Enhance availability of the Patch Management Download Manager...
Posting this here to see if the community think it's a good idea. This is currently only invoked by DC during certain patch download operations. It would be significantly more useful if we were able to invoke it, on demand, regardless of what we or DC are doing. I have also posted this as a "feature request" in your appropriate feedback/ideas form.
Chrome stable channel update fixes 20 security vulnerabilities
Hello everyone, Chrome 85 has been promoted to the stable channel 85.0.4183.83 for Windows, macOS, and Linux. This update comes with fixes for 20 security vulnerabilities, the details of which are given below: CVE ID Vulnerability details Severity CVE-2020-6558 Insufficient policy enforcement in iOS High CVE-2020-6559 Use after free in presentation API High CVE-2020-6560 Insufficient policy enforcement in autofill Medium CVE-2020-6561 Inappropriate implementation in
Security updates released for Firefox 80, ESR 68.12, and ESR 78.2
Hello everyone, Mozilla has released security updates for Firefox 80, Firefox ESR 68.12, and Firefox ESR 78.2. Most of the vulnerabilities fixed are of high severity. The details of the vulnerabilities fixed are as follows: CVE ID Vulnerability details Severity CVE-2020-15663 Downgrade attack on the Mozilla Maintenance Service could have resulted in escalation of privilege High CVE-2020-15664 Attacker-induced prompt for extension installation High CVE-2020-12401 Timing-attack
Out-of-band updates released for Windows 8.1 and Windows Server 2012 R2
Hello everyone, Microsoft on August 19, released an emergency out-of-band update for two privilege escalation vulnerabilities disclosed in Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 systems. The vulnerabilities are tracked as CVE-2020-1530 and CVE-2020-1537. Both of these vulnerabilities exist in Windows Remote Access Service (RAS) and when exploited, grant elevated privileges to remote attackers. A patch for both vulnerabilities for Windows 10, Windows 7, and Windows Server 2008,
Windows 10 versions out of order?
I've noticed that the pie chart of Windows 10 versions (on the Patch Management homepage) is out of order and I think I finally figured out why. It appears to be displaying the versions from right to left instead of left to right. I would expect the versions to go couter-clockwise around the chart in this order: 1607, 1703, 1709, 1803, 1809, 1903, 1909. Instead it goes 1703, 1803, 1903, 1607, 1709, 1809, 1909. If you reverse the digits you get 3071, 3081, 3091, 7061, 9071, 9081, 9091, which is in
August Patch Tuesday - Non-security and Third party updates
Hello everyone, Below is the list of the supported Non-security and Third party updates from August Patch Tuesday NON-SECURITY UPDATES : Update for Microsoft Office 2016 (KB4484418) Update for Microsoft Project 2016 (KB4484477) Update for Skype for Business 2016 (KB4484464) Update for Microsoft Office 2010 (KB4484454) Update for Microsoft PowerPoint 2010 (KB4092435) NON-SECURITY SQL SERVER UPDATES : Cumulative Update Package 6 for SQL Server 2019 - KB4563110 Cumulative Update Package 14 for SQL
August Patch Tuesday security updates
Hello everyone, Below is the list of the security updates supported from August Patch Tuesday New Windows Security Updates : 2020-08 Security Only Quality Update for Windows 8.1 (KB4571723) (CVE-2020-1464) 2020-08 Security Only Quality Update for Windows Server 2012 R2 (KB4571723) (CVE-2020-1464) 2020-08 Security Only Quality Update for Windows Server 2012 (KB4571702) (CVE-2020-1464) 2020-08 Security Monthly Quality Rollup for Windows 8.1 (KB4571703) (CVE-2020-1464) (CVE-2020-1380) 2020-08 Security
Security fixes released for Adobe Acrobat and Reader
Hello everyone, Adobe has released security updates for Acrobat and Reader for Windows and macOS. Most of the updates are rated 'critical' and 'important'. Successful exploitation of these vulnerabilities could lead to arbitrary code execution in the context of the current user. The affected versions are as follows: Acrobat DC Continuous - 2020.009.20074 and earlier versions Acrobat Reader DC Continuous - 2020.009.20074 and earlier versions Acrobat 2017 Classic 2017 - 2017.011.30171 and earlier versions
Chrome stable channel update 84.0.4147.125 fixes several security vulnerabilities
Hello everyone, Google has updated its stable channel for Chrome to 84.0.4147.125 for Windows, macOS, and Linux. This update comes with 15 security fixes. The vulnerabilities addressed are as follows: CVE ID Vulnerability Severity CVE-2020-6542 Use after free in ANGLE High CVE-2020-6543 Use after free in task scheduling High CVE-2020-6544 Use after free in media High CVE-2020-6545 Use after free in audio High CVE-2020-6546 Inappropriate implementation in installer
Desktop central patch mangement
Hello, Urgent support required! I am using desktop central for many years for endpoint management and patch management but there is a big issue with desktop central patch management. End-user cannot choose and install patch after deployment, they are forced to install all the patches pushed, this is good for endpoints but not for server patching. we are still using WSUS for server patching, can you please add some feature, like available patch on Self-Service Portal so user can choose and installed.
DC Patch Management patch not detected...
Patch: 2020-01 Update for Windows 10 Version 1909 for x64-based Systems (KB4497165) Microsoft Windows Update identifies this system as requiring this update. However, DC does not, despite the inventory report, in DC confirming it has a qualifying CPU.
Patch's KB4565589 & KB4565636 not installing on Windows 7 w/ ESU's
The above two patches have failed to install on all of our Windows 7 machines that have had an ESU license applied to them. The ending result from the .NET error log is: Final Result: Installation failed with error code: (0x80070643), "Fatal error during installation. According to Microsoft, the error code is a generic code. Anyone else having issues with these two patches?
Security updates released for Firefox 79 and Firefox ESR 68.11
Hello everyone, Mozilla has fixed several security vulnerabilities in Firefox 79 and Firefox ESR 68.11. The details of the vulnerabilities are as follows: CVE ID Vulnerability Severity CVE-2020-15652 Potential leak of redirect targets when loading scripts in a worker High CVE-2020-6514 WebRTC data channel leaks internal address to peer High CVE-2020-15655 Extension APIs could be used to bypass Same-Origin Policy High CVE-2020-15653 Bypassing iframe sandbox when allowing
Chrome updated to stable channel 84.0.4147.105
Hello everyone, Google Chrome has been updated to stable channel 84.0.4147.105 for Windows, macOS, and Linux. This update fixes several security vulnerabilities, the details of the same are presented below: CVE ID Vulnerability Severity CVE-2020-6537 Type Confusion in V8 High CVE-2020-6538 Inappropriate implementation in WebView High CVE-2020-6532 Use after free in SCTP High CVE-2020-6539 Use after free in CSS High CVE-2020-6540 Heap buffer overflow in Skia High
Problem with patching TeamViewer 15.7.6 on Mac OS X - El Capitan 10.11.6
Is anybody else here having a problem with DC incorrectly detecting the above version of TeamViewer as being required by a Mac running El Capitan?
Decline Superseded Patch
I show a windows 10 server pack needs to be installed on one machine, service pack 1709. However the machine is already patched to 1803. Since the checkbox for the patch is greyed out as it is superseded, how can i decline the patch in hopes of desktop central not incorrectly reporting that it is still needed?
POST request to Patch Management API
When trying to initiate a POST request using Python requests library to api/1.3/patch/downloadpatch I get the following response back. {"error_description":"No Patches Specified","message_type":"downloadpatch","error_code":"3004","message_version":"1.3","status":"error"} My code is as follows: headers = { "username": "<redacted username>", "password": "<redatcted password>", "auth_type": "ad_authentication", "domainName": "<redacted domain>", "Authorization":"<redacted auth token>",
Feature update 2004 multilanguages
Hi everyone, I'm currently test the feature update deployment for 2004 win10 upgrade but I have a problem with languages version (Unknown error code : 50006) We have 3 different languages in our office, fr-FR, fr-CA and en-EN Is it possible to add 3 diffrent ISO in the update repository? Thanks, Léo
Patch in Applied Status is Missing
Dear all, We are using Manage Engine Desktop Central to apply patches to our clients. I came across with an issue that might pose a risk in my opinion. We patch the clients and then make a cross check using Nessus Patch audit. Nessus found that, KB4484284 was missing in some clients. When I checked on Desktop Central console, it was in applied status in most of the clients. Then I tried to deploy this patch manually. I have chosen the package and tried to deploy. All deployments ended with non-applicable
KB4540673 and KB4528760 installation issues
Has anyone ran into issues trying to install KB4540673 and KB4528760? Were you able to resolve the issue?
Per Remote Office Dashboard and Permissions
Hi there, Desktop Central has this nifty Dashboard in it's Patch Management component and I would like to know if it is possible to have Dashboard for each Remote Office by itself. That would be super helpful to see the health of each of our supported locations at a glance. Also, is it possible to assign permissions to only a limited subset of the Remote Offices or managed devices to a technician? Example: Technician A can perform patching to location 1, 2 and 3 Technician B can perform patching
Machines reporting to Desktop Central
Is there a way we can email the assigned user of a desktop or a laptop that they have not connected to the network for x number of days and thus remind them to do so, so that Desktop Central might be able to push necessary updates to their computers?
Security updates for Microsoft Edge (Chromium - based)
Hello everyone, Security updates for Microsoft Edge (Chromium-based) has been released to fix several vulnerabilities. The details of the vulnerabilities addressed are as follows: CVE-ID Vulnerability details Severity CVE-2020-6510 Heap buffer overflow in background fetch Critical CVE-2020-6511 Side-channel information leakage in content security policy High CVE-2020-6512 Type Confusion in V8 High CVE-2020-6513 Heap buffer overflow in PDFium High CVE-2020-6514
Critical remote code execution vulnerability in Windows DNS server (CVE-2020-1350)
Hello there, Patch Tuesday July 2020 comes with a fix for the critical vulnerability CVE-2020-1350 in Windows DNS Server. This vulnerability is classified 'wormable' and has been given a CVSS score of 10. Cause of this vulnerability: This vulnerability exists due to the improper handling of requests by Windows Domain Name System (DNS) Servers. Impact of this vulnerability: To exploit this vulnerability, an unauthenticated attacker should send malicious requests to a Windows DNS server.
Patch Tuesday July 2020 - Supported updates
Hello everyone, Below is breakdown of all the updates released this Patch Tuesday. New Security Bulletins : 2020-07 Servicing Stack Update for Windows 10 Version 1809 and Windows Server 2019 (KB4558997) 2020-07 Servicing Stack Update for Windows 10 Version 1803 (KB4565552) 2020-07 Servicing Stack Update for Windows 10 Version 1709 (KB4565553) 2020-07 Servicing Stack Update for Windows 10 Version 1903 and Windows Server, version 1903 (KB4565554) 2020-07 Servicing Stack Update for Windows 10 Version
Google stable channel updated to 84.0.4147.89
Hello everyone, Chrome 84 has been updated to stable channel 84.0.4147.89 for Windows, Mac, and Linux. Various security issues have been fixed with this release, the details of which are as follows: CVE-ID Vulnerability details Severity CVE-2020-6510 Heap buffer overflow in background fetch Critical CVE-2020-6511 Side-channel information leakage in content security policy High CVE-2020-6512 Type Confusion in V8 High CVE-2020-6513 Heap buffer overflow in PDFium High
Combine Patch Manager Plus Cloud with Desktop Central
Hi, we are Desktop Central users (on-premise) and I have seen that Patch Manager Plus has a "Cloud" version. Is there a way to combine cloud patching in our current Desktop Central management? We would like to update patches in remote users and foreign delegations (without a remote on premise server for each delegation). Thanks.
Microsoft Visual C++ 2015-2019 Redistributable (14.26.28720)
Hi everyone Has anyone looked into these two updates that Desktop Central offers as third-party updates? Microsoft Visual C++ 2015-2019 Redistributable (14.26.28720) - patch ID 31457 Microsoft Visual C++ 2015-2019 Redistributable (x64) (14.26.28720) - patch ID 314573 Reason I am asking: DC says these updates are missing, however, Microsoft Update, WSUS and a third-party vulnerability scanner do not show these updates as missing. The fact that Microsoft does not even offer these updates via Microsoft
Job history for Automatic Patch Deployment
Hi, We have two automatic patch deployment routines configured to run every fortnight. Is there any way to view the history of those routines to see when they last ran, what computers were patched and what patches were installed? Also can this information be got by way of a scheduled report? thanks Ed.
Google releases chrome stable channel update 83.0.4103.116
Hello everyone, Google has updated its chrome stable channel to 83.0.4103.116 for Windows, Mac, and Linux. This following high severity vulnerability has been fixed in this release. CVE-2020-6509: Use-after-free in extensions To patch this vulnerability using Desktop Central, initiate a sync between the Patch Database and Desktop Central server. Once this is done, search for the following Patch IDs or Bulletin ID and install them in target systems. Patch ID Bulletin ID Patch Description 314753
Patch Tuesday June 2020 - Supported updates
Hello everyone, This month, we are witnessing the largest ever Patch Tuesday with 129 security fixes. Here is the list of supported updates New Security Bulletins : 2020-06 Security Update for Adobe Flash Player for Windows (KB4561600) 2020-06 Security Only Quality Update for Windows Server 2008 (KB4561645) (ESU) 2020-06 Security Only Quality Update for Windows 7 and Windows Server 2008 R2 (KB4561669) (ESU) 2020-06 Security Only Quality Update for Windows Server 2012 (KB4561674) 2020-06 Security
Patching In Progress - stuck on offline machines
Here's the situation: I have a production deployment that consists of 1400 machines. We are at roughly 80% complete however, there is a list of 11 machines that have the status of "Patching in Progress." The problem here is that 9 of those machines have shown as offline for the last 3 days. This seems to be causing an issue to where the remainder of the machines are falling behind on getting patched. The WOL Status is always listed as "In Progress." and the WOl Remarks are listed as Processing wake
Chrome releases security updates to fix critical vulnerabilities
Hello everyone, Chrome has updated its stable channel to 83.0.4103.97 for Windows, Mac, and Linux. This update comes with security fixes for several vulnerabilities. The details of the vulnerabilities are as follows: CVE ID Vulnerabilities Severity CVE-2020-6493 Use after free in WebAuthentication High CVE-2020-6494 Incorrect security UI in payments High CVE-2020-6495 Insufficient policy enforcement in developer tools High CVE-2020-6496 Use after free in payments High To patch these vulnerabilities
Chrome stable channel update fixes 3 vulnerabilities
Hello folks, Google has updated its chrome stable channel to 83.0.4103.106 for Windows, Mac, and Linux. This update comes with fixes for three vulnerabilities. The details of these vulnerabilities are as follows: CVE ID Vulnerability Severity CVE-2020-6505 Use after free in speech High CVE-2020-6506 Insufficient policy enforcement in WebView High CVE-2020-6507 Out of bounds write in V8 High To install this update using Desktop Central, initiate a sync between the Patch Database and Desktop
Windows SMB protocol hit again by a new critical vulnerability - SMBleed
Hello everyone, A mere three months after patching a wormable SMBv3 vulnerability dubbed SMBGhost (CVE-2020-0796), cybersecurity researchers have identified another similar vulnerability in Windows SMB protocol. This vulnerability is called SMBleed (CVE-2020-1206) and has a severity rating score of 10. What is SMBleed? SMBleed is a new critical wormable vulnerability found in the Windows Server Message Block (SMB) protocol. This vulnerability allows attackers to leak kernel memory remotely. SMBleed
Unknown Error. Code : -2145116137
On a Windows 2008 R2 server I am getting this error code. Please advise.
Mozilla releases security fixes for Firefox 77
Hello everyone, Mozilla has released security fixes for vulnerabilities in Firefox 77. The details of the vulnerabilities fixed are as follows CVE ID Vulnerability Severity CVE-2020-12399 Timing attack on DSA signatures in NSS library High CVE-2020-12405 Use-after-free in SharedWorkerService High CVE-2020-12406 JavaScript type confusion with NativeTypes High CVE-2020-12407 WebRender leaking GPU memory when using border-image CSS directive Moderate CVE-2020-12408 URL spoofing when using IP
Rollout of Windows 10 2004 Feature updates
Hello All, A Quick heads-up, Microsoft has released its Windows 10 2004 feature updates for users. Below you can find a few highlights of this feature update. Fast identity authentication through Windows Hello is now supported across all major browsers. Windows Defender system guard enables a higher level of firmware protection. Setup Diag is automatically installed. Improvements in Windows Powershell cmdlets. Go ahead and read this document to know what the pre-requisites are and how
Critical issue while deploying Cisco Webex patch
Hello everyone, The Cisco Webex patch with Patch ID 313977 was released on Apr-28-2020 at 04:40 pm GMT. Regrettably, on installing this patch in certain machines, few of our customers got in touch with us stating a few issues. Following this, the patch was removed from the Desktop Central repository on the morning of Apr-29-2020, for further analysis of the situation. Issue when deploying Cisco Webex patch: Customers who have synced the database and deployed the Cisco Webex patch in the following
Desktop Central patch management cloud install for Remote Workers
Hi, since Covid-19 about 95% of our staff is now working from home. We have to be able to approve patches for our systems. All of our systems connect through a vpn however we do not want the patches to push to system through vpn because it causes bandwidth issues. We have heard there is an option to have employees working from home to receive the patches directly from the cloud and not from the DC server repository. Essentially they would receive the patch approval through vpn but the actual patches
Next Page