Patchscan timeout
Hello, i have a problem with desktop central. first the setup: i installed windows central 10 on a windows server 2019 essentials with installed domain controller in a virtual machine for evaluation purposes. Agent installed fine on the machine. But when i start the patchscan i always get a timeout. Checked the article for that but no success. Any help is appreciated. thanks and best regards
Chrome 83.0.4103.61 fixes 38 security flaws
Hello everyone, The latest stable version of the web browser ' Google Chrome ', version 83.0.4103.61, aka Chrome 83, is released for Windows, Mac and Linux. This update contains 38 security fixes and packs a number of new features including enhanced privacy controls, new settings for managing cookie files, a new Safety Check option, support for tab groups, new graphics for web form elements, a new API for detecting barcodes, and a new anti-XSS security feature. Here's a quick glance at the list
Software installed but Patch not applicable?
Hello, short Question, according Desktop Central, the Software is installed in a minor Version, but the Patch is not applicable? 1. Installed Software at Example Desktops: 2. Patch for Deployment: 3. Not Applicable Message I configured the Task as "Patch Installation"....could it be, that DC think, Version 15.5.xx is not applicable because the installed Version is 15.1.xx? But if i choose "Software Deployment", did DC install the new Version 15.5.xx additionally or did DC upgrade the existing Version
Zoom Update 4.6.20033.0407 not working
Hi, Today a patch for Zoom was available. None of our clients show this patch as needed (installed version 4.6.19253). Patch version is Zoom (4.6.20033.0407). If apply this patch log shows: Patch detected as Not applicable since its components are available in the system through other patches deployed in the same configuration or due to some other reason. Any advice appreciated. Thanks, Juergen
Adobe releases patches for vulnerabilities in Reader and Acrobat
Hello everyone, In this month's security release, Adobe has fixed security vulnerabilities in Reader and Acrobat for Windows and macOS. If these vulnerabilities are exploited, they could cause remote code execution attacks and information leaks. The details of the vulnerabilities are as follows: CVE-ID Severity Impact CVE-2020-9610 Important Application denial-of-service CVE-2020-9612 Critical Arbitrary Code Execution CVE-2020-9615 Critical Security feature bypass CVE-2020-9597 CVE-2020-9594
May 2020 Patch Tuesday updates
Hello Everyone, Below is breakdown of all the updates released this Patch Tuesday. New Security Bulletins : 2020-05 Security Only Quality Update for Windows Server 2008 (KB4556854) (ESU) 2020-05 Security Only Quality Update for Windows 7 and Windows Server 2008 R2 (KB4556843) (ESU) 2020-05 Security Only Quality Update for Windows Server 2012 (KB4556852) 2020-05 Security Only Quality Update for Windows 8.1 and Windows Server 2012 R2 (KB4556853) 2020-05 Security Monthly Quality Rollup for Windows Server
Need additional field in "Inventory" --> "Software", "Managed Installations" column to display system names, not just count of systems where software is installed
Requesting that the "Managed Installations" field display not just the count of systems where a particular software application is installed but the actual hostname of the system on which that particular software application is installed.
Chrome fixes critical vulnerabilities - CVE-2020-6831 and CVE-2020-6464
Hello everyone, Google Chrome has updated its stable channel to 81.0.4044.138 for Windows, Mac, and Linux. This update addresses two security vulnerabilities. CVE ID Vulnerability Severity CVE-2020-6831 Stack buffer overflow in SCTP High CVE-2020-6464 Type confusion in Blink High To patch these vulnerabilities, initiate a sync between the Desktop Central server and the Central Patch repository. After the sync, search for the following Patch IDs or Bulletin ID and install them in your target
Mozilla fixes security vulnerabilities in Firefox 76
Hello everyone, Mozilla has released fixes for several security vulnerabilities in Firefox 76. Below are the details of the vulnerabilities fixed. CVE ID Vulnerability Severity CVE-2020-12387 Use-after-free during worker shutdown Critical CVE-2020-12388 Sandbox escape with improperly guarded access tokens Critical CVE-2020-12389 Sandbox escape with improperly separated process types High CVE-2020-12390 Incorrect serialization of nsIPrincipal.origin for IPv6 addresses Moderate CVE-2020-12391
Patching for closed network not finishing update from internet
Its been 4 days trying to sync the patch database from internet but it never complete downloading update information using the command "patchsync.bat -c updatedb", it always stuck some where in the process, I left it for two days but it never finishes. What could be the problem? Thanks
All Windows versions compromised due to critical Zero-day vulnerabilities
Hello folks, Two critical zero-day vulnerabilities have been discovered in Windows Adobe Type Manager Library. Both these vulnerabilities are unpatched and allows attackers to take remote control of the systems affected (Remote Code Execution vulnerability). As of now, the attacks are not widespread and only limited targeted systems are hit. Versions affected All versions of the Windows Operating system is susceptible to attacks including Windows version 10, 8.1, 7, and Server 2008, 2012, 2016,
Email Notification not Enabled for Vulnerability Update
I see the below message on Desktop Central --> Patch Mgmt--> Dashboard Anyhow I am not able to click on the Configure Now. It seems a link is not in place.
Windows 10 Pro x64 1909 Feature Pack update issue
I have followed the instructions at the link below to setup the following Win10 1909 feature pack updates... Win10 Pro x86 Win10 Pro x64 Win10 Enterprise x86 Win10 Enterprise x64 https://www.manageengine.com/patch-management/how-to/windows-10-feature-pack-deployment-1909.html I named the four ISO files as per the instructions in the link for the English files. Three of the four are working fine... Win10 Pro x86 1909 (107613-Win10_1909_enx32.iso) Win10 Enterprise x86 1909 (107615-Win10_1909_en_enterprisex32.iso)
How to create a daily patch management report with trend graph charts on Desktop Central?
Hello, I want to create a report of patch management with details as follows: It should show a daily trend with a graph chart This kind of chart needs to show the missing critical patches/vulnerabilities. Is there any way to make such report? Thank you.
Chrome fixes critical vulnerabilities in the latest stable channel update
Hello everyone, Google Chrome stable channel has been updated to 81.0.4044.129 for Windows, Mac, and Linux. This update comes with security fixes for two critical vulnerabilities. The details of the vulnerabilities are as follows: CVE-ID Vulnerability Severity CVE-2020-6461 Use after free in storage High CVE-2020-6462 Use after free in task scheduling High To patch these vulnerabilities, initiate a sync between the Desktop Central server and the Central Patch repository. Search for the following
Windows Server 2019 update to 1909
Hye, I cannot see any feature update for Windows server 2019 to version 1903 or 1909. Can this be rolled out by using Desktop Central? If so is there instrucions on how to somewhere please?
Chrome releases stable channel update to address critical vulnerabilities
Hello everyone, Google has updated its Chrome stable channel to 81.0.4044.122 for Windows, Mac, and Linux. This update comes with fixes for three critical vulnerabilities CVE ID Vulnerability Severity CVE-2020-6458 Out of bounds read and write in PDFium High CVE-2020-6459 Use after free in payments High CVE-2020-6460 Insufficient data validation in URL formatting High To patch these vulnerabilities using Desktop Central, initiate a sync between the Desktop Central server and the Central Patch
Patch Tuesday April 2020 - updates breakdown
Hello guys, Here is a quick breakdown of the April Patch Tuesday updates New Security Bulletins : 2020-04 Servicing Stack Update for Windows Server 2019 and Windows 10 Version 1809 (KB4549947) 2020-04 Servicing Stack Update for Windows 10 Version 1607 and Windows Server 2016 (KB4550994) 2020-04 Servicing Stack Update for Windows 10 Version 1903 and Windows Server, version 1903 (KB4552152) 2020-04 Servicing Stack Update for Windows 10 Version 1909 and Windows Server, version 1909 (KB4552152) 2020-04
Google chrome patches critical vulnerability - CVE-2020-6457
Hello folks, Chrome has updated its stable channel to 81.0.4044.113 for Windows, Mac, and Linux systems. This update includes the security fix for the critical vulnerability CVE-2020-6457. This is a use-after free vulnerability in Speech recognizer component in Google Chrome. A remote attacker who exploits this vulnerability can create a specially crafted web page and trick victims into clicking it, triggering the use-after-free error to execute arbitrary codes on the target systems. Initiate
Office 365 updates never gets installed
We are using Desktop Central and updates for Office 365 never gets installed. We have created APD tasks but of no use. We always gets the below error while patching it. "Patch update delayed since application is used by another process" Is there any way Desktop Central can patch Office Applications?
Several Test Group for Patch Deployment
Hi! How can i make testing of patches for several groups? The idea is to test patches in the test environment, then patches goes to the test group of a few real computers, and after installing patches on this computers they will be approved and automaticaly installed on all computers in my network. So, can i implement testing patches before approving in two steps?
Patching Open Applications
Some apps, such as Zoom or Office 365, won't update while the user has them open. You get the following message: "Patch update delayed since application is used by another process." Is there any way to force these apps to close as part of the normal patching process? Or do I have to create a configuration/scheduled task to reboot or forcefully close everything?
Firefox 75 and Firefox ESR 68.7 fix high severity vulnerabilities
Firefox rolled out the latest stable version Firefox 75.0 and its corresponding ESR version Firefox ESR 68.7 to fix a number of vulnerabilities found in their earlier versions. Here's a list of CVEs fixed and their details: CVE ID Severity Vulnerability Description Fixed in CVE-2020-6828 High Preference overwrite via crafted Intent from malicious Android application Firefox ESR 68.7 CVE-2020-6827 High Custom Tabs in Firefox for Android could have the URI spoofed Firefox ESR 68.7 CVE-2020-6821
Can patches be staged on endpoints prior to installation?
Hi everyone, I am new to this tool and I have a limited change window for patching. I would like to make the install times as efficient as possible. Can I use Desktop Central to prestage the patches prior to installation? Thank you in advance!
Zoom issued fix for an UNC vulnerability that compromises Windows credentials
Zoom patched a fatal flaw in the Zoom Windows client that allows attackers to use its chat feature to share malicious links that once clicked will leak the Windows network credentials of the victim. Such attacks are possible because Zoom for Windows not only converts normal URLs into a clickable link but also Windows networking Universal Naming Convention (UNC) paths. UNC is used to locate a network resource, such as a file hosted on an attacker-controlled SMB (Server Message Block) server. When
Mozilla fixes 2 wildly exploited zero-day vulnerabilities in Firefox
Mozilla has released fixes for 2 zero-day vulnerabilities in Firefox. The fixes are available in the newly released version of the browser, Firefox 74.0.1.The updated version fixes the vulnerabilities CVE-2020-6819 and CVE-2020-6820 Vulnerability and impact Both CVE-2020-6819 and CVE-2020-6820 are use-after-free vulnerabilities and occur due to improper memory space management by Firefox. These bugs when exploited allow the hacker to write codes into Firefox's memory and have it executed in the
Patch database proxy server settings
I am not able to change the Proxy settings for the Patch database. It is set to "No Connection to the Internet" and when I change it to "Direct Connection to the internet" The SAVE button does nothing. Any help with this would be appreciated.
Google Chrome releases Stable Channel Update
Hello guys, Google Chrome has updated its stable channel to 80.0.3987.162 for Windows, Mac, and Linux systems. This update also includes 8 security fixes. Below are the fixes that require immediate attention CVE ID Severity Vulnerability CVE-2020-6450 High Use after free in WebAudio CVE-2020-6451 High Use after free in WebAudio CVE-2020-6452 High Heap buffer overflow in media Initiate a sync between the Desktop Central server and the Central Vulnerability database and search
Force Distribution server to re-sync
Morning, I was wondering if there is an easy way to force a single distribution server to perform a full re-sync? It appears that files located in "DesktopCentral_DistributionServer\replication\store" have been deleted by mistake. This produces an error of "File not available to download from server" on the target machine served by that distribution server. Regards
not enough disk space to download patch? But yes there is...
I am evaluating Desktop Central. I have a patch (1909_x64.exe, a Win10 update?) that has failed to install with the message that there is not enough disk space to download the patch... 10GB required. But I have 219GB available on my drive where Desktop Central is installed. I have also confirmed that the patch repository is on that local drive. I had the same message earlier on a different patch, but it installed after a client and server reboot. Any ideas?
Patches Tab is blank in build 10.0.513
We have an issue where when looking at a Systems Details via System in Threats & Patches, the patches tab is blank. I know systems have patches installed and or missing but the tab is blank. Is this issue isolated to me? or do others have same issue? I've tried Chrome, IE and Firefox with same result.
MS Patch id 28391 Windows7ESUchecker.exe fails to down load
Is anyone having issues with desktop central patch management failing to download Windows7ESUchecker.exe for patch ID 28391? I have even downloaded manually and the tried to upload it and I get a checksum error when I do.
Google Chrome releases stable version 80.0.3987.149
Hello folks, Google Chrome has recently updated the stable channel to 80.0.3987.149. This version comes with fixes for 13 security bugs, of which nine are rated High in severity. The CVE IDs of the patches released are as follows. CVE-2020-6422 CVE-2020-6424 CVE-2020-6425 CVE-2020-6426 CVE-2020-6427 CVE-2020-6428 CVE-2020-6429 CVE-2019-20503 CVE-2020-6449 Desktop Central now supports Google Chrome's latest version 80.0.3987.149 for Windows, Mac, and Linux. If you're looking to update
Critical vulnerabilities fixed in Adobe Reader and Acrobat
Hello folks, The lack of Adobe updates in the March Patch Tuesday might have come as a surprise to many of us. However a week from Patch Tuesday, Adobe has released updates to fix 13 vulnerabilities in Adobe Acrobat and Reader for Windows and macOS. 9 of them are rated 'Critical'. Affected versions These versions are applicable for both Windows and mac platforms Acrobat DC Continuous 2020.006.20034 and earlier versions Acrobat Reader DC Continuous 2020.006.20034 and earlier versions Acrobat
Powershell Rest API Interegation
Hi, Has anyone tried to invoke rest methods via powershell to pull data from Desktop Central? I am currently having issues sending the initial POST to get an authentication Key back as I have done with other REST API's. I mainly seem to be getting the below even with known correct credentials :- error_description : Username and password did not match message_type : authentication error_code : 10001 message_version : 1.0 status : error I can invoke a request to a URL that
Malicious Software Removal Tool x64 - Are you installing and auditing?
Hello all; I see that this particular piece of software really isn't needed in our environment. We utilize Sophos Endpoint with InterceptX. Are any of you deploying this item?
"Out-of-band" fix rolled out for the leaked Eternal Darkness bug
Hello folks, Earlier in March 2020 Patch Tuesday, Microsoft has announced a security advisory on an unpatched vulnerability in the SMBv3 protocol (CVE-2020-0796) with a temporary workaround in place. Now a fix is available for this vulnerability as KB4551762, for Windows 10, versions 1903 and 1909, and Windows Server 2019, versions 1903 and 1909. Microsoft strongly recommends that you install the updates for this vulnerability. In case you have applied the workaround published earlier and wish
"EternalDarkness" - unpatched SMB v3 compression RCE bug details leaked
Microsoft has announced in its security advisory the details of a remote code execution vulnerability(RCE), tracked as (CVE-2020-0796) in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles connections that use compression. This vulnerability has been named 'EternalDarkness' and 'SMBGhost', along the lines of the EternalBlue exploit that leveraged the SMB vulnerability to launch the 2017 WannaCry ransomware. Affected products: Product Version Windows Server Version
Clearing Patch Status
Is there a quick way to reset/clear the patch status on some machines? I have several that were patches manually that are showing previous failures. These don't appear to clear so I was hoping to manually reset it.
March 2020 Patch Tuesday updates
Hello folks, Good day. Quick update on the March 2020 Patch Tuesday. New Security Bulletins : 2020-03 Security Monthly Quality Rollup for Windows Server 2008 for x64-based Systems (KB4541506) (ESU) 2020-03 Security Monthly Quality Rollup for Windows 7 and Windows Server 2008 R2 for x64-based Systems (KB4540688) (ESU) 2020-03 Security Monthly Quality Rollup for Windows Server 2012 for x64-based Systems (KB4541510) 2020-03 Security Monthly Quality Rollup for Windows 8.1 and Windows Server 2012 R2 for
Next Page