Quantcast
Channel: Ivanti User Community : Document List - Patch Manager
Viewing all 446 articles
Browse latest View live

Next Gen Microsoft Windows Vulnerabilities (beta) is not shown in the Patch Manager > Download updates > Windows > Vulnerabilities

$
0
0

Next Gen Microsoft Windows Vulnerabilities (beta) is not shown in the Patch Manager > Download updates > Windows > Vulnerabilities

 

screenshot epm 2017.3 download updates updates tab.PNG

 

To resolve the issue, click on and select "Microsoft Windows Vulnerabilites", click on button "Apply" and click on the button "Download now".

 

screenshot epm 2017.3 download updates updates tab selected windows vulnerabilities.PNG

 

Once the download completes, go back to "Download updates" and the definition type "Next Gen Microsoft Windows Vulnerabilities ( beta ) will be shown.

screenshot epm 2017.3 download updates updates tab next gen microsoft windows vulnerabilities beta ticked.PNG


EPM version 2017.3 Verification - Verify definition signatures/hashes before downloading

$
0
0

EPM version 2017.3 Verification - Verify definition signatures/hashes before downloading option is enabled by default and it cannot be disabled.

 

EPM version 2017.3 Management Console > Tools > Security and Compliance > Patch and compliance > Download updates > tab Content > Verification

 

Verify definition signatures/hashes before downloading

 

NOTE: When checked, any definitions that do not have a valid SHA256 hash will not be downloaded. Also, any lists of definitions that do not have a valid signature will not be processed. The download progress form will show any download failures due to invalid/missing signatures or hashes.

 

 

screenshot epm 2017.3 download updates content verification gray.png

Ivanti Endpoint Manager and Endpoint Security - Security and Compliance Frequently Asked Questions

$
0
0

Ivanti Endpoint Manager and Endpoint Security - Security and Compliance

NEW! About the New Patch Engine in Ivanti Endpoint Manager

How to patch Office 365

  Introduction to Patch Manager - LANDESK Patch Manager 2016

About LDMS 2016 new Patch and Compliance features

How to patch and manage Windows 10 using LANDESK Security and Patch Manager

How to patch Office365 Click-to-Run installations efficiently with LANDESK

How to upgrade to Windows 10 Anniversary Edition using Ivanti Patch and Compliance

How to troubleshoot a Patch and Compliance (vulnerability) scan

How to patch and manage Windows 10 using LANDESK Security and Patch Manager

 

 

 

How to report LANDESK Patch Manager definition issues to technical support
How to report LANDESK Patch Manager vulnerability detection problems to support
How to request new content be added to Patch and Compliance Manager

 

 

Remember, the LANDESK Help site is a valuable source of information!

 

Important Notices

 

LANDESK support program for Windows XP and Server 2003 patch content

 

How To'sIssues

How to get started with Patch Manager in LDMS 9.6

How to change the default Patch Location for Security and Patch Managerd

How to change the Default Distribution and Patch Settings

How to change the default Patch Location for Security and Patch Manager

How to change the number of Security Scan logs kept on a managed device

How to create a Custom Vulnerability Definition in Security and Compliance Manager

How to create a Pre-Cached Repair / Staged Repair

How to establish a Patch and Compliance Baseline Patch Group

How to exclude a managed device from applying patches

How to export patch definitions to a Dark Core (a core server with no internet access)

How to leverage Linux vendor tools to remediate vulnerabilities

How to manage superseded patches in Security and Compliance Manager

How to patch and manage Windows 10 using LANDESK Security and Patch Manager

How To: Repair Patches as a Specific User or "Run as Administrator"

How to repair vulnerabilities using a pre-cache task (install from local cached file or peers instead of from the source…

How to reset security scan local scheduler settings using a managed script

How to retain more vulscan logs before they are overwritten

How to Scan and/or Repair against a custom group

How to Scan for Specific Patches

How to schedule a Security Scan

How to set autofix attempt times before giving up

How to set up a Core Server to download patches for other cores with limited internet access (Dark Core)

How to speed up patching by disabling creation of restore points per each single update

How to start CBA8 with custom definition

How to troubleshoot a Patch and Compliance (vulnerability) scan

How to troubleshoot Core Server patch content download issues

How to troubleshoot detection problems in LANDESK

How to troubleshoot high CPU usage from the W3WP process for LDAppVulnerability

How to troubleshoot IIS using Log Parser Studio from Microsoft

How to troubleshoot Patch Manager detection and remediation issues

How to troubleshoot the Patch and Compliance Manager client scan and repair process

How to uninstall old Java versions with LDMS Patch and Compliance

How to uninstall Patches through Patch Manager

How to upgrade Software Using Patch Manager

How to upgrade to Internet Explorer 11 using Patch Manager

How to use Application Blocking in LDMS 9.6 Patch and Compliance Manager

How to use autofix in Security and Compliance Manager

How to use Custom Groups to repair groups of computers

How To: Use the Patch Cleanup Option in the Download Updates Tool in Patch and Compliance Manager

How to Use Manually Downloaded Patches

How to use Patch Manager to deploy a LANDESK Service Pack

How to use Security and Compliance Manager to deploy a Component Patch

How to use VBScript in the detection rule of a Custom Vulnerability

How to use VBScript in the Patch Installation & Removal (repair) section of a Custom Vulnerability

How to utilize LANDESK to Disable/Enable Windows Automatic Updates

How to view installed updates for Windows using WMIC

Issue: "Create custom definition" icon is greyed out in the Patch and Compliance tool.

Issue: Additional file in custom patch is not downloaded to same directory as the patch

Issue: Affected Computers window doesn't display any results

Issue: After upgrading to LDMS 9.6 the 'Download updates' screen still shows 9.5 content

Issue: Agent Continually Prompts for Reboot

Issue: Autofix no longer repairing vulnerabilities

Issue: Cannot open vulscan logs folder from the command line using "vulscan e"

Issue: Copied repair patch tasks will not delete

Issue: Definition types missing from the download updates window.

Issue: Download Updates options missing or show "Do Not Remove"

Issue: Download updates settings revert back to original options

Issue: Downloaded status next to a definition rule does not show correct status

Issue: Gather Historical Information task is failing to run in Management Suite 9.6.

Issue: Google Chrome not detected as an installed application on Windows Server in Security and Compliance Manager

Issue: High CPU load and slow patch deployment using LANDESK Patch Manager

Issue: Java Update Leaves Old Build Installed

Issue: KB# is showing up in Windows Update but not in LANDESK Patch Manager

Issue: Last Vulnerability (or other type) scan date is not updated in Inventory

Issue: Message "No Patches Available" in Scheduled Task status after scheduling repair task

Issue: Microsoft Hotfixes aren't included by default in LANDESK Security and Patch Manager

Issue: Patch Manager Configuration loses settings inside the Download Updates window

Issue: Patch Manager is not installing all of the patches that show up in Windows Update

Issue: Patch severity mismatch between Microsoft and LANDESK

Issue: Patches are downloaded in different languages

Issue: Patches failing to download with the message "Skipping old or disabled patch"

Issue: Patches show as both detected and installed

Issue: PatchHistory database table is very large and causing a strain on SQL resources

Issue: Reboot prompt shows hours until Automatic Reboot

Issue: Repair tasks not showing after Portal refreshes

Issue: Scanned and Detected numbers are not updating or are incorrect in Patch Manager

Issue: Security and Compliance Manager (Vulscan) window blank

Issue: Skype updates are not installing depending on the version

Issue: Special characters not working in unique filename path for Patch Information section of Custom Definitions

Issue: Unable to Download More Than 100 Vulnerabilities at a Time

Issue: Unable to download or install .MSU patches through Patch Manager

Issue: Unable to log in to Windows after applying Blocked Applications

Issue: Unable to schedule and start a patch content download

Issue: Very few patches are detected for Windows 2012 server managed nodes

Issue: Vulnerability Scans are not updating on the core

Issue: Vulscan cannot connect to the vulcore.asmx service on the Core Server

Issue: Vulscan is not applying agent setting changes or is using an incorrect agent setting

Issue: Vulscan stuck in a loop following deployment of SP1 for LDMS 9.5

Issue: Windows 7 and 2008 clients are blue screening when using Application Blocking

IIssue: Windows Devices in another AD domain do not get Patches applied

 

 

InformationErrors

About an update & improvement to the LANDeskScan.DLL notification

About Autofix and Scan by Scope changes in LDMS 9.6

About content verification in LANDESK Patch Manager

About IIS Virtual Directories and File Permissions for Security and Patch Manager

About LANDESK Distribution and Patch settings

About LANDESK Patch Content severity levels

About LANDESK Patch Manager and Antivirus return codes

About LANDESK Security and Compliance Manager content

About manually downloaded patch definitions

About Patch and Compliance content vulnerability definition title suffixes

About Patch Codes for Inventory

About Patch Manager 9.6 new permissions options for editing and importing definitions

About Patch Manager Auto Update

About Patch Manager vulnerability information and the processes that affect it

About Patching: 101 - A simple, effective method of patching

About the "Gather Historical Information" task in Ivanti EPM Patch and Compliance Manager

About the "Patch-only settings" inside "Distribution and Patch Settings"

About the "Use 64-bit registry view on 64-bit windows" setting within Patch and Compliance definition rules

About the Checksum and Hash types used in Patch Manager definitions

About the Compliance group in Security and Compliance Manager

About the icons in the Security and Compliance tool

About the LANDESK support program for Windows XP and Server 2003 patch content

About the LDMS 9.5 and 9.6 Patch Manager database schema

About the Patch Manager definition rules processing order

About the Registry Keys that are checked to see if a reboot is needed

About the security and compliance scan (vulscan) log files

About the Vulnerability scan and repair logs

Error "Unable to get the setting from core" when running security scan (Vulscan.exe)

Error: "0x8db30194" (404) from vulscan

Error: "0x8db3019c All Patches Failed" in Vulscan log file

Error: "1314" when installing a patch or application through Patch Manager

Error: "8004005" when patching Microsoft Office installs

Error: "Cannot complete the requested action. The device must be rebooted first." when running vulnerability repair job

Error: "Client user does not have administrator rights" when running Vulnerability Scan

Error: "Core could not find a file" when running vulscan on clients

Error: "Could not establish trust relationship for the SSL/TLS secure channel error" when downloading patch definitions

Error: "Error writing scripting file. Please verify access privilege" when running vulnerability repair job

Error: "Failed to apply compliance settings" during vulnerability scan

Error: "Failed to download all additional files" when repairing a vulnerability using a Policy method

Error: "Failed. Cannot Interpret Data" when running a Security and Compliance scan

Error: "Hash for patch does not match with host. Discarding" when downloading Patch Content

Error: "HTTP Error 403" / Vulscan Return Code 433

Error: "Invalid column name 'scan' when downloading content after Service Pack installation

Error: "Invalid XML file 951_updates.xml. There is an error in XML document (2, 2)" when downloading Antivirus definitio…

Error: "Length of LOB data (XXXXXX) to be replicated exceeds configured maximum 500000" when downloading updates

Error: "No uninstall instructions. Patch is not installed." when uninstalling a patch

Error: "Node's reported ID is not in the database"

Error: "RunPatches ERROR: Download failed (80072f76)" when repairing vulnerability

Error: "Server Busy" when running a Vulnerability Scan

Error: "Unable to find string with ID message" in Vulscan UI

Error: "Unable to get custom variable overrides"

Error: "You have not specified a site from which to download updates" when downloading updates in Patch Manager

How to upgrade to Windows 10 Anniversary Edition using Ivanti Patch and Compliance

$
0
0

This article describes how to use Ivanti Patch and Compliance to upgrade to Windows 10 Anniversary Edition

 

For information about upgrading to Windows 10 Creators Edition (1703) see How to upgrade to Windows 10 Creators Edition using Ivanti Patch Manager

 

Windows 10 Anniversary Edition is also known as Windows 10 RS1 or Windows 10 1607.

 

Goal

 

Upgrade the clients to Windows 10 version 1607.

 

Steps

 

These steps use the Ivanti Patch and Compliance Manager definition called "W10V1607". A prerequisite for installing this version to a client computer is that the target computer must have 2GB of memory or higher.  If the client computer does not have 2GB of memory or higher it will be detected but it will not attempt to install the update.

 

  1. Download or otherwise acquire the Windows 1607 media for the version of Windows that you are updating (Education, Professional, or Enterprise)

    This can be done by following the instructions in this link.

* MediaCreationTool.exe from http://go.microsoft.com/fwlink/?LinkId=691209 can create only two editions: Windows 10 Professional or Windows 10 Home. There is no option to download and create editions Windows 10 Enterprise or Windows 10 Education. Also within a Windows 10 ISO file created using the MediaCreationTool.exe there is no ..\sources\install.wim file and the verification of what edition Windows 10 is, cannot be performed using dism.exe -- "dism.exe /get-wiminfo /wimfile:F:\sources\install.wim"

 

Please note that the MediaCreationTool will download the latest Windows 10 version, which is at this point 1709 (Fall Creator Update)


If using a copy from MSDN this is likely an all-in-one image, only the product key changes the version.

  1. Place this .ISO into the \ManagementSuite\LDLogon\Patch\ directory on your core server.  If you have changed the patch storage location, place it in the equivalent directories.
  2. Open the LANDESK Management Suite Console and go to the Security and Compliance Tool group
  3. Open the Patch and Compliance Tool
  4. Ensure that you have downloaded the latest updates in the Vulnerabilities category.

    Vulneraiblities category.png
  5. After downloading the vulnerabilities category, find the "W10V1607" definition.  This is the definition that we will be using to upgrade Windows.

    Win10v1703.png

  6. Next, examine the properties of the definition by double-clicking it.

    You will notice that there is a list of rules in the definition.  You need to select the correct rule that matches the version of Windows you are trying to upgrade.
  7. Note the following in the description tab of the definition:

    W10v1703-properties.png
  8. Double-click the rule that matches the version of Windows you are trying to upgrade.  Be careful to choose the selectx86 or x64 version.

    W10V1703 Rules.png

  9. You will need to make sure that your .ISO file for the Windows upgrade matches exactly the filename within the rule in the Patch information section under Unique filename.  In order to do this highlight the filename and make sure to go all the way to the end just prior to ".ISO" and then press Ctrl-C to copy the file name except the extension.
  10. Right-click and rename your .ISO file from step 1 and paste in the name you just copied from the definition rule.  Make sure it still has the .iso extension and that it is not named ".iso.iso" or anything like that.  It must match exactly with the Unique Filename in the rule.
  11. Run Download Updates one more time to ensure that the "Downloaded" Yes/No column in the rule is updated to "Yes".  If it does not update, check your storage location and the name of the .ISO to make sure it matches.
  12. Run a scan and repair as usual.

 

Further information about the Patch Manager definition release can be seen here.

 

How to block automatic update to the Anniversary Edition of Windows on client systems

 

In order to block Windows 10 systems from automatically installing Operating System Upgrades, the following methods may be used:

 

Group Policy

Computer Configuration / Administrative Templates / Windows Components / Windows Update Policy

Setting: Turn off the upgrade to the latest version of Windows through Windows Update

 

Registry

HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate

DWORD value: DisableOSUpgrade = 1

 

Ivanti Patch and Compliance Manager Definition

The DISABLEWIN10UPGRADE can be sent as a repair job to turn off the Windows 10 auto-updates to newer OS versions.

This definition sets the Registry key listed above.

How to patch Office 365

$
0
0

Overview:

Ivanti Patch and Compliance now provides support for Office 365 versions 2013 and 2016.  Patch and Compliance administrators can now scan, detect, and remediate client devices that have Office 365 installed. For Office 365 version 2013, Ivanti leverages the Microsoft Office Deployment Tool to perform the remediation tasks for updating Office 2013 installations. For Office 365 version 2016, Ivanti has developed an Office Com API to perform remediation tasks for updating Office 2016 installations. Ivanti provides a utility (Office365Util.exe) for you to use to download the Office installation data and to check the hash for Office 2016 installation data. When the Office patches are downloaded, Ivanti Endpoint Manager will check the hash on the pertinent files to ensure validity.

 

High Level Process

 

  1. The Ivanti administrator downloads Office 365 definitions from the Ivanti global servers.
  2. Once the Office 365 definitions are downloaded to the core, the Ivanti administrator can scan for those Office 365 vulnerabilities.
  3. In order to remediate (apply latest patches) detected vulnerabilities, Ivanti administrator have to manually run, on the core machine, a new tool provided by Ivanti (Office365Util.exe). Using this tool, the Ivanti administrator can choose the Office 365 versions that are relevant to the environment. The Ivanti Office 365 utility will download the patch binaries and the Microsoft Office deployment tool from the Microsoft cloud.
  4. Once the patch binaries are downloaded to the core, the Ivanti administrator can apply the patches to all vulnerable endpoints using the standard method of applying patches.

Step 1: Download Content

 

Customers download the Office 365 vulnerability definitions, the O365Util.dll, and the Office365Util.exe from the Ivanti Global Host Content Server by downloading the latest Microsoft Windows Vulnerabilities.

 

Download Updates (Microsoft Windows Vulnerabilities)Updating Definitions (Office365Util.exe/O365Util.dll)
o365downloadupdates.jpgupdates.jpg

 

Updating Definitions (MSO365)MSOFFICE 365 (Vul_Defs)MSO365 (Vul_Defs)
MSO365.jpgMSo365Def.jpg

Step 2: Launch Office365Util.exe

 

Upon successful content download, an Office365Utility folder is created under the LDLogon share and will contain the Office365Util.exe file provided by Ivanti.

 

\\Core_Server\LDLogon\Office365Utility

 

2017-10-18_1747.png
This utility will allow you to select the specifics regarding the Office 365 product you are patching. Launch this utility directly from C:\Program Files\LANDesk\ManagementSuite\ldlogon\Office365Utility\ by double-clicking on Office365Utility.exe
(do not try to run it via the network share \\Core_Server\LDLogon\Office365Utility or \\localhost\LDlogon\Office365Utility as you will get an error).

 

Step 3: Select Options from Office365Util

 

The view provided below displays the available options inside of the Office365Util application (Ivanti Office 365 Utility for Patch and Compliance):

There is no Channel support for Office 2013

 

PlatformsDeployment Tools
o365Patform.jpgo365Utility2016.jpg

 

ChannelsOffice 365 (2013) Product List View
o365_2013.jpgo365Channel.jpg

 

In order to successfully patch Office 365, select which Office 365 patch product updates to download in order to support client remediation. After selecting the desired product updates from the Ivanti Office 365 Utility for Patch and Compliance application, click START.

 

 

    STARTo365.jpg 

 

Office 365 Tool

 

The START action will do (2) things:

 

  1. Create an Office365Tool folder under the LDLogon share and process the Microsoft setup.exe file

    \\Core_Server\LDLogon\Office365Tool

The contents of this folder will contain the Deployment Tool Type (2016 or 2013) selected during the download and all relative installation data applicable to the options selected in the Ivanti Office 365 Utility for Patch and Compliance
application. The display below will outline the contents of both Deployments Tools (2016 and 2013).

 

If you have both 2016 and 2013 products in need of patching, the download has to be completed separately.

 

Office365Tool
Deployment Tool Options
oToolOverview.jpgoToolBothPlats.jpg

 

2016 Content2013 Content
2016View.jpg2013View.jpg

   
      2. Create an Office365 folder under the LDLogon\Patch share that contains the patch files(s):

 

\\Core_Server\LDLogon\Patch\Office365

Patch Location

 

Updated Office 365 patching is not designed to take advantage of our download technology. The client device will NOT download o365 patch files from a preferred server or peer device. The files will be retrieved from the default or non-default patch location.

iis.jpgexplorer.jpg

 

Non-Default Patch Location

 

This section is only applicable to those who have changed the default download location for patches. After downloading the Office 365 patch updates and installation data with the Ivanti Office 365 tool, the following SOURCE will be in the vulnerability definition:

 

Office 365 (2016)

 

httpSourcesURL="Core_Server/LDLogon/Patch/Office365/DeploymentToolType/Channel/Architecture"

 

Ex: httpSourcesURL=http://2016E/ldlogon/patch/office365/2016/current/x64

Office 365 (2013)

httpSourcesURL=http://Core_Server/LDLogon/Patch/Office365/DeploymentToolType

 

Ex: httpSourcesURL= http://2016E/ldlogon/patch/office365/2013

 

In order for the Patch Install Commands in the vulnerability definition to interpret the correct patch location, the Custom Variable will have to be set in every MSO365 vulnerability definition.

 

To do this open the properties on the definition and select the Custom Variables tab. By default the value specified will resolve to the default patch location.

 

Sources.jpg

 

You will need to explicitly set the value to reflect the location your patches reside.

 

variable.jpg

 

The Patch Install Commands section of the definition utilizes a script that resolves the Custom Variable.

 

2016.jpg

 

References

How to change the default Patch Location for Security and Patch Manager

Microsoft Office 2016 Deployment Tool

Microsoft Office 2013 Deployment Tool for Click-to-Run

"Security and Patch" option is not available in the right click menu in the scheduled tasks for targets of the task.

$
0
0

Issue:

Security and Patch option is missing when right-clicking computers in the Scheduled Tasks tool in the Console.

 

Solution:

Install SU2 or newer for 2017.3.

About the Next Gen Microsoft Patch Definition Naming Convention

$
0
0

Overview

Starting with the April 11th 2017 Patch Tuesday, Microsoft no longer uses a traditional naming format for Security Bulletins. To help our customer's, we created our own naming format as follows:

 

The new Security Bulletin mappings our products will be using: MS[YY]-[MM]-[PP(P)]

 

  • MS = Microsoft
  • YY = Year
  • MM = Month Released
  • PP =  Product

Here are examples from Patch Tuesday December 12, 2017:

  • MS17-12-OFF
    • All Office patches
  • MS17-11-O365
    • Security Only Updates for Office 365
  • MS17-12-IE
    • All IE patches
  • MS17-12-AFP
    • All Microsoft released Flash patches
  • MS17-12-W10
    • All Windows 10 patches, rollups and Deltas
  • MS17-12-2K8
    • All Vista and 2008 patches
  • MS17-12-SO7
    • Security Only Update for Windows 7 and Server 2008 R2
  • MS17-12-SO8
    • Security Only Update for Server 2012
  • MS17-12-SO81
    • Security Only Update for Windows 8.1 and Server 2012 R2
  • MS17-12-MR7
    • Monthly Rollup for Windows 7 and Server 2008 R2 (this is the rollup that includes non-security fixes)
  • MS17-12-MR8
    • Monthly Rollup for Server 2012 (this is the rollup that includes non-security fixes)
  • MS17-12-MR81
    • Monthly Rollup for Windows 8.1 and Server 2012 R2 (this is the rollup that includes non-security fixes)
  • MS17-12-SLV
    • All Microsoft Silverlight patches
  • MS17-12-2K3
    • All Server 2003 patches for the customers that subscribe to them (Extended support)
  • MS17-12-XPE
    • All Microsoft XP Embedded patches

.NET Patches will follow a slightly different naming scheme:

  • MS[YY]-[MM]-[TT][PP]-[KB]
    • YY = Year
    • MM = Month
    • TT = Type (Security Only or Monthly Rollup)
    • PP = Product (.NET)
    • KB = Parent KB
  • MS17-12-SONET-1234567
    • Security only patches associated with that parent KB
    • Security patch type
  • MS17-12-MRNET-1234567
    • Monthly Rollup associated with that parent KB
    • Non-Security patch type

Non-security .NET Patches also have a slightly different naming scheme:

  • MSNS[YY]-[MM]-[TT][PP]-[KB]
    • YY = Year
    • MM = Month
    • TT = Type (Quality Preview or Quality Rollup)
    • PP = Product (.NET)
    • KB = Parent KB
  • MSNS17-12-QPNET-1234567
    • Quality Preview patches associated with that parent KB
    • Non-Security patch type
  • MSNS17-12-QRNET-1234567
    • Quality Rollup associated with that parent KB
    • Non-Security patch type

 

Additional Information

Additional Naming Conventions

  • QP = Quality Preview
  • NS = Non-Security

 

Microsoft released the following article for FAQ on the changes made: Security Updates Guide dashboard and API:

 

Q: Why is the security bulletin ID number (e.g. MS16-XXX) not included in the new Security Update Guide?

A: The way Microsoft documents security updates is changing. The previous model used security bulletin webpages and included security bulletin ID numbers (e.g. MS16-XXX) as a pivot point. This form of security update documentation, including bulletin ID numbers, is being retired and replaced with the Security Update Guide. Instead of bulletin IDs, the new guide pivots on vulnerability ID numbers and KB Article ID numbers.

Support for the Intel 'Meltdown' security vulnerability KB4058702


Important information on detection logic for the Intel 'Meltdown' security vulnerability

$
0
0

Overview

 

Microsoft has identified a severe compatibility issue with a small number of anti-virus software products.

 

We highly suggest all customers review these issues here:  https://support.microsoft.com/en-us/help/4072699

 

Due to to possible BSOD issues that may occur when installing this update on system with out of date AV software, we will be adding a detection prerequisite as Windows Update does:

Key="HKEY_LOCAL_MACHINE" Subkey="SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat"

Value="cadca5fe-87d3-4b96-b7fb-a231484277cc"

Type="REG_DWORD”

 

If key does not exist you will be offered the detection only version of this patch.

 

This means that the associated patch for a system will not be remediated unless the Registry key is present. This mirrors how the patches are handled by Microsoft. Full details regarding the offering of the patch, and options if the Registry key is missing, are located in the Microsoft article here: https://support.microsoft.com/en-us/help/4072699/important-information-regarding-the-windows-security-updates-released

 

The patches will be offered for deployment if the key exists.

Affected patches:

  • MS18-01-IE Q4056568
  • MS18-01-SO7 Q4056897
  • MS18-01-SO8 Q4056899
  • MS18-01-SO81 Q4056898
  • MS18-01-W10 Q4056888, Q4056890, Q4056891, Q4056892, Q4056893

Affected CVEs:

  • CVE-2017-5753
  • CVE-2017-5715
  • CVE-2017-5754

 

Link to Security bulletin advisory:  https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002

How to Verify and Update the Global Autofix and Reboot Settings to Existing Agents

$
0
0

Purpose

The Global Autofix and Reboot settings can be set up in the Agent configuration> Standard LANDesk Agent page, but once configured it seems there is no way to update it by a Change Setting task, or by simply updating on the Agent configuration and save the setting. Some believe that the Agent will need to be redeployed in order to overwrite the existing Global Autofix and Reboot settings. This document provides a way to update those settings without having to redeploy the Agents.

 

global settings.png

 

Step by Step

1. First it will be useful to get an idea of which Agents have used the Global Autofix and Reboot settings. Follow this article: Displaying the Settings "Never Reboot" and "Never Autofix" in Your Inventory

2. After the above step, an inventory scan will have to be run successfully in order for the inventory information to be synced back to the core server. Then you should be able to see an entry like the following in the Agent's inventory:

never reboot never autofix.png

NOTE: If the Agent doesn't have the Global Settings configured, the inventory will simply look like this.

no such setting.png

 

3. Locate the Agent configuration that your Agent has been using, modify the Global Autofix and Reboot settings as needed, save the configuration.

4. Right click on the Agent configuration, and select Schedule Update to Agent Setting to create a scheduled task.

5. Drag and drop the Agents you need the setting to be modified and start the task.

6. When this is done, start an inventory scan on the Agent machines and you can see that the above entry in the inventory value has changed.

 

Relevant Articles

Displaying the Settings "Never Reboot" and "Never Autofix" in Your Inventory

Current definitions in Patch and Compliance referencing Support for the Intel 'Meltdown' Security Vulnerability

$
0
0

Affected patches:

Vulnerability

KB

Product

Type

MS18-01-2K8_INTL

KB4056615
KB4056759
KB4056941
KB4056942
KB4056944

Windows Server 2008

Security Updates

MS18-01-IE_INTL

KB4056568

Internet Explorer

Security Update

MS18-01-MR7_INTLKB4056894Windows 7, Server 2008 R2Monthly Rollup
MS18-01-MR8_INTLKB4056896Windows Server 2012Monthly Rollup

MS18-01-SO7_INTL

KB4056897

Windows 7, Server 2008 R2

Security Only

MS18-01-SO8_INTL

KB4056899

Windows Server 2012

Security Only

MS18-01-SO81_INTL

KB4056898

Windows 8.1, Server 2012 R2

Security Only

MS18-01-SQL_INTL

KB4052987
KB4057118
KB4057119
KB4057122

SQL Server 2016, 2017

Security Updates

MS18-01-W10_INTL

KB4056888
KB4056890
KB4056891
KB4056892
KB4056893

Windows 10

Cumulative Update and Delta Update

 

 

How to Scan and/or Repair against a custom group

 

Additional Information

 

Due to to possible BSOD issues that may occur when installing this update on system with out of date AV software, we will be adding a detection prerequisite as Windows Update does:

Key="HKEY_LOCAL_MACHINE" Subkey="SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat"

Value="cadca5fe-87d3-4b96-b7fb-a231484277cc"

Type="REG_DWORD”

 

If key does not exist you will be offered the detection only version of this patch.

 

This means that the associated patch for a system will not be remediated unless the Registry key is present. This mirrors how the patches are handled by Microsoft. Full details regarding the offering of the patch, and options if the Registry key is missing, are located in the Microsoft article here: https://support.microsoft.com/en-us/help/4072699/important-information-regarding-the-windows-security-updates-released

 

An Example of the detection only definition being returned will contain "DETECT" in the definition name and under Patch Required it will say: No repair action specified There is also no patch information provided

NoRegKeyHighlighted.PNG

An Example of the definition where the regkey is detected and you will be able to remediate

PatchRequired.PNG

 

Support for the Intel 'Meltdown' security vulnerability KB4058702

Important information on detection logic for the Intel 'Meltdown' security vulnerability

Next Gen: Why the Delta vs Cumulative Update is Offered for Windows 10

$
0
0

Purpose

 

This article explains how our detection the Delta or Cumulative version of the patch is offered.

 

Description

 

Our detection logic will verify the  'UBR' value from the registry to determine if the Delta or the Cumulative update will be offered.

HKLM" Key="SOFTWARE\Microsoft\Windows NT\CurrentVersion" Value="UBR" (Update Build Revision)
  • The Delta is offered if build version equals N-1. (N= Latest Build. Current build being offered minus one version level)
  • The full Cumulative update is offered if build version is N-2 or less.

 

You will only be offered one or the other and never both.

 

Related Documentation

 

Windows 10 release information

String not found Patch Action 47

$
0
0

Issue:

Getting messages like the following in the Security and Patch Information for clients on the History page:

String not found Patch Action 46

String not found Patch Action 47

 

Solution:

The messages are cosmetic and can be ignored. They will go away if you upgrade to 2016.3 with the latest update or 2017.3.

Error: "Unable to find string with ID message" in Vulscan UI

$
0
0

If you are like me living a country that does not have a localized version of LANDESK, you might run into this issue.

 

You start the Vulnerability Scan and when the message should appear that the vulscan detects a vulnerability, you only get the message: Unable to find string with ID...

 

This happens because LANDESK doesn't support the language of your OS but builds a XXXvulscan.dll with your language code. In the case of The Netherlands, we would see a NLDvulscan.dll. This 'localized' dll unfortunately doesn't contain the all of the strings the vulscan UI asks for.

 

To remedy this, go to the LDLogon share on the Core Server. Copy the ENUvulscan.dll and rename the copy to XXXvulscan.dll, XXX being your country ID. If the localized DLL exists already, delete it before you rename the copy.

 

That's it. Your vulscan running on the workstation will detect a newer DLL on the server and automatically download it. And you will have all the strings available from the English languange DLL, showing you exactly what is detected and more.

 

In addition this can occur if not all Vulscan related files are up to date and there is a mismatch. 

About Patching: 101 - A simple, effective method of patching

$
0
0

As the Enterprise Ivanti Endpoint Manager Administrator of a large company that has had over 15 Core Servers with over 12,000 systems and over 20 other Ivanti tech's to support I have found "how should I patch" to come up often at my location as well as on this forum.

 

Like Windows, there are 3 or more ways to do most anything in Ivanti Endpoint Manager patching being one of those, and I have re-written the way I advocate our techs patch in Ivanti from the way I recommended a few years back and thought I would post it here for other to use as needed. It is not the only way, nor am I saying it is the best way.

 

Please keep in mind that this is a basic method, simple and effective.  I did not go into Auto-Fix, some of our advanced tech's use it, others don't.  I wanted something a newbie could pick up, read and begin patching in a very short amount of time.

 

Picking what patches to patch can be a political nightmare depending on your companies policies.  Ours went from 12 groups doing it all differently, some patching critical's only, some not patching, others patching everything possible to a reduced number of groups that all now have a "baseline" that is set from up above that is pretty in-depth and aggressive deadlines to have them patched by.

 

In short, we patch all security related items with few exceptions that are patchable via Ivanti and we do it aggressively as you must nowadays in this world of exploits.

 

If you are not patching, I strongly suggest you start.

 

Attached is the method I recommend, it uses two tasks, one a "Push" the other a straight "Policy".  Why not a "Policy Support Push" you ask?  We were doing that but are finding that some systems will stick in the "active" bin of the scheduled tasks for some reason (being researched) and thus the task will not become a policy.  If you restart the task, some of those systems will clear, but then others will stick... and so on.

 

It goes over creating a group of patches, creating the tasks, targeting the systems and scheduling the deployment.

 

I look forward to your feedback and I hope this helps some of you.


How to set up a dark network Core Server (without outside network access)

$
0
0

How to set up your Dark Network Core: Step by step

 

 

Description

This document details the procedure for copying definitions from a "light core" (A core that is connected to outside networks) and a "Dark Core" (a core that is not connected to outside networks)  This is often done for security purposes or lack of connectivity.

 

 

Assumptions

 

  • The user has a familiarity with Ivanti Endpoint Manager and associated files and functions
  • The user has 2 servers, one "Light" and one "Dark" (One with Internet connectivity and one without internet connectivity)
  • The user has Ivanti Endpoint Manager installed with default parameters, file and drive locations, etc.

Process

 

Step one: Prepare both core servers to have accurate data

 

In order to download a complete set of data to transfer from the light core to the dark core, the database tables related to Patch Manager must be reset.  This must occur on any core server that has previously downloaded patch data, otherwise a complete set of data will not be downloaded.

 

This can be done on both core servers by doing the following:

 

    1. On each core server, open a command prompt on the server and change to the C:\Program Files\LANDESK\ManagementSuite folder.
    2. Run "CoreDbUtil.exe /patchmanager".
    3. Open the process list in Task Manager (right-click the taskbar and select "Task Manager) and watch for CoreDbUtil.exe to drop from the list to make sure it has finished.
      (The log for CoreDBUtil.exe is located in the main log location at \Program Files\LANDESK\ManagementSuite\Log)

 

Step two: Prepare the Dark Core folder structure

 

On the Dark Network Core Server, you will need to have a location for the vulnerability XML files and a location for the actual patches themselves to be stored in. For ease of use, we recommend using the already created patch folder structure that is set up when you install Ivanti EPM. By default, patches are stored in the \Program files\LANDESK\ManagementSuite\LDLogon\patch  folder. If a different location is desired this article can be used to set up the alternative location.

If patches have not been downloaded on the dark core previously the patch folder may not have been created and should be manually created.

 

Step three: Retrieve content on the "Light Core"

 

    1. Within Security and Patch Manager open the Download Updates window and select all of the categories you want to download.
    2. In addition select "Download patches for definitions selected above and also the radio button for "for all downloaded definitions" and click "Apply" and then "Close".
      SelectCategories.gif
    3. From a Command prompt, change to the LANDESK\ManagementSuite folder.
    4. From a Command prompt, type "vaminer /noprompt /copy" and hit enter.  (If scripting this action to run regularly please add the /noui" switch to the vaminer command line switches).
    5. Select the desired categories to download and click "Download now"

      (Vaminer.exe is the executable that runs to download content from the Ivanti patch content servers).

      The first time this is run it will take quite a while as it will not only be downloading vulnerability definitions but also all patches.  (Due to this you will need a large amount of storage space on the dark core server).  This will download updates and store them to a to the patch directory.  The default patch directory is \Program Files\LANDESK\ManagementSuite\LDLOGON\patch.

 

To verify further that this process has completed correctly, in \Program Files\LANDESK\Managementsuite\ldlogon\patch and it's subdirectories you should have .XML files that were generated by the Ivanti Content download to represent your vulnerability definitions.  Do not change the folder structure or files.

 

Step four: Copy PatchSources file to patch directory on Source (Light) Core


Copy ENU_PatchSourcesXXX*.xml (Where XXX equals the current LDMS version) from \Program Files\LANDESK\ManagementSuite\LDMAIN to \Program Files\LANDESK\ManagementSuite\LDLOGON\PATCH on the source core.  This step is necessary because Vaminer.exe (the program that is downloading the Patch Content) expects that file to be in that location.  Again, this needs to match the version you are running: 9.5 (ENU_PatchSources95.xml), 9.6 (ENU_PatchSource96.xml, 2016.3 (ENU_PatchSources101.xml) and so on.  Modification of the file is not necessary, it just needs to exist in that location.

 

Step five: Prepare the ENU_PatchSourcesXXX.xml on the Dark Core

 

In the \Program Files\LANDESK\ManagementSuite\LDMAIN folder there will be several files called ENU_PatchSources and then a numerical ending.  These stand for the current and prior versions of LDMS.   Choose the one that is the latest and matches your version on your core server.

 

For example: On a 2016.3 Core server you will likely see three ENU_PATCHSOURCESXXX files:

      • ENU_PatchSources951.XML
      • ENU_PatchSources961.xml
      • ENU_PatchSources101.xml

 

We would select ENU_PatchSources101.xml as this corresponds to LDMS 10.1 (2016.3) and begin editing it.

 

If your core is not running in the English language you will want to select the XML file that matches your language prefix (ESP, JPN, etc)

 

Modify the Enu_PatchSourcesXXX.xml as modeled below:

Line #2 in the .XML will contain ‘/LDPM8/ldvul.php?%Credentials%KEYWORD=filename&FILENAME=’.  Replace it with  /ldlogon/Patch (or whatever directory you have defined as your patch storage directory).

Before:

PatchesSrcRelativePath>/LDPM8/ldvul.php?%Credentials%KEYWORD=filename&amp;FILENAME=patches</PatchesSrcRelativePath>
<LDAVRelativePath>/kvirus-8.0/mirror</LDAVRelativePath>
<CVEMoreInfo>http://cve.mitre.org/cgi-bin/cvename.cgi?name=%CVE_ID%</CVEMoreInfo>


After:

<PatchesSrcRelativePath>\LDLOGON\PATCH</PatchesSrcRelativePath>
<LDAVRelativePath>/kvirus-8.0/mirror</LDAVRelativePath>
<CVEMoreInfo>http://cve.mitre.org/cgi-bin/cvename.cgi?name=%CVE_ID%</CVEMoreInfo>
  1. Next you will need to change the URL's for each Patch Content Server location.    These will be listed under the <Sites> tag.  Search for <sites> and you will see 3 sites, West Coast, East Coast, and EMEA.

    Delete two out of three sites leaving just one site. 

    You will change the hostname listed in the <URL> field and then the Description.

    EditXML.gif

If you are using content that will be manually copied to the core server, put the name of your Dark Core server.  If there will be constant or periodic network connection between your light core and dark core, put the name of your light core here.


In the following section you will select the definition download category that you want to download to the dark core and you will edit that entry in the .XML.  We will replace the string that normally works with the LANDESK Patch server and replace it with a local path.

 

The following example is for the vulnerability definition category Windows Vulnerabilities  Again, you will modify the path from the patch server location to a local directory. You also will add the tag <Enabled>true</enabled>.  This is the same as ticking the checkbox next to the vulnerabilities category when bringing up the Download Updates tool.

 

Search for /LDPM8/ldvul.php?%Credentials%KEYWORD=filename&amp;FILENAME=Windows2 the correct section by searching for "Windows2".  Modify the section within the <URL> tags

 

The resulting line will be<URL>/LDLOGON/PATCH/Windows2</URL>. 

 

You also will add the tag <Enabled>true</Enabled>. This is the same as ticking the checkbox next to the vulnerabilities category when bringing up the Download Updates tool.  Without adding the <Enabled> tag you will need to select the categories every time Download Updates is opened.
EditXML2.gif

When renaming these sections per component you wish to download, FILENAME=Windows2 will use the subdirectory name of "Windows2" under the Patch directory after you modify it.  For example, if I wanted to change the source for Ivanti Data Analytics updates, you would search for that category by searching for just that - "LANDESK Data Analytics Updates".

 

You would then modify the <URL>/LDPM8/ldvul.php?%Credentials%KEYWORD=filename&amp;FILENAME=LDDA</URL> to <URL>/LDLOGON/PATCH/LDDA</URL>.

 

     Before:
     <Source>

                     <URL>/LDPM8/ldvul.php?%Credentials%KEYWORD=filename&amp;FILENAME=LDDA</URL>

                   <Description>LANDESK Data Analytics Updates</Description>

                   <ShowInLDSM>true</ShowInLDSM>

                   <ShowInLSM>true</ShowInLSM>

            </Source>

 

     After:
     <Source>

                        <URL>/LDLOGON/PATCH/LDDA</URL>

                        <Description>LANDESK Data Analytics Updates</Description>

                        <ShowInLDSM>true</ShowInLDSM>

                        <ShowInLSM>true</ShowInLSM>

                        <Enabled>true</Enabled>

            </Source>

 

Once all of the edits have been made do a "Save as" and save it as "Patchsourcestemp.xml" and mark it as a read-only file.  (Right-click, go to properties and check the box "Read Only")

After you have marked it as read-only, rename it to "patchsources.xml".  Remember, all of this is taking place in the LDMAIN folder.

 

Step six: Import the vulnerability definitions into the "Dark Core"

 

  1. Now you will need to move the data to the dark core for insertion into the database.   Copy the entire Patch directory and all new subdirectories and all contents to an external hard drive, network share or whatever method you prefer.  This will include the .XML files for the Vulnerability Definitions and also any patches that were downloaded to the light core.

    If the light core will have access to the dark core this can be done automatically through a file transfer process, automated or otherwise.  The key is to download content on the core server regularly using the "vaminer /noprompt /noui /copy" switch and then copy the updated data to the Dark Core.

  2. When copying the Patch Directory from your Light Core to your Patch Directory on your Dark Network Core, ensure the directories look the same.
  3. Run Download Updates on the Dark Core Server, if running via script simply run "VAMINER.EXE" from the main ManagementSuite folder.

 

If automating the copying of Data from the light core to the dark core:

 

If you are automating the copying of the vulnerability data from the light core to the dark core, ensure the following steps are taking place:

 

    1. "Vaminer /copy /noprompt /noui" is run on the core server.
    2. All files from the Patch directory and it's subdirectories are copied to the Patch folder on the dark core.  This can be done using content replication, robocopy or other preferred methods.
    3. Vaminer.exe is run on the dark core (without switches).

 

This should be done on an automated schedule so that these steps take place in sequence and that there is enough time for each step to complete before the next one starts.

Support for Non-Security Patch MSNS18-01-4078130 to disable mitigation against CVE-2017-5715

$
0
0

Overview

 

Microsoft has released an out of band Critical Update KB4078130 to disable mitigation against CVE-2017-5715.

Note: We highly recommend reading this Microsoft article:Update to disable mitigation against Spectre, Variant 2

MSNS18-01-4078130 / KB4078130 is a Critical Non-Security Patch that will disable the fix for variant 2 for stability issues.  The machine must reboot after installing the patch for it to apply on the system.

 

Additional Information

 

To enable the fix again you may reinstall the patch for your OS that remediates CVE-2017-5715

How to Give Support Information on False Patch Detections and Troubleshooting

$
0
0

Note: Clicking on a photo will enlarge it.

 

This document will go over what to look for and do if you think you have a patch that is detecting incorrectly on your devices.  Incorrect detections can happen if the detection logic is incorrect and still reports as needed but the patch has already been installed, is not applicable to the system or other issues.  In this document, you’ll learn what to look for in the vulscan logs which are required to submit the incorrect patch detection for review.

This document assumes you know how to find individual patches, create a patch group and move patches to it in the console and create a repair task on a specific patch or group of patches in the console.  It also assumes you have an understanding of repair tasks and how to add target devices to them and run the task.

 

Prep the Client

 

As of January 2018 all new content created uses the new patching engine.  Additional logs are needed as well as the vulscan log to troubleshoot the false detection.

 

Diagnostic Tool

Updated The "Get debug logs and zip (patch)" feature is only available in 2017.3 and newer product versions.

To retrieve logging remotely access the Diagnostic tool and select the Logs | Client option to view client-side logs. An additional option "Get debug logs and zip (patch)" is present for debug logging for all Next Gen definitions. This will only function if the Distribution and Patch agent setting has Enable security scan debug trace logselected.

 

Diag_DebugLog.jpg

 

To enable debug trace logs for versions 9.6 - 2017.1 run the following cmd locally on the endpoint or distribute a script to the desired device:

 

vulscan /enableDpdTrace=true /showui

 

The showui switch is optional.

 

This will generate additional logging in the Programdata\Landesk\DebugLog folder consisting of the following (2) files:

 

PatchManifestSyncSDK.log

PatchScanSDKDpdTrace.log

 

When the repair job finishes you will need the following files to give to support in a zip file:

 

C:\Programdata\landesk\log\Vulscan.log  (Make sure it is the correct one, see below)

C:\Programdata\landesk\log\stdeploy.log

C:\Programdata\landesk\log\stdeployercore.log

C:\Programdata\Landesk\DebugLog\PatchManifestSyncSDK.log

C:\Programdata\Landesk\DebugLog\PatchScanSDKDpdTrace.log

 

 

Run a Repair Task

 

Running a repair task for the specific patch(es) gives supports the best information.  The vulscan logs only showing one patch or two processing will show them detecting and installing and are more concise and easier to look over to find details.  General vulscan logs are not Ideal as many only show the patch detecting but not installing and have a lot of unneeded information.  Running a specific repair task with patches having the issue will provide the best logs.

You can create a repair task by going to Tools > Security and Compliance > Patch and Compliance.  Click the Scan folder and find your patch.  When you find the patch having the issue right click it and from the menu that appears click Repair.  If you have a patch group or several patches you can do the same and create a repair task for several patches at the same time.

 

The Repair task dialog will open.  Most settings you can leave as a defaults.  You can add a target device at this time as well.  If you have a maintenance window on your clients, be sure to check Ignore Maintenance Window if specified so the patch tries to install as well as scan in this repair task.

Once you have a target in your task run it and wait for it to complete.

 

Vulscan Log

 

The full vulscan log, created as a result of running the task, is needed for us to determine the issue of the false detection.  This log is located on the target devices in the C:\programdata\Landesk\Log folder. They are named vulscan.log.  Older logs have a number in the name.   The correct log file will have a line at the top with the task ID in the name as shown in the example.  This information changes with each task.

 

Thu, 26 Oct 2017 14:59:37 Command line: /policyfile="C:\ProgramData\LANDesk\Policies\CP.2353.RunNow._iOiXj4cedTDG&#474FOGYMztt+mWNQ=.xml"
Thu, 26 Oct 2017 14:59:37 client policy file: C:\ProgramData\LANDesk\Policies\CP.2353.RunNow._iOiXj4cedTDG&#474FOGYMztt+mWNQ=.xml
Thu, 26 Oct 2017 14:59:37 Reading policy parameters
Thu, 26 Oct 2017 14:59:37 scan=0
Thu, 26 Oct 2017 14:59:37 scanFilter=INTL_4049179_MSU;INTL_3089023_MSU
Thu, 26 Oct 2017 14:59:37 fixnow=True
Thu, 26 Oct 2017 14:59:37    maintEnable=False

 

Once you have found the correct vulscan log. Doing a search in the log file for the all capitals case sensitive “DETECTED” will yield the detection of the patch and the reason.  In our example case it show the file version is out dated and that is the reason the patch is needed.

 

Thu, 26 Oct 2017 14:59:45 VUL: '3089023_MSU' (windows8.1-kb3089023-x64.msu) DETECTED.  Reason 'File C:\Windows\System32\flashplayerapp.exe version is less than the minimum version specified.'.  Expected '18.0.0.232'.  Found '11.3.300.265'.  Patch required 'windows8.1-kb3089023-x64.msu'.
Thu, 26 Oct 2017 14:59:45    Patch is NOT installed

 

You can see in the example the patch was detected as needed due to a file being at a lower version than in the patch.  Now scroll down to the bottom of the log file.  You’ll see a “Patch Installation” header and below that you will find details of what happened when the device attempted to install the patch. In our example the patch returned the error code 2149842967 converted to a hex value that gives a result of  0x80240017 Looking on the list of WUSA codes the patch returned a “Not Applicable”.

Thu, 26 Oct 2017 15:03:21 Command Interpreter running
Thu, 26 Oct 2017 15:03:21 Setting current directory: C:\Program Files (x86)\LANDesk\LDClient\
Thu, 26 Oct 2017 15:03:21 Executing C:\Windows\system32\wusa.exe "C:\Program Files (x86)\LANDesk\LDClient\sdmcache\windows8.1-kb3089023-x64.msu" /quiet /norestart
Thu, 26 Oct 2017 15:03:23 Exit Code: -2145124329 (0x80240017)
Thu, 26 Oct 2017 15:03:23 Error: "C:\Windows\system32\wusa.exe" returned failure exit code (2149842967)
Thu, 26 Oct 2017 15:03:23 ERROR(EXECUTEFILE) Failed to run command - 80004005
Thu, 26 Oct 2017 15:03:23 DownloadPatch ERROR: Failed to run commands (80004005).
Thu, 26 Oct 2017 15:03:23 Last status: Failed
Thu, 26 Oct 2017 15:03:23 Stopping wuauserv service.
Thu, 26 Oct 2017 15:03:23 Stop service wuauserv
Thu, 26 Oct 2017 15:03:25 Successfully controlled the service.
Thu, 26 Oct 2017 15:03:25 DeferredReportAction: name 'windows8.1-kb3089023-x64.msu', code '1', type '-1', status 'Error: "C:\Windows\system32\wusa.exe" returned failure exit code (2149842967)'
Thu, 26 Oct 2017 15:03:25 Running post-install/uninstall script
Thu, 26 Oct 2017 15:03:25 RunPatches completed.  1 processed.  0 installed. 1 failures.  Thu, 26 Oct 2017 15:03:25 Sending previous action history to core

STdeployercore.log

In addition the STdeployercore.log will also show the patch being installed and the error code for the Next Gen definitions:

2018-01-26T21:15:53.2279239Z 134c I DeploymentPackageReader.cpp:783 Deploy package 'C:\ProgramData\LANDesk\timber\sandboxes\InstallationSandbox#2018-01-26-T-21-15-15\0001c460-0000-0000-0000-000000000000.zip' successfully opened unsigned for package IO
2018-01-26T21:15:53.2279239Z 134c I Authenticode.cpp:134 Verifying signature of C:\Program Files (x86)\LANDesk\LDClient\sdmcache\windows6.1-kb4056894-x64_tw1158080.msu with CWinTrustVerifier
2018-01-26T21:15:54.2534266Z 134c V UnScriptedInstallation.cpp:30 Executing (C:\Program Files (x86)\LANDesk\LDClient\sdmcache\windows6.1-kb4056894-x64_tw1158080.msu /quiet /norestart), nShow: true.
2018-01-26T21:19:19.4406288Z 134c V ChildProcess.cpp:140 Process handle 00000408 returned '3010'.

 

Windows Update(WUSA) Error Codes

Result CodeResult StringDescription
0x80240001WU_E_NO_SERVICEWindows Update Agent was unable to provide the service.
0x80240002WU_E_MAX_CAPACITY_REACHEDThe maximum capacity of the service was exceeded.
0x80240003WU_E_UNKNOWN_IDAn ID cannot be found.
0x80240004WU_E_NOT_INITIALIZEDThe object could not be initialized.
0x80240005WU_E_RANGEOVERLAPThe update handler requested a byte range that overlaps a previously requested range.
0x80240006WU_E_TOOMANYRANGESThe requested number of byte ranges exceeds the maximum number (2^31 - 1).
0x80240007WU_E_INVALIDINDEXThe index to a collection was invalid.
0x80240008WU_E_ITEMNOTFOUNDThe key for the item queried could not be found.
0x80240009WU_E_OPERATIONINPROGRESSA conflicting operation was in progress. Some operations (such as installation) cannot be performed simultaneously.
0x8024000AWU_E_COULDNOTCANCELCancellation of the operation was not allowed.
0x8024000BWU_E_CALL_CANCELLEDOperation was cancelled.
0x8024000CWU_E_NOOPNo operation was required.
0x8024000DWU_E_XML_MISSINGDATAWindows Update Agent could not find the required information in the update's XML data.
0x8024000EWU_E_XML_INVALIDWindows Update Agent found invalid information in the update's XML data.
0x8024000FWU_E_CYCLE_DETECTEDCircular update relationships were detected in the metadata.
0x80240010WU_E_TOO_DEEP_RELATIONUpdate relationships that are too deep were evaluated.
0x80240011WU_E_INVALID_RELATIONSHIPAn invalid update relationship was detected.
0x80240012WU_E_REG_VALUE_INVALIDAn invalid registry value was read.
0x80240013WU_E_DUPLICATE_ITEMOperation tried to add a duplicate item to a list.
0x80240016WU_E_INSTALL_NOT_ALLOWEDOperation tried to install while another installation was in progress or the system was pending a mandatory restart.
0x80240017WU_E_NOT_APPLICABLEOperation was not performed because there are no applicable updates.
0x80240018WU_E_NO_USERTOKENOperation failed because a required user token is missing.
0x80240019WU_E_EXCLUSIVE_INSTALL_CONFLICTAn exclusive update cannot be installed with other updates at the same time.
0x8024001AWU_E_POLICY_NOT_SETA policy value was not set.
0x8024001BWU_E_SELFUPDATE_IN_PROGRESSThe operation could not be performed because the Windows Update Agent is self-updating.
0x8024001DWU_E_INVALID_UPDATEAn update contains invalid metadata.
0x8024001EWU_E_SERVICE_STOPOperation did not complete because the service or system was being shut down.
0x8024001FWU_E_NO_CONNECTIONOperation did not complete because the network connection was unavailable.
0x80240020WU_E_NO_INTERACTIVE_USEROperation did not complete because there is no logged-on interactive user.
0x80240021WU_E_TIME_OUTOperation did not complete because it timed out.
0x80240022WU_E_ALL_UPDATES_FAILEDOperation failed for all the updates.
0x80240023WU_E_EULAS_DECLINEDThe license terms for all updates were declined.
0x80240024WU_E_NO_UPDATEThere are no updates.
0x80240025WU_E_USER_ACCESS_DISABLEDGroup Policy settings prevented access to Windows Update.
0x80240026WU_E_INVALID_UPDATE_TYPEThe type of update is invalid.
0x80240027WU_E_URL_TOO_LONGThe URL exceeded the maximum length.
0x80240028WU_E_UNINSTALL_NOT_ALLOWEDThe update could not be uninstalled because the request did not originate from a WSUS server.
0x80240029WU_E_INVALID_PRODUCT_LICENSESearch may have missed some updates before there is an unlicensed application on the system.
0x8024002AWU_E_MISSING_HANDLERA component that is required to detect applicable updates was missing.
0x8024002BWU_E_LEGACYSERVERAn operation did not complete because it requires a newer version of server software.
0x8024002CWU_E_BIN_SOURCE_ABSENTA delta-compressed update could not be installed because it required the source.
0x8024002DWU_E_SOURCE_ABSENTA full-file update could not be installed because it required the source.
0x8024002EWU_E_WU_DISABLEDAccess to an unmanaged server is not allowed.
0x8024002FWU_E_CALL_CANCELLED_BY_POLICYOperation did not complete because the DisableWindowsUpdateAccess policy was set.
0x80240030WU_E_INVALID_PROXY_SERVERThe format of the proxy list was invalid.
0x80240031WU_E_INVALID_FILEThe file is in the wrong format.
0x80240032WU_E_INVALID_CRITERIAThe search criteria string was invalid.
0x80240033WU_E_EULA_UNAVAILABLELicense terms could not be downloaded.
0x80240034WU_E_DOWNLOAD_FAILEDUpdate failed to download.
0x80240035WU_E_UPDATE_NOT_PROCESSEDThe update was not processed.
0x80240036WU_E_INVALID_OPERATIONThe object's current state did not allow the operation.
0x80240037WU_E_NOT_SUPPORTEDThe functionality for the operation is not supported.
0x80240038WU_E_WINHTTP_INVALID_FILEThe downloaded file has an unexpected content type.
0x80240039WU_E_TOO_MANY_RESYNCThe agent was asked by server to synchronize too many times.
0x80240040WU_E_NO_SERVER_CORE_SUPPORTWUA API method does not run on a Server Core installation option of the Windows 2008 R2 operating system.
0x80240041WU_E_SYSPREP_IN_PROGRESSService is not available when sysprep is running.
0x80240042WU_E_UNKNOWN_SERVICEThe update service is no longer registered with Automatic Updates.
0x80240FFFWU_E_UNEXPECTEDAn operation failed due to reasons not covered by another error code.
0x80241001WU_E_MSI_WRONG_VERSIONSearch may have missed some updates because Windows Installer is less than version 3.1.
0x80241002WU_E_MSI_NOT_CONFIGUREDSearch may have missed some updates because Windows Installer is not configured.
0x80241003WU_E_MSP_DISABLEDSearch may have missed some updates because a policy setting disabled Windows Installer patching.
0x80241004WU_E_MSI_WRONG_APP_CONTEXTAn update could not be applied because the application is installed per-user.
0x80241FFFWU_E_MSP_UNEXPECTEDSearch may have missed some updates because there was a failure of Windows Installer.
0x80242000WU_E_UH_REMOTEUNAVAILABLEA request for a remote update handler could not be completed because no remote process is available.
0x80242001WU_E_UH_LOCALONLYA request for a remote update handler could not be completed because the handler is local only.
0x80242002WU_E_UH_UNKNOWNHANDLERA request for an update handler could not be completed because the handler could not be recognized.
0x80242003WU_E_UH_REMOTEALREADYACTIVEA remote update handler could not be created because one already exists.
0x80242004WU_E_UH_DOESNOTSUPPORTACTIONA request for the handler to install (uninstall) an update could not be completed because the update does not support install (uninstall).
0x80242005WU_E_UH_WRONGHANDLERAn operation did not complete because the wrong handler was specified.
0x80242006WU_E_UH_INVALIDMETADATAA handler operation could not be completed because the update contains invalid metadata.
0x80242007WU_E_UH_INSTALLERHUNGAn operation could not be completed because the installer exceeded the time limit.
0x80242008WU_E_UH_OPERATIONCANCELLEDAn operation being done by the update handler was cancelled.
0x80242009WU_E_UH_BADHANDLERXMLAn operation could not be completed because the handler-specific metadata is invalid.
0x8024200AWU_E_UH_CANREQUIREINPUTA request to the handler to install an update could not be completed because the update requires user input.
0x8024200BWU_E_UH_INSTALLERFAILUREThe installer failed to install (uninstall) one or more updates.
0x8024200CWU_E_UH_FALLBACKTOSELFCONTAINEDThe update handler should download self-contained content rather than delta-compressed content for the update.
0x8024200DWU_E_UH_NEEDANOTHERDOWNLOADThe update handler did not install the update because the update needs to be downloaded again.
0x8024200EWU_E_UH_NOTIFYFAILUREThe update handler failed to send notification of the status of the install (uninstall) operation.
0x8024200FWU_E_UH_INCONSISTENT_FILE_NAMESThe file names in the update metadata are inconsistent with the file names in the update package.
0x80242010WU_E_UH_FALLBACKERRORThe update handler failed to fall back to the self-contained content.
0x80242011WU_E_UH_TOOMANYDOWNLOADREQUESTSThe update handler has exceeded the maximum number of download requests.
0x80242012WU_E_UH_UNEXPECTEDCBSRESPONSEThe update handler has received an unexpected response from CBS.
0x80242013WU_E_UH_BADCBSPACKAGEIDThe update metadata contains an invalid CBS package identifier.
0x80242014WU_E_UH_POSTREBOOTSTILLPENDINGThe post-reboot operation for the update is still in progress.
0x80242015WU_E_UH_POSTREBOOTRESULTUNKNOWNThe result of the post-reboot operation for the update could not be determined.
0x80242016WU_E_UH_POSTREBOOTUNEXPECTEDSTATEThe state of the update after its post-reboot operation has completed is unexpectedly.
0x80242017WU_E_UH_NEW_SERVICING_STACK_REQUIREDThe operating system servicing stack must be updated before this update is downloaded or installed.
0x80242FFFWU_E_UH_UNEXPECTEDThis update handler error is not covered by another WU_E_UH_* code.
0x80243001WU_E_INSTALLATION_RESULTS_UNKNOWN_VERSIONThe results of the download and installation could not be read in the registry due to an unrecognized data format version.
0x80243002WU_E_INSTALLATION_RESULTS_INVALID_DATAThe results of download and installation could not be read in the registry due to an invalid data format.
0x80243003WU_E_INSTALLATION_RESULTS_NOT_FOUNDThe results of download and installation are not available; the operation may have failed to start.
0x80243004WU_E_TRAYICON_FAILUREA failure occurred when trying to create an icon in the notification area.
0x80243FFDWU_E_NON_UI_MODEUnable to show the user interface (UI) when in a non-UI mode; Windows Update (WU) client UI modules may not be installed.
0x80243FFEWU_E_WUCLTUI_UNSUPPORTED_VERSIONUnsupported version of WU client UI exported functions.
0x80243FFFWU_E_AUCLIENT_UNEXPECTEDThere was a user interface error not covered by another WU_E_AUCLIENT_* error code.
0x80244000WU_E_PT_SOAPCLIENT_BASEWU_E_PT_SOAPCLIENT_* error codes map to the SOAPCLIENT_ERROR enum of the ATL Server Library.
0x80244001WU_E_PT_SOAPCLIENT_INITIALIZEInitialization of the SOAP client failed, possibly because of an MSXML installation failure.
0x80244002WU_E_PT_SOAPCLIENT_OUTOFMEMORYSOAP client failed because it ran out of memory.
0x80244003WU_E_PT_SOAPCLIENT_GENERATESOAP client failed to generate the request.
0x80244004WU_E_PT_SOAPCLIENT_CONNECTSOAP client failed to connect to the server.
0x80244005WU_E_PT_SOAPCLIENT_SENDSOAP client failed to send a message due to WU_E_WINHTTP_* error codes.
0x80244006WU_E_PT_SOAPCLIENT_SERVERSOAP client failed because there was a server error.
0x80244007WU_E_PT_SOAPCLIENT_SOAPFAULTSOAP client failed because there was a SOAP fault due to WU_E_PT_SOAP_* error codes.
0x80244008WU_E_PT_SOAPCLIENT_PARSEFAULTSOAP client failed to parse a SOAP fault.
0x80244009WU_E_PT_SOAPCLIENT_READSOAP client failed while reading the response from the server.
0x8024400AWU_E_PT_SOAPCLIENT_PARSESOAP client failed to parse the response from the server.
0x8024400BWU_E_PT_SOAP_VERSIONSOAP client found an unrecognizable namespace for the SOAP envelope.
0x8024400CWU_E_PT_SOAP_MUST_UNDERSTANDSOAP client was unable to understand a header.
0x8024400DWU_E_PT_SOAP_CLIENTSOAP client found the message was malformed (fix before resending).
0x8024400EWU_E_PT_SOAP_SERVERThe SOAP message could not be processed due to a server error (resend later).
0x8024400FWU_E_PT_WMI_ERRORThere was an unspecified Windows Management Instrumentation (WMI) error.
0x80244010WU_E_PT_EXCEEDED_MAX_SERVER_TRIPSThe number of round trips to the server exceeded the maximum limit.
0x80244011WU_E_PT_SUS_SERVER_NOT_SETWUServer policy value is missing in the registry.
0x80244012WU_E_PT_DOUBLE_INITIALIZATIONInitialization failed because the object was already initialized.
0x80244013WU_E_PT_INVALID_COMPUTER_NAMEThe computer name could not be determined.
0x80244015WU_E_PT_REFRESH_CACHE_REQUIREDThe reply from the server indicates that the server was changed or the cookie was invalid; refresh the state of the internal cache and retry.
0x80244016WU_E_PT_HTTP_STATUS_BAD_REQUESTHTTP 400 - the server could not process the request due to invalid syntax.
0x80244017WU_E_PT_HTTP_STATUS_DENIEDHTTP 401 - the requested resource requires user authentication.
0x80244018WU_E_PT_HTTP_STATUS_FORBIDDENHTTP 403 - server understood the request, but declined to fulfill it.
0x80244019WU_E_PT_HTTP_STATUS_NOT_FOUNDHTTP 404 - the server cannot find the requested Uniform Resource Identifier (URI).
0x8024401AWU_E_PT_HTTP_STATUS_BAD_METHODHTTP 405 - the HTTP method is not allowed.
0x8024401BWU_E_PT_HTTP_STATUS_PROXY_AUTH_REQHTTP 407 - proxy authentication is required.
0x8024401CWU_E_PT_HTTP_STATUS_REQUEST_TIMEOUTHTTP 408 - the server timed out waiting for the request.
0x8024401DWU_E_PT_HTTP_STATUS_CONFLICTHTTP 409 - the request was not completed due to a conflict with the current state of the resource.
0x8024401EWU_E_PT_HTTP_STATUS_GONEHTTP 410 - the requested resource is no longer available at the server.
0x8024401FWU_E_PT_HTTP_STATUS_SERVER_ERRORHTTP 500 - an error internal to the server prevented fulfilling the request.
0x80244020WU_E_PT_HTTP_STATUS_NOT_SUPPORTEDHTTP 501 - server does not support the functionality that is required to fulfill the request.
0x80244021WU_E_PT_HTTP_STATUS_BAD_GATEWAYHTTP 502 - the server, while acting as a gateway or proxy, received an invalid response from the upstream server it accessed when attempting to fulfill the request.
0x80244022WU_E_PT_HTTP_STATUS_SERVICE_UNAVAILHTTP 503 - the service is temporarily overloaded.
0x80244023WU_E_PT_HTTP_STATUS_GATEWAY_TIMEOUTHTTP 504 - the request was timed out waiting for a gateway.
0x80244024WU_E_PT_HTTP_STATUS_VERSION_NOT_SUPHTTP 505 - the server does not support the HTTP protocol version used for the request.
0x80244025WU_E_PT_FILE_LOCATIONS_CHANGEDOperation failed due to a changed file location; refresh internal state and resend.
0x80244026WU_E_PT_REGISTRATION_NOT_SUPPORTEDOperation failed because Windows Update Agent does not support registration with a non-WSUS server.
0x80244027WU_E_PT_NO_AUTH_PLUGINS_REQUESTEDThe server returned an empty authentication information list.
0x80244028WU_E_PT_NO_AUTH_COOKIES_CREATEDWindows Update Agent was unable to create any valid authentication cookies.
0x80244029WU_E_PT_INVALID_CONFIG_PROPA configuration property value was wrong.
0x8024402AWU_E_PT_CONFIG_PROP_MISSINGA configuration property value was missing.
0x8024402BWU_E_PT_HTTP_STATUS_NOT_MAPPEDThe HTTP request could not be completed and the reason did not correspond to any of the WU_E_PT_HTTP_* error codes.
0x8024402CWU_E_PT_WINHTTP_NAME_NOT_RESOLVEDThe proxy server or target server name cannot be resolved.
0x8024402FWU_E_PT_ECP_SUCCEEDED_WITH_ERRORSExternal .cab file processing completed with some errors.
0x80244030WU_E_PT_ECP_INIT_FAILEDThe external .cab file processor initialization did not complete.
0x80244031WU_E_PT_ECP_INVALID_FILE_FORMATThe format of a metadata file was invalid.
0x80244032WU_E_PT_ECP_INVALID_METADATAExternal .cab file processor found invalid metadata.
0x80244033WU_E_PT_ECP_FAILURE_TO_EXTRACT_DIGESTThe file digest could not be extracted from an external .cab file.
0x80244034WU_E_PT_ECP_FAILURE_TO_DECOMPRESS_CAB_FILEAn external .cab file could not be decompressed.
0x80244035WU_E_PT_ECP_FILE_LOCATION_ERRORExternal .cab processor was unable to get file locations.
0x80244FFFWU_E_PT_UNEXPECTEDThere was a communication error not covered by another WU_E_PT_* error code
0x80245001WU_E_REDIRECTOR_LOAD_XMLThe redirector XML document could not be loaded into the Document Object Model (DOM) class.
0x80245002WU_E_REDIRECTOR_S_FALSEThe redirector XML document is missing some required information.
0x80245003WU_E_REDIRECTOR_ID_SMALLERThe redirector ID in the downloaded redirector .cab file is less than in the cached .cab file.
0x8024502DWU_E_PT_SAME_REDIR_IDWindows Update Agent failed to download a redirector .cab file with a new redirector ID value from the server during the recovery.
0x8024502EWU_E_PT_NO_MANAGED_RECOVERA redirector recovery action did not complete because the server is managed.
0x80245FFFWU_E_REDIRECTOR_UNEXPECTEDThe redirector failed for reasons not covered by another WU_E_REDIRECTOR_* error code.
0x80246001WU_E_DM_URLNOTAVAILABLEA download manager operation could not be completed because the requested file does not have a URL.
0x80246002WU_E_DM_INCORRECTFILEHASHA download manager operation could not be completed because the file digest was not recognized.
0x80246003WU_E_DM_UNKNOWNALGORITHMA download manager operation could not be completed because the file metadata requested an unrecognized hash algorithm.
0x80246004WU_E_DM_NEEDDOWNLOADREQUESTAn operation could not be completed because a download request is required from the download handler.
0x80246005WU_E_DM_NONETWORKA download manager operation could not be completed because the network connection was unavailable.
0x80246006WU_E_DM_WRONGBITSVERSIONA download manager operation could not be completed because the version of Background Intelligent Transfer Service (BITS) is incompatible.
0x80246007WU_E_DM_NOTDOWNLOADEDThe update has not been downloaded.
0x80246008WU_E_DM_FAILTOCONNECTTOBITSA download manager operation failed because the download manager was unable to connect the Background Intelligent Transfer Service (BITS).
0x80246009WU_E_DM_BITSTRANSFERERRORA download manager operation failed because there was an unspecified Background Intelligent Transfer Service (BITS) transfer error.
0x8024600aWU_E_DM_DOWNLOADLOCATIONCHANGEDA download must be restarted because the location of the source of the download has changed.
0x8024600BWU_E_DM_CONTENTCHANGEDA download must be restarted because the update content changed in a new revision.
0x80246FFFWU_E_DM_UNEXPECTEDThere was a download manager error not covered by another WU_E_DM_* error code.
0x80247001WU_E_OL_INVALID_SCANFILEAn operation could not be completed because the scan package was invalid.
0x80247002WU_E_OL_NEWCLIENT_REQUIREDAn operation could not be completed because the scan package requires a greater version of the Windows Update Agent.
0x80247FFFWU_E_OL_UNEXPECTEDSearch using the scan package failed.
0x80248000WU_E_DS_SHUTDOWNAn operation failed because Windows Update Agent is shutting down.
0x80248001WU_E_DS_INUSEAn operation failed because the data store was in use.
0x80248002WU_E_DS_INVALIDThe current and expected states of the data store do not match.
0x80248003WU_E_DS_TABLEMISSINGThe data store is missing a table.
0x80248004WU_E_DS_TABLEINCORRECTThe data store contains a table with unexpected columns.
0x80248005WU_E_DS_INVALIDTABLENAMEA table could not be opened because the table is not in the data store.
0x80248006WU_E_DS_BADVERSIONThe current and expected versions of the data store do not match.
0x80248007WU_E_DS_NODATAThe information requested is not in the data store.
0x80248008WU_E_DS_MISSINGDATAThe data store is missing required information or has a null value in a table column that requires a non-null value.
0x80248009WU_E_DS_MISSINGREFThe data store is missing required information or has a reference to missing license terms, a file, a localized property, or a linked row.
0x8024800AWU_E_DS_UNKNOWNHANDLERThe update was not processed because its update handler could not be recognized.
0x8024800BWU_E_DS_CANTDELETEThe update was not deleted because it is still referenced by one or more services.
0x8024800CWU_E_DS_LOCKTIMEOUTEXPIREDThe data store section could not be locked within the allotted time.
0x8024800DWU_E_DS_NOCATEGORIESThe category was not added because it contains no parent categories, and it is not a top-level category.
0x8024800EWU_E_DS_ROWEXISTSThe row was not added because an existing row has the same primary key.
0x8024800FWU_E_DS_STOREFILELOCKEDThe data store could not be initialized because it was locked by another process.
0x80248010WU_E_DS_CANNOTREGISTERThe data store is not allowed to be registered with COM in the current process.
0x80248011WU_E_DS_UNABLETOSTARTCould not create a data store object in another process.
0x80248013WU_E_DS_DUPLICATEUPDATEIDThe server sent the same update to the client computer, with two different revision IDs.
0x80248014WU_E_DS_UNKNOWNSERVICEAn operation did not complete because the service is not in the data store.
0x80248015WU_E_DS_SERVICEEXPIREDAn operation did not complete because the registration of the service has expired.
0x80248016WU_E_DS_DECLINENOTALLOWEDA request to hide an update was declined because it is a mandatory update or because it was deployed with a deadline.
0x80248017WU_E_DS_TABLESESSIONMISMATCHA table was not closed because it is not associated with the session.
0x80248018WU_E_DS_SESSIONLOCKMISMATCHA table was not closed because it is not associated with the session.
0x80248019WU_E_DS_NEEDWINDOWSSERVICEA request to remove the Windows Update service or to unregister it with Automatic Updates was declined because it is a built-in service and Automatic Updates cannot fall back to another service.
0x8024801AWU_E_DS_INVALIDOPERATIONA request was declined because the operation is not allowed.
0x8024801BWU_E_DS_SCHEMAMISMATCHThe schema of the current data store and the schema of a table in a backup XML document do not match.
0x8024801CWU_E_DS_RESETREQUIREDThe data store requires a session reset; release the session and retry with a new session.
0x8024801DWU_E_DS_IMPERSONATEDA data store operation did not complete because it was requested with an impersonated identity.
0x80248FFFWU_E_DS_UNEXPECTEDThere was a data store error not covered by another WU_E_DS_* code.
0x80249001WU_E_INVENTORY_PARSEFAILEDParsing of the rule file failed.
0x80249002WU_E_INVENTORY_GET_INVENTORY_TYPE_FAILEDFailed to get the requested inventory type from the server.
0x80249003WU_E_INVENTORY_RESULT_UPLOAD_FAILEDFailed to upload inventory result to the server.
0x80249004WU_E_INVENTORY_UNEXPECTEDThere was an inventory error not covered by another error code.
0x80249005WU_E_INVENTORY_WMI_ERRORA WMI error occurred when enumerating the instances for a particular class.
0x8024A000WU_E_AU_NOSERVICEAutomatic Updates was unable to service incoming requests.
0x8024A002WU_E_AU_NONLEGACYSERVERThe old version of Automatic Updates has stopped because the WSUS server has been upgraded.
0x8024A003WU_E_AU_LEGACYCLIENTDISABLEDThe old version of Automatic Updates was disabled.
0x8024A004WU_E_AU_PAUSEDAutomatic Updates was unable to process incoming requests because it was paused.
0x8024A005WU_E_AU_NO_REGISTERED_SERVICENo unmanaged service is registered with AU.
0x8024AFFFWU_E_AU_UNEXPECTEDThere was an Automatic Updates error not covered by another WU_E_AU * code.
0x8024C001WU_E_DRV_PRUNEDA driver was skipped.
0x8024C002WU_E_DRV_NOPROP_OR_LEGACYA property for the driver could not be found. It may not conform with required specifications.
0x8024C003WU_E_DRV_REG_MISMATCHThe registry type read for the driver does not match the expected type.
0x8024C004WU_E_DRV_NO_METADATAThe driver update is missing metadata.
0x8024C005WU_E_DRV_MISSING_ATTRIBUTEThe driver update is missing a required attribute.
0x8024C006WU_E_DRV_SYNC_FAILEDDriver synchronization failed.
0x8024C007WU_E_DRV_NO_PRINTER_CONTENTInformation required for the synchronization of applicable printers is missing.
0x8024CFFFWU_E_DRV_UNEXPECTEDThere was a driver error not covered by another WU_E_DRV_* code.
0x8024D001WU_E_SETUP_INVALID_INFDATAWindows Update Agent could not be updated because an .inf file contains invalid information.
0x8024D002WU_E_SETUP_INVALID_IDENTDATAWindows Update Agent could not be updated because the wuident.cab file contains invalid information.
0x8024D003WU_E_SETUP_ALREADY_INITIALIZEDWindows Update Agent could not be updated because of an internal error that caused setup initialization to be performed twice.
0x8024D004WU_E_SETUP_NOT_INITIALIZEDWindows Update Agent could not be updated because setup initialization never completed successfully.
0x8024D005WU_E_SETUP_SOURCE_VERSION_MISMATCHWindows Update Agent could not be updated because the versions specified in the .inf file do not match the actual source file versions.
0x8024D006WU_E_SETUP_TARGET_VERSION_GREATERWindows Update Agent could not be updated because a Windows Update Agent file on the target system is newer than the corresponding source file.
0x8024D007WU_E_SETUP_REGISTRATION_FAILEDWindows Update Agent could not be updated because regsvr32.exe returned an error.
0x8024D008WU_E_SELFUPDATE_SKIP_ON_FAILUREAn update to the Windows Update Agent was skipped because previous attempts to update failed.
0x8024D009WU_E_SETUP_SKIP_UPDATEAn update to the Windows Update Agent was skipped due to a directive in the wuident.cab file.
0x8024D00AWU_E_SETUP_UNSUPPORTED_CONFIGURATIONWindows Update Agent could not be updated because the current system configuration is not supported.
0x8024D00BWU_E_SETUP_BLOCKED_CONFIGURATIONWindows Update Agent could not be updated because the system is configured to block the update.
0x8024D00CWU_E_SETUP_REBOOT_TO_FIXWindows Update Agent could not be updated because a restart of the system is required.
0x8024D00DWU_E_SETUP_ALREADYRUNNINGWindows Update Agent setup is already running.
0x8024D00EWU_E_SETUP_REBOOTREQUIREDWindows Update Agent setup package requires a reboot to complete installation.
0x8024D00FWU_E_SETUP_HANDLER_EXEC_FAILUREWindows Update Agent could not be updated because the setup handler failed when it was run.
0x8024D010WU_E_SETUP_INVALID_REGISTRY_DATAWindows Update Agent could not be updated because the registry contains invalid information.
0x8024D011WU_E_SELFUPDATE_REQUIREDWindows Update Agent must be updated before search can continue.
0x8024D012WU_E_SELFUPDATE_REQUIRED_ADMINWindows Update Agent must be updated before search can continue. An administrator is required to perform the operation.
0x8024D013WU_E_SETUP_WRONG_SERVER_VERSIONWindows Update Agent could not be updated because the server does not contain update information for this version.
0x8024DFFFWU_E_SETUP_UNEXPECTEDWindows Update Agent could not be updated because of an error not covered by another WU_E_SETUP_* error code.
0x8024E001WU_E_EE_UNKNOWN_EXPRESSIONAn expression evaluator operation could not be completed because an expression was unrecognized.
0x8024E002WU_E_EE_INVALID_EXPRESSIONAn expression evaluator operation could not be completed because an expression was invalid.
0x8024E003WU_E_EE_MISSING_METADATAAn expression evaluator operation could not be completed because an expression contains an incorrect number of metadata nodes.
0x8024E004WU_E_EE_INVALID_VERSIONAn expression evaluator operation could not be completed because the version of the serialized expression data is invalid.
0x8024E005WU_E_EE_NOT_INITIALIZEDThe expression evaluator could not be initialized.
0x8024E006WU_E_EE_INVALID_ATTRIBUTEDATAAn expression evaluator operation could not be completed because there was an invalid attribute.
0x8024E007WU_E_EE_CLUSTER_ERRORAn expression evaluator operation could not be completed because the cluster state of the computer could not be determined.
0x8024EFFFWU_E_EE_UNEXPECTEDThere was an expression evaluator error not covered by another WU_E_EE_* error code.
0x8024F001WU_E_REPORTER_EVENTCACHECORRUPTThe event cache file was defective.
0x8024F002WU_E_REPORTER_

 

EVENTNAMESPACEPARSEFAILED
The XML in the event namespace descriptor could not be parsed.
0x8024F003WU_E_INVALID_EVENTThe XML in the event namespace descriptor could not be parsed.
0x8024F004WU_E_SERVER_BUSYThe server rejected an event because the server was too busy.
0x8024FFFFWU_E_REPORTER_UNEXPECTEDThere was a reporter error not covered by another error code.

Windows Update Agent Result Codes

 

Manually Testing the Patch

It is best practice that you download the patch to the device and manually run in in the GUI.  The patch should display a message giving the same reason for not installing in a dialog. Once you have verified why the patch will not install manually, contact support and be sure to upload the vulscan log from the repair task to the case.

 

Detection Issues That Support Likely Will Not be able to Resolve

Certain false detection issues can occur that support will likely be unable to troubleshoot or resolve.  The most likely of these is with our powershell scripts running on Windows 7 devices. The example from another vulscan log below shows a script error when trying to run on a device.

Mon, 23 Oct 2017 14:58:48 File OSVERSION version within specified
Mon, 23 Oct 2017 14:58:48 Prod Windows 7 Service Pack 1 (ID:WIN7SP1) verified OSVERSION, found: 6.1.7601.1
Mon, 23 Oct 2017 14:58:48 Prod Windows 7 Service Pack 1 (ID:WIN7SP1) verified C:\Windows\explorer.exe, found: C:\Windows\explorer.exe
Mon, 23 Oct 2017 14:58:48 Running detection script
Mon, 23 Oct 2017 14:58:48 Content filename: 'RollupFixB201710.ps1'
Mon, 23 Oct 2017 14:58:48 Writing script content to file 'C:\Windows\TEMP\RollupFixB201710.ps1' starting at line 5
Mon, 23 Oct 2017 14:58:48 Launching external script processor: <powershell.exe>
Mon, 23 Oct 2017 14:58:48 args: <-executionpolicy bypass C:\Windows\TEMP\RollupFixB201710.ps1>
Mon, 23 Oct 2017 14:58:48 External timeout: 60
Mon, 23 Oct 2017 14:58:48 Called CreateProcess: "powershell.exe"
Mon, 23 Oct 2017 14:58:48 Error 2 launching application <powershell.exe>
Mon, 23 Oct 2017 14:58:48 4041681_MSU detected
Mon, 23 Oct 2017 14:58:48 VUL: '4041681_MSU' (windows6.1-kb4041681-x86.msu) DETECTED. Reason 'Unexpected error in custom script source. See agent log for details'. Expected ''. Found ''. Patch required 'windows6.1-kb4041681-x86.msu'.

Mon, 23 Oct 2017 14:58:48 Patch is NOT installed
Mon, 23 Oct 2017 14:58:48 Last status: Done

 

You can see from the log that the script attempted to run but got a 'Unexpected error in custom script source. See agent log for details' error. In all cases where we cannot get a proper detection from our scripts Ivanti errs on the side of caution and will throw a DETECTED and will try and install the patch just to be safe.

Issues that arise from script errors are difficult to impossible for us to troubleshoot.  The likely cause is a security setting or Antivirus/Malware program that prevents the script from running.  GPOs and powershell policies can also interfere if they are enabled in the customers environment. Since issues like this are impossible to replicate in our teat labs and are unique to the customers environment, the customer is advised to do some troubleshooting and see if security settings and restrictions can be lowered on a test device to try and get the script to run properly before contacting support.

How to troubleshoot a Patch and Compliance (vulnerability) scan

$
0
0

 

This document illustrates the files, registry, settings and other information necessary to effectively troubleshoot a vulnerability scan.

In addition, this document walks through the steps that a basic Patch and Compliance scan (otherwise known as a vulnerability scan) takes.

 

This article will not describe every single step that the Vulnerability Scanner takes, but those steps where a failure can occur.

 

For the purposes of this document a simple scan is performed by running the following at the client command line:

vulscan /scan=0 /showui

 

This command tells the vulnerability scanner to scan Windows vulnerabilities (type 0) and to show a user interface.

 

The name "LDMS2016" and "LDMS2016_v###" will be seen throughout this document.   This refers to the Core Server name of "LDMS2016" which is the name of the core server that the author had when creating the document.

 

 

Settings

The settings that control how the vulnerability scanner will behave are stored in the Distribution and Patch Settings within the Agent Settings tool.

 

These settings control behaviors such as user input options, Cloud Services Appliances patch options, scanner CPU utilization, etc.

 

These settings are stored in the Ivanti EPM Database in the AgentSettings table and physically on the core server in the

\Program Files\LANDESK\ManagementSuite\ldlogon\AgentBehaviors folder.  The Distribution and Patch Settings are stored in the AgentBehavior_(Corename)_v###.xml file within this folder.

 

AgentBehaviorsXML.jpg

                                                                            Example

 

 

Product Licensing

The categories available to scan and repair are controlled by the Product license that has been purchased and activated on the core server.

 

The following graphic shows the categories available within the Download Updates function within the Patch and Compliance tool for those with a license for all categories.

   DownloadUpdatesCategories.jpg

Click for full size

For Product Licensing support Contact Ivanti supportand select the Product Licensing option.

 

Registry Keys

 

Core

HLKM\Software\LANDESK\ManagementSuite\PatchManagement\WebServiceMaxThreads

This key does not exist by default and should only be created with an understanding of how this key works and the full ramifications of creating this key and changing the default value.  This changes the number of default threads

 

This key is documented here: https://community.landesk.com/docs/DOC-36027#jive_content_id_Increasing_the_Number_of_Web_Process_to_Database_Threads

 

Client

HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\landesk\managementsuite\WinClient\Vulscan

 

This registry key contains the following information:

 

NameTypeData
Description
AgentBehaviorREG_SZLDMS2016_v495The agent behavior that vulscan will use when operating
AlternateRebootBehavior

/rebootIfNeeded is called from 3 possible locations during a client configuration.  It is hard for the task-handler version of the caller to know that a one-time-only (client-config-only) reboot override has been specified.  So all installers just call vulscan with the /UseAlternateRebootBehavior.  If vulscan can find the string value of "AlternateRebootBehavior" in the vulscanreg key, it'll act as if the behavior was passed by the command line.

CommandLineREG_SZThe command line that was used to launch vulscan
ComputerIdn.LDMS2016REG_DWORD0x00000006When running in a /showui mode the ComputerIDN is accessed locally from the registry rather than needing a separate GetSystemIDN for the UI through a second web service call to the core.  This value matches the ComputerIDN identifier in the Ivanti Endpoint Manager database.
KLBehaviorREG_SZLDMS2016_v517This refers to the Ivanti Antivirus behavior.  This will exist even if Ivanti Antivirus is not installed on the client.
LastReportedReboot.LDMS2016REG_DWORD0x00000001
trustedfilelistREG_SZLDMS2016_v861Trusted file list used for Ivanti Endpoint Security.  This will be present even if EPS is not installed or trusted file lists are not configured for this client.

Note: The populated "Data' entries are provided as an example.  Yours will differ.

 

The VulscanReboot key should NOT be modified, deleted or created.   This is a volatile registry key used by the vulnerability scanner.  Creating this key manually will create a persistent registry key that does not go away and will cause reboot loops and/or other undesirable behavior.

 

 

Gathering information for Ivanti Support

 

The vulnerability scan log files are located in the C:\ProgramData\LANDESK\log folder.

 

When in doubt just .ZIP up the entire folder and send it.

 

Otherwise, the following logs should be gathered:

 

  • vulscan*.log
  • statusdlg*.log

 

It is very useful to turn on Xtrace with the following enabled from the registry key prior to duplicating the problem and gathering logs:

 

From HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\landesk\managementsuite\LogOptions:

2016-07-18_11-23-22.jpg

How To: Enable XTrace Diagnostic Logging for the Ivanti Core and Clients

 

Tips and Tricks

 

Vulscan can be used as a shortcut to open various folders.  The following should be run on the client command line:

 

Vulscan e - Open the folder where Vulscan resides

Vulscan c - Open the LDClient folder,

Vulscan log - Open the ProgramData\LANDESK\Log folder

 

Issue: Cannot open vulscan logs folder from the command line using "vulscan e"

 

Ivanti Patch and Compliance (vulnerability) Scan Process Flow

 

It is important to note that the following must all be able to take place:  Client contact to core through IIS and several web services.  Core contact to Database Server  Core Contact to client  Correct permissions on core ManagementSuite\Incoming directory and \ManagementSuite\LDLOGON\VulnerabilityData and VulscanResults folders.

 

Note that issues can come and go during a vulscan.  This would indicate intermittent issues.  Most of the time this occurs when the server or database has connectivity issues or are too overwhelmed to respond to requests.

 

Step 1  - Contact the Ivanti Core Server

The vulscan engine attempts to contact the core server by checking the HKLM\SOFTWARE\Intel\LANDESK\LDWM registry key.  The client tries to contact vulcore.asmx through the WSVulnerabilityCore web service.  Thus the client needs to be able to contact the core, IIS needs to be available, the app pool needs to be running, and the database needs to be able to contact the core. 

 

Good Vulscan.log entry

Fri, 15 Jul 2016 11:38:20 Core server name found in HKLM\SOFTWARE\Intel\LANDesk\LDWM: LDMS2016

Fri, 15 Jul 2016 11:38:20 File C:\Program Files (x86)\LANDesk\Shared Files\ProxyHost.exe version within specified

Fri, 15 Jul 2016 11:38:20 Attempting to connect to proxyhost

Fri, 15 Jul 2016 11:38:20 connect to proxy result: 0

Fri, 15 Jul 2016 11:38:20 Using proxyhost to communicate with the core

What could go wrong?

Certificate-Based Authentication - New Secure Client information

 

Ivanti Endpoint Manager Enhanced Security Mode

 

If core has been upgraded and you have copied the .CRT, .KEY and

Client unable to connect to the core server

 

Error: "Host not found. Retrying"

Bad vulscan.log entry:

Fri, 15 Jul 2016 13:50:16 In SendRequest: Action = SOAPAction: "http://tempuri.org/GetHashForFile"

 

Fri, 15 Jul 2016 13:50:16 SendRequest: SOAPAction: "http://tempuri.org/GetHashForFile"

 

Fri, 15 Jul 2016 13:50:16 Action SOAPAction: "http://tempuri.org/GetHashForFile" failed, socket error: 0, SOAPCLIENT_ERROR: 5.  Status code: 503, fault string:

Fri, 15 Jul 2016 13:50:16   Retrying in 0 seconds...

Fri, 15 Jul 2016 13:50:16 Action SOAPAction: "http://tempuri.org/GetHashForFile" failed, socket error: 0, SOAPCLIENT_ERROR: 5.  Status code: 503, fault string:

Fri, 15 Jul 2016 13:50:16   Retrying in 9 seconds...

Fri, 15 Jul 2016 13:50:19 Last status: Retrying in 6 seconds...

The client makes a SOAP request to the core server webservice and gets HTTP error 503 - Service Unavailable

 

Note: The default timeout for Vulscan to connect to the core is 10 minutes.   Connection will fail after this time.


Basic Troubleshooting

    • Does the HKLM\SOFTWARE\Intel\LANDESK\LDWM registry key have the correct core name listed?
    • Can you ping the core server?  Try IP address, netbios name, and FQDN
    • Does the client have connectivity otherwise?
    • Can you browse to http://coreservername/WSVulnerabilityCore/vulcore.asmx from the client browser?
      • Is the LDAppVulnerability application pool running on the core and is is the identity assigned to it correct?
      • Is IIS running on the core?

 

Useful Articles

IIS Troubleshooting and Ivanti Endpoint Manager: 101

How to troubleshoot IIS using Log Parser Studio from Microsoft

 


Core server unable to talk to the database

 

This error shows that something is wrong with the core to database communication or web service to database communication.  This can be a simple connectivity issue, database too busy, IIS/ASP.NET, etc.

 

Error: "Server busy"

 

Bad Vulscan.log entry:

Fri, 15 Jul 2016 13:31:07 In SendRequest: Action = SOAPAction: "http://tempuri.org/ResolveDeviceID"

 

 

Fri, 15 Jul 2016 13:31:07 SendRequest: SOAPAction: "http://tempuri.org/ResolveDeviceID"

 

 

Fri, 15 Jul 2016 13:31:22 Action SOAPAction: "http://tempuri.org/ResolveDeviceID" failed, socket error: 0, SOAPCLIENT_ERROR: 7.  Status code: 500, fault string: Server was unable to process request. ---> A network-related or instance-specific error occurred while establishing a connection to SQL Server. The server was not found or was not accessible. Verify that the instance name is correct and that SQL Server is configured to allow remote connections. (provider: TCP Provider, error: 0 - The remote computer refused the network connection.) ---> The remote computer refused the network connection

Fri, 15 Jul 2016 13:31:22   Retrying in 5 seconds...

Fri, 15 Jul 2016 13:31:25 Last status: Retrying in 2 seconds...

Fri, 15 Jul 2016 13:31:26 Last status: Retrying in 1 seconds..

The client does a SOAP request to the core web service to resolve it's device ID and gets HTTP Error 500 - Internal Server Error

 

    • Can you browse from the client to http://<coreservername>/WSVulnerabilityCore/Vulcore.asmx?
    • Is the core server overloaded or is the database overloaded causing a lack of a timely response?
    • Do other functions that depend on database connectivity work?  (Inventory Scan, doing a search for computers, running an Ivanti query, etc)
    • Is the APP pool assigned to the right version of .NET (4.0)
    • Is ASP.NET 4.0 bound to IIS?
    • Are the database credentials on core correct?  Check in the Configure Services drop-down in the Ivanti Endpoint Manager console.
    • Is the database server up and running?  (Ping the database server, etc)

 


Useful Articles

Error: "Server Busy" When Running a Vulnerability Scan

Step 2  - Core downloads and applies various agent settings

At this step the core server downloads and applies various agent settings.  If a setting does not apply to the computer the file will be downloaded anyway.  (For example, if you have Endpoint Security in your

 

Good Vulscan.log entry

Fri, 15 Jul 2016 14:38:57 Checking whether to unzip 'C:\ProgramData\vulScan\ClientConnectivityBehavior_Apply.zip'.  Force: false

Fri, 15 Jul 2016 14:38:57 GetFileHash: could not find "C:\ProgramData\vulScan\ClientConnectivityBehavior_Apply.zip"

Fri, 15 Jul 2016 14:38:57 Calling 'PreApplyBehavior' in 'C:\Program Files (x86)\LANDesk\LDClient\ClientConnectivityBehavior_Apply.dll'

Fri, 15 Jul 2016 14:38:57 Client connectivity settings pre-apply dll

Fri, 15 Jul 2016 14:38:57 Allowing to download from the source

Fri, 15 Jul 2016 14:38:57 Downloading trusted certificates

Fri, 15 Jul 2016 14:38:57 In SendRequest: Action = SOAPAction: "http://tempuri.org/GetHashForFile"

 

Fri, 15 Jul 2016 14:38:57 SendRequest: SOAPAction: "http://tempuri.org/GetHashForFile"

 

Fri, 15 Jul 2016 14:38:57 Success

Fri, 15 Jul 2016 14:38:57 Self update: files are up to date.

Fri, 15 Jul 2016 14:38:57 Last status: Done

Fri, 15 Jul 2016 14:38:57 Calling 'ApplyBehavior' in 'C:\Program Files (x86)\LANDesk\LDClient\ClientConnectivityBehavior_Apply.dll'

Fri, 15 Jul 2016 14:38:57 Successfully loaded ClientConnectivityBehavior_apply behaviors from 'C:\ProgramData\vulScan\ClientConnectivityBehavior_LDMS2016_v499.xml'.

The client checks it's file hash for the behavior file and compares it through a SOAP request to the core web service function "GetHashForFile".

It then applies the behavior to the client.

What could go wrong?

Client cannot access the AgentBehaviors folder on the core server

 

The client needs to be able to access the \LDLOGON\Agentbehaviors folder on the core server.  It then downloads the agent behavior .XML files and applies them if they pertain to the computer, otherwise the settings come down, but they are not applied.

 

Error: " 'Applying XXX settings failed"

Bad vulscan entry:

Fri, 15 Jul 2016 15:20:53 Info: Core did not find file AgentBehaviors/RebootBehavior_LDMS2016_v503.xml

Fri, 15 Jul 2016 15:20:53 Last status: File not found on core

Fri, 15 Jul 2016 15:20:53 Info: Core did not find file RebootBehavior_Apply.zip

Fri, 15 Jul 2016 15:20:53 Last status: File not found on core

Fri, 15 Jul 2016 15:20:53 Info: Core did not find file AgentBehaviors/RCBehavior_LDMS2016_v511.xml

Fri, 15 Jul 2016 15:20:53 Last status: File not found on core

Fri, 15 Jul 2016 15:20:53 Info: Core did not find file RCBehavior_Apply.zip

Fri, 15 Jul 2016 15:20:53 Last status: File not found on core

 

Useful Articles

Issue: Vulscan is not applying agent setting changes or is using an incorrect agent setting

Error "Unable to get the setting from core" when running security scan (Vulscan.exe)

Error: "Core could not find a file" when running vulscan on clients

Error: "Failed to apply compliance settings" during vulnerability scan return code 451


 

Step 3 - Vulscan loads and caches local MSI information

In order for the vulnerability scanner to scan MSI information, the vulnerability scanner reads and caches the MSI information from the local computer's registry. This calls the MsiEnumProducts and MsiEnumPatches functions.  This depends on the existence of MSI.DLL in the C:\Windows\System32 directory.

 

Vulscan.log entry:

Fri, 15 Jul 2016 15:20:56   Loading MSI patch information

Fri, 15 Jul 2016 15:20:56   product {7A4192A1-84C4-4E90-A31B-B4847CA8E23A}

Fri, 15 Jul 2016 15:20:56   product {7E8833A1-AF24-4CAE-82DF-CFE14C14B94D}

Fri, 15 Jul 2016 15:20:56   product {2EDC2FA3-1F34-34E5-9085-588C9EFD1CC6}

Fri, 15 Jul 2016 15:20:56   product {E7D4E834-93EB-351F-B8FB-82CDAE623003}

Fri, 15 Jul 2016 15:20:56   product {764384C5-BCA9-307C-9AAC-FD443662686A}

Fri, 15 Jul 2016 15:20:56   product {5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}

Fri, 15 Jul 2016 15:20:56   product {3D6AD258-61EA-35F5-812C-B7A02152996E}

Fri, 15 Jul 2016 15:20:56   product {45734758-4041-4EA8-8E62-DE661FC3879C}

Fri, 15 Jul 2016 15:20:56   product {23170F69-40C1-2702-0920-000001000000}

Fri, 15 Jul 2016 15:20:56   product {60EC980A-BDA2-4CB6-A427-B07A5498B4CA}

Fri, 15 Jul 2016 15:20:56   product {1F1C2DFC-2D24-3E06-BCB8-725134ADF989}

Fri, 15 Jul 2016 15:20:56   product {4C5EF2FF-EEA0-4314-8693-2AF565F14525}

Fri, 15 Jul 2016 15:20:56 Loaded 12 products and/or patches

 

Step 4 - Client requests vulnerability data information from core

 

  1. Vulnerability Definitions are downloaded from the Ivanti Patch Content servers and stored in the Ivanti Endpoint Manager database connected to the core server.
  2. When a client calls in to scan for particular data, it requests Vulnerability data of a certain type (Windows Vulnerabilities, LANDESK Updates, Custom Definitions, etc) and for the particular OS the client is running.
    1. If the client is close to up to date the client gets the vulnerability data directly from the web service.  If it is not close to up to date it downloads the entire vulnerablity data set from the .XML file(s) mentioned below.
    2. The core server also writes this information to XML files in \Program Files\LANDesk\ManagementSuite\LDLogon\VulnerabilityData
    3. The file that gets written is "type_os-bitlevel_language.timestamp".   So a Windows 7 x64 client requesting Windows Vulnerability Data information would cause the core server to write a file called "0_win7-x64_enu.1315869631.xml" and also a compressed .XMLZ version of the same file.  Only the first requesting client causes the .XML file to be initially written.  Thereafter the other clients will simply receive this .XML file.

      Note: Deleting a definition will cause the entire .XML file to be re-written and all clients will redownload the entire .XML file.

    4. LDZIP.DLL in \Program Files (x86)\LANDesk\ManagementSuite\WSVulnerabilityCore\Bin is responsible for writing the compressed version.
    5. The client then downloads this .XMLZ file, decompresses it and begins parsing it.

     

    Good vulscan.log entry:

    Fri, 15 Jul 2016 15:20:56 -------------------ProcessRules of type 0----------------------

    Fri, 15 Jul 2016 15:20:56 GetData(): agentconfig =

    Fri, 15 Jul 2016 15:20:56 Getting definition data from core LDMS2016

    Fri, 15 Jul 2016 15:20:56 HTTP POST: http://LDMS2016:443/WSVulnerabilityCore/VulCore.asmx

    Fri, 15 Jul 2016 15:20:56 Setting a proxy...

    Fri, 15 Jul 2016 15:20:56 Setting socket timeout to 1000 * 60 * 4

    Fri, 15 Jul 2016 15:20:56 Success

    Fri, 15 Jul 2016 15:20:56 Last status: Done

    Fri, 15 Jul 2016 15:20:56 Parsing information

    Fri, 15 Jul 2016 15:20:56 Decompressing data

     

    What could go wrong?

     

    Error: "0x8db30194" (404) from vulscan

    Error: "Client user does not have administrator rights" when running Vulnerability Scan

    Error: "Failed. Cannot Interpret Data" when running a Security and Compliance scan

     

    Step 5 - Vulnerability scanning results are sent to the core server

    After scanning the results are sent to the core server through http://<corename>:443/WSVulnerabilityCore/vulcore.asmx.  At this point the Web services processes the results and creates a scan result file (in this case ScanResults_{A25894AD-E7E7-C042-86AB-5F8BBD866601}_0.vrz) that goes into the \Program Files\LANDESK\ManagementSuite\VulscanResults folder on the core.  This gets processed into the database and will show up in the Security and Compliance information for the client in the inventory.

     

    Good vulscan.log entry

    Mon, 18 Jul 2016 08:37:40 Sending scan results to core LDMS2016

    Mon, 18 Jul 2016 08:37:40 PutResultsAsFile uncompressed length: 4936

    Mon, 18 Jul 2016 08:37:40 compressed length: 914

    Mon, 18 Jul 2016 08:37:40 HTTP POST: http://LDMS2016:443/incomingdata/postcgi.exe?prefix=vulscanresults\&name=ScanResults_{A25894AD-E7E7-C042-86AB-5F8BBD866601}_0.vrz

    Mon, 18 Jul 2016 08:37:40 Setting a proxy...

    Mon, 18 Jul 2016 08:37:40 Setting socket timeout to 1000 * 60 * 4

    Mon, 18 Jul 2016 08:37:40 Success

    Mon, 18 Jul 2016 08:37:40 In SendRequest: Action = SOAPAction: "http://tempuri.org/PutResultsByFile"

     

    What can go wrong?

    Failures to send the results can come from some of the following issues:

     

    • Incorrect permissions to the \Program Files\LANDESK\ManagementSuite\IncomingData folder.
    • Incorrect permissions to the \Program Files\LANDESK\ManagementSuite\VulscanResults folder.
    • Missing, corrupted or incorrect version of postcgi.exe in the IncomingData folder.
    • Inability to contact the web service to place results.

     

    Failure in vulscan.log

    Mon, 18 Jul 2016 08:49:37 Sending scan results to core LDMS2016

    Mon, 18 Jul 2016 08:49:37 PutResultsAsFile uncompressed length: 4936

    Mon, 18 Jul 2016 08:49:37 compressed length: 913

    Mon, 18 Jul 2016 08:49:37 HTTP POST: http://LDMS2016:443/incomingdata/postcgi.exe?prefix=vulscanresults\&name=ScanResults_{A25894AD-E7E7-C042-86AB-5F8BBD866601}_0.vrz

    Mon, 18 Jul 2016 08:49:37 Setting a proxy...

    Mon, 18 Jul 2016 08:49:37 Setting socket timeout to 1000 * 60 * 4

    Mon, 18 Jul 2016 08:49:37 Failed http://LDMS2016:443/incomingdata/postcgi.exe?prefix=vulscanresults\&name=ScanResults_{A25894AD-E7E7-C042-86AB-5F8BBD866601}_0.vrz on server (0), server status: 404.

    Mon, 18 Jul 2016 08:49:37 HTTP Error 404.  Giving up.

    Mon, 18 Jul 2016 08:49:37 Last status: Failed: No response from core

    Mon, 18 Jul 2016 08:49:37 Failed to put vulnerability results to core as file: 8DB301B1

    Mon, 18 Jul 2016 08:49:37 Skipping repair step because scan errors occurred.

    Mon, 18 Jul 2016 08:49:37 ReleaseMutex 'Global\vulscan_scan' succeeded. Code: 0

    Mon, 18 Jul 2016 08:49:37 Failed

    In this case the postcgi.exe was missing in the incomingdata folder.  The service responded with an HTTP 404 error "File or directory not found".

     

    Additional articles:

    Issue: Vulnerability Scans are not updating on the core

    Error: "HTTP Error 403" Vulscan Return Code 433

     

    Step 6 - Vulnerability scanner checks for autofix patches

    The vulnerability scanner then checks with the core server to see if there are any patches that should be auto fixed at this time.  This is done through the http://localhost/wsvulnerabilitycore/vulcore.asmx web service using the GetAllPatches function.  If patches are found that need to be auto fixed one of the following methods is called:

     

    • Getallpatches2 -  GetAutofix Patches for all definitions specified
    • GetAutofixPatchesForGroup - If scanning against a group, get all Autofix definitions for that group.
    • GetPatchesForGroup - Get all patches for a group (remember, you can push a repair job against a group and it will be able to scan and repair in one scan)
    • GetPatchesForVulnerability - Get all auto fix patches for patches manually selected and scanned.

     

    The core then builds a list of the repair logic that vulscan will follow and it gets sent to the client through the web service, the client then writes an .XML file to follow as it repairs patches.   This information is all of the repair logic from the definition.

    A comprehensive guide to the Meltdown and Spectre vulnerabilities (regularly updated)

    $
    0
    0
    This article is regularly updated with information regarding these vulnerabilities

     

    metlddownspectredave.jpg

     

    This document serves to be a reference to assist with the following:

     

     

    Overview of the Meltdown and Spectre vulnerabilities

    For a further overview of both the Meltdown and Spectre vulnerabilities please see the following Ivanti Blog Post: https://www.ivanti.com/blog/meltdown-spectre-need-know/ 

     

    Meltdown - CVE Notice # CVE-2017-5754                 More information from the National Vulnerability Database: NVD - CVE-2017-5754

    Spectre Variant 1 - CVE Notice # CVE-2017-5753    More information from the National Vulnerability Database: NVD - CVE-2017-5753

    Spectre Variant 1 - CVE Notice # CVE-2017-5715    More information from the National Vulnerability Database: NVD - CVE-2017-5715

     

    These CVE and NVD entries contain lists of advisories, solutions, and tools regarding these vulnerabilities. CVE is a reference method for publicly known IT vulnerabilities and exposures.

     

    Meltdown and Spectre are vulnerabilities that affect various computer processors including Intel x86 processors and some ARM-based processors.  Due to this, we will cover how to mitigate this through the features of Ivanti EPM.  Meltdown affects a very large range of computers, cell phones, tablets, etc.  Thus this touches some of the systems that you manage with Ivanti EPM.  (Examples are servers, desktops, cell phones and other mobile devices)  In January of 2018, it was disclosed along with another exploit called "Spectre" with which it shares some but not all characteristics.  Meltdown patches may introduce some amount of performance loss, however, it is not as high as initially reported.   On January 18th, 2018 unwanted reboots and other stability issues were reported due to patches applied for the mitigation of these vulnerabilities.  Due to this newer updates have been released.   All updates will be addressed later in the document underneath the OS Updates section.

     

     

    OS Updates


    New
    01/29/2018 
    Important update for all operating systems

    Due to issues found with the currently available patches, extreme caution should be used when considering the installation of them.   Due to instability that can be caused by these patches the CPU vendors will be issuing further updates that will require new patches from OS Vendors, Browser Vendors, Hardware Vendors, etc.  

    Article from Intel:Root Cause of Reboot Issue Identified; Updated Guidance for Customers and Partners

     

    Windows Updates

     

    This section describes available Patch and Compliance definitions that can be delivered through the EPM Patch and Compliance tool.

    If your patches are not installing and you expect them to be, it may be due to a registry key that Microsoft requires to be present prior to installing the patches.  This protects against potential incompatibility with Anti-malware software that may cause blue screen crashes.  

    For more information see About Antivirus products and the Meltdown and Spectre security vulnerabilities

     

    01/29/2018

     

    Microsoft has released an emergency out of band update that disables the mitigation for Spectre variant 2.  This was due to the fact that Intel's new microcode can cause higher than expected reboots that can result in data loss or corruption. 

     

    Ivanti Patch News Bulletin: A tool to disable Mitigation against Spectre (KB4078130) has been released by Microsoft. 29/Jan/2018

     

    Microsoft news about this patch release: https://support.microsoft.com/en-us/help/4078130/update-to-disable-mitigation-against-spectre-variant-2

     

    This update adds two registry settings that “manually disable mitigation against Spectre Variant 2”:

     

    "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 1 /f

    "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 1 /f

    The installation of this latest patch is optional, however, caution should be taken.  If the prior Spectre mitigation patches caused instability, you will want to install this patch (within definition MSNS18-01-4078130_INTL) in order to return to better system stability.

     

    Note: If you choose to install the following patch for KB4078130, the previously fixed patches will again detect as being installed.  You need to choose one or the other to put in your scan group.  Meaning MSNS18-01-4078130_INTL or the patches further below

    Remove Spectre Variant 2 fix

    Ivanti IDMicrosoft KB #Ivanti Publish DateOther Notes
    MSNS18-01-4078130_INTLKB407813001/29/2018

     

     

    Windows 10

    Ivanti IDMicrosoft KB #Ivanti Publish Date
    Other Notes
    MS18-01-W10_INTLVersion 1507 - KB405689301/03/2018Cumulative Update and Delta Update
    "Version 1511 - KB405688801/03/2018Cumulative Update and Delta Update
    "Version 1607 - KB405689001/03/2018Cumulative Update and Delta Update
    "Version 1703 - KB405689101/03/2018Cumulative Update and Delta Update
    "Version 1709 - KB405689201/03/2018Cumulative Update and Delta Update

     

    Windows 8.1 and Server 2012

    Ivanti Patch and Compliance Manager IDMicrosoft KB #Ivanti Publish DateOther Notes
    MS18-01-SO81_INTL  (Windows 8.1) *KB405689801/04/2018Security Only
    MS18-01-SO9_INTL (Server 2012) *KB405689901/04/2018Security Only
    MS18-01-MR7_INTLKB405689401/04/2018Monthly Rollup


    * 01/24/2018 - Windows has issued a further update to mitigate stop errors caused by a spurious interrupt on systems with PIC and APIC controllers on systems that have previously been patched with the patches for KB4056898 amongst other patches.
    (This is Ivanti Definition ID MSNS18-01-4077561_INTL)

     

    Windows 7 and Server 2008

    Ivanti IDMicrosoft KB #
    Ivanti Publish Date
    Other Notes
    MS18-01-S07_INTLKB405689701/04/2018Security Only
    MS18-01-MR7-INTLKB405689401/04/2018Monthly Rollup

     

    For important information regarding the installation of these patches, go here Current definitions in Patch and Compliance referencing Support for the Intel 'Meltdown' Security Vulnerability and see the "Additional Information" section.

    Patches are often superceded by another newer patch that contains additional fixes or migitates problems with prior patches.  It is expected that most if not all of these patches will be superceded, likely in the near future as Intel and Microsoft acquire more information about the issue.

    It is important to keep your definitions cleaned up so you are only scanning and repairing the latest patches.

    To manage your Patch Content effectively seeHow To: Manage Superceded Patches in Patch and Compliance Manager

    Note: As of 01/17/2018 for all OS Versions all Windows patches for 32-bit systems do not provide Meltdown mitigations.  This is a Windows Patch issue, not an Ivanti Patch issue.

    macOS and iOS updates

     

    Apple included mitigations for macOS 10.13.2 and iOS 11.2 released in December.  It has since followed up with additional mitigations with the just-released Apple macOS Supplemental Update: About speculative execution vulnerabilities in ARM-based and Intel CPUs - Apple Support

     

    Linux and Unix updates

     

    Centos 6

    Ivanti IDType of updateMore Info URLDate Published
    CESA-2018-0093microcode_ctlhttps://access.redhat.com/errata/RHSA-2018:0093
    01/17/2018
    CESA-2018:0013microcode_ctlhttps://access.redhat.com/errata/RHSA-2018:0013
    01/04/2018
    CESA-2018-0061libverthttps://access.redhat.com/errata/RHSA-2018:003001/04/2018
    CESA-2018:0008kernelhttps://access.redhat.com/errata/RHSA-2018:001301/04/2018
    CESA-RHSA-2018:0024qemu-kvmhttps://access.redhat.com/errata/RHSA-2018:0024

    01/04/2018

     

    Centos 7

    Ivanti IDType of updateMore Info URLDate Published
    CESA-2018:0094linux-firmwarehttps://access.redhat.com/errata/RHSA-2018:0094
    01/17/2018
    CESA-2018:0007kernelhttps://access.redhat.com/errata/RHSA-2018:000701/04/2018
    CESA-2018:0014linux-firmwarehttps://access.redhat.com/errata/RHSA-2018:001401/04/2018
    CESA-2018:0012microcode_ctlhttps://access.redhat.com/errata/RHSA-2018:001201/04/2018
    CESA-2018:0029libvirthttps://access.redhat.com/errata/RHSA-2018:002901/04/2018
    CESA-2018:0023qemu-kvmhttps://access.redhat.com/errata/RHSA-2018:002301/04/2018

     

    Redhat Enterprise

    Ivanti IDType of updateMore Info URLDate Published
    RHSA-2018-0093microcode_ctlhttps://access.redhat.com/errata/RHSA-2018:0093
    01/17/2018
    RHSA-2018-0094linux-firmwarehttps://access.redhat.com/errata/RHSA-2018:009401/17/2018
    RHSA-2018-0030libverthttps://access.redhat.com/errata/RHSA-2018:003001/05/2018
    RHSA-2018-0024qemu-kvmhttps://access.redhat.com/errata/RHSA-2018:0024

    01/04/2018

    RHSA-2018-0023qemu-kvmhttps://access.redhat.com/errata/RHSA-2018:002301/04/2018
    RHSA-2018-0012microcode_ctlhttps://access.redhat.com/errata/RHSA-2018:001201/04/2018
    RHSA-2018-0014linux-firmwarehttps://access.redhat.com/errata/RHSA-2018:001401/04/2018
    RHSA-2018-0007kernelhttps://access.redhat.com/errata/RHSA-2018:000701/04/2018
    RHSA-2018-0008kernelhttps://access.redhat.com/errata/RHSA-2018:000801/04/2018
    RHSA-2018-0013microcode_ctlhttps://access.redhat.com/errata/RHSA-2018:001301/04/2018

     

    Ubuntu

    Ivanti IDType of updateMore Info URLDate Published
    USN-3530-1WebKitGTKUSN-3530-1: WebKitGTK+ vulnerabilities | Ubuntu01/11/2018
    USN-3531-1intel-microcodeUSN-3531-1: Intel Microcode update | Ubuntu01/11/2018
    USN-3522-4linux-lts-xeniaUSN-3522-4: Linux kernel (Xenial HWE) regression | Ubuntu01/10/2018
    USN-3523-2linux-hwe, linux-azure, linux-gcp, linux-oemUSN-3523-2: Linux kernel (HWE) vulnerabilities | Ubuntu01/10/2018
    USN-3522-3linux regressionUSN-3522-3: Linux kernel regression | Ubuntu01/10/2018
    USN-3522-2linux-lts-xenial, linux-awsUSN-3522-2: Linux (Xenial HWE) vulnerability | Ubuntu01/09/2018
    USN-3522-1linux, linux-aws, linux-euclid, linux-kvmUSN-3522-1: Linux kernel vulnerability | Ubuntu01/09/2018

     

     

     

    Browser Vulnerabilities

     

    EdgeInternet ExplorerGoogle ChromeFirefoxOpera
    Earliest Recommended VersionVaries per build numberVaries per OS

    64.0.3282.140

    57.0.450.0.2762.67
    Ivanti Patch Definition IDMS18-01-W10_INTLMS18-01-IE_INTLChrome-215_INTLFF18-001_INTL or newerOPERA-154_INTL

     

    BIOS, Firmware and Driver updates

     

    Ivanti EPM Patch and Compliance provides content for several vendor's BIOS and driver updates.  It is recommended to follow the advice of the vendor and to update your systems accordingly.

     

    As a convenience we offer some links to vendor websites relating to this issue:

     

    Dell: Meltdown and Spectre Vulnerabilities | Dell US

    HP: HPSBHF03573 rev. 7 - Side-Channel Analysis Method | HP® Customer Support

    Lenovo: Reading Privileged Memory with a Side Channel

     

    Most vendors have pulled their BIOS updates pending new changes from the CPU vendors. 

    Further Information: Root Cause of Reboot Issue Identified; Updated Guidance for Customers and Partners

     

    These vendor links are provided for convenience.  They may quickly become outdated and there may be better links provided by the vendor.

     

    Antivirus software and possible compatibility issues with OS patches

     

    See the following article for information specific regarding antivirus compatibility including Ivanti Antivirus: About Antivirus products and the Meltdown and Spectre security vulnerabilities

    Viewing all 446 articles
    Browse latest View live


    <script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>