Quantcast
Channel: Shavlik User Community : All Content - Ivanti Patch for Windows
Viewing all 2126 articles
Browse latest View live

Can Ivanti Patch for Windows Server patch itself?

$
0
0

Hello All,

 

I'm still quite new to Ivanti Patch for Windows, so sorry if this is a simple question.

 

Our configuration is as follows, one Ivanti Patch for Windows Server and a external SQL server for it's database.

 

I can't see any documentation explaining how best to patch itself, and if there are any special considerations that I need to be aware of?

 

Thanks in advance.

 

Kieren


Error Code 501

$
0
0

We are trying to deploy to our workstations, but the majority of the workstations I am testing were not able to be scanned because of the following error.

  • Check to see that the Remote Registry service is enabled on the target machine - Error Code 501

 

Does the remote registry service need to be running in order for Shavlik to scan and patch? Or is there an alternative?

 

Thank you,

Jose

How To: Know When Xml Updates (Patch Definitions) Are Released and How to Receive Notifications

$
0
0

Purpose

 

This document will provide information about how to obtain information about Shavlik's XML updates (patch definitions).

 

Description

 

Generally the Shavlik content team will provide patch definition updates every Tuesday and Thursday. However, there are three easy sources that can be used to see when new XML updates (patch definitions) are released.

 

1) XML Announcements Sign up: http://www.shavlik.com/forms/xmlsubscribe.aspx

You can sign up to receive Shavlik Protect content (patch definition) email notifications under the 'Shavlik Protect Content Updates' form here.

Or, send a blank email to subscribe-shavlik-xml@listserv.shavlik.com to sign up for these notifications.

 

2) Patch Data Information Blog Page: Shavlik Protect | Simplify and Automate your IT Management

This web page displays all patch definitions released by the Shavlik content team for the Protect application.

 

3) Patch Data Information RSS Feed: http://protect7.shavlik.com/feed/

All the same information as protect7.shavlik.com in an RSS feed.

 

4) Patch Data Information Twitter: https://twitter.com/ShavlikXML

This Twitter account is updated every time an XML release is put out. This is a good alternative to recieving email notifications, depending upon your preferences.

 

Affected Product(s)

Ivanti Patch for Windows Servers 9.x

Shavlik Protect 9.x

Shavlik Protect SDK

Current Microsoft Security Bulletin Naming Convention As Of April 11th, 2017

$
0
0

Overview

 

Starting with the April 11th 2017 Patch Tuesday, Microsoft will no longer be using a traditional naming format for Security Bulletins.

 

The new Security Bulletin mappings our products will be using: MS[YY]-[MM]-[PP(P)]

 

  • MS = Microsoft
  • YY = Year
  • MM = Month Released
  • PP =  Product

 

Here are examples from Patch Tuesday Nov 14, 2017:

 

  • MS17-11-OFF
    • All office patches
  • MS17-11-IE
    • All IE patches
  • MS17-11-AFP
    • All Microsoft released Flash patches
  • MS17-11-W10
    • All Windows 10 patches, rollups and Deltas
  • MS17-11-2K8
    • All Vista and 2008 patches
  • MS17-11-SO7
    • Security Only Update for Windows 7 and Server 2008 R2
  • MS17-11-SO8
    • Security Only Update for Server 2012
  • MS17-11-SO81
    • Security Only Update for Windows 8.1 and Server 2012 R2
  • MS17-11-MR7
    • Monthly Rollup for Windows 7 and Server 2008 R2 (this is the rollup that includes non-security fixes)
  • MS17-11-MR8
    • Monthly Rollup for Server 2012 (this is the rollup that includes non-security fixes)
  • MS17-11-MR81
    • Monthly Rollup for Windows 8.1 and Server 2012 R2 (this is the rollup that includes non-security fixes)
  • MS17-11-SLV
    • All Microsoft Silverlight patches
  • MS17-11-2K3
    • All Server 2003 patches for the customers that subscribe to them (Extended support)
  • MS17-11-XPE
    • All Microsoft XP Embedded patches

 

.NET Patches will follow a slightly different naming scheme:

 

  • MS[YY]-[MM]-[TT][PP]-[KB]
    • YY = Year
    • MM = Month
    • TT = Type (Security Only or Monthly Rollup)
    • PP = Product (.NET)
    • KB = Parent KB
  • MS17-11-SONET-1234567
    • Security only patches associated with that parent KB
    • Security patch type
  • MS17-11-MRNET-1234567
    • Monthly Rollup associated with that parent KB
    • Non-Security patch type

 

Non-security .NET Patches also have a slightly different naming scheme:

 

  • MSNS[YY]-[MM]-[TT][PP]-[KB]
    • YY = Year
    • MM = Month
    • TT = Type (Quality Preview or Quality Rollup)
    • PP = Product (.NET)
    • KB = Parent KB
  • MSNS17-11-QPNET-1234567
    • Quality Preview patches associated with that parent KB
    • Non-Security patch type
  • MSNS17-11-QRNET-1234567
    • Quality Rollup associated with that parent KB
    • Non-Security patch type

 

Additional Information

 

Additional Naming Conventions

  • QP = Quality Preview
  • NS = Non-Security

 

Microsoft released the following article for FAQ on the changes made: Security Updates Guide dashboard and API:

 

Q: Why is the security bulletin ID number (e.g. MS16-XXX) not included in the new Security Update Guide?

A: The way Microsoft documents security updates is changing. The previous model used security bulletin webpages and included security bulletin ID numbers (e.g. MS16-XXX) as a pivot point. This form of security update documentation, including bulletin ID numbers, is being retired and replaced with the Security Update Guide. Instead of bulletin IDs, the new guide pivots on vulnerability ID numbers and KB Article ID numbers.

 

 

Affected Product(s)

 

Shavlik Protect

Shavlik Patch

Ivanti Patch for Windows Servers

Ivanti Patch for SCCM

Check if Windows 10 is CB/CBB or LTSB

$
0
0

Purpose

 

The purpose of this document is to help determine the version of Windows 10 being used

 

Overview

 

1. Open Control Panel - System - Windows Edition. If LTSB it will end with LTSB, e.g. Windows 10 Enterprise 2016 LTSB

2. Look at registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductName and will end in LTSB if LTSB

3. From PowerShell execute:

gwmi win32_operatingsystem | select OperatingSystemSKU

A value of 4 means CB while 125 means LTSB

 

Remember that CB and CBB is the same OS with CBB simply deferring the update (typically CBB lags 4 months behind CB).

 

Affected Products

 

Windows 10

Scheduled Console Task Manager Overview

$
0
0

Discussion

 

The Scheduled Console Tasks Manager is designed to give you a single location from which to monitor the tasks currently scheduled on the console. These tasks can include patch scans, asset scans, patch deployments to the console machine, patch deployments to hosted virtual machines, power tasks run against the console, script executions, and scheduled reports. The Scheduled Console Tasks Manager uses the services of the Microsoft Task Scheduler to schedule and initiate each task. If you prefer, you can view the tasks within the Microsoft Scheduler by accessing the Task Scheduler dialog on your Windows console machine and then expanding the Task Schedule Library > LANDESK > Protect tree.

 

Note: To monitor scheduled tasks on your remote machines, use the Scheduled Remote Tasks Manager.

 

You can use the Scheduled Console Tasks Manager to modify and delete the scheduled tasks. For example, if you know a certain machine will be unavailable on a certain day you can reschedule any scans that are set to be performed on that machine.

 

Overview

 

You access the Scheduled Console Tasks Manager by selecting Manage > Scheduled Console Tasks.

Console Task.PNG

The following commands are available using the buttons on the dialog or by right-clicking a task on any of the tabs.

Console.PNG

 

Related Documents

 

How To Test SYSTEM Account Permissions

 

Affected Product(s)

Protect 9.X

Ivanti Patch for Windows Servers 9.3.X

Notifications and Warnings Options Overview

$
0
0

Purpose

 

The Notifications and Warnings dialog allows you to specify when you want Ivanti Patch for Windows® Servers to inform you about potential operational issues.

 

Notification and warning options2.PNG

Description

Notification and warning options.PNG

 

Affected Product(s)

 

Ivanti Patch for Windows® Servers

How To: Automatically Export The Result Of A Continuous Ping Command To A Text File

$
0
0

Purpose

 

This document is made to assist in automatically exporting the result of a ping command to a text file for troubleshooting.

 

Solution

 

Open the command prompt (Start > Run > type "cmd").

Type the following command "C:\>ping nameofwebsiteorip >> c:\namefile.txt -t".

 

 

For example if you want to ping the loopback address

Ping.PNG

 

Output located at C:\namefile.txt

 


Patch Options Overview

$
0
0

Purpose

 

The Patch Options dialog allows you to specify patch scanning and deployment options.

 

Patch Options.PNG

Description

Patch Options2.PNG

Affected Product(s)

 

Ivanti Patch for Windows 9.3

Schedule reboot during maintenance window - best practice

$
0
0

Hello -

 

We recently picked up Shavlik Protect to patch our Windows Servers, and I had a question that I don't seem to be able to find a quick answer for:

 

Schedule reboot

If you elect to reboot the machines, you can specify when the reboot should occur. You can:

  • Reboot the machines immediately after installation
  • Reboot at a specific time
  • Reboot at a specific date and time

 

If I schedule updates to begin at 11PM, and I have a “must be available” timeline of 3AM (server must be available again in terms of maintenance window).  If I schedule a reboot at specific time of 2:30 AM and the patching is still occurring will this interrupt/halt the patching (and notify me?), or will it continue patching AFTER the reboot and then reboot again down the road?  I really want to ensure that if patching takes longer than expected I wont be an situation of a reboot occurring post 3AM (if I pick reboot immediately after install), but I also don’t want to cause issues with the patching because we rebooted in the middle of patching?

 

Also how does it handle several patches that trip the reboot flag?  Does it apply all the patches in the group and then reboot, or is intelligent enough to apply patch, reboot and then continue patching?

 

Thanks!

How To: Disable Automatic Updates in Windows 10 1607 and 1703

$
0
0

Purpose

 

This documents describes how to disable Automatic Updates in Windows 10 build 1607 and 1703.

 

Solution

 

Note: You must create these registry keys manually

 

1. Click Start, click Run, and then type regedit in the Open box.

2. Locate and then click the following key in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU

3. Add the following settings:

  • Value name: NoAutoUpdate

Value data: 0 or 1

    • 0: Automatic Updates is enabled (default).
    • 1: Automatic Updates is disabled.

Registry Value Type: Reg_DWORD

  • Value name: AUOptions

Value data: 1 to 4

    • 1: Keep my computer up to date has been disabled in Automatic Updates.
    • 2: Notify of download and installation.
    • 3: Automatically download and notify of installation.
    • 4: Automatically download and scheduled installation.

Registry Value Type: Reg_DWORD

 

Additional Information

 

This method contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:

How to back up and restore the registry in Windows: https://support.microsoft.com/en-us/help/322756

 

Affected Products

 

Windows 10 Build 1607

Windows 10 Build 1703

How To: Disable Automatic Updates in Windows 10 1709 through GPO

$
0
0

Purpose

 

This documents details how to disable Automatic Updates in Windows 10 build 1709 through a GPO

 

Solution

 

Steps for single computer:

 

1. Click Start, and then click Run.

2. Type gpedit.msc, and then click OK.

3. Expand Computer Configuration.

4. Right-click Administrative Templates, and then click Add/Remove Templates.

5. Click Add, click Wuau.admin the Windows\Inf folder, and then click Open.

6. Click Close.

7. Under Computer Configuration, expand Administrative Templates, expand Windows Components, and then expand Windows Update.

The Configure Automatic Updatespolicy appears. This policy specifies whether the computer receives security updates and other important downloads through the Windows Automatic Updates feature. The settings for this policy let you specify if automatic updates are enabled on the computer. If the service is enabled, you must select one of the three configuration options.

8. To view the policy settings, double-click the Configure Automatic Updatespolicy.

9. To turn on Automatic Updates, click Enabled or to turn off select Disabled

 

Steps for multiple computers:

 

1. From the server, click the "Start" button and select "Programs" > "Administrative Tools" > "Active Directory Users and Computers."

2. Right-click the domain name whose settings you want to change and select "Properties." Select the "Group Policy" tab.

3. Highlight the domain policy you wish to modify, which will typically be the default group policy, and then click the "Edit" button.

4. The Group Policy Object Editor will now be open. In the left window, navigate to "Computer Configuration" > "Administrative Templates" > "Windows Components" > "Windows Update."

5. In the main frame, double-click the option "Configure Automatic Updates."

6. Select "Disabled" to turn off automatic updates.

Policy changes are not applied immediately to the workstations. Active sessions will have their policy refreshed every 90 minutes by default. Inactive machines will have their policy updated when a user logs in or when the computer starts up

 

Affected Products

 

Windows 10 Build 1709

How To: Know When Xml Updates (Patch Definitions) Are Released and How to Receive Notifications

$
0
0

Purpose

 

This document will provide information about how to obtain information about Shavlik's XML updates (patch definitions).

 

Description

 

Generally the Shavlik content team will provide patch definition updates every Tuesday and Thursday. However, there are three easy sources that can be used to see when new XML updates (patch definitions) are released.

 

1) XML Announcements Sign up: http://www.shavlik.com/forms/xmlsubscribe.aspx

You can sign up to receive Shavlik Protect content (patch definition) email notifications under the 'Shavlik Protect Content Updates' form here.

Or, send a blank email to subscribe-shavlik-xml@listserv.shavlik.com to sign up for these notifications.

 

2) Patch Data Information Blog Page: Shavlik Protect | Simplify and Automate your IT Management

This web page displays all patch definitions released by the Shavlik content team for the Protect application.

 

3) Patch Data Information RSS Feed: http://protect7.shavlik.com/feed/

All the same information as protect7.shavlik.com in an RSS feed.

 

4) Patch Data Information Twitter: https://twitter.com/ShavlikXML

This Twitter account is updated every time an XML release is put out. This is a good alternative to recieving email notifications, depending upon your preferences.

 

Affected Product(s)

Ivanti Patch for Windows Servers 9.x

Shavlik Protect 9.x

Shavlik Protect SDK

Best Practice: Windows Automatic Updates

$
0
0

Purpose

 

The purpose of this document is to explain the best practices for Windows Automatic Update configuration in a Shavlik environment.

 

 

Description

 

When Windows Automatic Update is configured to check for updates, even if it is not configured to download or install them, it can cause slow deployments with Shavlik.

 

 

Recommendations 

 

A. Set Automatic Updates to "Never check for updates".

 

a. Configure settings at the local computer level.

 

Go to Control Panel> All Control Panel Items> Windows Update> Change settings and choose "Never check for updates (not recommended)" then hit OK.

 

AutoUpdate.PNG

 

b. Disable Automatic Updates through GPO.

 

1. Click Start, and then click Run.

2. Type gpedit.msc, and then click OK.

3. Expand Computer Configuration > Administrative Templates> Windows Components> Windows Update.

4. Select Configure Automatic Updates,choose Disabled, and hit Ok.

5. As GPO updates every 90 minutes, you can force this update to take effect by running the command gpudate /force.

 

Windows Update.PNG

 

More information on this process can be found in Configure Automatic Updates using Group Policy.

 

B. Stop the Windows Update Service and set the service to Manual.  (The service will start as needed)

 

C. Make sure you don't have a custom location setting for "Specify intranet Microsoft updater service location".  This is set in in Group Policy Object Editor, expand Computer Configuration, expand Administrative Templates, expand Windows Components, and then click Windows Update and remove this setting.

 

Additional Information

 

Methodology has changed in Windows 10 build 1511, 1607, and 1703. To disable Windows Automatic Updates for Windows 10 Build 1607 and 1703 click here.

 

Microsoft has reverted back to the methodology in this document with Windows 10 build 1709

 

Affected Product(s)

 

All Windows OS with the exception of Window 10 build 1511, 1607, and 1703

Need to un-install an agent client.

$
0
0

Can Ivanti provide a non-ftp link for agentinstaller.msi and patchinstaller.msi for version 9.3.4440.0 ?

 

Thanks,

John


Patching Process Of Hypervisors and ESXI Hosts

$
0
0

Hypervisor scanning and deployment

 

Scanning and deployment operations are performed by the hypervisor. In order to scan for installed and missing Bulletins, the hypervisor needs the latest patching metadata files. The metadata files are available from VMware inside an archive 9ZIP0 file. There is a different metadata package for each supported version of ESX and ESXi. Protect supplies the target hypervisor with the URL to the proper metadata file, but in this release, the hypervisor must download the file from the internet.

 

Hypervisor deployment

 

When the user selects the Bulletins to install, Protect will analyze the request and determine the proper bundles to be install by using the same metadata that was used by the hypervisor during the scan.

 

Protect gets the URLs for the bundles and passes them to the hypervisor. The hypervisor will download the bundles from VMware and perform the installation. The scan and installation processes are initiated by the Protect Console Service. Once initiated, the Scan or Deployment operation will continue even if the Protect GUI is shut down.

 

Deploying patches to the Virtual Environment

 

  1. The console instructs the hypervisor to download the pertinent bulletins and perform an installation.
  2. The hypervisor downloads the pertinent bulletins from VMware servers.
  3. The hypervisor performs an installation using the downloaded bulletins.
  4. The hypervisor perfroms an assessment using the previously downloaded metadata
  5. The hypervisor sends the assessment results to the console.

 

Operation details

 

Details of the deployment operation can be found in the following locations:

  • Operation Monitor
  • Event History log
  • vCenter Event and Alert logs
  • ST.ServiceHost.managed.log

 

ESX/ESXi Hypervisor deployment requirements

 

  • The ESX or ESXi Hypervisor must be at one of the following versions :

            ESX - 4.0 or later

            ESXi - 4.1 or later

  • The Shavlik Protect console must be internet connected.
  • The ESX or ESXi Hypervisor must be internet connected.
  • Port 443 must be open on the hypervisor.
  • The latest version of VMware Tools must be installed and running on all virtual machines managed by the hypervisor.
  • You must have previously performed a successful scan of the ESX or ESXi hypervisor.

How To: Setup Automatic Removal of Vmware Snapshots in Protect 9.2

$
0
0

Purpose

 

Shavlik Protect has the ability to take VMware snapshots. You can set this in a Custom Deployment Template, Under the tab Hosted VM/Templates. You also have the ability to delete old snapshots.

Deployment Template.PNG

 

Protect waits to delete the snapshots until the next deployment. If your deployments are spread out, and you would like your snapshots erased sooner, you can do this by deploying a custom patch that is always detected as missing. (QSK2745, MSST-001)

 

Overview

 

     1. Create a new Patch Scan Template by going to New-> Patch Scan Template and name is "Custom Action Scan". The only thing you need to change is under Patch Properties in the bottom right, click the radio button for "Scan Selected" and click the "Custom Actions" box.

custom action scan.PNG

 

     2. Create a New Deployment Template by going to New-> Deployment Template and name it "Custom Action for VMware Snapshot"

    • On the General Tab, deselect the ‘Send Tracker status’ option. This change is so that the tracker doesn’t falsely report the deployment as failed. Be aware you will not receive a tracker status for this deployment.

1.PNG

 

      3. Go to the Post-deploy Reboot tab, and set this to ‘Never reboot after deployment’.

 

2.PNG

     4. Under the Hosted VMs/Templates Tab, choose Delete old snapshots created by Shavlik Protect Advanced (age in days): (I set 2. You set your desired results. You need to set this to take pre-deployment snapshots as well.

 

  Protect can only delete existing snapshots at the time it takes a new snapshot.  It does NOT delete a snapshot at the age specified without a snapshot creation event triggering the age calculation and deletion

 

     5. Click Save.

3.PNG

 

Click the Home button and follow these instructions to schedule the task.

 

  1. Type a name in step 1. (I used to "Remove VMware Snapshots")
  2. Select your machine group that contains your VMs (Mine is names "VMs")
  3. Select how often you would like this to run to remove your snapshots (I chose Sundays, Tuesdays & Thursdays)
  4. Select "Custom Action Scan"

               a. Click Auto-Deploy patches after scan

               b. Chose "Custom Action for VMware Snapshot"

               c.Click "Install immediately.

     5. Click Schedule.

home.PNG

 

 

Affected Product(s)

Protect 9.X

Shavlik - Initiate Reboot Immediately

$
0
0

In our deployment template, users can initiate the reboot as soon as patch installation is complete. When they do so, it takes some time before the computer actually reboots (sometimes as long as 10 minutes).

Is there a way to quicken this restart time?

filter so you can remove versions?

$
0
0

Hi

 

 

Is there any filter so you can remove versions of updates, for example .net (when you scan)? We just want to patch updates and not version.
Becomes quite tricky if you are going to make a patchgrups on every version and then exceptions them.

 

Best regards /Maria

 

Ivanti Patch for Windows Servers API integration with the BeyondTrust vulnerability scanner

$
0
0

Purpose

 

The following is a sample integration script for the Ivanti Patch for Windows Servers API integration with the BeyondTrust vulnerability scanner.

 

If you use a vulnerability scanner to identify weaknesses in your network, the scanner may detect hundreds or even thousands of issues on your machines. At first this might seem a bit overwhelming, but what’s likely happening is that the vulnerability scanner is simply producing a lot of noise. The scanner is assessing for CVEs (Common Vulnerabilities and Exposures) explicitly.  In reality a software update will often include many CVEs.  A patch can also be superseded or replaced by a newer update.  What this tends to cause is the Vulnerability Assessment reflecting hundreds of vulnerabilities that can be resolved by updating just a few software titles on a system. 

 

To address this, you can use the API to:

 

  • Make calls to the vulnerability scanner
  • Extract the vulnerability list (consisting of CVEs)
  • Import those CVEs into a Ivanti Patch for Windows Servers patch group via the Patch Group API
  • Perform patch scans and deployments using that patch group
  • The patch engine will take into account any superseded patches and will identify the handful of patches that are required to bring the target system into compliance. If you rerun the vulnerability scanner after deploying the patches, the vulnerability count should be greatly reduced.

 

Overview

The API feature is meant for advanced users who have a working knowledge of PowerShell and who want to perform tasks beyond those available through the Ivanti Patch for Windows Servers user interface.


Please note:

 

  • The scripts can be downloaded from here: BeyondInsightToPatch_API.zip (attached to this document)
    • We included 2 scripts, one that will verify the BeyondTrust certificate and another where it will not.
  • The PS script needs run from the Patch for Windows Servers console server.

 

Environment confirmation steps:

 

1. Ensure the BeyondInsight console is set up correctly

    a. Go to the Configure tab

    b. Go to the API Registration tab

    c. Make sure the current IPv4 address/range is in the Source Addresses list.

    d. Click Update

2. Edit the $Authorization variable at the top of the BeyondInsightToPatch.ps1 file to include your BeyondInsight authorization connection string as specified in the BeyondInsight API documentation.

    a. http://<yourBIhost>/eEye.RetinaCS.Server/Flex/Help/BeyondInsightAndPasswordSafeAPIUserGuide.pdf

    b. Use the example style text from the Authorization Header section of the API guide. Only include the text to the right of "Authorization="

        Example: PS-Auth key=XXXXXXXX...XXXX; runas=demo;

 

How to invoke the script - BeyondInsightToPatch.ps1

 

1. Open PowerShell

2. Run BeyondInsightToPatch.ps1 or invoke it with the following mandatory parameters:

3. BeyondInsightToPatch -BtHostOrIpAddress '127.0.0.1' -SmartRuleId 10001 -ScanTemplate 'Demo' -DeployTemplate 'Agent Standard' -PatchGroupName 'Demo' -MachineGroupName 'Demo' -ScanName 'BT-Ivanti demo' -DeployMissingPatches $False

    a. BtHostOrIpAddress should be the current IPv4 address of the console VM. I've configured BI to allow 127.0.0.1

    b. SmartRuleId should be the smart asset group defined by BeyondInsight.

         I. 1 is the system group of All Assets

        II. 2 is the system group of All Workstations.

    c. DeployMissingPatches set to $True will actually download and deploy the patches to the machines in $MachineGroupName

4. If/when you see yellow warning messages like "WARNING: Cve item was not found: CVE-YYYY-NNNN", don't worry.

    a. It means we don't have that CVE in our (Ivanti Patch for Windows Servers content)

    b. The patch for the vulnerability may be in our content, but under a different CVE. We add all CVEs for all vulnerabilities to the Patch Group.

5. Open Patch for Windows Servers and view the full results of the patch scan/deployment. You'll see the scan result by $ScanName, date, and source of API in the left navigator.

Viewing all 2126 articles
Browse latest View live