Hello,
I'm looking for a trick to create a scan template that allows me to exclude a particular service pack.
It is easy to create a scan template that excludes patchs but I can't find a solution to exclude a service pack.
Thank you in advance,
Hello,
I'm looking for a trick to create a scan template that allows me to exclude a particular service pack.
It is easy to create a scan template that excludes patchs but I can't find a solution to exclude a service pack.
Thank you in advance,
We have multiple patch scan and patch deployment tasks that can be seen on Scheduled Console Tasks -view. Is there a way to add more machines to the task without having to create a new task all over again?
Hello,
I am trying to patch my Windows 2008 R2 server which happens to be the Ivanti Patch server. I am using the same admin credential that I use when I patch other servers which work fine.
I am able to scan for needed patches but when I go to deploy them that's when the error appears.
Thanks,
Paul
We have a daily patch scan task created in "Schduled Console Tasks". Most of the machines are in domain, so patch scan works for domain machines. However the scheduled patch scan task does not work for workgroup machines. I have assigned local account for workgroup machines and manual patch scan works. It seems that Ivanti only allows to run scheduled tasks with only one credential.
How do i schedule a agentless patch scan task for non-domain machines?
Purpose
This article explains how our detection determines whether the Delta or Cumulative version of updates are offered.
Description
Our detection logic will verify the 'UBR' value from the registry to determine if the Delta or the Cumulative update will be offered.
HKLM" Key="SOFTWARE\Microsoft\Windows NT\CurrentVersion" Value="UBR" (Update Build Revision)
You will only be offered one or the other and never both.
Related Documentation
Windows 10 release information
Ivanti Patch for Windows Servers (all)
Ivanti Security Controls (all)
This document provides a link to the Migration Tool User's Guide for Ivanti Patch for Windows Servers.
Ivanti Patch for Windows Servers 9.3 Migration Tool User's Guide
Product(s)
Ivanti Patch for Windows Servers (all versions)
Oracle is delaying the licensing enforcement until next quarter! You can read more about this on the Java 8 support page: https://www.oracle.com/technetwork/java/javase/tech/eol-135779.html
"Starting with the April 2019 scheduled quarterly critical patch update, Oracle Customers can access updates to Java SE 8 for commercial use from Oracle through My Oracle Support and via corporate auto update where applicable."
Oracle has announced changes to ongoing support for Java SE 8 (Standard Edition). This article describes these changes and how Ivanti will continue its support for Java SE 8 in January 2019 and beyond.
More on this:Oracle recently announced changes to support for Public Updates for Java SE 8 in a blog post on September 17th, 2018.
In January 2019 Oracle will require those who wish to continue support for Java 8 SE on Servers, Desktops, and Cloud Deployments to subscribe to the new Java SE Subscription offering to continue to receive Java SE 8 updates. This subscription covers all Java 8 SE licensing and support needs. If you cannot migrate applications with dependencies on Java 8 over to Java 10 by then, this is your option to continue to gain security updates until you can transition.
The following End of Public Updates announcement was taken from the Oracle Java SE Support Roadmap.
Java SE 8 is going through the End of Public Updates process for legacy releases. Oracle will continue to provide free public updates and auto updates of Java SE 8, until at least the end of December 2020 for Personal Users, and January 2019 for Commercial Users. Personal Users continue to get free Java SE 8 updates from Oracle at java.com (or via auto update), and Commercial Users continue to get free updates to Java SE 8 from OTN for free under the BCL license. Starting with the April 2019 scheduled quarterly critical patch update, Oracle Customers can access updates to Java SE 8 for commercial use from Oracle through My Oracle Support and via corporate auto update where applicable (Visit My.Oracle Support Note 1439822.1 - All Java SE Downloads on MOS– Requires Support Login).
Oracle does not plan to migrate desktops from Java SE 8 to later versions via the auto update feature. This includes the Java Plugin and Java Web Start. Instead of relying on a browser-accessible system JRE, we encourage application developers to use the packaging options introduced with Java SE 9 to repackage and deliver their Java applications as stand-alone applications that include their own custom runtimes.
Current releases remain free and open source for all users from jdk.java.net.”
Ivanti will continue to support Java SE 8, but will do so with what we refer to as “drop-in” support for products who have this functionality. This means supported Ivanti Patch Management solutions will continue to detect and have logic to update Java SE 8 instances in your environment, but it will be up to the customer to provide the installer and drop it into the patch repository for remediation purposes. This change keeps both Ivanti and our customers in compliance with Oracle’s licensing for Java SE 8.
Please refer to instructions for the Ivanti Patch solution you are using for details on how “drop-in” support works in your product:
Ivanti Patch for Windows
Ivanti Security Controls (ISeC)
Ivanti Patch for SCCM
Purpose
This document will walk you through on configuring your machine so that it can be scanned using local account credentials.
Symptoms
Although you have the correct local account credentials defined and assigned, scans on your machine fail. Errors include 451 The specified user account requires administrative rights to the target machine, 452 Unable to connect to the remote machine or 5: Access is Denied.
Resolution
If you are not using the built-in Administrator account on the remote machines (and using that account is NOT recommended), you must disable User Account Control (UAC) remote restrictions on the machines with the following steps.
In some instances, exporting/importing this registry key will not correctly fix the issue. If you imported this key via a .reg file, and you continue getting access denied messages, try deleting the registry value and manually entering it using the steps above.
For more details on disabling UAC remote restrictions, see http://support.microsoft.com/kb/951016
Additional Information
Refer to this portion of the Agentless Patch Scanning Prerequisites.
Affected Versions
Patch for Windows Servers 9.3.x
Ivanti Security Controls (all)
WannaCrypt (also known as WanaCrypt0r 2.0, WanaCry or Wcry) is an encryption-based ransomware attack, that started spreading globally on May 12th.
The malware encrypts files on affected systems using AES and RSA encryption ciphers, meaning hackers can decrypt system files using a unique decryption key.
WannaCrypt changes the computer's wallpaper with messages, asking the victim to download the decryptor from Dropbox and demanding hundreds in bitcoin to get their files back.
WannaCrypt uses multiple attack vectors:
Updated MS17-010(Q4012598): Added patches for Windows 8, Windows XP and Windows Server 2003, Windows Vista, Windows Server 2008
Video demonstrating how to patch and report on the Wannacrypt vulnerabitity in Ivanti Patch for Windows Servers (Shavlik Protect). This also works for the Petya vulnerability patches.
If you encounter an error for decrypting your credentials or with the Shavlik Protect Console service stopping after updating to the latest content data, the workaround is to install .Net Framework 4.6.2 on the Protect console server. For customer who cannot install .Net Framework 4.6.2, we are working on a fix that doesn't require this. No ETA on this.
WannaCrypt creates the following registry keys:
It will display a ransom message on the desktop wallpaper, by changing the following registry key:
Files created in the malware's working directory:
Once ransomware has encrypted files, there is not much you can do. Sometimes, ransomware has been badly written and it has been possible - by reverse engineering their code - to find a way to decrypt the data.
This does not seem to apply to WannaCrypt and we are unaware of a way to recover encrypted data at this time.
One might ask if paying the ransom will really decrypt the files. Sometimes it will, but there is no guarantee.
When Cryptolocker hit a few years ago, some users reported that they did get their data back after paying the ransom.
Live Updates on the Ransomware Attack from Our CISO, Director of Security and Chief Technologist
May 15, 2017 - 9:00 PDT | 12:00 EDT | 17:00 BST | 18:00 CEST
Ivanti Webinar Series
Ransomware Update: New Threats, New Defenses
September 14, 2016
Stephen Brown, Director of Product Management, Ivanti
Passive Protection Against Ransomware
June 01, 2016
Eran Livne, Principal Product Manager, Ivanti
To date, Ivanti has not detected the WannaCrypt malware in our environment.
In advance of the threat, we took the following proactive steps to fortify our environment against these types of threats:
Since this threat emerged, we have taken the following additional steps:
When a global threat like WannaCrypt comes along, it's up to all of us in cyber security to make sure we shut it down.To help minimize its impact, until June 15, 2017, we're offering a free 90-day license for the best-in-industry patch management solution that's tailored to your system needs. Register for Ransomware Get Well Quick trial.
Bookmark this page, we will add updates as they become available. Our patch content teams are currently working to include the emergency security patches in our patch content.
Error 1603: A fatal error occurred during installation
Error 1605: This action is only valid for products that are currently installed.
Error 1612: The installation source for this product is not available. Verify that the source exists and that you can access it.
Patch for Windows may become corrupt or unstable due to multiple reasons. Corruption to the Windows Installer, Installer folder or other corruption to the automated uninstall process is a typical root cause. When this occurs a manual uninstall of Patch for Windows is necessary. This article provides information on manually removing Patch for Windows from a server. This should only be used as a last resort to clean up a broken installation of Patch for Windows.
Microsoft provides assistance with the manual uninstall process by providing a Fix it tool. The link to the tool is: Fix problems that block programs from being installed or removed
How to use the Fix it tool
If Shavlik Protect, vCenter Protect, Netchk Protect, Patch for Windows is listed:
If Shavlik Protect, vCenter Protect, or Protect is Not Listed:
(Product codes are listed below)
Product GUID codes:
Make sure to use the corresponding GUID for the version of Protect you are attempting to uninstall.
- Protect 7.0.832.0: {C6D1AE7C-DE93-4E93-A916-C4144525C82C}
- Protect 7.0.841.0: {C6D1AE7C-DE93-4E93-A916-C4144525C82C}
- Protect 7.1.410.0: {90047C28-0B1B-4B30-8177-50729907EBF2}
- Protect 7.2.155.0: {9B7F1E45-4C47-4E25-9EAB-098923E4171C}
- Protect 7.5.2716.0: {CEA2D643-08C0-422E-9B27-B58ED9D38D07}
- Protect 7.6.1482.0: {661A3308-5BE2-4E0F-A752-BDDB247DD2DB}
- Protect 7.8.1340.0: {0A4D8D5E-7177-4A45-8A7F-0A5757403F97}
- Protect 7.8.1388.0: {0A4D8D5E-7177-4A45-8A7F-0A5757403F97}
- Protect 7.8.1392.0: {0A4D8D5E-7177-4A45-8A7F-0A5757403F97}
- Protect 8.0.3756.0: {F77AFB04-D13F-48DA-BB99-A5B31B6AAE0B}
- Protect 8.0.3965.1: {5A696B05-9F06-4B3D-83A0-69E848EFAC4A}
- Protect 8.0.4027.2: {5A696B05-9F06-4B3D-83A0-69E848EFAC4A}
- Protect 9.0.1106.0: {8045AD29-C6A4-43F5-9F1F-9560EB09F99A}
- Protect 9.0.1182.0: {070964CB-00B0-4E36-A3F6-A09F76FBD197}
- Protect 9.0.1182.0 {B7F5FF6F-382B-8834-3B85-B6390F7F4DA1}
- Protect 9.1.4334.0: {83593D3F-ADD7-491B-82EC-1A2E6D08C385}
- Protect 9.1.4472.0: {83593D3F-ADD7-491B-82EC-1A2E6D08C385}
- Protect 9.2.4988: {063C2D00-E6D5-6624-4903-4EEB4561AE61}
- Protect 9.2.5046: {063C2D00-E6D5-6624-4903-4EEB4561AE61}
- Protect 9.2.5119: {063C2D00-E6D5-6624-4903-4EEB4561AE61}
- ScriptLogic Patch Authority Ultimate 8.0.3756: {A8210996-CD25-4C8C-A2D7-207635DEDC28}
- ScriptLogic Patch Authority Ultimate 8.0.4027: {86DE6110-3F1C-40EE-98D9-05CD7A4B212F}
- ScriptLogic Patch Authority Ultimate 9.0.1182: {0EAD1B8A-6F58-2304-A817-34C1724CE04C}
- Patch for Windows Servers 9.3 Console: {5240C49D-72A5-4EE6-8687-C1F8DBD849CC}
- Patch for Windows Servers 9.3 Agent: {863EACA4-E689-4284-BEE2-8C5DE09E32BA}
- Patch for Windows Servers 9.3 Agent Patch Engine: {E9C4A462-8F43-4959-A6C6-B63E6D0050BA}
- Patch for Windows Servers 9.3 Agent Asset Engine: {0D593038-F0EF-4F93-8134-2DA47CA016EB}
Delete the relevant certificates. (You will need to reinstall all agents after performing this step)
10. Close the MMC window. At this point, install the latest version of Protect.
If you continue to encounter any install errors, contact Ivanti support: Ivanti Support Portal
If the Fixit tool fails to correct the error, you may need to manually delete an upgrade key located under HKEY_CLASSES_ROOT\Installer\UpgradeCodes in the registry. Then try reinstalling Patch for Windows with the latest installer.
Known Upgrade Codes: [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\B7F5FF6F382B88343B85B6390F7F4DA1]
The Fixit utility is provided by Microsoft. Make sure you read any known issues or guidelines for this tool on Microsoft's site prior to use.
Patch for Windows - All version
Overview
These instructions will help you enable All logging (verbose logging) then those collect logs and supporting information to help Support troubleshoot issues on your console and remote clients.
Instructions
Ivanti Patch for Windows Servers (PWS) 9.X Console Logging:
1. Open the Patch for Windows GUI and navigate to Tools > Options > Logging and change logging to All for both user interface and services.
a. If you are unable to set logging via the GUI see this doc: http://community.shavlik.com/docs/DOC-22938
2. Close the console GUI.
3. Stop the 'Ivanti Patch for Windows Servers Console Service' service.
4. Delete the contents of C:\ProgramData\LANDesk\Shavlik Protect\Logs on your console.
a. If troubleshooting agentless deployment or scheduling, delete the contents of C:\Windows\ProPatches\Logs on your target machine as well.
5. Start the 'Ivanti Patch for Windows Servers Console Service' service and open the Patch for Windows GUI.
6. Attempt to reproduce the issue. Please document steps to reproduce. Screenshots are very helpful.
7. Collect the logs from the Logs folder(s) from steps 4 (please zip).
a. Include applicable screenshots.
b. [Deployment issues only] On the target system, zip a copy of the entire C:\Windows\ProPatches folder and its contents (exclude the Patches sub-folder).
8. Zip everything together and attach to the case on the support portal.
Shavlik Protect - Ivanti Patch for Windows Servers Agent Logging:
1. You will need to set your agent's logging level to All by opening the Agent Policy assigned to the machine you are gathering logs from. The option is in the General tab.
2. If not already set, change the logging level to ‘All’ then Save and update Agents. Choose to update agents if prompted again.
a. If Patch for Windows fails to update the agent, you will need to perform an Agent Check-in from the agent GUI on the target machine or wait for the scheduled check-in.
3. Remote to the agent client machine, close the agent GUI and stop the services:
a. The services start with Ivanti or ST.
4. Delete the contents of theC:\ProgramData\LANDesk\Shavlik Protect\Logs folder on the agent client machine.
5. Start services that start with Ivanti or ST.
6. Attempt to reproduce the issue. Please document steps to reproduce. Screenshots are very helpful.
7. Take applicable screenshots of errors or information relevant to the issue.
a. Collect the logs from step 4.
b. Collect the screenshots.
8. Zip everything together and attach to the case on the support portal.
Ivanti Patch for Windows Servers Deployment Logging: (the information collected here is specific to agentless deployments)
1. Navigate to the target machine with the deployment issues.
2. Stop all services that start with Ivanti or ST.
3. Attempt to reproduce the issue. Please document steps to reproduce. Screenshots are very helpful.
4. Delete the patches from C:\Windows\ProPatches\Patches.
5. Zip the entire C:\Windows\ProPatches folder.
a. Include applicable screenshots.
6. Zip everything together and attach to the case on the support portal.
Ivanti Patch for Windows Servers install issues:
Ivanti Patch for Windows Servers 9.3+
This document shows how to find the installation and setup logs for Patch for Windows. These are often requested by Ivanti support when troubleshooting installation failures.
The setup and installation logs for Patch for Windows can be found by doing the following:
Either option brings you to the same directory. You will need to search the temp directory for the following naming of files. There may be multiple of each depending how many times you have attempted installation. The newest log files would be the best to collect for support.
For information on collecting other/additional logging please see the document, How To: Gather console, patch deployment and agent logs for Ivanti Patch for Windows
Patch for Windows 9.3+
Many common Patch for Windows scan errors can be corrected by changes to configuration or environment. This article lists the most common scan error messages and provides some guidance on correcting the issue.
Scan errors can occur when:
Error Code | Description | |
Error Code 101: Unable to determine System Language | The scan process reads the Windows ntdll.dll file to determine the language of the system. If this file is inaccessible, the prerequisite validation fails and the scan is aborted. See the following document for more information: Patch Scan Error Code 101: Unable To Determine OS Language | |
Error Code 105: MS_UNABLE_TO_GET_SYSTEM_DATA | This issue occurs due to an access denied message at the root of the problem, or due to other environmental or network related issues. See the following KB: Scanning A Remote Machine Using Protect Fails With Error 105: MS_UNABLE_TO_GET_SYSTEM_DATA | |
Error Code 200: System not found. Scan not performed. | This indicates that the specified computer was not located and could not be scanned. | |
Error Code 201: System not found. <system error message> | A network problem is preventing the specified machine from being scanned. Check to see that your computer (the scanning machine) is properly connected to the network and that you can remotely logon to the specified machine. | |
Error Code 202: System not found. Scan not performed. | A network or system error occurred while the scan was in process. Check to see that your scanning machine is properly connected to the network and that the machine being scanned is still connected to the network. Also ensure that the remote machine is running the Server service. | |
Error Code 230: Scan not performed. <system error message> | A general network error has occurred. See the system documentation for more information. | |
Error Code 235: System not found, or NetBIOS ports may be firewalled. Scan not performed. | Most likely, there is no machine with the specified IP address. If a machine does exist at this address, a personal firewall or port filtering device may be dropping packets destined for TCP ports 139 and 445. | |
Error Code 261: System found but it is not listening on NetBIOS ports. Scan not performed. | A machine exists at this IP address but it is either not listening on, or is blocking access to, TCP ports 139 and 445. | |
Error Code 270: Connected to a machine with the wrong hostname or domain name. | Ensure that you are meeting all scanning prerequisites, and that you are able to resolve the target system properly by forward and reverse nslookup. Example: nslookup target_IP_address nslookup target_NetBIOS_name
| |
Error Code 301: SystemRoot share access required to scan. | Unable to connect to the remote machine’s system share. This may occur if the administrator has unshared the systemroot (typically C$ or similar) or has disabled the AutoShareServer(Wks) via the registry.
See: Scan Error 301 - SystemRoot Share Access Required to Scan
For more information on restoring Admin Shares, see the Microsoft Knowledge Base article 318755. | |
Error Code 429: DLL is not properly registered. | ||
Error Code 430: Incorrect version of MDAC. | ||
Error Code 451: Admin rights are required to scan. Scan not performed. | The current or specified user account performing the scan does not have administrative rights to the machine being scanned. Check to see that the specified account is a member of the local administrators group on the machine being scanned (or is a member of a group with local administrative rights).
If you are scanning machine in a workgroup, check Scan Error 5, 451 or 452 When Scanning A Machine With a Local Account | |
Error Code 452: Protect is unable to scan this machine. Please check to see that you have administrative rights to this machine and are able to login to this machine from your workstation. Scan not performed. | Check to see that the Server service is enabled on the remote machine and that you can remotely logon to this machine. Ensure that the Workstation service is running on the machine performing the scan.
If you are scanning machine in a workgroup, check Scan Error 5, 451 or 452 When Scanning A Machine With a Local Account
MS15-027 has also caused this issue. Please see MS15-027 (KB3002657) May Cause Patch Scans To Fail With Error 452 | |
Error Code 501: Remote registry access denied. Scan not performed. | Check to see that the Remote Registry service is enabled on the machine being scanned. | |
Error Code 502: Scan not performed. Error reading Registry <system error message> | A general registry error has occurred. See the system documentation for more information. | |
Error Code 503: Scan not performed. Error reading Registry. | A general registry error has occurred. No additional information is available. | |
Error Code 553: Unable to read registry. Please ensure that the remote registry service is running. Scan not performed. | Check to see that the Remote Registry service is enabled on the machine being scanned. | |
Error Code 621: OS of target is an unsupported version of Windows | The specified may be a non-Microsoft platform running SMB services or otherwise emulating a Microsoft product. Review the document: Scanning a Machine Using Protect Fails with Error 621: OS of Target Is an Unsupported Version of Windows | |
Error Code 622: Machine OS is not Recognized. Please run with tracing on and send to technical support. Scan not performed. | Unable to determine the operating system of the specified machine. This may occur when scanning beta or unreleased versions of Microsoft operating systems. | |
Error Code 623: Machine Service pack is not Recognized. Please run with tracing on and send to technical support. Scan not performed. | Unable to determine the Service Pack of the specified machine. This may occur when scanning beta or unreleased versions of Microsoft Service Packs. | |
Error Code 701: File http://download.microsoft.com/download/ ... secure.cab was NOT downloaded. | The signed, compressed CAB file containing the security patch information could not be obtained from the specified location. This may occur if the scanning machine is not connected to a network, or is otherwise unable to access the specified file or location. If the CAB file is not obtained, an attempt is made to access the uncompressed XML file via https. | |
Error Code 702: File https://www.microsoft.com/technet/secur ... secure.xml was NOT downloaded. Attempting to find local copy of mssecure.cab. | The uncompressed XML file containing the security patch information could not be obtained from the specified location via https. This may occur if the scanning machine is not connected to a network, or is otherwise unable to access the specified file or location. If the XML file is not obtained from the network, an attempt is made to locate an existing version of this file on the local machine. | |
Error Code 799: Itanium class servers are not supported by Protect. | ||
Error Code 800: Unable to retrieve OS info for image | SysPrep: Enter System Out-of-Box Experience (OOBE) with Generalize checked. Generalize is not a supported switch and will cause scan failures to offline VM and Templates. | |
Error Code 802: Could not read boot.ini file in harddrive at '%s' | Unable to read the image's boot.ini file after successfully mounting the hard disk (non-Vista systems). | |
Error Code 803: Could not find windows install directory in boot.ini file in harddrive at '%s' | The virtual image hard drive was successfully mounted and the boot.ini file was read but the scan engine was unable to locate the %systemroot% folder at the specified location (non-Vista systems). | |
Error Code 804: Could not find system32 directory for virtual system at '%s' | The virtual image hard drive was successfully mounted and the boot.ini file was read but the scan engine was unable to locate the %systemroot%\system32 folder at the specified location (non-Vista systems). | |
Error Code 805: Timeout when mounting hard drive at '%s' to drive '%c' | An attempt to mount the virtual image was not successful. The mounting process timed out after 60 seconds. Try scanning this image individually to see if the mount succeeds. | |
Error Code 806: Error mounting hard drive at '%s' to drive '%c' | An attempt to mount the virtual image was not successful. This can happen if the image being mounted is encrypted, is on a compressed drive, is a template or a linked clone, or any of the vmdk files are read-only. If this is a VMware Workstation or VMware Server image, this error occurs if the image is currently powered on or suspended. Please see the following document Error Code 806 – Unable to Mount Volume | |
Error Code 807: Error mounting hard drive at '%s' to drive '%c' with exit code %d | An attempt to mount the virtual image was not successful. The mounting process returned an unknown error code. Contact support for assistance. | |
Error Code 808: Could not get return code from mounting tool when mounting hard drive at '%s' to drive '%c' due to %s | The virtual image mounting process completed but the mount process was unable to determine if the mounting was successful. | |
Error Code 809: Unknown virtual image type '%s' extracted from '%s'. | The scan engine was unable to determine the virtual image type. This may occur if scanning a currently unsupported virtual image platform. | |
Error Code 810: Could not find system32 directory for virtual image: '%s' | The virtual image hard drive was successfully mounted but the scan engine was unable to locate the image's %systemroot%\system32 folder. | |
Error Code 811: Could not get information about drive mounted at '%s' for system:'%s' | The scan engine was unable to determine the systemroot drive letter for the mounted image. | |
Error Code 812: Could not open mounted registry key 'HKLM\\Software\\MountedDevices' for system: '%s' | The virtual image hard drive and registry was successfully mounted but the scan engine was unable to read the mounted registry. | |
Error Code 813: Could not enumerate the values under the key HKLM\\Software\\MountedDevices for system: '%s' | The virtual image hard drive and registry was successfully mounted but the scan engine was unable to enumerate values from the mounted registry. | |
Error Code 814: No path to vmware-mount.exe provided! | The scan engine was unable to locate the VMware mounting tool. Please make sure that the VMware Virtual Disk Development Kit has been properly installed. | |
Error Code 815: Could not find mounting tool at '%s' | The scan engine was unable to locate the VMware mounting tool. Please make sure that the VMware Virtual Disk Development Kit has been properly installed. | |
Error Code 816: Could not read system file at '%s' | The vmx configuration file does not exist for the specified VMware Workstation or VMware Server image. | |
Error Code 817: Error parsing system file at '%s' | The scan engine was unable to read the vmx file for the specified VMware Workstation or VMware Server image. Check the vmx file and ensure that it can be read in a text viewer. | |
Error Code 818: '%s'. Unable to mount the virtual image. The virtual image is currently powered on. | The scan engine was unable to mount the virtual image because the virtual image was powered on. The scan engine is only capable of scanning images that are offline (powered off). | |
Error Code 819: '%s'. Unknown PowerStatus '%d' | The scan engine was unable to determine the current state of the image (powered on, suspended, powered off). | |
Error Code 820: %s'. Scanning suspended or paused images is not currently supported. | The scan engine was unable to mount the virtual image because the virtual image was suspended (paused). The scan engine is only capable of scanning images that are offline (powered off). | |
Error Code 821: Could not open Objects key in BCD for image at '%s' | The scan engine was unable to access the boot configuration data (BCD) for this image. This error message could indicate that there is a problem with the specified image. Try powering on this image to ensure that it is still valid. This error message applies to Vista images only. | |
Error Code 822: Could not enumerate keys in 'BCD\\Objects' for image at '%s' | The scan engine was unable to enumerate information from the boot configuration data (BCD) for this image. This error message could indicate that there is a problem with the specified image. Try powering on this image to ensure that it is still valid. This error message applies to Vista images only. | |
Error Code 823: Could find default boot section in the BCD for image at '%s' | The scan engine was unable to enumerate boot information from the boot configuration data (BCD) for this image. This error message applies to Vista images only. | |
Error Code 824: Could not open key at 'BCD\\Objects\\%s\\Elements\\22000002' for image at '%s' | The scan engine was unable to open the boot information data from the boot configuration data (BCD) for this image. This error message applies to Vista images only. | |
Error Code 825: Could find the Windows root in default boot section of the BCD for image at '%s' | The scan engine was unable to locate the value which stores the location of the windows directory in the boot configuration data (BCD) for this image. This error message applies to Vista images only. | |
Error Code 826: Registry mount sentry is NULL! | The scan engine was enable to mount the virtual image's registry. The console may be running low on memory. | |
Error Code 827: Hard-drive mount sentry list is NULL or empty! | The scan engine was unable to read the vmx file and/or this file had no hard drives configured for the image. | |
Error Code 828: Could not mount registry for image '%s'. This could be caused by running a non supported configuration. Windows 2000 can't mount x64 registries. | The scan engine was unable to mount the registry for the virtual image. This may occur if using a Windows 2000 console and trying to mount x64 images (unsupported). | |
Error Code 829:
Error: 829 - Accessing disk ID | This error can occur due to a number of different reasons. This is an error that occurs prior to mounting the image - it is not related to mounting the image (like the errors above)
General errors:
VIX_E_FAIL = 1, | |
Error Code 1001: IPv6 addresses are not supported. | IPv6 addresses are currently not supported. Ensure that IPv4 is enabled. | |
Error Code 1300: Not all privileges or groups referenced are assigned to the caller | The error message is a generic error stating you haven't provided an account with full privileges that may be required to perform some action. See the following document for more information: Patch Scanning Error 1300 - Not All Privileges Or Groups Referenced Are Assigned To The Caller |
Patch for Windows 9.3+
This document provides information to troubleshoot slow patch scans when using Ivanti Patch for Windows.
There can be a number of causes of slow patch scans. The first thing you should look into is if there have been any recent changes - either to the console system or the network you are on.
Some of the most common causes of slow scans addressed in this article are:
1. Ensure that you are on the latest version/build of Patch for Windows.
Whenever we have a new version released there is a possibility that there may be bug fixes or product improvements which could help resolve your issue.
You can verify the latest version and download it from the following link: Patch for Windows download page
2. Make sure that your console system has enough resources to run your scans.
If you are scanning a high number of machines you may need to increase the CPU and/or memory available to the console system. Our hardware system requirements for processor and memory are as follows:
Processor/CPU:
Memory/RAM:
For more information, see System Requirements
3. Antivirus or real-time threat protection software may be scanning our patch scan results as they are being sent back to the Patch for Windows console server.
Sometimes antivirus software, in particular those that perform on-access scanning may slow down the patch scan process. Most often we see these programs slow the process as the results are sent to the console's arrivals folder to be imported to the database.
Solution:
C:\ProgramData\LANDesk\Shavlik Protect\Console\Arrivals
4. There may be network/configuration issues.
The most common issue is that high latency will cause scanning of remote systems to take a long time to complete. Things to check:
Check the latency.
On your console system run a ping connecting to a target system. To do so click Start > Run > type CMD and hit enter, then enter the following command- ping [target machine name or ipaddress] i.e ping machine01 or ping 10.1.10.5.
The higher the latency (the value next to time=), the longer you can expect the scan to take for Protect. High latency impacts scans due to the fact that our scan engine uses a separate connection for each check that is performed during the Dynamic Product Detection process.
Is the scan taking place over a LAN connection or WAN connection?
Most often WAN connections will have much higher latency. As such, longer patch scans can be expected over WAN.
Workarounds available for latency/network issues:
5. Possible Database Issues
You will need SQL Server Management Studio to perform some of these checks. If you are using SQL Express you will most likely need to download the free Management Studio Express from Microsoft's download site. See the links below:
For SQL 2005 Express: http://www.microsoft.com/downloads/details.aspx?FamilyID=c243a5ae-4bd1-4e3d-94b8-5a0f62bf7796&displaylang=en
For SQL 2008 Express: http://www.microsoft.com/downloads/details.aspx?FamilyID=08e52ac2-1d62-45f6-9a4a-4b76a8564a2b&displaylang=en
For SQL 2008R2 Express: http://www.microsoft.com/download/en/details.aspx?id=22985
For SQL 2012 Express (Choose the management studio after clicking download): http://www.microsoft.com/en-us/download/details.aspx?id=29062
For more recent versions, click on your desired version here: SQL Server Management Studio Changelog/Downloads
Whether the SQL server being used is remote or local can make a large impact as well. If the database is hosted on a remote server you may need to check into your network connection between the console system and the SQL server. If there is any latency or any network issues it could cause your scans to run slow.
6. Virtual Machine resource contention:
If you have the console running on a virtual machine make sure that the resources that the VM are trying to use are actually available in case you have other VM's running simultaneously that are possibly using all of the host server resources.
Patch for Windows 9.3+
DB connection issue error " E APAlertEventProducer.Create|Unable to connect to SQL Server 'xxx'. SqlError message: 'Login failed for user 'NT AUTHORITY\ANONYMOUS LOGON'.
Here are some things to check and/or try for this issue:
1) Check for previously imported results that are stuck in the arrivals directory. These temporary files can be deleted. They can be found here:
-On Vista/2008/7: C:\ProgramData\LANDesk\Shavlik Protect\Console\Arrivals
-On XP/2003: C:\Documents and Settings\All Users\Application Data\LANDesk\Shavlik Protect\Console\Arrivals
2) If you're using an Express version of SQL, make sure that the database isn't full - 10GB is the limit for SQL Express 2008R2 & newer. 4GB is the limit for older versions of SQL Express. You can use the database maintenance function in Protect to help clear up space - it can be found under Tools > Options > Database Maintenance within Patch for Windows.
3) In Patch for Windows go to Help > View Help and look up the “SQL Server Post Installation Notes” and follow the directions within.
If you still have an issue, please go through the following steps to obtain trace logs and send them to support:
How To: Gather console, patch deployment and agent logs for Ivanti Patch for Windows
Patch for Windows 9.3+
The purpose of this article is to explain how patch scanning detection works in Patch for Windows.
The Patch for Windows scan engine performs security patch assessment against a variety of Windows-based operating systems and products from Microsoft and other product vendors.
The Patch for Windows engine uses an Extensible Markup Language (XML) file that contains information about which security hotfixes are available for each product. The XML file contains security bulletin name and title, and detailed data about product-specific security hotfixes, including:
The content data file, called WindowsPatchData.zip, is created and hosted by Ivanti.
When you run Patch for Windows (without specifying advanced file input options), the program must download a copy of this XML file so that it can identify the hotfixes that are available for each product. The XML file is a digitally signed CAB file and is available on the Shavlik website. Patch for Windows downloads the CAB file, verifies its digital signature, and then extracts the XML file to your local computer. Note that a CAB file is a compressed archive that is similar to a ZIP file.
After the XML file is extracted, Patch for Windows scans your machine (or the selected machines) to determine the operating system, service packs, and programs that you are running. Patch for Windows then identifies security patches that are available for your combination of installed software. Patches that are applicable to your machine but are not currently installed are displayed as "Missing Patch" in the resulting output. In the default configuration, Patch for Windows output displays only those patches that are necessary to bring your machine up-to-date. Patch for Windows recognizes roll-up packages and does not display those patches that are replaced by later patches.
Read more about supersedence detection (replacement patches) here: Determining Patch Replacements
During the scanning process the detection goes through a few main steps, simplified in order here:
1. DPD (Dynamic Product Detection) - The scan engine will first use DPD to identify the:
A. Operating System
B. Any products installed on the target system
C. The service pack level of any installed products (if applicable).
2. Patch detection - Once the DPD determines all applicable products on the target system the scan then goes into individual patch detection for all patches that apply to the OS or products on the target system. For each individual patch the scan goes through registry and/or file checks for any registry keys or files that are affected by the patch. This is also where any filtering comes into play. (i.e. product, patch type, criticality, or any other patch filter settings)
Patch for Windows 9.3+
You are able to manually verify a Java installation exists on a target (client) system, but a patch scan with Patch for Windows does not list a Java patch as missing or installed.
There are three likely causes for this issue that should be evaluated first:
Is Java Development Kit installed on the target (client) system? If Java Development Kit (JDK) is installed on the target system, you cannot patch Java (the Java Runtime Environment - JRE) separately. JDK contains its own version of JRE, and applying a separate JRE update will break the JDK on the system, so if the JDK is detected you will not be offered any JRE updates. Another possible cause of the issue is a corrupt install of JRE on the target (client) system.
The Patch for Windows scan engine's detection logic verifies the version of the jvm.dll and java.exe files on the target machine. The scan engine determines the location of these files based on information stored in the registry on the client system. A scan issue occurs if the file location listed in the registry key does not match where the files are located on the system. You can manually verify this by navigating to one of the following registry location using regedit:
Navigate to one of the versions of Java listed under this key, then for each version there will be a "RuntimeLib" key. The value of the RuntimeLib key contains the location that we check during our patch scan process.
You can also perform a search for jvm.dll and/or java.exe on your system. If the files are not located in the directory specified in the value of the RuntimeLib registry key then you may have a bad install of Java. The best way to correct this is to manually apply the next Java patch or reinstall Java on the system.
If the instructions in this article do not help identify the root cause of this issue, contact the Shavlik support team and please provide the following information:
Patch for Windows 9.3+
There are patch type that exist as an installer and an uninstaller; these patches can cause a loop when scanning and deploying. When the installation patch is deployed it makes the uninstall patch considered to be missing. These patches are designed by their vendor in this manner to facilitate adding/removing the patch according to environmental needs. If scanning/deploying these types of patches it may appear that the patch continually is missing as it continues to add/remove per deployment. The uninstall patch will end with 'U'. These patches tend to belong to the 'Security Tools' patch type.
Example: Missing the Installation Patch
Example: After Installed, Now Missing Uninstall Patch
Exclude the specific patch utilizing a patch group, or choose not to deploy the patches installer/uninstaller after scanning.
Refer to the following document:
How To: How To: Include or Exclude Specific Patches in Scan Results in Ivanti Patch for Windows Servers
These are known patches that offer an uninstaller.
Patch for Windows 9.3+
This document will help you determine why previously deployed patches are detected missing after subsequent scans.
It is possible that the patch is delivered to the remote system, but is never executed or attempted to install but failed. This may happen if the scheduler does not start the deployment. This can also happen if the patch requires a reboot to fully install, and a reboot has not been performed before running another scan.
Before you begin, ensure your system is rebooted after the patch is installed. Patches that require a reboot after am installation are not fully installed until a reboot takes place and they will appear as missing. Do not rescan before deployment is complete, or patches may show as missing. Perform another scan after the system has been rebooted.
To determine whether or not the deployment actually started, go to C:\Windows\ProPatches and look in the Staged folder. If there is nothing in the Staged folder then the deployment has started, but if there are directories in the Staged folders one or more deployments have not started. You can also determine whether or not patches recently ran by going to C:\Windows\ProPatches\Logs\STDeployercore.log and looking for recent entries and return codes. Keep in mind that the times will be in GMT.
To manually test this on the target machine, manually install the patch. Note errors that are displayed during the installation process and inform Technical Support accordingly - screenshots may be useful.
If the re-can scan does not result in showing the patch as installed, it is possible you are experiencing a different issue. To further examine your case, contact support (http://www.shavlik.com/support/contact/). You should have the following information ready before contacting Ivanti Technical Support:
Reproduce the issue and generate logs based on the steps in this document: How To: Gather console, patch deployment and agent logs for Ivanti Patch for Windows
Patch for Windows 9.3+