Google fixes a high severity vulnerability in its Chrome 105.0.5195.102 Stable Channel update
Hello everyone, Chrome Stable Channel has been updated to 105.0.5195.102 for Windows, Mac, and Linux. This update comes with 1 security fix. The details of the vulnerability fixed are mentioned below: CVE ID Vulnerability Severity CVE-2022-3075 Insufficient
Patch Scan = Vulnerability Scan?
I have an issue with home VPN users who get on network for like 1hr and sign off. Their laptops might be fully up-to-date, but still show as having vulnerabilities (because they didn't scan in the 1hr of being on network). How can I manually initiate
Google fixes a critical and several high severity vulnerabilities in its Chrome 105.0.5195.52/53/54 Stable Channel update
Hello everyone, Chrome Stable Channel has been updated to 105.0.5195.52/53/54 for Windows, 105.0.5195.52 for Mac, and Linux. This update comes with 24 security fixes. The details of the vulnerabilities fixed are mentioned below: CVE ID Vulnerability Severity
Google fixes several high severity vulnerabilities in its Chrome 104.0.5112.79/80/81 Stable Channel update
Hello everyone, Chrome Stable Channel has been updated to 104.0.5112.79/80/81 for Windows, and 104.0.5112.79 for Mac and Linux. This update comes with 27 security fixes. The details of the vulnerability fixed are mentioned below: CVE ID Vulnerability
Google fixes a critical and several high severity vulnerabilities in its Chrome 104.0.5112.102/101 Stable Channel update
Hello everyone, Chrome Stable Channel has been updated to 104.0.5112.102/101 for Windows, 104.0.5112.101 for Mac, and Linux. This update comes with 11 security fixes. The details of the vulnerabilities fixed are mentioned below: CVE ID Vulnerability Severity
Patch Tuesday August 2022 - Supported updates
Hello everyone, Here is the list of updates supported in this month's Patch Tuesday release. New Security Bulletins : 2022-08 Security Only Quality Update for Windows Server 2008 Systems (KB5016686) (ESU) 2022-08 Security Only Quality Update for Windows
Red Hat Linux: Unable to enable patching due to login validation error?
I'm trying to enable Red Hat Linux support within Endpoint Central and am currently hung up at the initial step where I enter my Redhat username and password. It's providing a "Validation Failure" each time I do this. I've double checked the password
Google Chrome Patch
My company uses ManageEngine Desktop Central to manage devices on our network. We have a system health policy in place that "Excludes all third party patches to determine the systems health". Google Chrome completely ignores this and declares the devices
Training Videos
Are there resources for more in-depth training? I'm aware of the 7 tutorial videos, but I feel that they just brush the surface of what Desktop Central can do. I'd love a "best practices" video for Patch Management, etc.
Patch Database URL's or IP Address range
Hi guys I need set firewall rule to allow Server to download Patch Database. I need the Patch Database URL's or IP Address range.
Patch Tuesday July 2022 - Supported updates
Hello everyone, Here is the list of updates supported in this month's Patch Tuesday release. New Security Bulletins : 2022-07 Security Only Quality Update for Windows Server 2008 Systems (KB5015870) (ESU) (CVE-2022-22047) 2022-07 Security Only Quality
Google fixes a zero-day and other high severity vulnerabilities in its Chrome 103.0.5060.114 Stable Channel update
Hello everyone, Chrome Stable Channel has been updated to 103.0.5060.114 for Windows, Mac, and Linux. This update comes with 4 security fixes. The details of the vulnerability fixed are mentioned below: CVE ID Vulnerability Severity CVE-2022-2294 Heap
Unknown Error Code 17002 with Update for Office 365 Professional Plus Semi Annual Channel for x64 1902 of version (11328.20392)
Hi, if I deploy the update for an Office365 I got an "Unknown Error Code 17002" and the Office365. After the failed update I can't update Office365 manually. The only way is to un- and reinstall Office365. What is Error Code 17002? Any advice? Thx, Alf
Google fixes a critical and several high severity vulnerabilities in its Chrome 103.0.5060.53 Stable Channel update
Hello everyone, Chrome Stable Channel has been updated to 103.0.5060.53 for Windows, Mac, and Linux. This update comes with 14 security fixes. The details of the vulnerability fixed are mentioned below: CVE ID Vulnerability Severity CVE-2022-2156 Use
Scan All -> Agent is not reachable
Hello, I am not new to DC (EC), we use it at work commerically, however I did not set it up there. I did set it up in my own home-lab environment, which is a fully fledged AD-Domain with 12 servers etc. One own server is for EC. The main difference though
Patch Tuesday June 2022 - Supported updates
Hello everyone, Here is the list of updates supported in this month's Patch Tuesday release. New Security Bulletins : 2022-06 Security Only Quality Update for Windows Server 2008 Systems (KB5014743) (ESU) 2022-06 Security Only Quality Update for Windows
Error installing Feature Pack Update for Windows 11 (21H2) - October 2021 Update (x64)
Hi, I try to install patch 109022 - Feature Pack Update for Windows 11 (21H2) - October 2021 Update (x64) on some win10 PCs in order to upgrade to win11. On some PCs it gets done normally and after restart they get upgraded to win11, and on others I get
Google fixes several high severity vulnerabilities in its Chrome 102.0.5005.115 Stable Channel update
Hello everyone, Chrome Stable Channel has been updated to 102.0.5005.115 for Windows, Mac, and Linux. This update comes with 7 security fixes. The details of the vulnerability fixed are mentioned below: CVE ID Vulnerability Severity CVE-2022-2007 Use
Excluding a single host from automatic patch deployment
I have one remote user whose machine I need to patch only at weekends. Currently I have a custom group to which I add everyone but him so I can apply patches to everyone else more often, but I'd prefer to use a dynamic group for that, but to exclude just his PC. However, the exclude option doesn't let me chose a machine, just types of machines. Any ideas?
Mozilla fixes several high severity vulnerabilities in Firefox 101 and Firefox ESR 91.10
Hey everyone, Mozilla has released fixes for several high-severity vulnerabilities in Firefox 101 and Firefox ESR 91.10. The details of the vulnerabilities fixed can be found below: CVE ID Description Severity CVE-2022-21736 (Firefox and Firefox ESR
Orphaned Tasks after trying to deploy patches. Can't stop them
We set up automatic patching for windows desktop, prior to using Desktop Central we used WSUS. Turned out WSUS corrupted the patch databases on the workstations. Patches were deployed but not installed, When the endpoint rebooted DC reported the patch
Google fixes several high severity vulnerabilities in its Chrome 102.0.5005.61/62/63 Stable Channel update
Hello everyone, Chrome Stable Channel has been updated to 102.0.5005.61/62/63 for Windows, 102.0.5005.61 for Mac, and Linux. This update comes with 32 security fixes. The details of the vulnerability fixed are mentioned below: CVE ID Vulnerability Severity
error during patch deployment 33609 Office365_installer_15128.20178_currentx64.exe
hello I have the following error during the deployment of the patch indicated above. can someone help me solve it please Remote Office Last Contact Time Status Updated At Remarks Last Boot Time WOL Status WOL Remarks Reboot Required Local Office May 12,
Best Practice deployment policy
Hello, We are getting around 65% successful deployment of the monthly patches, and are looking for ways to improve this. Does anyone have any best practices related to the deployment policies they would be willing to share? We want to get it up to the
Certain MS SQL 2014 Server Standard Edition components deployed on out-of-target endpoints
What happened? A couple of MS SQL 2014 Server standard edition components were deployed automatically on out-of-target endpoints. Patch details Patch ID Patch Description 500100 SQL Server 2014 Service Pack 3 (KB4022619) 30716 Security Update for
Desktop Central Patch Deployment issue
Partch ID 500100, 30716 Are falsely being seen as a missed patch to machines that don't have sql 2014 of any variety installed , anyone else seeing this? This is even after running another DB update this morning. Running Build 10.1.2137.15
dcpatchscan high CPU load
On some of our older pcs in my company we have detected that everytime dcpatchscan is running we have a very high CPU load 50%-80%. Is there a way to lower the scan rate? So that it runs once a day? I couldn't find an option to schedule the patch scan
Patch Tuesday May 2022 - Supported updates
Hello everyone, Here is the list of updates supported in this month's Patch Tuesday release. New Security Bulletins : 2022-05 Security Only Quality Update for Windows Server 2008 (KB5014006) (ESU) (CVE-2022-26925) 2022-05 Security Only Quality Update
RingCentral App Update - Not available in Patch Management
Hi all, We're looking to update the new RingCentral app from DesktopCentral but the updates aren't showing up in our Patch Management console. See the update notification from RC: The patches that are available:
Mozilla fixes several high severity vulnerabilities in Firefox 100 and Firefox ESR 91.9
Hey everyone, Mozilla has released fixes for several high-severity vulnerabilities in Firefox 100 and Firefox ESR 91.9. The details of the vulnerabilities fixed can be found below: CVE ID Description Severity CVE-2022-29914 (Firefox and Firefox ESR)
Google fixes several high severity vulnerabilities in its Chrome 101.0.4951.41 Stable Channel update
Hello everyone, Chrome stable channel has been updated to 101.0.4951.41 for Windows, Mac, and Linux. This update comes with 30 security fixes. The details of the vulnerability fixed are mentioned below: CVE ID Vulnerability Severity CVE-2022-1477 Use
Microsoft Edge for Business
i, I have a problem with Microsoft Edge for Business in the Automate Patch Deployment - Patch Management, this product is not appear for deploy.
Problem with Patch managemrnt in Dekstop Central
Hi, I've installed a Desktop Central Server in a closed network without internet. I followed the steps regarding "Patch Management for closed network". I downloaded the zip file and downloaded the vulnerability database using the following command. patchsync.bat
[New update] [Solved] Tableau Prep Builder patch gets automatically installed on systems that didn't have the product installed
Edit 2: Added RCA of the situation. Edit 1: Uninstallation patches have been added as a new resolution method. Kindly scroll to the bottom of the post. Hey everyone, This forum post is to announce that the team is aware of a minor issue arising in
Google fixes one Zero-day (CVE-2022-1364) in Chrome 100.0.4896.127 stable channel update
Hello everyone, Chrome stable channel has been updated to 100.0.4896.127 for Windows, macOS, and Linux. This update include 2 security fixes, of which one is a zero-day vulnerability tracked as CVE-2022-1364. As is norm, Google has stated that it is
MS April Patches not showing under Supported Patches
MS April Patches not showing under Supported Patches after numerous attempts to sync the database. This is the latest Patches available in the database. Is it just me or is someone else experiencing the same issue?
Patch Tuesday April 2022 - Supported updates
[EDIT] Office updates, Third party updates, and Mac updates, added Below is the list of Patch Tuesday security updates, supported this month New Security Bulletins : 2022-04 Servicing Stack Update for Windows 10 Version 1507 (KB5013269) 2022-04 Servicing
Update Vulnerability DB - Issue with File Integrity
Receiving "File integrity verification failed. Invalid response received." error on attempting to check for updates... Trying to access https://patchdb.manageengine.com/dc-crs/crs-meta-data.xml.
Patch scanning fails
Hello, Since this afternoon, Patch scanning on all our 100+ PC fails with error message "Anomalies found in scanning.Contact support with agent logs". I'm not sure if it's due to the upgrade from 10.1.2138.11 or to the synchronizing with the patch database
ME/DC dropped the ball with macOS patching...
It appears that, since the introduction of macOS Big Sur, Apple have had a paradigm shift in the way patching of macOS behaves and can be managed. It appears that ManageEngine have dropped the ball on this event quite spectacularly. No comment or response
Next Page