Quantcast
Channel: Shavlik User Community : All Content - Ivanti Patch for Windows
Viewing all 2126 articles
Browse latest View live

Windows Update Service Is Required to Install Patches on Windows Vista and Later Windows Operating Systems

$
0
0

Description

 

Microsoft patches fail to deploy on the following operating systems:

 

  • Windows Vista
  • Windows Server 2008
  • Windows 7
  • Windows Server 2008 R2
  • Windows 8
  • Windows Server 2012
  • Windows 8.1
  • Windows Server 2012 R2
  • Windows 10 (all builds)
  • Windows Server 2016 (all builds)

 

When attempting to manually run a patch file copied to a target machine in C:\Windows\ProPatches\Patches you receive an error that the Windows Update service was not able to start or is not started.

You may also see an error return code of 1058 when deploying .msu patches.

 

Resolution

 

Windows Vista/2008 changed patching behavior. Windows Vista and later patches are of a file type .MSU and this file type requires the Windows Update Service to be enabled to execute. The Windows update application is not required, but the standalone service handles extraction and execution of MSU patches and must remain enabled. For more details: KB934307 

The Windows Update service must not be set to 'Disabled'. It does not explicitly need to be started, but it must be enabled. It can be set to 'Manual', 'Automatic-Delayed Start', or 'Automatic'.
Windows Automatic Updates should be set to never check for updates, please see this document for more information: Best Practice: Windows Automatic Updates

Affected Products

 

Shavlik Protect 9.x

Ivanti Patch for Windows Servers 9.3.x


Why is vmtools update from shavlik also installing C++ redistributable?

$
0
0

Shavlik for windows patching v9.2.

 

 

one of sys admin pushed some MS patching to VM (6.5) windows servers (2012R2 & 2016) that included vm tools updates.     when the sys admin started pushing just vm tools, we discovered that it was installing another patch that wasn't selected.

 

 

we noticed both in server app logs and add/remove programs that C++ redistributable (both 64 & 32 bit) installers are getting installed also. 

 

 

this doesn't happen via the virtual center (v 6.5) update.

 

 

is this something that is expected with Shavlik on updating vm tools (ver 10305-9)?

Troubleshooting Slow Patch Scans In Ivanti Patch for Windows Servers

$
0
0

Purpose

 

This document provides information to troubleshoot slow patch scans when using Ivanti Patch for Windows Servers (PWS).

 

Symptoms

 

Patch scans in Patch for Windows typically do not take a lot of time to complete. Patch scans that take longer than 5-10 minutes to complete may adversely impact the patch process. Such slow patch scans will typically point to environmental causes.

This article only applies to step number four of the scanning process (Scan for patches). If you have trouble with other steps during the scan process it will most likely be due to a different issue. For instance, if the scan never completes this likely is caused by a different issue, and this article would not apply.

 

Causes

 

There can be a number of causes of slow patch scans. The first thing you should look into is if there have been any recent changes - either to the console system or the network you are on.

 

Some of the most common causes of slow scans addressed in this article are:

- Insufficient system resources (RAM, CPU, etc.)

- Antivirus scanning- particularly those that perform on-access scans.

- Network/Latency issues (poor latency, scanning over WAN, etc.)

- Database issues - (lack of database maintenance, insufficient SQL server system resources, etc.)

 

Resolution

 

Possible issues that may need to be addressed:

 

Note: The "console system" refers to the system where you are running Ivanti Patch for Windows or Shavlik Protect.

 

1. Ensure that you are on the latest version/build of PWS.

Whenever we have a new version released there is a possibility that there may be bug fixes or product improvements which could help resolve your issue.

 

You can verify the latest version and download it from the following link:

https://go.ivanti.com/Web-Download-Patch-Windows.html

 

2. Make sure that your console system has enough resources to run your scans.

If you are scanning a high number of machines you may need to increase the CPU and/or memory available to the console system. Our hardware system requirements for processor and memory are as follows:

 

Processor/CPU:

  • Minimum: 2 processor cores 2 GHz or faster
  • Recommended: 4 processor cores 2 GHz or faster (for 250 - 1000 seat license)
  • High performance: 8 processor cores 2 GHz or faster (for 1000+ seat license)

Memory/RAM:

  • Minimum: 2 GB of RAM
  • Recommended: 4 GB of RAM (for 250 - 1000 seat license)
  • High performance: 8 GB of RAM (for 1000+ seat license)

 

For more information, see Protect Console System Hardware Performance Guidelines.

 

3. Antivirus or real-time threat protection software may be scanning our patch scan results as they are being sent back to the PWS console system.

 

Sometimes antivirus software, in particular those that perform on-access scanning may slow down the patch scan process. Most often we see these programs slow the process as the results are sent to the console's arrivals folder to be imported to the database.

 

Solution:

-Test disabling your antivirus/threat protection software to see if scans run faster while it's disabled.

-Create an exception in your Antivirus/threat protection for the following folder on the console machine:

C:\ProgramData\LANDesk\Shavlik Protect\Console\Arrivals


4. There may be network/configuration issues.

The most common issue is that high latency will cause scanning of remote systems to take a long time to complete. Things to check:

 

-Check the latency.

On your console system run a ping connecting to a target system. To do so click Start > Run > type CMD and hit enter, then enter the following command- ping [target machine name or ipaddress] i.e ping machine01 or ping 10.1.10.5.

pingedit.PNG

The higher the latency (the value next to time=), the longer you can expect the scan to take for Protect. High latency impacts scans due to the fact that our scan engine uses a separate connection for each check that is performed during the Dynamic Product Detection process.

 

-Is the scan taking place over a LAN connection or WAN connection?

Most often WAN connections will have much higher latency. As such, longer patch scans can be expected over WAN.

 

Workarounds available for latency/network issues:

-If you have many machines in other areas that the console system would be scanning over a WAN connection it may be best to install a second Protect console on a system that is local to those systems. You can then scan those systems over a LAN connection rather than over a high latency WAN connection to avoid these problems.

-You can install a PWS agent on systems to avoid slow scanning issues caused by network problems. The agent will run the scan locally on the client system so it avoids all network traffic while scanning.

-There is an option to change the number of simultaneous machines scanned during the scan process. To make this change you will need to create a custom patch scan template in PWS. On the 'General' tab under the template you can decrease the number of machines the scan will simultaneously run on. Dragging the bar to a lower number may help improve scan speeds. You will need to use your custom patch scan template to run a scan for this to take effect.

-It's possible it may help you to perform network monitoring during the scan. This would require a 3rd party network monitoring tool which we do not support.

 

5. Possible Database Issues

 

You will need SQL Server Management Studio to perform some of these checks. If you are using SQL Express you will most likely need to download the free Management Studio Express from Microsoft's download site. See the links below:
For SQL 2005 Express: http://www.microsoft.com/downloads/details.aspx?FamilyID=c243a5ae-4bd1-4e3d-94b8-5a0f62bf7796&displaylang=en

For SQL 2008 Express: http://www.microsoft.com/downloads/details.aspx?FamilyID=08e52ac2-1d62-45f6-9a4a-4b76a8564a2b&displaylang=en

For SQL 2008R2 Express: http://www.microsoft.com/download/en/details.aspx?id=22985

For SQL 2012 Express (Choose the management studio after clicking download): http://www.microsoft.com/en-us/download/details.aspx?id=29062

For more recent versions, click on your desired version here: SQL Server Management Studio Changelog/Downloads

 

  • Open Management Studio and connect to your SQL server. Expand 'Databases', and locate your 'Protect' or 'Shavlikscans' database. Right click on the database, and then go to Properties > General tab. Check the Size of your database. If your database is over 4GB in size, it's possible that you may need to perform database cleanup.
  • If you are using SQL Express there is a database size limitation built into SQL. Full versions of SQL are only limited by allocated space given by the DBA or space of the hard disk. The size limitations for currently support versions of SQL Express are as follows:
    • SQL Express 2005: 4GB size limit per database
      SQL Express 2008: 4GB size limit per database
      SQL Express 2008R2 and later: 10GB size limit per database
  • Perform database maintenance. You can now easily do this from within the PWS console under Tools > Options > Database Maintenance. If you are having slow scans take place it may help to delete as many old results as possible as well as perform the option to 'Rebuild Indexes'.
  • After this it may help to close PWS, go into SQL Management Studio, and perform the following steps: Right click on the Protect database and go to Properties > Options. Set the Recovery model to "Simple". Hit Ok. Then right click on the Protect database again and go to Tasks > Shrink > Database. This will help shrink the size of the database and the log file.

 

Whether the SQL server being used is remote or local can make a large impact as well. If the database is hosted on a remote server you may need to check into your network connection between the console system and the SQL server. If there is any latency or any network issues it could cause your scans to run slow.

 

6. Virtual Machine resource contention:
If you have the console running on a virtual machine make sure that the resources that the VM are trying to use are actually available in case you have other VM's running simultaneously that are possibly using all of the host server resources.

 

Affected Product(s)

Ivanti Patch for Windows Servers 9.3.x

Shavlik Protect 9.x

Custom patch reports - combining different report

$
0
0

Hi All,

 

We are using Shavlik Protect:

Ivanti Patch for Windows® Servers Standard (ST.Protect.exe): 9.3.4510.0

 

I need a detailed summary report for audit purposes and I have found a couple of reports that if combined will give me the information needed. However here are my setbacks:

1. When generating Deployment Status by machine report I have almost all the info, but if I export it to excel or .cvs format I get numbers instead of designated names - for example Vendor severity is no longer low, moderate, etc, but rather 2,3,4...

2. Naming of the columns are not clear: smachID; smachNotFoundReasonErrorNum; smachServerType; and see 1. While in PDF or original format all is "human" readable;

 

I have found the following document describing some of the queries used for generating reports:

https://help.ivanti.com/sh/help/en_US/PWS/92/rv-prt-9-2.pdf

However it seems a bit outdated and I was wondering if there is a updated version.

 

Ultimately what I'm looking for are the following columns:

                

Full
  Nodename(server
OS ClassSystem StatusSystem TypeTechnical OwnerBulletinPatch NameVendor SeverityPriorityPatch InstalledPatch ComplianceException ReasonDate ReleaseDate DueDate Installed
Server123WindowsVPC (in prod)serverVPC\some.nameMSNS18-05-4091664_V3Q4091664MediumHighYesyessome datesome datesome date

 

Note: I don't have access to SQL and I'm combining .cvs files into one detailed excel file.

 

The columns in red are missing or at least I can't find the naming convention in the .cvs files

 

Thank you in advance.

 

Kind regards,

Ivelin

Patch For Windows

$
0
0

Hello,

 

I come from an SCCM background and like the fact that the SCCM agent uses BITS (Background Intelligent File Transfer) to download content from SCM infrastructure.  This is very useful when clients disconnect from the corporate network halfway through a download, e.g. laptops.

 

What does Ivanti Patch for Windows use.

 

Is it BITS or some alternative, e.g. SMB.

 

Thanks

Available Reports

$
0
0

Available Reports

 

The following reports are available in Shavlik Protect. The reports you have access to is dependent upon your current license level.

 

To choose a report, select Tools > Create report from the main menu and then select a report from the drop-down list at the top of the Report Gallery dialog. The list is divided by the different types of security programs available within Shavlik Protect.

 

Report                                                                       Description

Seat License Status

This report provides information about the number of license seats available and the number of seats used.

Note: There is no filtering capability for this option.

Patch Reports

Condensed Patch Listing

A concise, six-column report displaying the machine name and patch status for each scanned host. Patch items are displayed as bulletin numbers (MS00-000).

Deployment Detail

This report provides detailed information about a particular patch deployment.

Deployment Percentage by Patch

This report displays the percentage of machines that have each patch installed. The percentage is based on the number of machines that require the patch.

Deployment Status by Deployment

This report provides information about the success or failure of one or more specified patch deployments.

Deployment Status by Machine

This report provides information about patch deployments made to one or more specified machines.

Detailed Summary

This report shows a summary of the scan, plus it provides a list that shows each machine that was scanned and detailed information about each machine.

Executive Summary

This report provides a high-level summary about the patches and the machines discovered by the scan.

Machine Inventory

This report provides a complete list of all software products installed on each machine discovered by the scan.

Machine Status by Patch Count

This report displays the number of machines in groups based on the number of missing patches.

Machine Status Summary

This report provides the patch status of each machine discovered by the scan.

Machine/OS Listing

This report lists the operating systems for each machine scanned.

Machines by Patch

Displays patch status for each machine sorted by Bulletin ID and QNumber.

Machines Not Scanned

This report lists all machines not scanned and the reason they were not scanned.

Missing SP

This report is a quick overview of all machines that are missing service packs for supported products. This report skips the simple criteria filter and displays the advanced criteria filter immediately.

Patch Annotation Information

This report lists all patch annotations.

Patch Criticality Information

This report lists all patches grouped by criticality. It allows a network administrator to quickly view the patches they have categorized as 'Critical' or 'High'.

 

 

Patch Listing

 

 

 

 

A concise listing (one line per patch processed) of all patches for all scanned machines sorted by 'Missing', 'Found', 'Informational' and 'Warning', then sorted by user preference.

Patch Status Summary

This report provides a descriptive summary about each patch discovered by the selected scan(s). The report includes both found and missing patches. Use the Next Page and Previous Page icons to navigate through the report.

Patches by Machine

Displays patch status for each machine sorted by machine name.

Patches by Machine Detail

A detailed listing of every patch found sorted by machine name. For each patch, the entire summary and reason is listed in the report. Note that this report can take very long if executed against thousands of computers.

Top Ten Missing Patches

This report lists the ten patches that are missing the most often.

Top Ten Vulnerable Machines

This report lists the ten most vulnerable machines discovered by the program during the selected scan(s). The machines with the most missing patches and service packs are judged to be the most vulnerable.

Deployment Percentage by Patch (IAVA)

(Available only if you have a Government Edition of Shavlik Protect.)

This report displays the percentage of machines that have each patch installed. The percentage is based on the number of machines that require the patch.

Detailed Summary (IAVA)

(Available only if you have a Government Edition of Shavlik Protect.)

This report gives a detailed scan summary.

Machine Status by Patch Count (IAVA)

(Available only if you have a Government Edition of Shavlik Protect.)

This report displays the number of machines in groups based on the number of missing patches.

Patch Status Detail (IAVA)

 

(Available only if you have a Government Edition of Shavlik Protect.)

This report gives detailed patch status information.

7 Day Executive Threat Summary

This report provides a high-level summary of all the detected and cleaned threats over the past seven days.

30 Day Executive Threat Summary

This report provides a high-level summary of all the detected and cleaned threats over the past 30 days.

Machine Threat Status

This report shows a summary of the threat scan, plus it provides a list that shows each machine that was scanned and detailed information about the threats detected on the target machines.

Threat Action Report

This report shows a list of all detected threats. The machines affected by each threat and the actions taken to eliminate each threat are also shown.

Threat Protection Status Report

This report displays both detailed and summary information on the threat protection status of an enterprise. Agent status, protection status, and definition version are reported for each machine.

 

Software Catalog Report

 

This report provides a list of all software installed on the scanned machines. The version number and install count information is displayed for each software product that is detected. If multiple versions of a product are detected, the machines using a particular version are listed in multiple columns.

Machine Hardware Detail Report

This report provides a detailed list of hardware assets on each machine.

Machine Software Detail Report

This report provides a detailed listing of software installed on each machine.

Virtual Machine Hardware Detail

This report provides a detailed list of the hardware properties of each virtual machine. The report is organized by virtual server.

Virtual Machine Memory Usage Report

This report provides a detailed list of the memory properties of each virtual machine. The report is organized by virtual server.

Virtual Machine Disk Usage Report

This report provides a detailed list of the disk properties of each virtual machine. The report is organized by virtual server.

Power Status Report

This report provides a list of machines and their power state at a specific time. The report is organized by machine group.

How To Use Advanced Reporting / Reports Advanced Filtering

$
0
0

Purpose

 

Administrators may find that the default reports may provide information that is less important to their patch process. There may be a need for information only regarding specific machines, patches, patch statuses, or other criteria.

 

Description

 

In Protect, choose Tools > Create Report.
In the Reports window choose your desired report in step 1.
In the Pick Filter Options, check the 'Use Advanced Filter' checkbox, and click Generate Report.

 

Reports window.png

 

The advanced filter options will load.

 

2-Generating report.png

 

 

 

In the Advanced Report Settings select the filtering type on the left, and then select the type's options on the right. When ready to generate the report, click Ok.

 

Example: The below screenshot will show the Condensed Patch Listing report filtered to only show patches that are found as Missing.

 

3-select options.png

 


Example: The following shows the difference between a non filtered report, and the same report when filtering for only missing patches.

 

4-non filtered report.png

 

 

Available Reports and filters:

Here is a list of the various Advanced Filter types and options available for each report.

  • Seat License Status -  No Filters

Patch Reports

  • Condensed Patch Listing
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Patches
      • Bulletin IDs
      • QNumbers
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
      • Patch Properties
        • Found
        • Missing
        • Warning
        • Effectively Installed
        • Informational
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
      • Machine Properties
    • Products
      • Product Names
      • Service Pack Names
  • Deployment Detail
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Patches
      • Bulletin IDs
      • QNumbers
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
      • Patch Properties
        • Found
        • Missing
        • Warning
        • Effectively Installed
        • Informational
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
      • Machine Properties
    • Products
      • Product Names
      • Service Pack Names
  • Deployment Percentage by Patch
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Consoles
      • Console Names
    • Patches
      • Bulletin IDs
      • QNumbers
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
      • Patch Properties
        • Found
        • Missing
        • Warning
        • Effectively Installed
        • Informational
    • Products
      • Product Names
      • Service Pack Names
  • Deployment Status by Deployment
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
  • Deployment Status by Machine
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Patches
      • Bulletin IDs
      • QNumbers
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
      • Machine Properties
  • Detailed Summary
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
  • Executive Summary
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Consoles
      • Console Names
  • Machine Inventory
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
    • Products
      • Product Names
  • Machine Status by Patch Count
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
  • Machine Status by Summary
    • Scan & Deployments
      • Scan Names
    • Consoles
      • Console Names
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
  • Machine/OS Listing
    • Scan & Deployments
      • Scan Names
      • Creation Dates
    • Machines
      • Machine Names
  • Machines by Patch
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Patches
      • Bulletin IDs
      • QNumbers
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
      • Patch Properties
        • Found
        • Missing
        • Warning
        • Effectively Installed
        • Informational
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
      • Machine Properties
    • Products
      • Product Names
      • Service Pack Names
  • Machines Not Scanned
    • Scans & Deployments
      • Creation Dates
  • Missing SP
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
      • Machine Properties
    • Products
      • Product Names
      • Service Pack Names
  • Patch Annotation Information
    • Patches
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
      • Patch Properties
        • Found
        • Missing
        • Warning
        • Effectively Installed
        • Informational
    • Products
      • Product Names
      • Service Pack Names
  • Patch Criticality Information
    • Patches
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
      • Patch Properties
        • Found
        • Missing
        • Warning
        • Effectively Installed
        • Informational
    • Products
      • Product Names
      • Service Pack Names
  • Patch Listing
    • Scan & Deployments
      • Scan Names
    • Patches
      • Bulletin IDs
      • QNumbers
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
      • Patch Properties
        • Found
        • Missing
        • Warning
        • Effectively Installed
        • Informational
    • Machines
      • Domains
    • Products
      • Product Names
      • Service Pack Names
  • Patch Status Detail
    • Scan & Deployments
      • Scan Names
    • Patches
      • Bulletin IDs
      • QNumbers
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
      • Patch Properties
        • Found
        • Missing
        • Warning
        • Effectively Installed
        • Informational
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
      • Machine Properties
    • Products
      • Product Names
      • Service Pack Names
  • Patch Status Summary
    • Scan & Deployments
      • Scan Names
    • Patches
      • Bulletin IDs
      • QNumbers
  • Patches by Machine
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Patches
      • Bulletin IDs
      • QNumbers
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
      • Patch Properties
        • Found
        • Missing
        • Warning
        • Effectively Installed
        • Informational
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
      • Machine Properties
    • Products
      • Product Names
      • Service Pack Names
  • Patches by Machine Detail
    • Scan & Deployments
      • Scan Names
    • Patches
      • Bulletin IDs
      • QNumbers
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
      • Patch Properties
        • Found
        • Missing
        • Warning
        • Effectively Installed
        • Informational
    • Machines
      • Domains
    • Products
      • Product Names
      • Service Pack Names
  • Top Ten Missing Patches - No Filters
  • Top Ten Vulnerable Machines - No Filters
  • Deployment Percentage by Patch (IAVA)
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Consoles
      • Console Names
    • Patches
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
    • Products
      • Product Names
      • Service Pack Names
  • Detailed Summary (IAVA)
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
  • Machine Status by Patch Count (IAVA)
    • Scan & Deployments
      • Scan Names
      • Creator Names
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
  • Patch Status Detail (IAVA)
    • Scan & Deployments
      • Scan Names
    • Patches
      • Severity
        • Critcial
        • Important
        • Moderate
        • Low
        • Not Set
      • Patch Properties
        • Found
        • Missing
        • Warning
        • Effectively Installed
        • Informational
    • Machines
      • Domains
      • IP Addresses
      • Machine Names
      • Machine Properties
    • Products
      • Product Names

Threat Reports

  • 7 Day Executive Threat Summary - No Filters
  • 30 Day Executive Threat Summary - No Filters
  • Machine Threat Status
    • Scans & Remediations
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • Machine Names
  • Threat Action Report
    • Scans & Remediations
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • Machine Names
  • Threat Protection Status Report
    • Consoles
      • Console Names
    • Machines
      • Domains
      • Machine Names

Asset Reports

  • Software Catalog Report
    • Consoles
      • Console Names
    • Machines
      • Domains
  • Machine Hardware Detail Report
    • Scans
      • Scan Names
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • Machine Names
  • Machine Software Detail Report
    • Scans
      • Scan Names
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • Machine Names
  • Virtual Machine Hardware Detail
    • Scans
      • Scan Names
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • Machine Names
  • Virtual Machine Memory Usage Report
    • Scans
      • Scan Names
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • Machine Names
  • Virtual Machine Disk Usage Report
    • Scans
      • Scan Names
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • Machine Names

Power Status Reports

  • Power Status Report
    • Scans
      • Scan Names
      • Creator Names
      • Creation Dates
    • Consoles
      • Console Names
    • Machines
      • Domains
      • Machine Names

 

Affected Product(s)

 

Shavlik Protect 9.x

 

 

 

 

Multiple RDS/Citrix servers haven't patched

$
0
0

I'm after some help please,

All of our RDS and citrix servers failed to patch last night see screenshot below

 

 

I've tried checking STDeploy.log but as you can see from the date modified below it hasn't been updated

 

 

Any suggestions on where to check please ? Many Thanks


PWS Agent causing laptop to freeze at startup?

$
0
0

Hi everyone, we have recently implemented PWS 2018 and deployed agents to the end user laptops. A lot of the end users are now complaining that their laptops are freezing before the welcome screen, after the welcome screen and after windows loaded at desktop screen. We have disabled Asset Scan on the agent, and Patch Scan is scheduled to be on Fridays. Because of the freezing, we have to uninstall the agents from the users' laptops. Just wondering if anybody in the community have encountered similar situation. The end user's os are win 10 and win 7.

How do you handle name changes?

$
0
0

With the now never-ending required OS changes from Microsoft and the constant re imaging and renaming machines, I am wondering if anyone has developed a workable solution to the 45 day expiration requirement of an Ivanti license seat. While Ivanti has been helpful and provided me with some temporary seats, I can see where future upgrades and replacements of machines will become an issue.

 

We want to patch a machine as soon as it is on the network, this of course requires it be given a name that hopefully it will keep for some duration, but often is not.  When systems are swapped out, say a workstation for a tablet to the same user, the name changes to reflex the machine type, and using another license.

 

I am looking for methods to better control this, even if it means retraining techs and changing procedures, but wondered if anyone has had success with a specific process for such a moving target.

Which one is better Ivanti Patch for Windows or Microsoft SCCM ?

$
0
0

Any input in that, I have done POC for Ivanti Patch for Windows and Microsoft SCCM both, I found Ivanti as light,sleek and easy to use. Any Pro's and Con's will be helpful.

Need to know "patch compliance" - Shavlik doesn't seem to have good way to do so

$
0
0

As a Manager, I want to know when all of my workstations are in compliance with a specific level of patching. Ivanti said the only way to know that is if the server can scan the endpoint. That doesn't work if 1) the computer isn't on the network at the same time we perform that scan and 2) the computer is never on the network to have a scan complete. Is a successful scan from the server the ONLY way to have the agent report in? There are no built in reports that provide what I need. Others must have found a way to do what I'm looking for. Can you please help. Thanks.

Agent Scan vs Agentless Scan (which takes more resources)?

$
0
0

We currently are using agents on our desktops and manage all our servers as "agentless".

 

A question that came up recently to a very time sensitive high availability set of servers, is how resource intensive are security patch scans on the systems in a machine group? There is a concern that running scans throughout the day while these systems are needed could cause a theoretical slowdown. Let me know your thoughts and experiences!!

July Exchange patching havoc

Keeping track of EOL software

$
0
0

Hello,

 

Does Ivanti or anyone have any recommendations on keeping track of software that is no longer supported?

 

Up until recently we were deploying Adobe Reader XI and only just found out that support was ended last year. Adobe Acrobat Reader DC has since replaced it.

 

Thanks,


New version/build of Ivanti Patch for Windows Servers

$
0
0

Last build 9.3.4510 (9.3 Update 1) was released 10/02/2017. When is anew build or version coming out? Whats new features or fixed bugs will be included?

Unable to scan error 201 Network connection error

$
0
0

Hello

 

I am unable to scan 2 servers , i always get error 201. I tried troubleshoot with all i got on the web without succes.

The ports are open, test existence/credential are ok, the firewall is ok, tried with different credentials and the issue is persistent. I can acces c$ on both machines.

 

I also tried to add those 2 servers on another shavlik machine and the issue is exactly the same.

All the Scanning  Prerequisites looks ok to me

 

Any ideas ? Thx

how to add offline Agent to a Machine Group

$
0
0

Hello,

we organized our Workstations based ob departments from our company.  So we basicly created multiple machine groups wich are linked with OUs from our domain.

Now we are facing the followin issure:

 

We are not able to add systems which are currently offline/powered off.

When we try for example an enerygy status scan we can see the new System in the result list (with the status - system not found).
But when we change the view to the machine groups we notify that the system not added to the group.

 

So what can we do to add offline/powered off machines to its machine groups without powering on.

Ivanti Patch for Windows Servers API integration with the Qualys vulnerability scanner

$
0
0

Purpose

 

The following is a sample integration script for the Ivanti Patch for Windows Servers API integration with the Qualys vulnerability scanner.

 

If you use a vulnerability scanner to identify weaknesses in your network, the scanner may detect hundreds or even thousands of issues on your machines. At first this might seem a bit overwhelming, but what’s likely happening is that the vulnerability scanner is simply producing a lot of noise. The scanner is assessing for CVEs (Common Vulnerabilities and Exposures) explicitly.  In reality a software update will often include many CVEs.  A patch can also be superseded or replaced by a newer update.  What this tends to cause is the Vulnerability Assessment reflecting hundreds of vulnerabilities that can be resolved by updating just a few software titles on a system.

 

To address this, you can use the API to::

 

  • Make calls to the vulnerability scanner
  • Extract the vulnerability list (consisting of CVEs)
  • Import those CVEs into a Ivanti Patch for Windows Servers patch group via the Patch Group API
  • Perform patch scans and deployments using that patch group
  • The patch engine will take into account any superseded patches and will identify the handful of patches that are required to bring the target system into compliance. If you rerun the vulnerability scanner after deploying the patches, the vulnerability count should be greatly reduced.

 

Overview

The API feature is meant for advanced users who have a working knowledge of PowerShell and who want to perform tasks beyond those available through the Ivanti Patch for Windows Servers user interface. The PS script needs run from the Patch for Windows Servers console server.

 

  • The script and supporting files can be downloaded from here: QualysToPatch_API.zip (attached to this document)
    • Extract the contents to it's own folder on C:\. For example C:\QualysToPatch_API
  • The copy tool curl is required for this to work. You can download this tool from here: curl 7.56.1
    • Extract the contents of the CAB files to it's own folder on C:\. For example: C:\curl

 

1. Edit the variables in the UpdateLocalQualysFiles.bat. This batch file is used to download data files directly from the Qualys content servers.

a. SET CURLPATH=C:\curl\curl.exe - Set the location of your curl.exe.

b. SET LOCALDATA="C:\QualysToPatch_API\Qualys" - Set the location of your Qualys scripts.

c. SET PLATFORM=qualysapi.qg3.apps.qualys.com - Specify host you were assigned when you setup your Qualys account.

d. SET USER="user:pass" - Set a username and password for your Qualys account.

 

2. Run UpdateLocalQualysFiles.bat to get the latest data from Qualys.  This will download the data files directly from the Qualys content servers and place them in the location specified in the batch file.

 

3. Run the script: (Scan)

    > . .\QualysToIvanti.ps1

    > QualysToIvanti -machinesXmlFile C:\QualysToPatch_API\hosts.xml -qualysKbXmlFile C:\QualysToPatch_API\qualyskb.xml -ScanTemplate 'Demo' -DeployTemplate 'Agent Standard' -PatchGroupName 'Demo' -MachineGroupName 'Demo' -ScanName 'Qualys-Ivanti demo' -DeployMissingPatches $False

 

4. You can choose not to perform a scan and update a Patch Group in Patch for Windows Servers.

    > . .\QualysToIvantiPatchGroup.ps1

    > QualysToIvantiPatchGroup -machinesXmlFile "C:\QualysToPatch_API\hosts.xml" -qualysKbXmlFile "C:\QualysToPatch_API\qualyskb.xml" -PatchGroupName 'Demo'

Scheduled Console task kicked off week early

$
0
0

I am having an issue with schedules kicking off a week early.  See screenshot.  My schedule is set to 3rd Tuesday but it ran last night and it scheduled to run again next week.

 

This is the second occurrence this has happened that i have noticed.  It may have been happening before but I only noticed it once I started running check-reboot scripts in tandem.  Last time was when the 1st of the month was Thursday and it affected my (3rd Tuesday + 2 Day) schedules.

Viewing all 2126 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>