Quantcast
Channel: Shavlik User Community : All Content - Ivanti Patch for Windows
Viewing all 2126 articles
Browse latest View live

Meltdown patch, enable features, registry script?

$
0
0

During the webinar scripting the required registry changes to enable the patch changes was discussed.

I see a reference to scripting for checking the AV registry changes in a previous discussion.

 

Has Ivanti developed a script to make the registry changes required to enable the patch features?

 

Also, in the chat window, it was indicated that one could run the script to enable the features prior to patching, thus eliminating the second reboot.  Is that correct?

 

Thanks,

Joe


Forticlient

$
0
0

We use Ivanti Protect patch management for patching our VM servers.  We would like to rollout a new version of the Fortinet client to the servers as a patch/distribution so that we can coordinate reboots within our maintenance window.  Is this possible to do?  Unfortunately, Fortinet is not listed in the Software Distribution list, where this would likely go..

 

Thanks in advance,

Steve

Security Tool: Implement registry keys per Windows Server guidance to protect against speculative execution side-channel vulnerabilities

$
0
0

Purpose

 

The Ivanti Content Team created a Security Tool to help implement the required registry keys discussed in the Microsoft article linked below.  This document will step through the configuration to specifically target the new Security Tool and deploy it your clients.

 

Windows Server guidance to protect against speculative execution side-channel vulnerabilities

 

"Microsoft is aware of a new publicly disclosed class of vulnerabilities that are referred to as “speculative execution side-channel attacks” that affect many modern processors and operating systems, including chipsets from Intel, AMD, and ARM. Microsoft has not yet received any information to indicate that these vulnerabilities have been used to attack customers. Microsoft continues working closely with industry partners including chip makers, hardware OEMs, and app vendors to protect customers. To get all available protections, hardware or firmware updates and software updates are required. This includes microcode from device OEMs and, in some cases, updates to antivirus software."
As we are unable to completely test the impact of adding these registry keys per Microsoft guidance, we highly recommend testing this in your test labs before pushing to production.  One known side affect of implementing this will be a performance decrease.

 

Instructions

 

You will be creating a Scan Template and Patch Group to specifically target this Security Tool.  This will allow you to scan with automatic deployment without having to worry about installing other Security Tools we offer.  We will be offering 2 Security Tools, one to implement the registry keys and another to remove the registry keys.

 

  • IVA18-001 Q4072698: This tool enables the fix for ADV180002
  • IVA18-001 Q4072698U: This tool disables the fix for ADV180002

 

Creating the Patch Group

 

A Patch Group contains a list of patches you can use to use as a baseline (to scan for) or use to exclude from scan results. We will be using a Patch Group as a baseline to scan for IVA18-001 Q4072698.

 

1. Navigate to New > Patch Group.  Enter a Name for the Patch Group and optionally a Description. Click Save.

 

2. Search for IVA18-001 or 4072698. Right-click on the Security Tool IVA18-001 Q4072698 and choose Add to Patch Group then choose the Patch Group you created.

 

3. The Patch Group is created and can be added to the Patch Scan Template, close the Patches window.

 

Creating the Patch Scan Template

 

The Scan Template, along with your new Patch Group will help you scan for the new Security Tool.

 

1. Navigate to New > Patch Scan Template

 

2. Give the Scan Template a Name, matching the Patch Group Name is advisable.

 

3. In the Baseline or Exceptions section, choose Baseline and check-mark your Patch Group. (no other filtering is needed)

 

4. The Scan Template should look similar to this:

 

 

5. The Patch Scan Template is created, Click Save.

 

Scanning for the Security Tool

 

The setup is complete, you can use your new Patch Scan Template to scan for the new Security Tool IVA18-001 Q4072698. The Security Tool will show missing on systems that do not have the registry keys on them and can be deployed like a regular update.  A reboot is required.

 

Additional Information

 

  • The target systems need to be restarted after running the Security Tools to enable or disable the registry keys for the changes to take effect.
  • You can follow these instructions to scan for the uninstall Security Tool by creating a Patch Group including the IVA18-001 Q4072698U version of the tool.

 

Affected Product(s)

 

Ivanti Patch for Windows Servers 9.3.x

Shavlik Protect 9.2.x

Server Performance Post Spectre/Meltdown

$
0
0

Just curious if anybody has seen any performance impact after applying the latest MS patches?

Shavlik Patch and Patching in Workgroup

$
0
0

We have a server that was joined to our domain but we have now moved it to our DMZ and set it to workgroup instead of domain member.  When we try to scan getting error 261; we confirmed that the required ports are open.  Is there by chance a known issue with having servers joined to a domain but then set to work group having problems with being patched by Shavlik?

 

Regards,

 

Michael 

MS12-001 KB2644615 Showing as Missing After the Installation of MS15-A02 KB3033929

$
0
0

Symptoms

 

After applying MS15-A02 KB3033929, the patch MS12-001 KB2644615 is now showing as missing.

 

Cause

 

The introduction of MS15-A02 in March 2015 opened up a security hole that is addressed by the installation of MS12-001 KB2644615 or MS13-063  KB2859537.

Resolution

 

Deploy MS12-001 KB2644615 based on the scan results from Shavlik Protect or download the install file for MS13-063 KB2859537 and manually run the file on the target machine

 

Affected Product(s)

 

Protect 9.X

agent installed on 250 workstation, only 35 respond normally

$
0
0

It started last December.  Must of my computer are not accessible with the agent.

But I can scan and Push Manually the patches

If I right click one computer that have the agent and try a ( Check-in request )

I get <<Agent did not respond>>. anything I tried like from the console ex: Update Binary (get Agent didn't respond, but is up-to-date)

I check Manage Machine Properties , Port : 3389 and Credential are Normal like the rest of the computer where it is working.

I tried view Scheduled Task, Got a popup refresh machine....

The scheduler on machine 10.1.24.25 is not available -2080374779 - unknown error (0x84000005) The list of jobs currently scheduled on 'computerneme' is unreadable

Then I tried ''Upgrade scheduler now'' with the right admin credential.

 

Got unother popup :

Atleast one of your credentials can no longer be decrypted. PLease edit or delete every credential with a 'Username' of 'None' in the credential manager.

 

I am stuck here  and not sure if I can delete the credential ?

 

Tks

 

Dan

Security Tool: Implement the QualityCompat registry key that enables Windows security updates released on January 3, 2018

$
0
0

Purpose

 

The Ivanti Content Team has created a Security Tool to help implement the QualityCompat registry key that enables deployment of the Windows security updates released on January 3, 2018. This document will step through the configuration to specifically target the new Security Tool and deploy it your clients.

Adding this registry key on machines that have out-of-date AV could cause BSOD's. As we are unable to completely test the impact of adding these registry keys or installing the OOB security updates per Microsoft guidance, we highly recommend testing this in your test labs before pushing to production.

 

 

Instructions

 

You will be creating a Scan Template and Patch Group to specifically target this Security Tool. This will allow you to scan with automatic deployment without having to worry about installing other Security Tools we offer.  We will be offering 2 Security Tools, one to implement the registry key and another to remove the registry key.

 

  • IVA18-002 Q4072699: This tool adds the QualityCompat registry key
  • IVA18-002 Q4072699U: This tool removes the QualityCompat registry key

 

Creating the Patch Group

 

A Patch Group contains a list of patches you can use to use as a baseline (to scan for) or use to exclude from scan results. We will be using a Patch Group as a baseline to scan for IVA18-002 Q4072699.

 

1. Navigate to New > Patch Group.  Enter a Name for the Patch Group and optionally a Description. Click Save.

2. Search for IVA18-002 or 4072699. Right-click on the Security Tool IVA18-002 Q4072699 and choose Add to Patch Group then choose the Patch Group you created.

 

3. The Patch Group is created and can be added to the Patch Scan Template, close the Patches window.

 

Creating the Patch Scan Template

 

The Scan Template, along with your new Patch Group will help you scan for the new Security Tool.

 

1. Navigate to New > Patch Scan Template

 

2. Give the Scan Template a Name, matching the Patch Group Name is advisable.

 

3. In the Baseline or Exceptions section, choose Baseline and check-mark your Patch Group. (no other filtering is needed)

 

4. The Scan Template should look similar to this:

 

5. The Patch Scan Template is created, Click Save.

 

Scanning for the Security Tool

 

The setup is complete, you can use your new Patch Scan Template to scan for the new Security Tool IVA18-002 Q4072699. The Security Tool will show missing on systems that do not have the registry key on them and can be deployed like a regular update.

 

Additional Information

 

  • You can follow these instructions to scan for the uninstall Security Tool by creating a Patch Group including the IVA18-002 Q4072699U version of the tool.

 

Affected Product(s)

 

Ivanti Patch for Windows Servers 9.3.x

Shavlik Protect 9.2.x


January kb4056897 & kb4056898 Require Registry keys to activate Patch.

$
0
0

January KB4056897 & KB4056898 both require registry keys to activate patch.   ( Server OS only)

Is there any guidance on including this in the push?  Or Is Ivanti creating a custom patch to set these keys?

 

Thanks  

Tim

How To: Use a Custom Action to add required registry key for deploying Windows Security OOB updates release January 3, 2018

$
0
0
We have released a Security Tool to add the registry key to your target systems.  A Custom Action is no longer needed.  For more information:
Security Tool: Implement the QualityCompat registry key that enables Windows security updates released on January 3, 2018


Purpose

 

As of January 3rd 2018, Microsoft is now requiring a registry key to be added to machines for addressing compatibility issues with a small number of anti-virus software products.

More information on this can be found here: Important information on detection logic for the Intel 'Meltdown' security vulnerability

 

Description

Adding this registry key on machines that have out-of-date AV could cause BSOD's. Please use this custom action at your own risk.

See Microsoft link for further details: https://support.microsoft.com/en-us/help/4072699/important-information-regarding-the-windows-security-updates-released

1.  Download and extract the attached zip below or here to get the batch file used for adding the registry key.

 

2.  Create a new Patch Scan Template that scans for only Custom Actions. (this will allow you run this against machine with no missing patches)

 

 

 

3.  Create a new Deployment Template.

 

 

4.  Name the template. Ex: Intel Meltdown Registry Key

 

 

4.  Click on Post-deploy Reboot. Change the reboot option to 'Never reboot after deployment'.

 

 

5. Click on Custom Actions. Click 'New'. A prompt to save the template will be presented. Click 'Save'.

 

 

6. The first action will push the batch file. Ensure that step 3 states 'Push File', and then select the batch file from the local machine. Click 'Save' when completed.

 

 

7. Click 'New' once more. Change Step 3 to 'After All Patches' and use the following command in Step 4: Call %pathtofixes%addregkey.bat

 

 

8. Click 'Save' twice to finish creating the Deployment Template.

 

9. Use the new Scan Template to scan your target machines.

 

 

10. Once the scan is completed, click 'View Results'

 

 

11. The results will offer our nullpatch.exe for deployment. Proceed by right-clicking the patch and clicking 'Deploy all missing patches'.

 

 

12. Select the new Deployment Template created earlier. Click 'Deploy' to start the deployment.

 

 

13. Open regedit to validate the registry key was added.

 

 

Additional Information

 

How To: Perform a Custom Action Complete Tutorial with Custom Actions

 

Affected Product(s)

 

Shavlik Protect 9.2

Ivanti Patch for Windows Servers 9.3

Security Tool: Implement registry keys per Windows Server guidance to protect against speculative execution side-channel vulnerabilities

$
0
0

Purpose

 

The Ivanti Content Team created a Security Tool to help implement the required registry keys discussed in the Microsoft article linked below.  This document will step through the configuration to specifically target the new Security Tool and deploy it your clients.

 

Windows Server guidance to protect against speculative execution side-channel vulnerabilities

 

"Microsoft is aware of a new publicly disclosed class of vulnerabilities that are referred to as “speculative execution side-channel attacks” that affect many modern processors and operating systems, including chipsets from Intel, AMD, and ARM. Microsoft has not yet received any information to indicate that these vulnerabilities have been used to attack customers. Microsoft continues working closely with industry partners including chip makers, hardware OEMs, and app vendors to protect customers. To get all available protections, hardware or firmware updates and software updates are required. This includes microcode from device OEMs and, in some cases, updates to antivirus software."
As we are unable to completely test the impact of adding these registry keys per Microsoft guidance, we highly recommend testing this in your test labs before pushing to production.  One known side affect of implementing this will be a performance decrease.

 

Instructions

 

You will be creating a Scan Template and Patch Group to specifically target this Security Tool.  This will allow you to scan with automatic deployment without having to worry about installing other Security Tools we offer.  We will be offering 2 Security Tools, one to implement the registry keys and another to remove the registry keys.

 

  • IVA18-001 Q4072698: This tool enables the fix for ADV180002
  • IVA18-001 Q4072698U: This tool disables the fix for ADV180002

 

Creating the Patch Group

 

A Patch Group contains a list of patches you can use to use as a baseline (to scan for) or use to exclude from scan results. We will be using a Patch Group as a baseline to scan for IVA18-001 Q4072698.

 

1. Navigate to New > Patch Group.  Enter a Name for the Patch Group and optionally a Description. Click Save.

 

2. Search for IVA18-001 or 4072698. Right-click on the Security Tool IVA18-001 Q4072698 and choose Add to Patch Group then choose the Patch Group you created.

 

3. The Patch Group is created and can be added to the Patch Scan Template, close the Patches window.

 

Creating the Patch Scan Template

 

The Scan Template, along with your new Patch Group will help you scan for the new Security Tool.

 

1. Navigate to New > Patch Scan Template

 

2. Give the Scan Template a Name, matching the Patch Group Name is advisable.

 

3. In the Baseline or Exceptions section, choose Baseline and check-mark your Patch Group. (no other filtering is needed)

 

4. The Scan Template should look similar to this:

 

 

5. The Patch Scan Template is created, Click Save.

 

Scanning for the Security Tool

 

The setup is complete, you can use your new Patch Scan Template to scan for the new Security Tool IVA18-001 Q4072698. The Security Tool will show missing on systems that do not have the registry keys on them and can be deployed like a regular update.  A reboot is required.

 

Additional Information

 

  • The target systems need to be restarted after running the Security Tools to enable or disable the registry keys for the changes to take effect.
  • You can follow these instructions to scan for the uninstall Security Tool by creating a Patch Group including the IVA18-001 Q4072698U version of the tool.

 

Affected Product(s)

 

Ivanti Patch for Windows Servers 9.3.x

Shavlik Protect 9.2.x

Update to patching Citrix Receiver

$
0
0

Overview

 

We are changing how we handle patching for Citrix Receiver to better match up with Citrix's lifecycle process. The changes we are making are:

 

Versions less than 4.9: Systems running versions of Citrix Receiver prior to version 4.9 will detect as previously, with the newest patch being offered updating the software to version 4.9 which is the Long Term Service Release (LTSR) of Citrix Receiver.

 

Version 4.9: As this is the LTSR release it will have any Cumulative Updates marked as applicable for it, but it will not have the update to version 4.10 marked as applicable. If you want to upgrade to 4.10 from 4.9, 4.10 will be available as a Software Distribution as a separate branch, similar to how major version updates are handled currently of Java Runtime Environment.

 

Due to the fact that Citrix only provides links for token based downloads of previous versions of Citrix Receiver we are unable to automatically download the files for the LTSR updates. The patches will need to be manually downloaded and added to the patch repository as detailed in the following document: How To: Supply and Deploy Patches That Can No Longer Be Downloaded

 

For Citrix Receiver 4.9, the latest version can be found here: https://www.citrix.com/downloads/citrix-receiver/windows-ltsr/receiver-for-windows-ltsr_4_9_1000.html

Version 4.10: As this is the current release, and the start of a new branch, it will have updates marked as applicable as they are released up to the point of the next LTSR release of Citrix Receiver. At this point a new branch will be created, with versions between 4.10 and the next LTSR being offered updates to the LTSR version.

 

Additional Information

 

 

Affected Product(s)

 

Shavlik Protect 9.2.x

Protect SDK 9.2.x

Ivanti Patch for Windows Servers 9.3.x

Patches That Always Show Missing In Results - Install/Uninstall Loops

$
0
0

Symptoms

 

  • Detected patch continues to show as missing after successfully deploying.
  • Patch that shows missing ends with 'U' every other deployment.

 

Cause

 

Certain patches exist as an installer and an uninstaller; these patches can cause a loop when scanning and deploying. When the installation patch is deployed it makes the uninstall patch considered to be missing. These patches are designed by their vendor in this manner to facilitate adding/removing the patch according to environmental needs. If scanning/deploying these types of patches it may appear that the patch continually is missing as it continues to add/remove per deployment. The uninstall patch will end with 'U'. These patches tend to belong to the 'Security Tools' patch type.

 

Example: Missing the Installation Patch

Missing Install Patch.png

 

Example: After Installed, Now Missing Uninstall Patch

missing uninstaller.png

 

Resolution

 

Exclude the specific patch utilizing a patch group, or choose not to deploy the patches installer/uninstaller after scanning.

 

Refer to the following document:

How To:  Include or Exclude Specific Patches in Scan Results

How To: Include or Exclude Specific Patches in Scan Results

 

These are known patches that offer an uninstaller.

  • Q2719615(U) - MS12-A04
  • Q2719662(U) - MS12-A06
  • Q2794220(U) - MS12-A10
  • Q2847140(U) - MS13-A02
  • Q2887505(U) - MS13-A08
  • Q2896666(U) - MS13-A09
  • QIE9001(U) - MSIE-002
  • Q4072698(U) - IVA18-001
  • Q4072699(U) - IVA18-002

 

Affected Product(s)

 

Shavlik Protect 9.x

Patch Deployment

$
0
0

Hi Team

 

During Patch Tuesday week, we patch our IT machines before our scheduled deployment on the weekend. We patch our machines, and they reboot as per normal, is there way to stop the second reboot on the weekend when the scheduled patches run, as the machine have been patched.

 

Thanks

 

Hemal

Slow patching of Windows Server 2016?

$
0
0

I realize this is probably more of a Microsoft issue, but has anyone else noticed dramatically slower deployment of patches to Server 2016 servers compared to 2008 R2/2012 R2?

 

We are seeing patching take almost an hour to deploy when with older versions it was 10-15 minutes.  Windows update is disabled and turning off A/V results in no change.  It's similar to complaints found in the technet forums:

 

what's with the really slow windows updates on 2016?

 

-Keith


Supported Operating Systems for Ivanti Patch for Windows Servers

$
0
0

Purpose

 

The purpose of this document is to list the currently supported operating systems for Ivanti Patch for Windows Servers 9.3.

 

Description

 

Agentless scanning for operating systems: (32- and 64-bit versions of any of the following)

  • Windows XP Professional (Note: Can deploy patches to Windows XP Family SP3 or later)
  • Windows XP Tablet PC Edition • Windows XP Embedded
  • Windows Server 2003, Enterprise Edition (Note: Can deploy patches to Windows Server 2003 Family SP2 or later)
  • Windows Server 2003, Standard Edition
  • Windows Server 2003, Web Edition
  • Windows Server 2003 for Small Business Server
  • Windows Server 2003, Datacenter Edition
  • Windows Vista, Business Edition
  • Windows Vista, Enterprise Edition
  • Windows Vista, Ultimate Edition
  • Windows 7, Professional Edition
  • Windows 7, Enterprise Edition
  • Windows 7, Ultimate Edition
  • Windows Server 2008, Standard
  • Windows Server 2008, Enterprise
  • Windows Server 2008, Datacenter
  • Windows Server 2008, Standard - Core
  • Windows Server 2008, Enterprise - Core
  • Windows Server 2008, Datacenter – Core
  • Windows Server 2008 R2, Standard
  • Windows Server 2008 R2, Enterprise
  • Windows Server 2008 R2, Datacenter
  • Windows Server 2008 R2, Standard - Core
  • Windows Server 2008 R2, Enterprise - Core
  • Windows Server 2008 R2, Datacenter - Core
  • Windows 8
  • Windows 8 Pro
  • Windows 8 Enterprise
  • Windows 8.1
  • Windows 8.1 Enterprise
  • Windows Server 2012, Foundation Edition
  • Windows Server 2012, Essentials Edition
  • Windows Server 2012, Standard Edition
  • Windows Server 2012, Datacenter Edition
  • Windows Server 2012 R2, Essentials Edition
  • Windows Server 2012 R2, Standard Edition
  • Windows Server 2012 R2, Datacenter Edition
  • Windows 10 Pro
  • Windows 10 Enterprise
  • Windows 10 Education
  • Windows Server 2016, Essentials Edition
  • Windows Server 2016, Standard Edition (excluding Server Core and Nano Server)
  • Windows Server 2016, Datacenter Edition (excluding Server Core and Nano Server)

 

Clients running with an agent: (64bit only)

  • Windows Vista Family
  • Windows 7 Family
  • Windows 8 Family, excluding Windows RT
  • Windows 10 Family
  • Windows Server 2008 Family
  • Windows Server 2008 Family R2
  • Windows Server 2012 Family
  • Windows Server 2012 Family R2
  • Windows Server 2016 Family

 

Additional Information

 

Affected Product(s)

 

Ivanti Patch for Windows Servers 9.3

Firewall and Proxy Exceptions URL List - Shavlik Protect/Ivanti Patch for Windows Servers (01/09/2018)

$
0
0

Overview

 

This article provides a list of required web addresses for the Protect application to allow:

 

  • Patch files fail to download
  • Patch definitions fail to update
  • Activation or License Refresh fails
  • Home page RSS feed fails to load
  • Product check for update fails

 

URL List

 

Protect and Patch for Windows Servers require these URLs to be accessible through firewalls, proxies and web filters:

 

ftp://ftp.adobe.com
ftp://ftp.attglobal.net
ftp://ftp.winzip.com
ftp://mozilla.stu.edu.tw
ftp://releases.mozilla.org
http://34e34375d0b7c22eafcf-c0a4be9b34fe09958cbea1670de70e9b.r87.cf1.rackcdn.com
http://a1540.g.akamai.net
http://aimp.su
http://airdownload.adobe.com
http://app.oldfoss.com
http://app.oldfoss.com:81
http://appldnld.apple.com
http://appldnld.apple.com.edgesuite.net
http://archive.apache.org
http://ardownload.adobe.com
http://au.v4.download.windowsupdate.com
http://azure.download.pdfforge.org
http://bitbucket.org
http://cache.lumension.com
http://cache.pack.google.com
http://cache-download.real.com
http://ccmdl.adobe.com
http://cdn01.foxitsoftware.com
http://cdn02.foxitsoftware.com
http://cdn04.foxitsoftware.com
http://cdn09.foxitsoftware.com
http://cdn1.evernote.com
http://classicshell.net
http://content.ivanti.com
http://content.rim.com.edgesuite.net
http://d.7-zip.org
http://dist.divx.com
http://dl.google.com
http://dl2.xmind.net
http://dl3.xmind.net
http://download.accusoft.com
http://download.adobe.com
http://download.autodesk.com
http://download.betanews.com
http://download.cdburnerxp.se
http://download.documentfoundation.org
http://download.dymo.com
http://download.filezilla-project.org
http://download.gimp.org
http://download.imgburn.com
http://download.macromedia.com
http://download.microsoft.com
http://download.newaol.com
http://download.nullsoft.com
http://download.oldfoss.com
http://download.oldfoss.com:81
http://download.pdfforge.org
http://download.piriform.com
http://download.royalapplications.com
http://download.skype.com
http://download.splunk.com
http://download.teamviewer.com
http://download.techsmith.com
http://download.videolan.org
http://download.virtualbox.org
http://download.windowsupdate.com
http://download.winzip.com
http://download1.operacdn.com
http://download2.operacdn.com
http://download3.operacdn.com
http://download3.vmware.com
http://download3.xnview.com
http://download4.operacdn.com
http://download-akm.skype.com
http://downloadarchive.documentfoundation.org
http://download-origin.cdn.mozilla.net
http://downloads.hpe.com
http://downloads.pdf-xchange.com
http://downloads.sourceforge.net
http://downloadus1.teamviewer.com
http://downloadus2.teamviewer.com
http://en.community.dell.com
http://files2.zimbra.com
http://fpdownload.macromedia.com
http://ftp.adobe.com
http://ftp.gimp.org
http://ftp.opera.com
http://ftp.osuosl.org
http://g.live.com
http://get.geo.opera.com
http://get.geo.opera.com.global.prod.fastly.net
http://get.videolan.org
http://gigenet.dl.osdn.jp
http://hotfixv4.microsoft.com
http://install.nitropdf.com
http://jaist.dl.sourceforge.net
http://javadl.oracle.com
http://javadl.sun.com
http://jsimlo.sk
http://knowledge.autodesk.com
http://localhost
http://localhostnt4w
http://mirror.clarkson.edu
http://mirror.nexcess.net
http://mirror6.layerjet.com
http://mirrors.syringanetworks.net
http://mozilla.stu.edu.tw
http://mozy.com
http://olive.download.pdfforge.org
http://openoffice.cs.utah.edu
http://operasoftware.pc.cdn.bitgravity.com
http://orange.download.pdfforge.org
http://osdn.dl.osdn.jp
http://packages.vmware.com
http://pnotepad.googlecode.com
http://prodesigntools.com
http://pspad.poradna.net
http://pumath.dl.osdn.jp
http://purple.download.pdfforge.org
http://qtinstall.info.apple.com
http://releases.mozilla.org
http://silverlight.dlservice.microsoft.com
http://software-dl.real.com
http://sourceforge.net
http://superb-dca2.dl.sourceforge.net
http://support.citrix.com
http://support.citrixonline.com
http://supportdownload.apple.com
http://swupdl.adobe.com
http://tcpdiag.dl.sourceforge.net
http://teal.download.pdfforge.org
http://tenet.dl.sourceforge.net
http://ufpr.dl.sourceforge.net
http://up.autodesk.com
http://upgrade.skype.com
http://us.download.nvidia.com
http://videolan-mirror.vpsserver.com
http://white.download.pdfforge.org
http://wl.dlservice.microsoft.com
http://www.7-zip.org
http://www.aimp.ru
http://www.coreftp.com
http://www.cutepdf.com
http://www.dotpdn.com
http://www.download.windowsupdate.com
http://www.filesetups.com
http://www.fosshub.com
http://www.getpaint.net
http://www.goodsync.com
http://www.jam-software.com
http://www.microsoft.com
http://www.mirrorservice.org
http://www.oldfoss.com
http://www.peazip.org
http://www.piriform.com
http://www.rarlab.com
http://www.realvnc.com
http://www.tightvnc.com
http://www.uvnc.com
http://www.uvnc.eu
http://www.wireshark.org
http://xh.yimg.com
http://xml.shavlik.com
https://2.na.dl.wireshark.org
https://airdownload.adobe.com
https://allwaysync.com
https://assets.cdngetgo.com
https://astuteinternet.dl.sourceforge.net
https://atlassian.jfrog.io
https://ayera.dl.sourceforge.net
https://bitbucket.org
https://cdn.gomlab.com
https://cdn1.evernote.com
https://clientupdates.dropboxstatic.com
https://cytranet.dl.sourceforge.net
https://d1ilhw0800yew8.cloudfront.net
https://data-cdn.mbamupdates.com
https://desktopassets.prezi.com
https://dl.bandicam.com
https://dl.google.com
https://dl.tvcdn.de
https://dl3.xmind.net
https://download.cdburnerxp.se
https://download.gimp.org
https://download.microsoft.com
https://download.royalapplications.com
https://download.skype.com
https://download.splunk.com
https://download.sublimetext.com
https://download.teamviewer.com
https://download.techsmith.com
https://download.tortoisegit.org
https://download.visualstudio.microsoft.com
https://download3.vmware.com
https://download3.xnview.com
https://downloadmirror.intel.com
https://downloadplugins.citrix.com
https://downloads.arduino.cc
https://downloads.bluebeam.com
https://downloads.hpe.com
https://downloads.plex.tv
https://downloads.sourceforge.net
https://downloadus1.teamviewer.com
https://downloadus2.teamviewer.com
https://downloadus4.teamviewer.com
https://e3.boxcdn.net
https://endpoint920510.azureedge.net
https://files.zimbra.com
https://fpdownload.macromedia.com
https://get.geo.opera.com
https://gigenet.dl.sourceforge.net
https://github.com
https://hipchat-ops.s3.amazonaws.com
https://iweb.dl.sourceforge.net
https://knowledge.autodesk.com
https://launch.getgo.com
https://managedway.dl.sourceforge.net
https://master.dl.sourceforge.net
https://media.inkscape.org
https://meetings.webex.com
https://na19.salesforce.com
https://neevia.com
https://nmap.org
https://nodejs.org
https://notepad-plus-plus.org
https://packages.vmware.com
https://phoenixnap.dl.sourceforge.net
https://pilotfiber.dl.sourceforge.net
https://pkware.cachefly.net
https://s3.amazonaws.com
https://secure.logmein.com
https://secure.mozy.com
https://secure-appldnld.apple.com
https://slack-ssb-updates.global.ssl.fastly.net
https://sourceforge.net
https://storage.googleapis.com
https://superb-dca2.dl.sourceforge.net
https://superb-sea2.dl.sourceforge.net
https://support.citrix.com
https://support.microsoft.com
https://svwh.dl.sourceforge.net
https://swdl.bluejeans.com
https://technet.microsoft.com
https://telerik-fiddler.s3.amazonaws.com
https://the.earth.li
https://vorboss.dl.sourceforge.net
https://web.mit.edu
https://www.citrix.com
https://www.dotpdn.com
https://www.fosshub.com
https://www.goodsync.com
https://www.hipchat.com
https://www.jam-software.com
https://www.microsoft.com
https://www.mozypro.com
https://www.piriform.com
https://www.rarlab.com
https://www.realvnc.com
https://www.scootersoftware.com
https://www.telerik.com
https://www.tracker-software.com
https://www.uvnc.eu
https://www.wireshark.org
vhttps://www.microsoft.com

 

If you require the IP addresses to create exceptions, you can ping the site for the current IP address or contact the vendor directly to obtain this information.  We are unable to list the IP addresses due to the varied dynamic IP addresses being used by the vendors.

Affected Product(s)

 

Shavlik Protect, All versions

Ivanti Patch For Windows Servers, All versions

With "Remove temp files" checked, tracker doesn't get updated that job is done

$
0
0

I've been doing some test pushes of the IVA18-002 tool using 9.3.0 build 4510 and came across an issue.

 

The tracker never gets the final updates, so it still says "Deployment opearation executing", even though the patch progress is executed.

 

I think there's either a timing or order of operations issue..

Dplyevts.log shows some successful updates as the files are pushed, job schedule, started, but it fails at the end.

STdeploy.log shows the file clean up, which happens before the last update to track is supposed to be sent.

(snips below)

 

So is this a bug? (e.g. the order got changed?) or just a timing thing because its one small patch???

 

 

 

 

 

 

Here's a snip from dplyevts.log with a few successful updatesand then the failed one:

 

2018-01-17T17:29:01.9336112Z 0d2c I TrackerAddress.cpp:49 Read 2 messages from 'e294d7ce-7f0e-4da1-a9de-8ae9357ea0d6.tracker'.

2018-01-17T17:29:01.9336112Z 0d2c I DplyEvts.cpp:291 PingBack updates code - tracker(https://e294d7ce-7f0e-4da1-a9de-8ae9357ea0d6:3121/ST/Console/Deployment/Tracker/v92)  deploymentId(e294d7ce-7f0e-4da1-a9de-8ae9357ea0d6), machineId(28672), status(43), failure(false), terminal(false).

2018-01-17T17:29:01.9336112Z 0d2c I SequenceState.cpp:30 Sequence state file 'C:\WINDOWS\ProPatches\Installation\InstallationSandbox#2018-01-17-T-17-28-21\e294d7ce-7f0e-4da1-a9de-8ae9357ea0d6.sequence.txt' does not exist, reverting sequence to default.

2018-01-17T17:29:01.9336112Z 0d2c I PingBack.cpp:53 Sending data to 'https://SHAVLIK1:3121/ST/Console/Deployment/Tracker/v92'.

2018-01-17T17:29:01.9336112Z 0d2c W HttpDownload.cpp:560 IE Proxy not found: 2.

2018-01-17T17:29:01.9336112Z 0d2c E HttpDownload.cpp:492 AttemptIEProxySession failed.

2018-01-17T17:29:02.1052134Z 0d2c I TrackerAddress.cpp:49 Read 2 messages from 'e294d7ce-7f0e-4da1-a9de-8ae9357ea0d6.tracker'.

2018-01-17T17:29:02.1052134Z 0d2c I DplyEvts.cpp:244 PingBack updates no code - tracker(https://e294d7ce-7f0e-4da1-a9de-8ae9357ea0d6:3121/ST/Console/Deployment/Tracker/v92)  deploymentId(e294d7ce-7f0e-4da1-a9de-8ae9357ea0d6), machineId(28672), patchId(143123), status(4), failure(false), terminal(false).

2018-01-17T17:29:02.1052134Z 0d2c I SequenceState.cpp:48 Read sequence 15001 from 'C:\WINDOWS\ProPatches\Installation\InstallationSandbox#2018-01-17-T-17-28-21\e294d7ce-7f0e-4da1-a9de-8ae9357ea0d6.sequence.txt'.

2018-01-17T17:29:02.1052134Z 0d2c I PingBack.cpp:53 Sending data to 'https://SHAVLIK1:3121/ST/Console/Deployment/Tracker/v92'.

2018-01-17T17:29:02.1208136Z 0d2c W HttpDownload.cpp:560 IE Proxy not found: 2.

2018-01-17T17:29:02.1208136Z 0d2c E HttpDownload.cpp:492 AttemptIEProxySession failed.

2018-01-17T17:29:02.4952184Z 0d2c I TrackerAddress.cpp:49 Read 2 messages from 'e294d7ce-7f0e-4da1-a9de-8ae9357ea0d6.tracker'.

2018-01-17T17:29:02.4952184Z 0d2c I DplyEvts.cpp:266 PingBack updates code - tracker(https://e294d7ce-7f0e-4da1-a9de-8ae9357ea0d6:3121/ST/Console/Deployment/Tracker/v92)  deploymentId(e294d7ce-7f0e-4da1-a9de-8ae9357ea0d6), machineId(28672), patchId(143123), status(5), failure(false), terminal(true), returnCode(0).

2018-01-17T17:29:02.4952184Z 0d2c I SequenceState.cpp:48 Read sequence 15002 from 'C:\WINDOWS\ProPatches\Installation\InstallationSandbox#2018-01-17-T-17-28-21\e294d7ce-7f0e-4da1-a9de-8ae9357ea0d6.sequence.txt'.

2018-01-17T17:29:02.4952184Z 0d2c I PingBack.cpp:53 Sending data to 'https://SHAVLIK1:3121/ST/Console/Deployment/Tracker/v92'.

2018-01-17T17:29:02.5108186Z 0d2c W HttpDownload.cpp:560 IE Proxy not found: 2.

2018-01-17T17:29:02.5108186Z 0d2c E HttpDownload.cpp:492 AttemptIEProxySession failed.

2018-01-17T17:29:02.7136212Z 0d2c I DplyEvts.cpp:70 Checking for necessary services.

2018-01-17T17:29:03.7432344Z 0d2c I DplyEvts.cpp:54 SvcIsRunning service name: LanmanServer, status: Running.

2018-01-17T17:29:03.7432344Z 0d2c I DplyEvts.cpp:54 SvcIsRunning service name: LanmanWorkstation, status: Running.

2018-01-17T17:29:03.7432344Z 0d2c I DplyEvts.cpp:54 SvcIsRunning service name: RemoteRegistry, status: Running.

2018-01-17T17:29:03.7432344Z 0d2c E TrackerAddress.cpp:34 Tracker address file 'C:\WINDOWS\ProPatches\Installation\InstallationSandbox#2018-01-17-T-17-28-21\e294d7ce-7f0e-4da1-a9de-8ae9357ea0d6.tracker' does not exist.

2018-01-17T17:29:03.7432344Z 0d2c I DplyEvts.cpp:291 PingBack updates code - tracker(https://e294d7ce-7f0e-4da1-a9de-8ae9357ea0d6:3121/ST/Console/Deployment/Tracker/v92)  deploymentId(e294d7ce-7f0e-4da1-a9de-8ae9357ea0d6), machineId(28672), status(99), failure(false), terminal(true).

2018-01-17T17:29:03.7432344Z 0d2c I SequenceState.cpp:30 Sequence state file 'C:\WINDOWS\ProPatches\Installation\InstallationSandbox#2018-01-17-T-17-28-21\e294d7ce-7f0e-4da1-a9de-8ae9357ea0d6.sequence.txt' does not exist, reverting sequence to default.

2018-01-17T17:29:03.7432344Z 0d2c W HttpDownload.cpp:560 IE Proxy not found: 2.

2018-01-17T17:29:03.7432344Z 0d2c E HttpDownload.cpp:492 AttemptIEProxySession failed.

2018-01-17T17:29:03.7432344Z 0d2c E HttpDownload.cpp:1029 WinHttpSendRequest failed: 12007.

2018-01-17T17:29:03.7432344Z 0d2c E HttpDownload.cpp:500 AttemptStraightSession failed.

 

 

 

And here's the STDEPLOY.LOG with the deletion happening just before the last tracker update

 

2018-01-17T17:29:02.5888196Z 0d2c I STPackageDeployer.cpp:1236 Patch file 'C:\WINDOWS\ProPatches\Patches\KB4072699.exe' install operation completed. Cooked result='5'. RebootRequired='false'

2018-01-17T17:29:02.5888196Z 0d2c I STPackageDeployer.cpp:1964 Done deploying patches...

2018-01-17T17:29:02.5888196Z 0d2c I STPackageDeployer.cpp:1966 Deploying product instances patches...

2018-01-17T17:29:02.5888196Z 0d2c I STPackageDeployer.cpp:2006 Done deploying product instances patches...

2018-01-17T17:29:02.5888196Z 0d2c W SingleInstanceLock.cpp:28 Waiting for another deployment to finish.

2018-01-17T17:29:02.5888196Z 0d2c I SingleInstanceLock.cpp:36 Exclusively continuing deployment.

2018-01-17T17:29:02.5888196Z 0d2c V STPackageDeployer.cpp:85 Initiating patch store servicing.

2018-01-17T17:29:02.5888196Z 0d2c V STPackageDeployer.cpp:106 Patch store servicing complete.

2018-01-17T17:29:02.5888196Z 0d2c I STPackageDeployer.cpp:1336 Postboot actions filename='PostBootTasks.xml' does not exist on the file system

2018-01-17T17:29:02.5888196Z 0d2c I STPackageDeployer.cpp:1342 Remove temp files flag is set. Pingbacks pending='false'. Sandbox cleanup deferred if true.

2018-01-17T17:29:02.5888196Z 0d2c V Sandbox.cpp:66 DoSandboxCleanup: Deleted file='C:\WINDOWS\ProPatches\Patches\KB4072699.exe'

2018-01-17T17:29:02.5888196Z 0d2c V Sandbox.cpp:66 DoSandboxCleanup: Deleted file='C:\WINDOWS\ProPatches\Installation\InstallationSandbox#2018-01-17-T-17-28-21\7z.dll'

2018-01-17T17:29:02.7136212Z 0d2c V Sandbox.cpp:66 DoSandboxCleanup: Deleted file='C:\WINDOWS\ProPatches\Installation\InstallationSandbox#2018-01-17-T-17-28-21\cl5.exe'

2018-01-17T17:29:02.7136212Z 0d2c V Sandbox.cpp:66 DoSandboxCleanup: Deleted file='C:\WINDOWS\ProPatches\Installation\InstallationSandbox#2018-01-17-T-17-28-21\deployPackage-28672.zip'

2018-01-17T17:29:02.7136212Z 0d2c I Sandbox.cpp:75 DoSandboxCleanup: Cannot delete filename='C:\WINDOWS\ProPatches\Installation\InstallationSandbox#2018-01-17-T-17-28-21\dplyevts.dll', file in use. Scheduled delete at next bootup.

2018-01-17T17:29:02.7136212Z 0d2c V Sandbox.cpp:66 DoSandboxCleanup: Deleted file='C:\WINDOWS\ProPatches\Installation\InstallationSandbox#2018-01-17-T-17-28-21\e294d7ce-7f0e-4da1-a9de-8ae9357ea0d6.sequence.txt'

2018-01-17T17:29:02.7136212Z 0d2c V Sandbox.cpp:66 DoSandboxCleanup: Deleted file='C:\WINDOWS\ProPatches\Installation\InstallationSandbox#2018-01-17-T-17-28-21\e294d7ce-7f0e-4da1-a9de-8ae9357ea0d6.tracker'

2018-01-17T17:29:02.7136212Z 0d2c V Sandbox.cpp:66 DoSandboxCleanup: Deleted file='C:\WINDOWS\ProPatches\Installation\InstallationSandbox#2018-01-17-T-17-28-21\InstallPatches-28672.bat'

2018-01-17T17:29:02.7136212Z 0d2c V Sandbox.cpp:66 DoSandboxCleanup: Deleted file='C:\WINDOWS\ProPatches\Installation\InstallationSandbox#2018-01-17-T-17-28-21\KB4072699.exe_install.bat'

2018-01-17T17:29:02.7136212Z 0d2c V Sandbox.cpp:66 DoSandboxCleanup: Deleted file='C:\WINDOWS\ProPatches\Installation\InstallationSandbox#2018-01-17-T-17-28-21\safereboot.exe'

2018-01-17T17:29:02.7136212Z 0d2c V Sandbox.cpp:66 DoSandboxCleanup: Deleted file='C:\WINDOWS\ProPatches\Installation\InstallationSandbox#2018-01-17-T-17-28-21\safereboot64.exe'

2018-01-17T17:29:02.7136212Z 0d2c I Sandbox.cpp:75 DoSandboxCleanup: Cannot delete filename='C:\WINDOWS\ProPatches\Installation\InstallationSandbox#2018-01-17-T-17-28-21\stdeploy.exe', file in use. Scheduled delete at next bootup.

2018-01-17T17:29:02.7136212Z 0d2c V Sandbox.cpp:66 DoSandboxCleanup: Deleted file='C:\WINDOWS\ProPatches\Installation\InstallationSandbox#2018-01-17-T-17-28-21\stdeploy.exe.config'

2018-01-17T17:29:02.7136212Z 0d2c V Sandbox.cpp:66 DoSandboxCleanup: Deleted file='C:\WINDOWS\ProPatches\Installation\InstallationSandbox#2018-01-17-T-17-28-21\STDeployerCore.dll'

2018-01-17T17:29:02.7136212Z 0d2c V Sandbox.cpp:66 DoSandboxCleanup: Deleted file='C:\WINDOWS\ProPatches\Installation\InstallationSandbox#2018-01-17-T-17-28-21\ToDelete.txt'

2018-01-17T17:29:02.7136212Z 0d2c E STPackageDeployer.cpp:507 Reboot disallowed or not required. externalRebootOption = '2', deployer requested reboot: false

2018-01-17T17:29:02.7136212Z 0d2c V DeployStatusReporter.cpp:128 Queueing online machine status msg. DeploymentId='e294d7ce-7f0e-4da1-a9de-8ae9357ea0d6', machineId='28672', status='99', isFinal='true'

2018-01-17T17:29:02.7136212Z 0d2c S StatusClient.cpp:109 Entering STDeployment::CStatusClient::ReportMachineStatusOnline.

2018-01-17T17:29:03.7432344Z 0d2c V SchedClt.cpp:148 CSchedClt(): schedulerType=1, jobCreator=STPackageDeployer, jobName=LaunchSTDeployForOnlineStatusRetry (e294d7ce-7f0e-4da1-a9de-8ae9357ea0d6), comment=Schedule STDeploy.exe to retry status reports..

2018-01-17T17:29:03.7432344Z 0d2c I STPackageDeployer.cpp:1002 'STDeploy.exe package="deployPackage-28672.zip" relaunchSandbox="C:\WINDOWS\ProPatches\Installation\InstallationSandbox#2018-01-17-T-17-28-21" relaunchReason="finalStatusRetry=1"' scheduled to in 5 minutes.

2018-01-17T17:29:03.7432344Z 0d2c S DeployExeStates.cpp:409 Leaving STDeploy::CInitialExecutionPackageDeploy::DoStatefulRemediateActions.

2018-01-17T17:29:03.7432344Z 0d2c I STDeploy.cpp:365 Current remediation phase completed. Process exit code: 0.

2018-01-17T17:29:03.7432344Z 0d2c S STDeploy.cpp:257 Leaving wmain.

January kb4056897 & kb4056898 Require Registry keys to activate Patch.

$
0
0

January KB4056897 & KB4056898 both require registry keys to activate patch.   ( Server OS only)

Is there any guidance on including this in the push?  Or Is Ivanti creating a custom patch to set these keys?

 

Thanks  

Tim

Non-Internet facing console scan failures

$
0
0

I have multiple consoles on three networks, all on WinServer 2012R2, all at Ivanti Patch 9.3.  Once a month (or more depending on urgency) I move files from Datafiles on an Internet facing console to that folder on the non-Internet facing console.  This month's transfer is not working.  When I attempt the first scan after copying the datafiles in, all the steps turn red with the error 'Failed to update the database with new definitions.'

 

I went back to the December datafiles and a scan worked fine.  I've updated the deployment credentials, used different credentials, copied and transferred datafiles over from a different console, but get the same results.

 

Any ideas?

 

dwhit5555

Viewing all 2126 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>