Jump to content

lepphce1

Members
  • Content Count

    39
  • Joined

  • Last visited

Posts posted by lepphce1


  1. 27 minutes ago, Kirill Tsapovsky said:

    Hello.

    Please clarify what you are checking update applicability against. Is it possible to cross-check hosts with the local Windows update list?

    There have been known certain updates that were not possible to distribute via KSC due to Microsoft specifics. However, if an item shows up on the list, its applicability should be actual. Please clarify if there are any discrepancies on that.

    Thank you.

    Even if I have _no_ applicable machines for an update, it should appear in the available updates list, correct (not assigned/to be installed)? In any case, I have a hundred machines that should have Win10/Server 2016 2017-10 CU update applicable, and it is not showing up anywhere in the software updates section.


  2. Send you

    9 minutes ago, Dmitry Eremeev said:

    Hello,

    what's the version of network agents ? Did you apply patch A for them ? Please attach "KL software report".

    Please attach Windows Update log from one machine.

    Thank you.

     

     

     

     

    Sent PM to you and KLCentralSupport. Yes, Patch A applied.

     

    Thanks!


  3. The machine I collected GSI for is running Windows 10 1703.

    A few observations.

    Windows 10 1607: 2017-10 Cumulative Update is being detected by all machines running that build.

    Windows 10 1511 & 1703: 2017-10 CU is NOT being detected (or any other Windows/Microsoft updates, it appears).

    Server 2016: no MS updates found.

    Server 2012: 2017-10 .NET and IE 11 updates found, but not the 2017-10 roll-up.

    I can confirm that KSC is aware of the 2017-10 roll-up for these builds (listed in "Software Updates" section), but does not find any applicable.

     

    Thanks!


  4. Using Patch "A" for KSC 10 SP2 MR1...

    I have multiple machines that are not finding Windows Updates, even after running the "Find Vulnerabilities and Applications updates" task.  It seems to find 3rd party apps but not Windows updates. The Find Vulnerabilities task completes successfully. Please advise.


  5. Hello,

    Had an odd event happen last night during our Monthly maintenance window. I have a "Install application updates and fix vulnerabilities" task that I use to patch both Microsoft and 3rd party updates to all of my servers. When I ran the task, I had to wait for HOURS for the KSC to copy files to the C:\ProgramData\KasperskyLab\adminkit\1103\$FTClTmp directory on each system I was running the task against. Each of my servers received many Gigabytes of data (some received 20-30Gigs). During this time, each machine would have the status of "Scheduled". When the task finally ran on the clients, it would only install a few 3rd party updates (non-microsoft). The result would be "Completed" with no reboot required. And then all of those many gigabytes of data disappeared from the said directory. It didn't apply anything near 30 gigs worth of patches.

     

    Re-running the task would copy a much smaller amount of data to this directory, and then patch all of the relevant Microsoft patches.

     

    So,

    1. There seems to be something very inefficient in how KSC is handling patch copying

    2. Why do I need to run the task twice for it to patch everything? This has not been an issue in the past.

     

    This is weird, does it make sense?

     

    Thanks


  6. The computer description in KSC is pulled from the local "Computer Description" under which is located in the "System" control panel item under "Computer name, domain, and workgroup settings." But I've found that the local computer description must exist prior to installing the Network Agent for this data to come across. Otherwise, you have to manually edit the field because I think it's a simple database entry that is populated when the network agent first communicates with the KSC.

     

    It would be nice if KSC could provide us a field that pulls the AD description, I agree with the OP that this would extremely useful.


  7. Please allow the ability to download Microsoft/Windows patches to KSC cache prior to installing. Maybe give us the option to immediately download patches from Microsoft when an update is approved.

     

    Currently, my only option is just to hit Start on the "Install application updates and fix vulnerabilities" and wait an unspecified amount of time for patches to download from the Internet. This makes timing on server patch management unpredictable (will I have to wait 15 minutes or 3 hours for the KSC/WSUS cache to complete...?).

     

    Thanks


  8. Hi,

     

    Please clarify what products and versions do you use?

    What products have clients where this message appears?

     

    BR

     

    We are using KSC 10 SP1 with Patch D. Network agent 10.2.434 with Patch D on the clients too. I do have an GSI report from an affected workstation if you would like to see that (PM me login info if u wish). This appears to be when the network agent is trying to update the "Apple Mobile Device support" software. I'm not sure what version is being updated with that particular software. I apologize, I'm not sure what else you would like to know.

×
×
  • Create New...

Important Information

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.