Quantcast
Channel: Shavlik User Community : All Content - Ivanti Patch for Windows
Viewing all 2126 articles
Browse latest View live

Windows 10 1809

$
0
0

Hello,

 

is there an estimate, when the IVANTI Advanced Patchmanagement supports Windows 10 1809?

 

At the Moment, it's not implemented, isn't it? On my new Dell 5591 with Windows 10 Enterprice 1809 (17763.1) Release I got the following security risk overview:

 

Best regards

Christian


Patch for SCCM crash when C++ 2015 x86 isn't installed

$
0
0

Purpose

 

This document will help you identify and correct a Patch for SCCM crash caused by missing prerequisite C++ x86 install.

 

This can be identified by looking in the Application event log:

Application: Microsoft.ConfigurationManagement.exe

Framework Version: v4.0.30319

Description: The process was terminated due to an unhandled exception.

Exception Info: System.DllNotFoundException

   at ST.Engines.NativeMethods.IsDigitallySignedBy(System.String, ST.Engines.Crypto.Signers, Boolean ByRef)

   at ST.Engines.Crypto.SignatureVerifier.IsSignedBy(System.String, ST.Engines.Crypto.Signers)

   at ST.Engines.Catalog.SingleFileDownload.HandleCompletedFile(System.Object, System.ComponentModel.AsyncCompletedEventArgs)

   at ST.Engines.Catalog.SingleFileDownload.ClientDownloadFileCompleted(System.Object, System.ComponentModel.AsyncCompletedEventArgs)

   at System.Net.WebClient.OnDownloadFileCompleted(System.ComponentModel.AsyncCompletedEventArgs)

   at System.Net.WebClient.DownloadFileOperationCompleted(System.Object)

   at System.Threading.QueueUserWorkItemCallback.WaitCallback_Context(System.Object)

   at System.Threading.ExecutionContext.RunInternal(System.Threading.ExecutionContext, System.Threading.ContextCallback, System.Object, Boolean)

   at System.Threading.ExecutionContext.Run(System.Threading.ExecutionContext, System.Threading.ContextCallback, System.Object, Boolean)

   at System.Threading.QueueUserWorkItemCallback.System.Threading.IThreadPoolWorkItem.ExecuteWorkItem()

   at System.Threading.ThreadPoolWorkQueue.Dispatch()

   at System.Threading._ThreadPoolWaitCallback.PerformWaitCallback()

Resolution

 

Install Microsoft Software C++ 2015 Redistributable (x86) - 14.0.24215.

 

Affected Products

 

Patch for SCCM 2.3.x

Patch for SCCM 2.4.x

Offline mode patch and datafile locations

$
0
0

I'm fairly new to administering Ivanti so please bear with me -- I'm coming into a scenario where the server is configured for offline management.  I've been working on getting the console configured to point to itself as a distribution server and deploy agents, however I can't find a clear direction on how to configure it to point to 2 separate locations for the datafiles and the patch files.  The patch folder has been moved to a separate drive, and I have updated such in Tools > Options > Downloads > Patch download directory.  When I push out a new agent, 1 of 2 things happens based on how I have it configured for the distribution server path: either it is unable to download all of the manifest/asset/patch metadata files, or it is unable to download the patch files.  I cannot seem to find a way to tell it, "The manifest files are in X directory and the patch files are in Y directory."  I've tried changing the other settings for Definition download source and Patch and Service Pack download source to custom UNC paths and to the distribution server, as well as changing the path for the Client connection in the distribution server settings.

Stop a Deployment via API

$
0
0

Hi,

 

I've been working alot with the Ivanti PowerShell API and one of the things I just can't get to work is stopping a deployment using the call Stop-PatchDeploy.

 

Stop-PatchDeploy -Uid XXXX

 

It just does nothing. Is there any restrictions on this? i.e can you only stop a deployment if it's in a certain state? I can Cancel the deployment via the GUI at any point?

 

Hope someone can help.

 

Thanks,

Max

Ivanti Patch for Windows Servers API integration with the BeyondTrust vulnerability scanner

$
0
0

Purpose

 

The following is a sample integration script for the Ivanti Patch for Windows Servers API integration with the BeyondTrust vulnerability scanner.

 

If you use a vulnerability scanner to identify weaknesses in your network, the scanner may detect hundreds or even thousands of issues on your machines. At first this might seem a bit overwhelming, but what’s likely happening is that the vulnerability scanner is simply producing a lot of noise. The scanner is assessing for CVEs (Common Vulnerabilities and Exposures) explicitly.  In reality a software update will often include many CVEs.  A patch can also be superseded or replaced by a newer update.  What this tends to cause is the Vulnerability Assessment reflecting hundreds of vulnerabilities that can be resolved by updating just a few software titles on a system. 

 

To address this, you can use the API to:

 

  • Make calls to the vulnerability scanner
  • Extract the vulnerability list (consisting of CVEs)
  • Import those CVEs into a Ivanti Patch for Windows Servers patch group via the Patch Group API
  • Perform patch scans and deployments using that patch group
  • The patch engine will take into account any superseded patches and will identify the handful of patches that are required to bring the target system into compliance. If you rerun the vulnerability scanner after deploying the patches, the vulnerability count should be greatly reduced.

 

Overview

The API feature is meant for advanced users who have a working knowledge of PowerShell and who want to perform tasks beyond those available through the Ivanti Patch for Windows Servers user interface.


Please note:

 

  • The scripts can be downloaded from here: BeyondInsightToPatch_API.zip
    • We included 2 scripts, one that will verify the BeyondTrust certificate and another where it will not.
  • The PS script needs run from the Patch for Windows Servers console server.

 

Environment confirmation steps:

 

1. Ensure the BeyondInsight console is set up correctly

    a. Go to the Configure tab

    b. Go to the API Registration tab

    c. Make sure the current IPv4 address/range is in the Source Addresses list.

    d. Click Update

2. Edit the $Authorization variable at the top of the BeyondInsightToPatch.ps1 file to include your BeyondInsight authorization connection string as specified in the BeyondInsight API documentation.

    a. http://<yourBIhost>/eEye.RetinaCS.Server/Flex/Help/BeyondInsightAndPasswordSafeAPIUserGuide.pdf

    b. Use the example style text from the Authorization Header section of the API guide. Only include the text to the right of "Authorization="

        Example: PS-Auth key=XXXXXXXX...XXXX; runas=demo;

 

How to invoke the script - BeyondInsightToPatch.ps1

 

1. Open PowerShell

2. Run BeyondInsightToPatch.ps1 or invoke it with the following mandatory parameters:

3. BeyondInsightToPatch -BtHostOrIpAddress '127.0.0.1' -SmartRuleId 10001 -ScanTemplate 'Demo' -DeployTemplate 'Agent Standard' -PatchGroupName 'Demo' -MachineGroupName 'Demo' -ScanName 'BT-Ivanti demo' -DeployMissingPatches $False

    a. BtHostOrIpAddress should be the current IPv4 address of the console VM. I've configured BI to allow 127.0.0.1

    b. SmartRuleId should be the smart asset group defined by BeyondInsight.

         I. 1 is the system group of All Assets

        II. 2 is the system group of All Workstations.

    c. DeployMissingPatches set to $True will actually download and deploy the patches to the machines in $MachineGroupName

4. If/when you see yellow warning messages like "WARNING: Cve item was not found: CVE-YYYY-NNNN", don't worry.

    a. It means we don't have that CVE in our (Ivanti Patch for Windows Servers content)

    b. The patch for the vulnerability may be in our content, but under a different CVE. We add all CVEs for all vulnerabilities to the Patch Group.

5. Open Patch for Windows Servers and view the full results of the patch scan/deployment. You'll see the scan result by $ScanName, date, and source of API in the left navigator.

Attempting To Set Definition Download Source - "Specific Distribution Server" Is Grayed Out

$
0
0

Symptoms

 

Within Tools > Operation > Downloads you see that "Specific Distribution Server" is grayed out under Definition download source, and you do have distribution sever(s) configured in this Protect console already.

Capture.JPG

 

Cause

 

1) You do not have a Distribution Server configured, or;

2) Your Distribution Servers are set up with at least one scheduled automatic synchronization tasks.

   (Distribution Servers set up with automatic synchronization cannot be used a definition download source.)

Capture1.JPG

 

Resolution

 

1) Ensure that you have at least one Distribution Server configured within Tools > Operations > Distribution Servers.

2) Ensure that the Distribution Server you intend to use as a definition download source is not configured for any Scheduled automatic synchronization under Tools > Operations > Distribution Servers.

 

Additional Information

 

Be aware that if you are intending to use a Distribution Server (share) as a definition download source - this share must be getting new data copied into it from a separate console that has an internet connection.

 

Refer to the following documentation for more information:

Configuring consoles within an offline environment to obtain definitions & patches from a distribution server share

Help: Configuring Distribution Servers

 

Affected Product(s)

 

Shavlik Protect 9.x

Adding ESXI Host - The Host Could Not Be found

$
0
0

Hi All wondering if anyone has came across this issue, (Support case raised)

 

Ivanti Product Fully Licensed:

Licensed Capabilities

--------------------

Maintenance and Data Subscription expires:  24/06/2019 01:00

 

## ISSUE ##

 

This is a New installation of Ivanti Patch for windows,

Once installed I was able to add 2 ESXI Vcenters, populate machine groups with discovered machines.

 

Came back a week later to add internet proxy details so I could start testing deployment and patching levels of the estate and I am met with:

 

Connection_Failed.PNG

 

I then removed one of the hosts and re-added and I get

Adding host.PNG

 

Credentials have been confirmed to be valid and working,

Successful Connection from Ivanti VM to Host via SSH:

Putty_Connection.PNG

 

Can Ping the hosts successfully:

Ping_Successful.PNG

 

Can telnet (443) from Ivanti VM to hosts:

telnet_successful.PNG

 

I have also completed a successful Refresh of all files.

 

Again the Credentials being used have already successfully added these hosts to Ivanti last week, and I can log in with these credentials to full admin level.

I have been unable to find any details of this issue anywhere else which has been successfully resolved.


Thanks Malachy

Custom patch reports - combining different report

$
0
0

Hi All,

 

We are using Shavlik Protect:

Ivanti Patch for Windows® Servers Standard (ST.Protect.exe): 9.3.4510.0

 

I need a detailed summary report for audit purposes and I have found a couple of reports that if combined will give me the information needed. However here are my setbacks:

1. When generating Deployment Status by machine report I have almost all the info, but if I export it to excel or .cvs format I get numbers instead of designated names - for example Vendor severity is no longer low, moderate, etc, but rather 2,3,4...

2. Naming of the columns are not clear: smachID; smachNotFoundReasonErrorNum; smachServerType; and see 1. While in PDF or original format all is "human" readable;

 

I have found the following document describing some of the queries used for generating reports:

https://help.ivanti.com/sh/help/en_US/PWS/92/rv-prt-9-2.pdf

However it seems a bit outdated and I was wondering if there is a updated version.

 

Ultimately what I'm looking for are the following columns:

                

Full
  Nodename(server
OS ClassSystem StatusSystem TypeTechnical OwnerBulletinPatch NameVendor SeverityPriorityPatch InstalledPatch ComplianceException ReasonDate ReleaseDate DueDate Installed
Server123WindowsVPC (in prod)serverVPC\some.nameMSNS18-05-4091664_V3Q4091664MediumHighYesyessome datesome datesome date

 

Note: I don't have access to SQL and I'm combining .cvs files into one detailed excel file.

 

The columns in red are missing or at least I can't find the naming convention in the .cvs files

 

Thank you in advance.

 

Kind regards,

Ivelin


Patch For Windows

$
0
0

Hello,

 

I come from an SCCM background and like the fact that the SCCM agent uses BITS (Background Intelligent File Transfer) to download content from SCM infrastructure.  This is very useful when clients disconnect from the corporate network halfway through a download, e.g. laptops.

 

What does Ivanti Patch for Windows use.

 

Is it BITS or some alternative, e.g. SMB.

 

Thanks

Regarding the pop-up in Safe Reboot, is it possible the edit the XYZ in the line "This action was initiated by XYZ"?

$
0
0

When I patch endpoints, and the pop-up with Safe Reboot appears, it ends with the line "This action was initiated by (my name)", and I would like to change "my name" to some thing else.

Is that possible?

Windows 10 Build Upgrade Fails with Error 2147483647

$
0
0

Purpose

 

To help identify what is blocking the upgrade of Windows 10 when deploying with Shavlik Protect 9.2.x or Ivanti Patch for Windows Servers (PWS) 9.3+

 

Symptoms

 

When you attempt to deploy a Windows 10 build upgrade using Protect/PWS, the deployment fails with error 2147483647

 

Cause

 

This may indicate something is preventing the installation of the upgrade, such as incompatible software or an application blocking the process from proceeding

 

Resolution

 

Method 1

1. Try executing the upgrade manually so that you can receive interactive prompts from the installer to identify what might be causing the issue. The example below shows the installer failing because of certain installed software being out of date, but because our process runs installers silently as the local System account, you would not see what was stopping the installation.

 

McAfee kills installer.PNG

 

 

2. In an elevated command prompt, run the command:

fltmc filters

 

You should see a list like this:

This identifies possible filters that could be blocking the ISO from mounting properly (possibly antivirus, encryption software, etc.), and you will need to temporarily disable anything that is interfering to deploy the upgrade through Protect/PWS

 

Method 2

1) Load the ISO

 

2) Open an admin command prompt

 

3) Navigate to the Drive the ISO created

 

4) Run the command "SETUP.EXE /Auto Upgrade /NoReboot /DynamicUpdate Disable /Compat ScanOnly"

Doing this will create an output that you can use to determine the cause of the failure without having to actually deploy the product manually.

 

 

Additional Information

 

See this doc for more info about deploying Windows 10 Build Upgrades with Protect/PWS:

Windows 10 Build Upgrade Deployment Support in Protect 9.2+ and Patch for Windows Server 9.3+

 

Affected Product(s)

 

Shavlik Protect 9.2.x

Ivanti Patch for Windows Servers 9.3+

ITScripts: Patch for Windows Server Standard vs Advanced ITScript Availability

$
0
0

Purpose

 

The purpose of this document is to show what scripts are available in the standard licensing versus what is available in the advanced licensing.

 

Description

 

Standard License

 

Configuration

  • Disable Adobe Flash Update
  • Disable Adobe Reader and Acrobat Updater
  • Disable Apple Auto Update
  • Disable Java Update Service
  • Disable Mozilla Firefox Updates
  • Disable Remote Desktop
  • Enable Remote Desktop
  • Set Target Machine Verbose Logging

 

Group Policy

  • Get List of Machines from Active Directory Security Group

 

Information

  • Get Date and Time
  • Get Hardware Asset Tag
  • Get Reboot Time
  • Get Registry Key Value
  • Get Remote User Accounts Last Login Times
  • Get Running Processes
  • Get Services
  • Get Shares

 

Maintenance

  • Check Disk
  • Console Clean Up
  • Remove Temp Files

 

Support -

  • Get Console & Agent Logs

 

Advanced License (Includes All Standard ITScripts Plus the Following)

 

Configuration

  • Disable USB Disk Service
  • Enable Wake-on-LAN
  • Set Power Plan

 

Information

  • Get Account Information for All Local Accounts
  • Get Available Disk Space
  • Get Dell Warranty Information
  • Get GPO Account Lockout Settings
  • Get GPO Password Policy Settings
  • Get List of Files in a Directory
  • Get Local Groups and Members
  • Get McAfee Enterprise Antivirus Engine and DATs Versions
  • Get Security Center Status
  • Get Statuses for Built-in Administrator and Guest Accounts
  • Get Symantec Antivirus Engine and Definition Versions
  • Get System Events

 

Maintenance

  • Defrag Disk Drive
  • Terminate Process

 

Network

  • Open Port Scanner

 

Support

  • Get Client Computer Group Policies

 

Additional Information

 

How to: Execute an ITScript using Ivanti Patch for Windows

Custom Action, Custom Patch, and ITScript Information and Troubleshooting

Custom ITScripts can only be imported with either an Advanced license or a specific ITScripts licensing add-on for Standard licenses

Guidelines for Creating Custom ITScripts

 

Affected Products

 

Shavlik Protect 9.2

Ivanti Patch for Windows Servers 9.3

Patching FileZilla Updates in Patch for SCCM

$
0
0

Purpose

 

The purpose of this document is to outline the issues surrounding FileZilla updates particularly related to the downloading of the patch files from the vendor.

 

Cause

 

Changes from the vendor, Filezilla, has caused downloads of the updates not from a Web browser to fail with an error 403 authentication error. From review, the cause is the lack of user token authentication as updates downloaded through Patch for SCCM are done on behalf of a user or system account, not as the actual user. Additional findings have shown the direct download links to also reroute to the main Filezilla site versus downloading the actual installer.

 

Resolution

 

The current workaround to this issue can be found in this document: Publish Manually Downloaded Products in Patch for SCCM

 

Affected Product

 

Ivanti Patch for SCCM 2.4

How To: Perform a Patch Uninstall on Multiple Systems with Ivanti Patch for Windows Servers

$
0
0

Purpose

 

The purpose of this document is to show how to perform a patch uninstall on multiple systems in Ivanti Patch for Windows

 

Description

 

Below is an example of how to set up the uninstall of one patch for multiple machines when using Shavlik Protect. This example is using agentless scan and deployment features.

 

1) Scan any systems you wish to remove a patch from.

 

Generally it's best to ensure you run a new scan so you have the most current assessment result available.

2) View the scan result.

 

You can also get to a scan result if you already have one by clicking the left drop down menu, and choose 'Results'.

 

3) In the scan result:

    1. Choose the machines you want to uninstall a patch from in the upper (Machines) pane. You can use CTRL + click or CTRL+Shift to select highlight multiple machines.

    2. In the lower pane, select any patch you wish to uninstall. Patches with an orange U and 'Yes' in the 'Uninstallable' column can be uninstalled. You can see how many machines currently have the patch installed viewing the 'Affected Machine Count' column.

    3. Right click on the highlighted patch, and choose 'Uninstall Select'.

    Note: Only one patch can be uninstalled from each system on a single deployment, and a reboot is required to complete the uninstall process.

4) You'll be prompted with the 'Deployment Configuration' window.

 

You can use an existing deployment template, or create a new one. For patch uninstall it's recommended to use a deployment template that has a post-deployment reboot enabled since the uninstall process will require a reboot to complete. You can also change the time of the deployment to take place immediately (default), scheduled at a certain date/time, or perform the uninstall at the target system's next reboot.

 

Under 'Patches to be deployed by machine' you can see a list of which machines will have the uninstall performed and whatever patch will be uninstalled from each system.

 

 

Additional Information

 

More information about uninstalling patches can be found here:

 

Help Guide - Uninstall Patches

 

Microsoft Documentation - Removing Patches

 

 

Affected Product

 

Ivanti Patch for Windows Server 9.3

How To: Gather console, patch deployment and agent logs for Ivanti Patch for Windows Servers

$
0
0

Overview

 

These instructions will help you enable All logging (verbose logging) then those collect logs and supporting information to help Support troubleshoot issues on your console and remote clients.

 

Instructions

 

Ivanti Patch for Windows Servers (PWS) 9.X Console Logging:


1. Open the Patch for Windows GUI and navigate to Tools > Options > Logging and change logging to All for both user interface and services.

     a. If you are unable to set logging via the GUI see this doc: http://community.shavlik.com/docs/DOC-22938

If you can reproduce the issue on demand, proceed to the next step.  If not, skip to step 6.

2. Close the console GUI.

3. Stop the 'Ivanti Patch for Windows Servers Console Service' service.

4. Delete the contents of C:\ProgramData\LANDesk\Shavlik Protect\Logs on your console.

     a. If troubleshooting agentless deployment or scheduling, delete the contents of C:\Windows\ProPatches\Logs on your target machine as well.

5. Start the 'Ivanti Patch for Windows Servers Console Service' service and open the Patch for Windows GUI.

6. Attempt to reproduce the issue.  Please document steps to reproduce.  Screenshots are very helpful.

7. Collect the logs from the Logs folder(s) from steps 4 (please zip).

     a. Include applicable screenshots.

     b. [Deployment issues only] On the target system, zip a copy of the entire C:\Windows\ProPatches folder and its contents (exclude the Patches sub-folder).

8. Zip everything together and attach to the case on the support portal.

If requested to do so, you can obtain the ST.FileVersions.log which contains all file versions relevant to Patch for Windows by going to Help > About Ivanti Patch for Windows Servers > Export Info.

 

Shavlik Protect - Ivanti Patch for Windows Servers Agent Logging:

 

1. You will need to set your agent's logging level to All by opening the Agent Policy assigned to the machine you are gathering logs from. The option is in the General tab.

2. If not already set, change the logging level to ‘All’ then Save and update Agents. Choose to update agents if prompted again.

     a. If Patch for Windows fails to update the agent, you will need to perform an Agent Check-in from the agent GUI on the target machine or wait for the scheduled check-in.

If you can reproduce the issue on demand, proceed to the next step.  If not, skip to step 6.

3. Remote to the agent client machine, close the agent GUI and stop the services:

     a. The services start with Ivanti or ST.

4. Delete the contents of theC:\ProgramData\LANDesk\Shavlik Protect\Logs folder on the agent client machine.

5. Start services that start with Ivanti or ST.

6. Attempt to reproduce the issue.  Please document steps to reproduce.  Screenshots are very helpful.

7. Take applicable screenshots of errors or information relevant to the issue.

     a.  Collect the logs from step 4.

     b.  Collect the screenshots.

8. Zip everything together and attach to the case on the support portal.

 

Ivanti Patch for Windows Servers Deployment Logging: (the information collected here is specific to agentless deployments)

 

 

1. Navigate to the target machine with the deployment issues.

If you can reproduce the issue on demand, delete the contents of the C:\Windows\ProPatches\ folder and continue to the next step.  If you cannot skip to step 4.

2. Stop all services that start with Ivanti or ST.

3. Attempt to reproduce the issue.  Please document steps to reproduce.  Screenshots are very helpful.

4. Delete the patches from C:\Windows\ProPatches\Patches.

5.  Zip the entire C:\Windows\ProPatches folder.

     a. Include applicable screenshots.

6. Zip everything together and attach to the case on the support portal.

 

Ivanti Patch for Windows Servers install issues:

 

 

Affected Product(s)


Ivanti Patch for Windows Servers 9.3+


URL exception list for Ivanti Patch for Windows Servers (10-11-2018)

$
0
0

Overview

 

This document provides a list of required URL addresses for Shavlik Protect and Ivanti Patch for Windows Servers to allow:

 

  • Patch executable download.
  • Patch content definition download.
  • Online license activation or license refresh.
  • Home page RSS feed.
  • Product check for update.

 

URL List

 

The following URLs may be used to download updates and must allowed through firewalls, proxies and web filters:

 

ftp://ftp.attglobal.net
ftp://mozilla.stu.edu.tw
ftp://releases.mozilla.org
http://34e34375d0b7c22eafcf-c0a4be9b34fe09958cbea1670de70e9b.r87.cf1.rackcdn.com
http://a1540.g.akamai.net
http://aimp.su
http://airdownload.adobe.com
http://app.oldfoss.com
http://app.oldfoss.com:81
http://appldnld.apple.com
http://appldnld.apple.com.edgesuite.net
http://archive.apache.org
http://ardownload.adobe.com
http://au.v4.download.windowsupdate.com
http://azure.download.pdfforge.org
http://bitbucket.org
http://cache.lumension.com
http://cache.pack.google.com
http://cache-download.real.com
http://ccmdl.adobe.com
http://cdn01.foxitsoftware.com
http://cdn02.foxitsoftware.com
http://cdn04.foxitsoftware.com
http://cdn09.foxitsoftware.com
http://cdn1.evernote.com
http://citrixreceiver491000.html
http://citrixreceiver492000.html
http://citrixreceiver493000.html
http://classicshell.net
http://content.ivanti.com
http://content.rim.com.edgesuite.net
http://d.7-zip.org
http://dist.divx.com
http://dl.google.com
http://dl2.xmind.net
http://dl3.xmind.net
http://download.accusoft.com
http://download.adobe.com
http://download.autodesk.com
http://download.betanews.com
http://download.ccleaner.com
http://download.cdburnerxp.se
http://download.documentfoundation.org
http://download.dymo.com
http://download.filezilla-project.org
http://download.gimp.org
http://download.imgburn.com
http://download.macromedia.com
http://download.microsoft.com
http://download.newaol.com
http://download.nullsoft.com
http://download.oldfoss.com
http://download.oldfoss.com:81
http://download.pdfforge.org
http://download.piriform.com
http://download.royalapplications.com
http://download.skype.com
http://download.splunk.com
http://download.teamviewer.com
http://download.techsmith.com
http://download.videolan.org
http://download.virtualbox.org
http://download.windowsupdate.com
http://download.winzip.com
http://download2.operacdn.com
http://download3.operacdn.com
http://download3.vmware.com
http://download3.xnview.com
http://download4.operacdn.com
http://download-akm.skype.com
http://downloadarchive.documentfoundation.org
http://download-origin.cdn.mozilla.net
http://downloads.hpe.com
http://downloads.pdf-xchange.com
http://downloads.sourceforge.net
http://downloadus1.teamviewer.com
http://downloadus2.teamviewer.com
http://en.community.dell.com
http://files2.zimbra.com
http://fpdownload.macromedia.com
http://ftp.adobe.com
http://ftp.gimp.org
http://ftp.opera.com
http://ftp.osuosl.org
http://g.live.com
http://get.geo.opera.com
http://get.videolan.org
http://gigenet.dl.osdn.jp
http://hotfixv4.microsoft.com
http://install.nitropdf.com
http://jaist.dl.sourceforge.net
http://javadl.oracle.com
http://javadl.sun.com
http://jsimlo.sk
http://knowledge.autodesk.com
http://localhost
http://localhostnt4w
http://mirror.clarkson.edu
http://mirror.nexcess.net
http://mirror2.layerjet.com
http://mirror6.layerjet.com
http://mirrors.syringanetworks.net
http://mozilla.stu.edu.tw
http://mozy.com
http://olive.download.pdfforge.org
http://openoffice.cs.utah.edu
http://orange.download.pdfforge.org
http://osdn.dl.osdn.jp
http://pnotepad.googlecode.com
http://prodesigntools.com
http://pspad.poradna.net
http://pumath.dl.osdn.jp
http://purple.download.pdfforge.org
http://qtinstall.info.apple.com
http://releases.mozilla.org
http://silverlight.dlservice.microsoft.com
http://software-dl.real.com
http://sourceforge.net
http://superb-dca2.dl.sourceforge.net
http://support.citrix.com
http://support.citrixonline.com
http://support1.uvnc.com
http://supportdownload.apple.com
http://swupdl.adobe.com
http://tcpdiag.dl.sourceforge.net
http://tdf.mirrors.tds.net
http://teal.download.pdfforge.org
http://tenet.dl.sourceforge.net
http://ufpr.dl.sourceforge.net
http://up.autodesk.com
http://updates-http.cdn-apple.com
http://upgrade.skype.com
http://us.download.nvidia.com
http://white.download.pdfforge.org
http://wl.dlservice.microsoft.com
http://www.7-zip.org
http://www.aimp.ru
http://www.coreftp.com
http://www.cutepdf.com
http://www.dotpdn.com
http://www.download.windowsupdate.com
http://www.filesetups.com
http://www.fosshub.com
http://www.getpaint.net
http://www.goodsync.com
http://www.jam-software.com
http://www.microsoft.com
http://www.mirrorservice.org
http://www.peazip.org
http://www.piriform.com
http://www.rarlab.com
http://www.realvnc.com
http://www.tightvnc.com
http://www.uvnc.com
http://www.uvnc.eu
http://www.wireshark.org
http://xh.yimg.com
http://xml.shavlik.com
http://zoom.us
https://2.na.dl.wireshark.org
https://airdownload.adobe.com
https://allwaysync.com
https://archive.apache.org
https://assets.cdngetgo.com
https://astuteinternet.dl.sourceforge.net
https://atlassian.jfrog.io
https://ayera.dl.sourceforge.net
https://az764295.vo.msecnd.net
https://bitbucket.org
https://cdn.gomlab.com
https://cdn1.evernote.com
https://cfhcable.dl.sourceforge.net
https://cisco.webex.com
https://clientupdates.dropboxstatic.com
https://cloud.r-project.org
https://content.ivanti.com
https://cytranet.dl.sourceforge.net
https://d11yldzmag5yn.cloudfront.net
https://d1ilhw0800yew8.cloudfront.net
https://data-cdn.mbamupdates.com
https://desktopassets.prezi.com
https://dl.bandicam.com
https://dl.google.com
https://dl.tvcdn.de
https://dl1.cdn.filezilla-project.org
https://dl3.cdn.filezilla-project.org
https://dl3.xmind.net
https://docs.microsoft.com
https://download.ccleaner.com
https://download.cdburnerxp.se
https://download.gimp.org
https://download.microsoft.com
https://download.qsrinternational.com
https://download.royalapplications.com
https://download.skype.com
https://download.splunk.com
https://download.sublimetext.com
https://download.teamviewer.com
https://download.techsmith.com
https://download.tortoisegit.org
https://download.virtualbox.org
https://download.visualstudio.microsoft.com
https://download.xnview.com
https://download1.operacdn.com
https://download3.vmware.com
https://download3.xnview.com
https://downloadmirror.intel.com
https://downloadplugins.citrix.com
https://downloads.arduino.cc
https://downloads.bluebeam.com
https://downloads.hpe.com
https://downloads.plex.tv
https://downloads.sourceforge.net
https://downloadus1.teamviewer.com
https://downloadus2.teamviewer.com
https://downloadus4.teamviewer.com
https://e3.boxcdn.net
https://endpoint920510.azureedge.net
https://files.zimbra.com
https://fpdownload.macromedia.com
https://ftp.opera.com
https://gensho.ftp.acc.umu.se
https://github.com
https://hipchat-ops.s3.amazonaws.com
https://iweb.dl.sourceforge.net
https://knowledge.autodesk.com
https://launch.getgo.com
https://master.dl.sourceforge.net
https://media.inkscape.org
https://meetings.webex.com
https://na19.salesforce.com
https://neevia.com
https://nmap.org
https://nodejs.org
https://notepad-plus-plus.org
https://packages.vmware.com
https://phoenixnap.dl.sourceforge.net
https://pilotfiber.dl.sourceforge.net
https://pkware.cachefly.net
https://s3.amazonaws.com
https://secure.logmein.com
https://secure.mozy.com
https://secure-appldnld.apple.com
https://slack-ssb-updates.global.ssl.fastly.net
https://sourceforge.net
https://storage.googleapis.com
https://superb-dca2.dl.sourceforge.net
https://superb-sea2.dl.sourceforge.net
https://support.citrix.com
https://support.microsoft.com
https://swdl.bluejeans.com
https://technet.microsoft.com
https://telerik-fiddler.s3.amazonaws.com
https://the.earth.li
https://versaweb.dl.sourceforge.net
https://vorboss.dl.sourceforge.net
https://web.mit.edu
https://welcome.webex.com
https://www.7-zip.org
https://www.citrix.com
https://www.dotpdn.com
https://www.fosshub.com
https://www.goodsync.com
https://www.hipchat.com
https://www.jam-software.com
https://www.microsoft.com
https://www.mozypro.com
https://www.piriform.com
https://www.rarlab.com
https://www.realvnc.com
https://www.scootersoftware.com
https://www.telerik.com
https://www.tightvnc.com
https://www.tracker-software.com
https://www.uvnc.eu
https://www.wireshark.org
vhttps://www.microsoft.com

 

Additional Information

 

  • To obtain the IP for vendor sites you can ping the vendor site or contact the vendor to obtain this information. We are unable to provide a list of IP addresses due to the varied dynamic IP addresses being used by the vendors. It may be easier to create an exception for an entire domain rather than entering all specific URLs, you can usually do so by entering the exception in this format:
    • *.domain.com.

 

Affected Product

 

Ivanti Patch for Windows Servers

Agent stuck on Installing Patches (17025)

$
0
0

Our agents are attempting to deploy several MS Office patches despite the fact that they are considered already installed. The patches are as follow:

 

KB3191923

KB4011142

KB4011036

KB4011219

KB4011572

KB4011568

KB3213542

KB4011563

KB4011568

 

Launching the patches manually informs me the updates are installed.  Please advise.

 

Thank you,

Microsoft Unsupported Security Patches

$
0
0

Purpose

 

This is a list of Microsoft Security Patches that are not supported by Shavlik. The patch and the reasoning is listed below.

 

 

Products

 

Microsoft Word 2010

  • kb24286772010-kbXXXXXXX-fullfile-x86-glb.exe
    • This series of patches cannot be supported due to it applying to a unique configuration of Office
    • Microsoft's official explanation is "The 3115198 update only applies to systems running specific configurations of Microsoft Office 2010. Some configurations will not be offered the update."
    • Microsoft does not disclose what this unique applicability configuration is

 

Microsoft Live Meeting Console 2007

  • KB3144432
    • This patch does not install silently as the system user
Microsoft Lync 2010 Attendee
    • This patch installs at the Per User level, not at the System level. The admin level install of the patch is supported

 

.NET Language Packs

  • KB3102437
    • These language packs contain translated text, such as error messages, for languages other than English. Installation of a language pack is not required to run .NET Framework applications on a non-English OS. Multiple language packs, each for a different language, can be installed on a single computer.
    • Since multiple language packs can be installed on a single computer, we have no way to detect or offer multiple languages per machine.

View Machine Smart Filter

$
0
0

I am using Patch for Windows. In Console, under View/Machine, I created a new Smart Filter. The rule is 'Path' 'contains' 'X'. But it did not find my machine groups having 'X' in its path. It seems the rule 'Path' did not work.

Deployment Tracker stuck at Scheduled during Deployment but patches install

$
0
0

Purpose

 

The purpose of this document is to go over what to do when the deployment tracker fails to update beyond Scheduled.

 

Symptoms

 

  • Deployment tracker will stay at scheduled despite the deployments being initialized on the target machines being deployed to.
  • Deployment tracker shows scheduled:

 

 

  • When looking at the STDeployerCore.log on the target machine(s), you will see results similar to below indicating the patches were installed successfully:

 

2016-10-06T21:01:35.1775494Z 0b78 I DeploymentPackageReader.cpp:782 Deploy package 'C:\Windows\ProPatches\Installation\InstallationSandbox#2016-10-06-T-21-00-54\deployPackage-2855.zip' successfully opened unsigned for package IO

2016-10-06T21:02:38.2639494Z 0b78 I Authenticode.cpp:134 Verifying signature of C:\Windows\ProPatches\Patches\Windows6.1-KB2544893-x64.msu with CWinTrustVerifier

2016-10-06T21:02:38.3263494Z 0b78 V UnScriptedInstallation.cpp:29 Executing (C:\Windows\ProPatches\Patches\Windows6.1-KB2544893-x64.msu /quiet /norestart), nShow: true.

2016-10-06T21:02:47.7895494Z 0b78 V ChildProcess.cpp:140 Process handle 000004FC returned '0'.

Cause

 

 

Resolution

 

1. Ensure that port 3121 is not being blocked in your network. Perform a telnet command from the target machine(s) to your Protect console machine's IP or FQDN address.

telnet {console IP/FQDN} 3121

 

     If Telnet is not installed, you will see the following:

     To Enable Telnet:

 

     If the port is blocked, you will see a similar error:

 

   If at this point you see the port fail to connect, you will need to make sure that 3121 is enabled in your network before attempting to deploy again.

 

     If the port is not blocked, you should see a blank command prompt:

 

2. Once you have confirmed that port 3121 is able to connect, check to ensure that your Deployment Template being used has 'Send Tracker Status' enabled:

 

3. Confirm that either TLS 1.0 is enabled between the console and the problem client machine or TLS 1.2 is properly configured

     Disabling TLS 1.0 may causes issues with Patch for Windows Servers.

     Enabling TLS 1.2 for Ivanti Patch for Windows Servers

 

4. Verify that you 'Console Alias Editor' has all of the following located within it:

  • Console NetBIOS name
  • FQDN
  • IP address

 

Tools > Console Alias Editor

 

 

 

Once updated, test your deployment again. If the device is able to properly connect, the tracker status will updated as expected.

 

If after updating the 'Console Alias Editor' the deployment status is still showing 'Scheduled', you will find in the dplyevts.log file on the target machine something similar to the following:

 

PingBack.cpp:63 Sending data to 'https://PROTECT-92-5119:3121/ST/Console/Deployment/Tracker/V92' failed: 12002.

 

 

If you find something similar to the above, you will need to uninstall the scheduler service from the machine(s).

 

Protect 9.2:

Manage > Scheduled Remote Tasks

 

Find device(s) being deployed to, right click the machine and select 'Refresh Selected':

 

 

Device will be shown as 'Online':

 

Once online, right click the device again, go to Scheduler service > Uninstall:

 

Patch for Windows Servers 9.3:

 

View > Machines

 

 

Find the device affected using the search window

 

 

Highlight machine > Right-click > View scheduled tasks

 

 

Click Uninstall to remove the scheduler service.

 

NOTE: To validate scheduler is uninstalled, go to C:\Windows\ProPatches and if you don't see a folder named Scheduler, the service was uninstalled.

 

Test another deployment to your target machine(s). During this deployment, the Scheduler service will reinstall and should update the deployment tracker to show the deployment operation executing.

 

 

Additional Information

 

 

Affected Products

 

Shavlik Protect 9.2.x

Ivanti Patch for Windows Servers 9.3.x

Viewing all 2126 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>