the IIS Server.

Note: If you are not using the vCenter vProtect Console patch repository, support for configuration of the the HTTP/HTTPS distribution server is not provided by VMware.

  • On Windows 2003 server:
    1. On the core server, launch Internet Information Services Manager.
    2. Navigate to the Default Web Site.
    3. Right-click the Default Web Site and select Properties.
    4. Click the HTTP Headers tab, then click MIME Types.
    5. Click New.
    6. Enter MSU for the file extension, and application/octet-stream for the MIME Type.
    7. Restart IIS by clicking Start> Run and entering iisreset.

  • On Windows 2008 Server:
    1. On the core server, Launch Internet Information Services Manager.
    2. Navigate to the Default Web Site and select it.
    3. Double-click MIME Types in the middle panel.
    4. Click Add.
    5. Enter MSU for the file extension, and application/octet-stream for the MIME Type.
    6. Restart IIS by clicking Start> Run and entering iisreset.

 

 

 

 

Products

 

Shavlik NetChk Protect

Shavlik NetChk vProtect

Product Versions

 

Shavlik NetChk Protect 7.8.1340

Shavlik NetChk Protect 7.8.1388

Shavlik NetChk Protect 7.8.1392

Shavlik NetChk vProtect 7.8.1340

Shavlik NetChk vProtect 7.8.1388

Shavlik NetChk vProtect 7.8.1392

7-Zip Install Doesn't Remove Registry Keys for Previous Versions

$
0
0

Symptoms

 

When installing the latest version of 7-Zip, vulnerability scans still report that older versions are installed and vulnerable.

 

Cause

 

The 7-Zip installer does not actively remove registry keys from older versions.  The vulnerability is a false positive since the executable has been upgraded, but the registry keys from those previous versions trigger the detection.

 

Resolution

 

We currently have a request posted on the 7-Zip support forum for the vendor to address this in future installers.  That thread is located here:

https://sourceforge.net/p/sevenzip/discussion/45797/thread/c6f74111/

 

This doc will be updated as that request reaches a resolution.

Windows Update Service Is Required to Install Patches on Windows Vista and Later Windows Operating Systems

$
0
0

Description

 

Microsoft patches fail to deploy on the following operating systems:

 

  • Windows Vista
  • Windows Server 2008
  • Windows 7
  • Windows Server 2008 R2
  • Windows 8
  • Windows Server 2012
  • Windows 8.1
  • Windows Server 2012 R2
  • Windows 10 (all builds)
  • Windows Server 2016 (all builds)

 

When attempting to manually run a patch file copied to a target machine in C:\Windows\ProPatches\Patches you receive an error that the Windows Update service was not able to start or is not started.

You may also see an error return code of 1058 when deploying .msu patches.

 

Resolution

 

Windows Vista/2008 changed patching behavior. Windows Vista and later patches are of a file type .MSU and this file type requires the Windows Update Service to be enabled to execute. The Windows update application is not required, but the standalone service handles extraction and execution of MSU patches and must remain enabled. For more details: KB934307 

The Windows Update service must not be set to 'Disabled'. It does not explicitly need to be started, but it must be enabled. It can be set to 'Manual', 'Automatic-Delayed Start', or 'Automatic'.
Windows Automatic Updates should be set to never check for updates, please see this document for more information: Best Practice: Windows Automatic Updates

Affected Products

 

Shavlik Protect 9.x

Ivanti Patch for Windows Servers 9.3.x

Troubleshooting Slow Patch Scans In Ivanti Patch for Windows Servers

$
0
0

Purpose

 

This document provides information to troubleshoot slow patch scans when using Ivanti Patch for Windows Servers (PWS).

 

Symptoms

 

Patch scans in Patch for Windows typically do not take a lot of time to complete. Patch scans that take longer than 5-10 minutes to complete may adversely impact the patch process. Such slow patch scans will typically point to environmental causes.

This article only applies to step number four of the scanning process (Scan for patches). If you have trouble with other steps during the scan process it will most likely be due to a different issue. For instance, if the scan never completes this likely is caused by a different issue, and this article would not apply.

 

Causes

 

There can be a number of causes of slow patch scans. The first thing you should look into is if there have been any recent changes - either to the console system or the network you are on.

 

Some of the most common causes of slow scans addressed in this article are:

- Insufficient system resources (RAM, CPU, etc.)

- Antivirus scanning- particularly those that perform on-access scans.

- Network/Latency issues (poor latency, scanning over WAN, etc.)

- Database issues - (lack of database maintenance, insufficient SQL server system resources, etc.)

 

Resolution

 

Possible issues that may need to be addressed:

 

Note: The "console system" refers to the system where you are running Ivanti Patch for Windows or Shavlik Protect.

 

1. Ensure that you are on the latest version/build of PWS.

Whenever we have a new version released there is a possibility that there may be bug fixes or product improvements which could help resolve your issue.

 

You can verify the latest version and download it from the following link:

https://go.ivanti.com/Web-Download-Patch-Windows.html

 

2. Make sure that your console system has enough resources to run your scans.

If you are scanning a high number of machines you may need to increase the CPU and/or memory available to the console system. Our hardware system requirements for processor and memory are as follows:

 

Processor/CPU:

  • Minimum: 2 processor cores 2 GHz or faster
  • Recommended: 4 processor cores 2 GHz or faster (for 250 - 1000 seat license)
  • High performance: 8 processor cores 2 GHz or faster (for 1000+ seat license)

Memory/RAM:

  • Minimum: 2 GB of RAM
  • Recommended: 4 GB of RAM (for 250 - 1000 seat license)
  • High performance: 8 GB of RAM (for 1000+ seat license)

 

For more information, see Protect Console System Hardware Performance Guidelines.

 

3. Antivirus or real-time threat protection software may be scanning our patch scan results as they are being sent back to the PWS console system.

 

Sometimes antivirus software, in particular those that perform on-access scanning may slow down the patch scan process. Most often we see these programs slow the process as the results are sent to the console's arrivals folder to be imported to the database.

 

Solution:

-Test disabling your antivirus/threat protection software to see if scans run faster while it's disabled.

-Create an exception in your Antivirus/threat protection for the following folder on the console machine:

C:\ProgramData\LANDesk\Shavlik Protect\Console\Arrivals


4. There may be network/configuration issues.

The most common issue is that high latency will cause scanning of remote systems to take a long time to complete. Things to check:

 

-Check the latency.

On your console system run a ping connecting to a target system. To do so click Start > Run > type CMD and hit enter, then enter the following command- ping [target machine name or ipaddress] i.e ping machine01 or ping 10.1.10.5.

pingedit.PNG

The higher the latency (the value next to time=), the longer you can expect the scan to take for Protect. High latency impacts scans due to the fact that our scan engine uses a separate connection for each check that is performed during the Dynamic Product Detection process.

 

-Is the scan taking place over a LAN connection or WAN connection?

Most often WAN connections will have much higher latency. As such, longer patch scans can be expected over WAN.

 

Workarounds available for latency/network issues:

-If you have many machines in other areas that the console system would be scanning over a WAN connection it may be best to install a second Protect console on a system that is local to those systems. You can then scan those systems over a LAN connection rather than over a high latency WAN connection to avoid these problems.

-You can install a PWS agent on systems to avoid slow scanning issues caused by network problems. The agent will run the scan locally on the client system so it avoids all network traffic while scanning.

-There is an option to change the number of simultaneous machines scanned during the scan process. To make this change you will need to create a custom patch scan template in PWS. On the 'General' tab under the template you can decrease the number of machines the scan will simultaneously run on. Dragging the bar to a lower number may help improve scan speeds. You will need to use your custom patch scan template to run a scan for this to take effect.

-It's possible it may help you to perform network monitoring during the scan. This would require a 3rd party network monitoring tool which we do not support.

 

5. Possible Database Issues

 

You will need SQL Server Management Studio to perform some of these checks. If you are using SQL Express you will most likely need to download the free Management Studio Express from Microsoft's download site. See the links below:
For SQL 2005 Express: http://www.microsoft.com/downloads/details.aspx?FamilyID=c243a5ae-4bd1-4e3d-94b8-5a0f62bf7796&displaylang=en

For SQL 2008 Express: http://www.microsoft.com/downloads/details.aspx?FamilyID=08e52ac2-1d62-45f6-9a4a-4b76a8564a2b&displaylang=en

For SQL 2008R2 Express: http://www.microsoft.com/download/en/details.aspx?id=22985

For SQL 2012 Express (Choose the management studio after clicking download): http://www.microsoft.com/en-us/download/details.aspx?id=29062

For more recent versions, click on your desired version here: SQL Server Management Studio Changelog/Downloads

 

  • Open Management Studio and connect to your SQL server. Expand 'Databases', and locate your 'Protect' or 'Shavlikscans' database. Right click on the database, and then go to Properties > General tab. Check the Size of your database. If your database is over 4GB in size, it's possible that you may need to perform database cleanup.
  • If you are using SQL Express there is a database size limitation built into SQL. Full versions of SQL are only limited by allocated space given by the DBA or space of the hard disk. The size limitations for currently support versions of SQL Express are as follows:
    • SQL Express 2005: 4GB size limit per database
      SQL Express 2008: 4GB size limit per database
      SQL Express 2008R2 and later: 10GB size limit per database
  • Perform database maintenance. You can now easily do this from within the PWS console under Tools > Options > Database Maintenance. If you are having slow scans take place it may help to delete as many old results as possible as well as perform the option to 'Rebuild Indexes'.
  • After this it may help to close PWS, go into SQL Management Studio, and perform the following steps: Right click on the Protect database and go to Properties > Options. Set the Recovery model to "Simple". Hit Ok. Then right click on the Protect database again and go to Tasks > Shrink > Database. This will help shrink the size of the database and the log file.

 

Whether the SQL server being used is remote or local can make a large impact as well. If the database is hosted on a remote server you may need to check into your network connection between the console system and the SQL server. If there is any latency or any network issues it could cause your scans to run slow.

 

6. Virtual Machine resource contention:
If you have the console running on a virtual machine make sure that the resources that the VM are trying to use are actually available in case you have other VM's running simultaneously that are possibly using all of the host server resources.

 

Affected Product(s)

Ivanti Patch for Windows Servers 9.3.x

Shavlik Protect 9.x

Available Reports

$
0
0

Available Reports

 

The following reports are available in Shavlik Protect. The reports you have access to is dependent upon your current license level.

 

To choose a report, select Tools > Create report from the main menu and then select a report from the drop-down list at the top of the Report Gallery dialog. The list is divided by the different types of security programs available within Shavlik Protect.

 

Report                                                                       Description

Seat License Status

This report provides information about the number of license seats available and the number of seats used.

Note: There is no filtering capability for this option.

Patch Reports

Condensed Patch Listing

A concise, six-column report displaying the machine name and patch status for each scanned host. Patch items are displayed as bulletin numbers (MS00-000).

Deployment Detail

This report provides detailed information about a particular patch deployment.

Deployment Percentage by Patch

This report displays the percentage of machines that have each patch installed. The percentage is based on the number of machines that require the patch.

Deployment Status by Deployment

This report provides information about the success or failure of one or more specified patch deployments.

Deployment Status by Machine

This report provides information about patch deployments made to one or more specified machines.

Detailed Summary

This report shows a summary of the scan, plus it provides a list that shows each machine that was scanned and detailed information about each machine.

Executive Summary

This report provides a high-level summary about the patches and the machines discovered by the scan.

Machine Inventory

This report provides a complete list of all software products installed on each machine discovered by the scan.

Machine Status by Patch Count

This report displays the number of machines in groups based on the number of missing patches.

Machine Status Summary

This report provides the patch status of each machine discovered by the scan.

Machine/OS Listing

This report lists the operating systems for each machine scanned.

Machines by Patch

Displays patch status for each machine sorted by Bulletin ID and QNumber.

Machines Not Scanned

This report lists all machines not scanned and the reason they were not scanned.

Missing SP

This report is a quick overview of all machines that are missing service packs for supported products. This report skips the simple criteria filter and displays the advanced criteria filter immediately.

Patch Annotation Information

This report lists all patch annotations.

Patch Criticality Information

This report lists all patches grouped by criticality. It allows a network administrator to quickly view the patches they have categorized as 'Critical' or 'High'.

 

 

Patch Listing

 

 

 

 

A concise listing (one line per patch processed) of all patches for all scanned machines sorted by 'Missing', 'Found', 'Informational' and 'Warning', then sorted by user preference.

Patch Status Summary

This report provides a descriptive summary about each patch discovered by the selected scan(s). The report includes both found and missing patches. Use the Next Page and Previous Page icons to navigate through the report.

Patches by Machine

Displays patch status for each machine sorted by machine name.

Patches by Machine Detail

A detailed listing of every patch found sorted by machine name. For each patch, the entire summary and reason is listed in the report. Note that this report can take very long if executed against thousands of computers.

Top Ten Missing Patches

This report lists the ten patches that are missing the most often.

Top Ten Vulnerable Machines

This report lists the ten most vulnerable machines discovered by the program during the selected scan(s). The machines with the most missing patches and service packs are judged to be the most vulnerable.

Deployment Percentage by Patch (IAVA)

(Available only if you have a Government Edition of Shavlik Protect.)

This report displays the percentage of machines that have each patch installed. The percentage is based on the number of machines that require the patch.

Detailed Summary (IAVA)

(Available only if you have a Government Edition of Shavlik Protect.)

This report gives a detailed scan summary.

Machine Status by Patch Count (IAVA)

(Available only if you have a Government Edition of Shavlik Protect.)

This report displays the number of machines in groups based on the number of missing patches.

Patch Status Detail (IAVA)

 

(Available only if you have a Government Edition of Shavlik Protect.)

This report gives detailed patch status information.

7 Day Executive Threat Summary

This report provides a high-level summary of all the detected and cleaned threats over the past seven days.

30 Day Executive Threat Summary

This report provides a high-level summary of all the detected and cleaned threats over the past 30 days.

Machine Threat Status

This report shows a summary of the threat scan, plus it provides a list that shows each machine that was scanned and detailed information about the threats detected on the target machines.

Threat Action Report

This report shows a list of all detected threats. The machines affected by each threat and the actions taken to eliminate each threat are also shown.

Threat Protection Status Report

This report displays both detailed and summary information on the threat protection status of an enterprise. Agent status, protection status, and definition version are reported for each machine.

 

Software Catalog Report

 

This report provides a list of all software installed on the scanned machines. The version number and install count information is displayed for each software product that is detected. If multiple versions of a product are detected, the machines using a particular version are listed in multiple columns.

Machine Hardware Detail Report

This report provides a detailed list of hardware assets on each machine.

Machine Software Detail Report

This report provides a detailed listing of software installed on each machine.

Virtual Machine Hardware Detail

This report provides a detailed list of the hardware properties of each virtual machine. The report is organized by virtual server.

Virtual Machine Memory Usage Report

This report provides a detailed list of the memory properties of each virtual machine. The report is organized by virtual server.

Virtual Machine Disk Usage Report

This report provides a detailed list of the disk properties of each virtual machine. The report is organized by virtual server.

Power Status Report

This report provides a list of machines and their power state at a specific time. The report is organized by machine group.

How To Use Advanced Reporting / Reports Advanced Filtering

$
0
0

Purpose

 

Administrators may find that the default reports may provide information that is less important to their patch process. There may be a need for information only regarding specific machines, patches, patch statuses, or other criteria.

 

Description

 

In Protect, choose Tools > Create Report.
In the Reports window choose your desired report in step 1.
In the Pick Filter Options, check the 'Use Advanced Filter' checkbox, and click Generate Report.

 

Reports window.png

 

The advanced filter options will load.

 

2-Generating report.png

 

 

 

In the Advanced Report Settings select the filtering type on the left, and then select the type's options on the right. When ready to generate the report, click Ok.

 

Example: The below screenshot will show the Condensed Patch Listing report filtered to only show patches that are found as Missing.

 

3-select options.png

 


Example: The following shows the difference between a non filtered report, and the same report when filtering for only missing patches.

 

4-non filtered report.png

 

 

Available Reports and filters:

Here is a list of the various Advanced Filter types and options available for each report.

  • Seat License Status -  No Filters

Patch Reports

  • Condensed Patch Listing
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Patches
      • Bulletin IDs
      • QNumbers
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
      • Patch Properties
        • Found
        • Missing
        • Warning
        • Effectively Installed
        • Informational
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
      • Machine Properties
    • Products
      • Product Names
      • Service Pack Names
  • Deployment Detail
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Patches
      • Bulletin IDs
      • QNumbers
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
      • Patch Properties
        • Found
        • Missing
        • Warning
        • Effectively Installed
        • Informational
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
      • Machine Properties
    • Products
      • Product Names
      • Service Pack Names
  • Deployment Percentage by Patch
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Consoles
      • Console Names
    • Patches
      • Bulletin IDs
      • QNumbers
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
      • Patch Properties
        • Found
        • Missing
        • Warning
        • Effectively Installed
        • Informational
    • Products
      • Product Names
      • Service Pack Names
  • Deployment Status by Deployment
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
  • Deployment Status by Machine
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Patches
      • Bulletin IDs
      • QNumbers
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
      • Machine Properties
  • Detailed Summary
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
  • Executive Summary
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Consoles
      • Console Names
  • Machine Inventory
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
    • Products
      • Product Names
  • Machine Status by Patch Count
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
  • Machine Status by Summary
    • Scan & Deployments
      • Scan Names
    • Consoles
      • Console Names
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
  • Machine/OS Listing
    • Scan & Deployments
      • Scan Names
      • Creation Dates
    • Machines
      • Machine Names
  • Machines by Patch
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Patches
      • Bulletin IDs
      • QNumbers
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
      • Patch Properties
        • Found
        • Missing
        • Warning
        • Effectively Installed
        • Informational
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
      • Machine Properties
    • Products
      • Product Names
      • Service Pack Names
  • Machines Not Scanned
    • Scans & Deployments
      • Creation Dates
  • Missing SP
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
      • Machine Properties
    • Products
      • Product Names
      • Service Pack Names
  • Patch Annotation Information
    • Patches
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
      • Patch Properties
        • Found
        • Missing
        • Warning
        • Effectively Installed
        • Informational
    • Products
      • Product Names
      • Service Pack Names
  • Patch Criticality Information
    • Patches
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
      • Patch Properties
        • Found
        • Missing
        • Warning
        • Effectively Installed
        • Informational
    • Products
      • Product Names
      • Service Pack Names
  • Patch Listing
    • Scan & Deployments
      • Scan Names
    • Patches
      • Bulletin IDs
      • QNumbers
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
      • Patch Properties
        • Found
        • Missing
        • Warning
        • Effectively Installed
        • Informational
    • Machines
      • Domains
    • Products
      • Product Names
      • Service Pack Names
  • Patch Status Detail
    • Scan & Deployments
      • Scan Names
    • Patches
      • Bulletin IDs
      • QNumbers
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
      • Patch Properties
        • Found
        • Missing
        • Warning
        • Effectively Installed
        • Informational
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
      • Machine Properties
    • Products
      • Product Names
      • Service Pack Names
  • Patch Status Summary
    • Scan & Deployments
      • Scan Names
    • Patches
      • Bulletin IDs
      • QNumbers
  • Patches by Machine
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Patches
      • Bulletin IDs
      • QNumbers
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
      • Patch Properties
        • Found
        • Missing
        • Warning
        • Effectively Installed
        • Informational
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
      • Machine Properties
    • Products
      • Product Names
      • Service Pack Names
  • Patches by Machine Detail
    • Scan & Deployments
      • Scan Names
    • Patches
      • Bulletin IDs
      • QNumbers
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
      • Patch Properties
        • Found
        • Missing
        • Warning
        • Effectively Installed
        • Informational
    • Machines
      • Domains
    • Products
      • Product Names
      • Service Pack Names
  • Top Ten Missing Patches - No Filters
  • Top Ten Vulnerable Machines - No Filters
  • Deployment Percentage by Patch (IAVA)
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Consoles
      • Console Names
    • Patches
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
    • Products
      • Product Names
      • Service Pack Names
  • Detailed Summary (IAVA)
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
  • Machine Status by Patch Count (IAVA)
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
  • Patch Status Detail (IAVA)
    • Scan & Deployments
      • Scan Names
    • Patches
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
      • Patch Properties
        • Found
        • Missing
        • Warning
        • Effectively Installed
        • Informational
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
      • Machine Properties
    • Products
      • Product Names

Threat Reports

  • 7 Day Executive Threat Summary - No Filters
  • 30 Day Executive Threat Summary - No Filters
  • Machine Threat Status
    • Scans & Remediations
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • Machine Names
  • Threat Action Report
    • Scans & Remediations
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • Machine Names
  • Threat Protection Status Report
    • Consoles
      • Console Names
    • Machines
      • Domains
      • Machine Names

Asset Reports

  • Software Catalog Report
    • Consoles
      • Console Names
    • Machines
      • Domains
  • Machine Hardware Detail Report
    • Scans
      • Scan Names
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • Machine Names
  • Machine Software Detail Report
    • Scans
      • Scan Names
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • Machine Names
  • Virtual Machine Hardware Detail
    • Scans
      • Scan Names
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • Machine Names
  • Virtual Machine Memory Usage Report
    • Scans
      • Scan Names
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • Machine Names
  • Virtual Machine Disk Usage Report
    • Scans
      • Scan Names
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • Machine Names

Power Status Reports

  • Power Status Report
    • Scans
      • Scan Names
      • Creator Names
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • Machine Names

 

Affected Product(s)

 

Shavlik Protect 9.x

 

 

 

 


Ivanti Patch for Windows Servers API integration with the Qualys vulnerability scanner

$
0
0

Purpose

 

The following is a sample integration script for the Ivanti Patch for Windows Servers API integration with the Qualys vulnerability scanner.

 

If you use a vulnerability scanner to identify weaknesses in your network, the scanner may detect hundreds or even thousands of issues on your machines. At first this might seem a bit overwhelming, but what’s likely happening is that the vulnerability scanner is simply producing a lot of noise. The scanner is assessing for CVEs (Common Vulnerabilities and Exposures) explicitly.  In reality a software update will often include many CVEs.  A patch can also be superseded or replaced by a newer update.  What this tends to cause is the Vulnerability Assessment reflecting hundreds of vulnerabilities that can be resolved by updating just a few software titles on a system.

 

To address this, you can use the API to::

 

  • Make calls to the vulnerability scanner
  • Extract the vulnerability list (consisting of CVEs)
  • Import those CVEs into a Ivanti Patch for Windows Servers patch group via the Patch Group API
  • Perform patch scans and deployments using that patch group
  • The patch engine will take into account any superseded patches and will identify the handful of patches that are required to bring the target system into compliance. If you rerun the vulnerability scanner after deploying the patches, the vulnerability count should be greatly reduced.

 

Overview

The API feature is meant for advanced users who have a working knowledge of PowerShell and who want to perform tasks beyond those available through the Ivanti Patch for Windows Servers user interface. The PS script needs run from the Patch for Windows Servers console server.

 

  • The script and supporting files can be downloaded from here: QualysToPatch_API.zip (attached to this document)
    • Extract the contents to it's own folder on C:\. For example C:\QualysToPatch_API
  • The copy tool curl is required for this to work. You can download this tool from here: curl 7.56.1
    • Extract the contents of the CAB files to it's own folder on C:\. For example: C:\curl

 

1. Edit the variables in the UpdateLocalQualysFiles.bat. This batch file is used to download data files directly from the Qualys content servers.

a. SET CURLPATH=C:\curl\curl.exe - Set the location of your curl.exe.

b. SET LOCALDATA="C:\QualysToPatch_API\Qualys" - Set the location of your Qualys scripts.

c. SET PLATFORM=qualysapi.qg3.apps.qualys.com - Specify host you were assigned when you setup your Qualys account.

d. SET USER="user:pass" - Set a username and password for your Qualys account.

 

2. Run UpdateLocalQualysFiles.bat to get the latest data from Qualys.  This will download the data files directly from the Qualys content servers and place them in the location specified in the batch file.

 

3. Run the script: (Scan)

    > . .\QualysToIvanti.ps1

    > QualysToIvanti -machinesXmlFile C:\QualysToPatch_API\hosts.xml -qualysKbXmlFile C:\QualysToPatch_API\qualyskb.xml -ScanTemplate 'Demo' -DeployTemplate 'Agent Standard' -PatchGroupName 'Demo' -MachineGroupName 'Demo' -ScanName 'Qualys-Ivanti demo' -DeployMissingPatches $False

 

4. You can choose not to perform a scan and update a Patch Group in Patch for Windows Servers.

    > . .\QualysToIvantiPatchGroup.ps1

    > QualysToIvantiPatchGroup -machinesXmlFile "C:\QualysToPatch_API\hosts.xml" -qualysKbXmlFile "C:\QualysToPatch_API\qualyskb.xml" -PatchGroupName 'Demo'

Scheduled Monthly Task Runs One Week Early or Not At All

$
0
0

Purpose

 

The purpose of this document is to highlight a Microsoft Windows Task Scheduler bug that can cause your monthly scheduled console tasks to run a week early or not at all.

 

Symptoms

 

The Ivanti Patch for Windows Servers console is installed on Windows Server 2016 or Windows 10, and you have a monthly console task that is set to run on a specific occurrence of a day of the week (4th Wednesday, 2nd Saturday, etc.).  Occasionally, this task executes exactly one week early or not at all.

 

Cause

 

Microsoft has confirmed a bug in the Windows Server 2016/Windows 10 Task Scheduler that will execute scheduled tasks one week early or not at all when specific conditions are met:

 

  • The monthly task is set to execute on a specific occurrence of a day of the week (4th Wednesday, 2nd Saturday, etc.)
  • The date the task is scheduled to execute is a multiple of 7 (7th, 14th, 21st, or 28th)

 

If these conditions exist and the task is scheduled to execute on the 7th, the task will not run.

If these conditions exist and the task is scheduled to execute on the 14th, 21st, or 28th, the task will execute one week early.

 

NOTE: This bug does not affect one-time tasks scheduled for an explicit time and date or monthly tasks set for a specific day of the month.  This will only affect monthly tasks scheduled for a certain occurrence of a day of the week.

 

Microsoft has released a patch to resolve this issue for Windows 10/Server 2016 build 1607: KB4343884

They are still working to resolve the issue in other builds.

This calendar from Microsoft's TechNet post regarding the issue illustrates the affected days of 2018.  Tasks scheduled days circled in red will execute one week early, while tasks scheduled on the days circled in grey will not execute.

 

  • NOTE: Microsoft originally stated this issue would not affect April and October as illustrated on the calendar below, but they have updated the TechNet post linked above to indicate the issue is occurring in April.  We recommend operating under the assumption this bug will surface in any month until Microsoft has released a fix for it.

 

Resolution

 

Q4343884 has been released by Microsoft to resolve this issue in Windows 10/Server 2016 build 1607

https://support.microsoft.com/en-us/help/4343884/windows-10-update-kb4343884https://support.microsoft.com/en-us/help/4343884/windows-10-update-kb4343884

 

Additional Information

 

Microsoft has acknowledged this issue and describes it further on their TechNet AskCore Japan blog:

https://blogs.technet.microsoft.com/askcorejp/2017/12/11/mouthly_tasks_issue/

 

Affected Product(s)

 

Shavlik Protect 9.2.x

Ivanti Patch for Windows Servers 9.3.x

Protect Detects A Patch That Should Not Be Detected As Missing

$
0
0

Symptoms


Protect is detecting a Patch that should not be detected as missing.

 

Resolution

 

NOTE: Before performing the following, please update to the latest XML data by going to Help > Refresh Files, close and reopen Shavlik Protect and then perform another scan against the machine(s) using a Security Patch or WUScan Template. The root cause of the issue may stem from custom filtering in a Scan Template or could already be fixed in a later XML release.

 

From The Protect Console:

 

1. Click on Results tab.

2. Choose the most recent scan containing the specific patch.

3. Click on the machine containing the specific patch.

4. Click on the specific patch.

5. View why Protect detects the patch as missing (Patch Information Tab).

6. Click on the linked Qnumber to be taking to documentation regarding this patch. Most of the time this will include the detection logic.

7. Browse to the location referenced in step 5 to verify the information found in step 5 and 6.

 

See below for more information:

new detection logic.PNG

 

 

 

Also note the Downloaded File name.

new detection 2.PNG

 

On the Target:

 

Browse to C:\Windows\ProPatches\Patches and find the specific patch. If you have previously deployed this patch and it failed, manually try to run the patch.

 

new detection 3.PNG

 

Take any screenshots of any errors such as the one below.

does not apply.jpg

 

Information to Send to Support

 

If you experience these errors, please create a support case at https://success.ivanti.com/  or by calling into support.

NOTE: If you choose to call into support, please gather this information before calling in.

 

Gather the following information:

 

  1. Before doing the following, please download the latest XML data by going to Help > Refresh Files.
  2. The Bulletin ID & Qnumber of the patch in question. This information can be found in Step 4 above.
  3. Clear your logs, and do a rescan and/or deployment.then gather the log. Please do this by following this guide for console logs: How To: Collect Shavlik Protect - Ivanti Patch for Windows Servers console, patch deployment and agent logs
  4. A DPDTrace gives more information on how Protect detects certain patches. Please gather a DPD trace on the target machine by following this guide: DPDTrace command line logging tool used for patch detection issues
  5. Screenshots from Step 5 from the console, Step 7 from the target and if applicable, the error when the patch is manually installed.

 

Include the following registry exports from the same target machine that ran the DPDTrace.  This will not only save time, it will also greatly increase our chances of determining the root cause of the detection issue and correcting it:

 

NOTE: This document has a batch file that retrieves the needed registry keys: Batch File for Obtaining Registry Exports for Detection Related Issues

  • HKLM\SOFTWARE\WOW6432\Microsoft\Windows\CurrentVersion\Uninstall

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall

  • HKLM\SOFTWARE\Classes\Installer\Products

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages

  • HKLM\SOFTWARE\Classes\Installer\Patches

 

Please zip all files into one archive file before emailing or attaching them to the case.

NOTE: You will not be able to email the registry keys to the case as .reg files. They must be either uploaded to the case through the support portal or changed into .txt files.

 

Affected Product(s)

 

Shavlik Protect 9.x

How To: Locate and Transfer the License Key to New Protect Console Machine

$
0
0

Purpose

 

This document outlines how to locate the Shavlik Protect license activation key in the console and transfer this key to a new or additional Protect console.

 

Description

 

When migrating to a new Shavlik Protect server or setting up an additional Protect console machine- understanding where to find the license key and how to input it in to the new console is vital to maintaining Shavlik Protect functionality through this transition. As this process may not frequently performed by administrators, a reference/guide for this process may prove to be helpful.

 

Locating the License Key on Existing Protect Console

 

Follow the process below to obtain your license key from your console machine. After locating the key in order to prepare to transfer the key to the new console machine, copy this 25-digit license key and make it readily available.

 

In Shavlik Protect 9.x:

    Help>About Shavlik Protect Advanced

 

In the About Shavlik Protect window, the license key can be found in the main text display under

 

    License Key:

          Activation Key: xxxxxxxxxxxxxxxxxxxxxxxxxx

 

 

In vCenter Protect 8:

This process is nearly identical to the process in Shavlik Protect 9.x. Refer to the images above.

 

To locate the license key follow this path:

          Help>About VMware vCenter Protect

 

In the About VMware vCenter Protect window, the license key can be found in the main text display under:

          License Key:

              Activation Key: xxxxxxxxxxxxxxxxxxxxxxxxx

 

 

Note: In the event the Protect Console is no longer installed, it may still be possible to obtain the license key from the following registry entry:

HKEY_LOCAL_MACHINE\SOFTWARE\LANDesk\Shavlik Protect\Console\Activation

The AK Value will contain the Activation Key/License key.

 

 

Activating the License Key in New Console

 

Activation is the process by which the Protect software is validated as having been purchased.  In order for the new Protect console to fully function activation is required. Users are prompted after installing and opening Shavlik Protect to input their activation key, through the Shavlik Protect Activation window.

 

 

 

To transfer the license key from your previous console machine follow the directions in the window as ordered by number:

 

    1. Select an activation mode (on left portion of window)

          Select "Product or bundle license"

    2. Enter your activation key(s) (in center of window)

          In the text field below, paste or manually input your 25-digit Protect license key

          Click the "Add" button right of the text field.

    3. Select activation method (lower-center of window)

          Choose "Online activation" if you have an internet connection.

          Click "Activate online now"(at the lower-right corner)

       

If you require "Offline activation" see the following article- How to Process a Manual (Offline) Activation for Ivanti Patch for Windows 9.3 or Patch for SCCM 2.3+

 

If the software was previously launched and activated by selecting Trial mode, this window can be accessed through Protect by navigating to:

    Help>Enter/refresh license key...

 

 

 

Additional Information

 

 

Affected Product(s)

 

Shavlik Protect 9.x
vCenter Protect 8.x

Database Connection Error Caused by Missing SQL Server

$
0
0

Symptoms

 

  • Attempting to launch Shavlik Protect fails and returns with the following error:

"The database connection could not be made. This may be caused by a temporary interruption in the database server, or the machine hosting the database could have been renamed."

 

Error window.PNG

 

  • Selecting "Launch the database configuration utility" and attempting to reconnect to SQL Server and Protect database fails, returning with error:

              "Failed to connect to SQL Server '(sql server path)'. Please verify the SQL name and credentials>"

 

Failed to connect dbconfig.PNG

 

  • After verifying SQL server credentials user receives same error message.

 

Cause

 

This issue will occur if the SQL Server previously on the machine has been removed. Without the SQL Server installed on the console machine, despite retaining the Protect database, Protect will be unable to function. Some users may inadvertently uninstall the server software without being aware that doing so will not permit Shavlik Protect to run. Doing so will not delete the Protect database and Protect should be able to function again after reinstalling and configuring the SQL Server.

 

Resolution

 

To resolve this issue you must:

  1. Reinstall Microsoft® SQL Server Management Studio® software (the Protect installer installs SQL Server 2012 Express by default)

  2.  Reattach the Protect SQL database to the SQL server.

The remainder of this document will provide in-depth instructions on how to perform these tasks to resolve the database connection error.

 

Installing the SQL Server

 

If you will be using an Express Edition of Microsoft SQL Server, you should consider downloading and installing Microsoft SQL Server Management Studio. This free software can be used to perform backups and to manage your database. Additionally, it will make the process of reattaching the Protect database to the SQL server much simpler.

 

If you would like to follow the resolution outlined in this document, SQL Server Management Studio is required.

 

The Microsoft® SQL Server® 2012 Express installer can obtained for free at the following link:

http://www.microsoft.com/en-us/download/details.aspx?id=29062

To install both the SQL Server and the Server Management Studio Express, install the package containing the SQL Express Server and SQL Server Management Studio.

 

After installation, Protect will still not launch, attempts to reconnect to the SQL server will return with this error:

    "The database 'Protect' does not exist on the SQL Server  Please verify your configuration"

databasedoesnotexist.PNG

 

This error indicates that the protect database must be reattached to the SQL Express server, the easiest way to do this is through Microsoft SQL Server Management Studio. This process will be outlined in the next section of this article.

 

Reattaching the Protect Database to the SQL Express Server

 

To reattach the Protect database to the SQL Express Server, open SQL Server Management Studio.

 

SQL Server Management Studio can be opened by following this path:

    Start->Micrsoft SQL Server 2012->SQL Server Management Studio

 

The "Connect to server" window will appear at launch.

SQLMS-Connect.PNG

For most users- including all who originally installed SQL Express through the Protect install package- none of the fields need to be modified.

Simply click connect to proceed to the next step in the process. Doing so will close the dialog box.

 

The SQL server should now be visible on the left in the Object Explorer pane. If the Databases subfolder is not visible, click the plus sign to the left of the entry containing the server path to display the server contents.

 

ServerManagementStudio-db.PNG

 

Right click this Databases directory and click "Attach..."

 

An "Attach Databases" dialog box will open.

attachdatabases.PNG

Click Add in the right-center of the window to proceed. Doing so will open the Locate Database Files window.

 

locatedbfiles.PNG

 

Left-click the Protect.mdf file, which is located under DATA, then click OK.

This will attach the database file and close the window.

 

Click OK again to exit the Attach Databases window.

In the Object Explorer pane, the Protect database should now be visible, demonstrating that the Protect database has successfully been attached to the SQL Express server.

 

After completing these steps, the SQL Server should be configured properly to allow the Protect console to function as before. Opening Protect should launch the program without any of the previous errors. Protect should require no more additional configuration to resume functional operation.

 

Note: After the completion of these steps, if any further difficulty is encountered in attempting to connect to the database by Protect, use the Database Setup Tool to make sure that Protect database is configured properly. This can be located by going to:

Start->Shavlik Protect->Database Setup Tool

 

Related Articles


If you receive the same error message as above and verify that the SQL Server is installed, your SQL Server service may not be running.

Launch Interface - Error - a Network-Related or Instance-Specific Error Occurred While Establishing a Connection to SQL Server.

 

Restore Shavlik Database from backup using SQL Server Management Studion:

http://community.shavlik.com/docs/DOC-22956

 

Affected Product(s)

 

Shavlik Protect 9.x

Viewing all 1352 articles
Browse latest View live


Latest Images