Upgrade to Windows 11 version 23H2 with Endpoint Central!
Hello everyone! As you all must be aware, Microsoft has recently rolled out the new 2023 update (version 23H2) for Windows 11. This is the second major update for Windows 11, encompassing all the features and fixes from previous cumulative updates in
Extend function of Test and Approve
There is a 1-to-1 mapping between the Test and Approve item, and a custom group. Cannot select a dynamic group. Can I please have Ability to select a custom dynamic group for testing Ability to use the same group for several test policies. Eg test critical
Patch Tuesday updates - November 2023
Good day, everyone! Here's a list of the updates released in this month's Patch Tuesday, New Security Bulletins : KB5032341, 2023-11 Security and Quality Rollup for .NET Framework 4.6.2 for Windows Server 2008 SP2 (KB5031987) (ESU) KB5032341, 2023-11
This version is not applicable for this target (Feature Update via Windows 11, version 23H2 Enablement Package (22H2 - 23H2) (x64)
Hi! I have some issues to run Feature Update via Windows 11, version 23H2 Enablement Package (22H2 - 23H2) (x64), we recevie "This version is not applicable for this target" on our Windows 11 22H2 machines. But when we download Windows11.0-kb5027397-x64.msu
Speed Up Patching
HI There, We currently use Desktop Manager to patch both user workstations and our servers. For workstations we have an automatic patch configuration, but for servers we do it manually as we have a very specific window to complete the patching. I've noticed that the jobs take a very long time to complete and frequently servers are in the yet to apply status when there is really no need for this. What I'd like is for all of the servers I select for a configuration to start applying patches at the
Surface firmware updates
I just wanted to put in a formal request for support of updating Surface Pro 1, 2, 3, and 4 firmware through the Desktop Central patch module. We have many many Surface devices and we have no way to upgrade the firmware on them. This is causing support issues since these updates are so critical. Do you have an update on when this feature will be added? Please contact me if I can be a beta-tester for it. Thank you.
O365 Patch Deployment user notification
Hello, We have O365 running in our environment as of last month. I have noticed and so have many users that Endpoint Central now deploys O365 patches during the specified time but only gives the user 5 minutes to close Office apps. There is an option
Vulnerability database update stuck on "Download Pending" on a closed network.
I have a fresh install of Endpoint Central version 11.2.2340.1. After install finished, i followed provided steps for permanently disabling TFA. I then set proxy to "No Internet Connection" and turned off scheduled database updates. I used the update
Managing Server 2012 ESU Updates
If we have our remaining Windows Server 2012 in Azure Arc for ESU support, can we still use EPC to manage and deploy the ESU updates moving forward? Or do they need applied some other way?
Product Suggestion for Updates self service portal
Hello! I would like to give some feedback on the new Self Service portal for self managed updates: 1. It would be nice if there was a way to default the self service portal to the updates tab instead of the Apps tab. 2. Like other patch management configurations,
Patch ID 110651 / Bulletin MSWU-3562 Failing on Most Machines
2023-07 Update for .NET Framework 3.5 for Windows 10 Version 1607 for x64 (KB5028913) I have the above mentioned patch detected as missing on 102 of our machines on the domain. Pushing the patch has failed on 98 of them. Attempts to install this patch
Anyone else's Patch Deployments Getting Stuck?
Anyone else having issues with Patch Deployments getting stuck at "Draft - Download In Progress"? Our endpoint central server started this horrifically annoying "feature" a couple months ago and support has been at best less than stellar, at worst completely
Google fixes a critical severity vulnerability and releases several security fixes in its Chrome 118.0.5993.70/.71 Stable Channel update
Hey everyone! Chrome Stable Channel has been updated to 118.0.5993.70/.71 for Windows and 118.0.5993.70 for Mac and Linux. This update comes with 20 security fixes. The details of the vulnerabilities fixed are mentioned below: CVE ID Vulnerability Severity
Will DesktopCentral support Vpro?
DesktopCentral supporting vPro would allow for PC's to be off and still be able to be patched. No longer requiring users to leave their PC's on and saving on energy costs among other things. One of vPro's marquee features is the ability to access a computer
Patch Tuesday updates - October 2023
Good day, everyone! Here's a list of the updates released in this month's Patch Tuesday, New Security Bulletins : 2023-10 Security Only Quality Update for Windows Server 2008 Systems (KB5031411) (ESU) (CVE-2023-36563) 2023-10 Security Only Quality Update
Deprecating Patch DB sync for Endpoint Central 10.1.2134.1 and below
Hello Everyone, Please be informed that the patch database sync will not happen for users using Endpoint Central versions 10.1.2134.1 and below. This will be effective from 20th of November, 2023. As a part of our performance enhancements and the commitment
Why is there still no post patch interaction from the EC Agent for macOS?
After patches are installed the computer just restarts. Boom! All your work is lost. Why is there is still no post patch UI from the agent, as there has been on Windows since day one?
Windows 11 (22H2) Feature Pack patches will now be listed under Missing Patches and Applicable Patches
Hey folks, To ensure a seamless Windows 11 upgrading experience using Endpoint Central, we have modified the UI for Feature Pack patches. Starting Jun. 05, 2023, the Windows 11 22H2 patches would be listed under Missing Patches and Applicable Patches.
Forced Windows 11 Upgrades
Is these a way for Endpoint Central to "push" and "force" the Windows 11 upgrade from Windows 10?
Google fixes several high severity vulnerabilities in its Chrome 117.0.5938.132 Stable Channel update
Good day, everyone! Chrome Stable Channel has been updated to 117.0.5938.132 for Windows, Mac and Linux. This update comes with 10 security fixes. The details of the vulnerabilities fixed are mentioned below: CVE ID Vulnerability Severity CVE-2023-5217
Mozilla fixes a critical severity vulnerability in Firefox (118.0.1) and Firefox ESR (115.3.1)
Hey everyone! Mozilla has fixed a critical severity security vulnerability in Firefox (118.0.1) and Firefox ESR (115.3.1). The details of the vulnerability fixed are as follows: Platform CVE ID Vulnerability Impact Firefox (118.0.1) and Firefox ESR (115.3.1)
Endpoint Central now supports macOS Sonoma!
Hey there folks! As we all know, Apple released macOS Sonoma (macOS 14) on 26th September 2023. This is the latest major release of the OS and is named after California's Sonoma County. At ManageEngine, we're glad to announce that you can now seamlessly
Apple fixes several security vulnerabilities in macOS Ventura 13.6, Monterey 12.7 and Safari 16.6.1
Hello everyone! Apple has fixed several security vulnerabilities in macOS Ventura 13.6, Monterey 12.7 and Safari 16.6.1. The details of the vulnerabilities fixed are as follows: Platform CVE ID Description Impact macOS Ventura 13.6 CVE-2023-41991 A certificate
Force install option?
Hi We are trialing Endpoint Central, and one of our POC tasks is patching Snow inventory agent. We have successfully deployed a configuration to a handful of servers. But they are all pending "in progress" because "software is in use". I can't find and
Systems requiring reboot
Hi, Is it possible to send a message to all users laptops requiring a reboot after patching, asking them to perform a reboot? We have some users who do not reboot their laptops when notified and can sometimes put the laptop into sleep, instead of rebooting
Create Deployment Policy via API
Hi I can create a new automatic deployment policy via the API. I have to assign a deployment policy to this policy. Is it also possible to create a new deployment policy via API? So far I have only seen that I can output a list. BR Thomy
Issue in the filtered query in Patch Mgmt
I'm not sure if this can be reproduced in other environments, but I'm seeing this on my cloud instance. Patch Mgmt --> Patches --> Supported Patches under Patches. I haven't checked in other pages such as Missing Patches / Installed Patches / Applicable
Google fixes a critical severity vulnerability and releases several security fixes in its Chrome 117.0.5938.62/.63 Stable Channel update
Hey everyone! Chrome Stable Channel has been updated to 117.0.5938.62/.63 for Windows and 117.0.5938.62 for Mac and Linux. This update comes with 16 security fixes. The details of the vulnerabilities fixed are mentioned below: CVE ID Vulnerability Severity
Mozilla fixes a critical severity vulnerability in Firefox (117.0.1), Firefox ESR (115.2.1) (102.15.1) and Thunderbird (102.15.1) (115.2.2)
Hey everyone! Mozilla has fixed a critical severity security vulnerability in Firefox (117.0.1), Firefox ESR (115.2.1) (102.15.1) and Thunderbird (102.15.1) (115.2.2). The details of the vulnerability fixed are as follows: Platform CVE ID Vulnerability
Patch Tuesday updates - September 2023
Good day, everyone! Here's a list of the updates released in this month's Patch Tuesday: New Security Bulletins : 2023-09 Security Only Quality Update for Windows Server 2008 Systems (KB5030286) (ESU) 2023-09 Security Only Quality Update for Windows Server
Patch categorization question
Why is the update for AspNet Core 6.0.21 (KB5029688) labeled as a Non Security update when there's 3 CVE's that have been fixed with this update? Shouldn't this be marked as a security update? From the KB Release notes: Notable Changes .NET 6.0.21 release
Google fixes a critical severity vulnerability in its Chrome 116.0.5845.187/.188 Stable Channel update
Hello everyone! Chrome stable channel has been updated to 116.0.5845.187/.188 for Windows and 116.0.5845.187 for Mac and Linux. This update comes with 1 security fix. The details of the vulnerability fixed are mentioned below: CVE ID Vulnerability Severity
Deploying macOS 12 Monterey security updates on Silicon machines using Desktop Central
Hello everyone, Apple has introduced new security policies for Silicon machines that requires end-user authentication for installing security updates. You can refer to this link from the vendor for more details on the same. macOS 12 Monterey security
Patch Management System health policy
does any one knows the ideal or the best practice for system health policy setting in patch management module?
User notification to show patches are installed
Is there a way to notify users that the deployment package was successfully installed in their machine? I know for some Microsoft patches that requires a reboot, users are notified that they need to reboot the laptop to finish the installation. But what
Patch Rolled Back on Rebboot
On more than one occasion, I've noticed that a machine will fail for patching. After some investigation, the error message states "patch installed successively, but rolled back on reboot". This doesn't happen for every system but it appears that it happens
how to uninstall patch 11.2.2325.14
hi, after installing patch 11.2.2325.14 endpoint server don't start. how to uninstall patch 11.2.2325.14 I tried with updatemanager.bat but nothing happens after unistall patch
[Updates released] [Zero-day] CVE-2023-36884 being targeted in the wild. No patches released yet.
Edit 1: Microsoft has released an update for Microsoft Office, providing enhanced security as a defense in depth measure. Further, Microsoft has also stated that installing this update will prevent the attack chain leading to CVE-2023-36884. More details
Patch Tuesday updates - August 2023
Hello folks! Here's a list of the updates released in this month's Patch Tuesday: New Security Bulletins : 2023-08 Security Only Quality Update for Windows Server 2008 for x64-based Systems (KB5029301) (ESU) 2023-08 Security Only Quality Update for Windows
Patch Tuesday (August 2023): Vulnerabilities and CVE IDs released
August 2023 Patch Tuesday: 87 flaws, 2 zero days and 6 critical vulnerabilities fixed Here is a breakdown of the 87 vulnerabilities fixed this month: CVE IDs: 73 Advisories: 2 Republished CVE IDs: 12 (more details on this below) Security updates were
Next Page