Patch still showing up as not being patched in vulnerability list, yet, when you look at deployment report, shows it being patched successfully??

Hey hoping someone out there has seen this, and has some answer for me.  I 
have a customer who's patch server seems to be running great except for 
one issue.  There are some machines, that show random patches as being 
vulnerabilities yet, if you look at the deployment report, it shows the 
patch has been deployed successfully?  I'm confused by this.  One thing i 
did notice is if i take a look at one of these patches, for example, 
the "Deployment Test and Diagnostic Package" if i click on it, it shows 
the particular computer as not being patched and an analysis date 
of "6/22/06" and if i look at the deployment report, it shows the pc was 
successfully patched on 8/22/07.  How do i update the "analysis date??"  
It seems like that's the problem.  The server is looking at old 
information???  I've done the agent restart / detect now etc...doesn't 
make a differece.  Shows the device contacting to the server with the 
correct date but that "analysis date" never changes... The server is 
win2k3 R2, running zpm 6.2.2.190 agent is running 6.2.2.181.
0
rob
8/24/2007 3:32:41 PM
novell.zenworks.patch 2914 articles. 0 followers. Follow

7 Replies
815 Views

Similar Articles

[PageSpeed] 49

is DAU running on those PCs?

-- 

Shaun Pond


0
Shaun
8/25/2007 9:59:36 AM
I have had the exact same problem in the past and on my side there was no 
solution as long as it was trully updated.  I use Microsofts Security 
Baseline Analyzer 2.0.1 to scan these machines with errors to make sure 
that they are infact being trully patched.  I have also had date 
inconsistencys and still do but the number of them is so large that I 
cannot go through each instance unfortunately.  I would like to know if 
the local PC or server date/time comes into play with the agent cause 
that would be a resonable answer for myself to accept.

james













Hey hoping someone out there has seen this, and has some answer for me.  
I 
> have a customer who's patch server seems to be running great except for 
> one issue.  There are some machines, that show random patches as being 
> vulnerabilities yet, if you look at the deployment report, it shows the 
> patch has been deployed successfully?  I'm confused by this.  One thing 
i 
> did notice is if i take a look at one of these patches, for example, 
> the "Deployment Test and Diagnostic Package" if i click on it, it shows 
> the particular computer as not being patched and an analysis date 
> of "6/22/06" and if i look at the deployment report, it shows the pc 
was 
> successfully patched on 8/22/07.  How do i update the "analysis 
date??"  
> It seems like that's the problem.  The server is looking at old 
> information???  I've done the agent restart / detect now etc...doesn't 
> make a differece.  Shows the device contacting to the server with the 
> correct date but that "analysis date" never changes... The server is 
> win2k3 R2, running zpm 6.2.2.190 agent is running 6.2.2.181.

0
james
8/27/2007 2:34:52 PM
> is DAU running on those PCs?
> 
> -- 
> 
> Shaun Pond
> 
> 
Hey Shaun,

I'm drawing a complete blank here...what exactly is DAU...(kicking myself 
now, cuz as soon as you say it, it's going to come to me)
0
rob
8/28/2007 2:20:14 PM
Hey James,

thanks for the post, makes me feel better that i'm not the only one out 
there seeing this.  The system definitely looks like it's doing what it's 
supposed to when it comes to the actual deployment of patches etc, just 
would like some logical explanation as to why it's doing what it's doing.  
In my line of work, most of my customers are banks, and therefore we have 
to deal with Auditors and strict regulations, and need to give them some 
answers as to why it's showing not patched, yet in fact it is.  They won't 
go for the "not sure" answer..ha ha..Shaun is the man when it comes to 
this stuff, so i have complete faith that he or someone else will be able 
to give us the answer..

rob

> I have had the exact same problem in the past and on my side there was 
no 
> solution as long as it was trully updated.  I use Microsofts Security 
> Baseline Analyzer 2.0.1 to scan these machines with errors to make sure 
> that they are infact being trully patched.  I have also had date 
> inconsistencys and still do but the number of them is so large that I 
> cannot go through each instance unfortunately.  I would like to know if 
> the local PC or server date/time comes into play with the agent cause 
> that would be a resonable answer for myself to accept.
> 
> james
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> Hey hoping someone out there has seen this, and has some answer for me.  
> I 
> > have a customer who's patch server seems to be running great except 
for 
> > one issue.  There are some machines, that show random patches as being 
> > vulnerabilities yet, if you look at the deployment report, it shows 
the 
> > patch has been deployed successfully?  I'm confused by this.  One 
thing 
> i 
> > did notice is if i take a look at one of these patches, for example, 
> > the "Deployment Test and Diagnostic Package" if i click on it, it 
shows 
> > the particular computer as not being patched and an analysis date 
> > of "6/22/06" and if i look at the deployment report, it shows the pc 
> was 
> > successfully patched on 8/22/07.  How do i update the "analysis 
> date??"  
> > It seems like that's the problem.  The server is looking at old 
> > information???  I've done the agent restart / detect now etc...doesn't 
> > make a differece.  Shows the device contacting to the server with the 
> > correct date but that "analysis date" never changes... The server is 
> > win2k3 R2, running zpm 6.2.2.190 agent is running 6.2.2.181.
> 

0
rob
8/28/2007 2:24:04 PM
Discover... Applicable...            Updates ;)

-- 

Shaun Pond


0
Shaun
8/28/2007 7:13:07 PM
Me too,

How to fix it?

0
mchon
10/4/2007 5:44:02 AM
Mchon,

I need to know the full title of the patch, and the OS you're deploying 
to - I can then tell you what it's looking for...

-- 

Shaun Pond


0
Shaun
10/17/2007 5:26:05 AM
Reply:

Similar Artilces:

Patches, patches, patches...
To forestall potential incidents of Warnock's Dillemma... I'm about to apply a whole heap 'o patches to Parrot. (With appropriate [APPLIED] responses, I hope) If, at the end of the day, I have *not* applied or commented on a patch you've sent, it means I've Officially Missed It, so give another try. Sorry 'bout this. Too much mail in the mailbox, and going back in time is tricky, as it can miss subsequent discussions on patches 'n stuff. -- Dan --------------------------------------"it's like th...

Patches, patches, patches... #2
OK, this is advance warning that I'm about to be reposting a bunch of patches of mine which appear to have succumbed to Warnock's Dilemma. The first three should be uncontroversial: there's a documentation fix-up for core.ops, and new tests for strings and stacks. The last one is rather larger, and consists of a greatly expanded set of tests for PerlString's, plus a bunch of bug-fixes. I'd be grateful if Jeff or Dan could take a look at this, as I have the feeling that a lot of the scalar PMCs are going to need similar fixes. Simon ...

Superseded patches still showing as not patched.
We have a group of superseded Office Compatibility Pack for Office 2007 vulnerabilities that are still showing as not patched even though there are no non-superseded Office Compatibility Pack for Office 2007 vulnerabilities showing as not patched. The superseded vulnerabilities are: MS09-021 969462 969679 Security Update for Office Compatibility Pack for Office 2007 (All Languages) MS09-027 969514 969613 Security Update for Office Compatibility Pack for Office 2007 (All Languages) MS09-067 972652 973704 Security Update for Microsoft Office Compatibility Pack for Office 2007 (...

[PATCH] Patch to patch for callbacks in core
I should have tested this better before submitting it. This patch is to Perl 11722 after applying my previous patch. Now callbacks will actually work. :-) - D <dmlloyd@tds.net> --- mg.c-old Tue Aug 21 13:26:52 2001 +++ perl-devel/mg.c Tue Aug 21 15:09:16 2001 @@ -1068,7 +1068,18 @@ void Perl_despatch_signals(pTHX) { - PL_event_pending = 0; + if (PL_callback_head != NULL) { + CALLBACK *cur, *next; + + for (cur = PL_callback_head; cur != NULL; cur = next) { + next = cur->next; + (*cur->callback)(cur->data); + ...

superreview cancelled: [Bug 235763] RFE: Print dialog show list printer descriptions if available : [Attachment 142878] New patch per db48x's comments (note that this patch depends on the patch in bu
Roland Mainz <roland.mainz@nrubsig.org> has cancelled Roland Mainz <roland.mainz@nrubsig.org>'s request for superreview: Bug 235763: RFE: Print dialog show list printer descriptions if available http://bugzilla.mozilla.org/show_bug.cgi?id=235763 Attachment 142878: New patch per db48x's comments (note that this patch depends on the patch in bug 235872) http://bugzilla.mozilla.org/attachment.cgi?id=142878&action=edit ...

PC has patch, but showing not patches in PM
I updated a PC this morning using patch management, the patch goes on fine. But when I check patch management it still shows as it not being patched. I've cleared the cache, ran inventory scan numerous times. The inventory shows the right version, but some reason its not talking to PM. Is there anything else I can do so it reports correctly to patch management? -- ahoagland ------------------------------------------------------------------------ Ahoagland, did the Discover Applicable Updates work OK (check the end of the detection log to see if it was posted), if...

patch status graph showing 0 patched
I have a pc (of 3 registered) that displays no vulnerabilites under the 'enabled and unpatched' vulnerabilites section (Impact: ALL) yet... looking at the Patch Status by Device Graph, it is displaying 0 patched and 3 partial ensanian@lycoming.edu, >yet... looking at the Patch Status by Device Graph, it is displaying 0 >patched and 3 partial This could be because the machines have not rebooted as the deployment required this. -- Jared Jennings - Data Technique, Inc. Novell Support Forums Sysop My Blog and Wiki with Tips, Tricks, and Tutorials http://jare...

Non Patch list or Non Patch report
We are a financial institution and we need to show examiners a report on what is NOT patched. Which is the easiest way to get a report of a list of IP addresses and computer names and a list of what isn't patched for each one? -- ddonahue22 ------------------------------------------------------------------------ Ddonahue22, I don't know of any simple way of doing this, and in any case how do you define "not patched"? If you define this by "meeting our mandatory baseline", then there's the baseline detail report, if you want a repor...

[PATCH] todo patch
--- perltodo.pod.old Wed May 16 17:51:45 2001 +++ perltodo.pod Mon May 28 16:56:29 2001 @@ -68,6 +68,10 @@ Artur Bergman's C<iThreads> module is a start on this, but needs to be more mature. +=head2 make perl_clone optionally clone ops + +So at pseduforking, mod_perl , iThreads and nvi will work properly (not as efficient) until regex engine is fixed + =head2 Work out exit/die semantics for threads =head2 Typed lexicals for compiler On Mon 28 May 2001 17:03, Artur Bergman <artur@contiller.se> wrote: > --- perltodo.pod.old Wed May 16 17:5...

[PATCH] installperl patch
------=_Part_72778_11907270.1186149310146 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Content-Disposition: inline The attached patch modifies installperl as follows: 1. Don't install lib/CGI/eg/*. (These files aren't installed by the CPAN version of CGI either.) 2. Don't install lib/ExtUtils/NOTES, and lib/ExtUtils/PATCHING. (These files aren't installed by the CPAN version of ExtUtils::MakeMaker either.) ------=_Part_72778_11907270.1186149310146 Content-Type: application/octet-stream; name=installperl.patch Content-Transf...

[PATCH] More Build patches
Two patches inline... A small change to Makefile.in so that 'make test' doesn't try to run without an interpreter or missing assembler libraries. Index: Makefile.in =================================================================== RCS file: /home/perlcvs/parrot/Makefile.in,v retrieving revision 1.24 diff -u -r1.24 Makefile.in --- Makefile.in 2001/10/14 10:58:19 1.24 +++ Makefile.in 2001/10/15 14:42:12 @@ -106,7 +106,7 @@ cd t; make clean cd docs; make clean -test: .test_dummy +test: $(TEST_PROG) assemble.pl .test_dummy .test_dummy: ...

[PATCH] Debian patches
--qDbXVdCdHGoSgWSk Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Attached are the patches to Debian's 5.8.4 package not currently covered by my latest rsync of perl-5.8.x. The patches have been re-worked to apply cleanly to that branch, but all should be applicable to perl-current as well. 10_fix_file_path Rewrite of File::Path::rmtree. This is the most important patch, it replaces rmtree with a recursive function to remove a race condition which potentially allows an attacker to make files suid or to remove arbitrary files (CAN-2...

[PATCH] more pod patches
Yet more pod linting, this time on .pm files. I've touched things without fear or favour mostly - I think probably a few of these changes affect things that are also maintained outside the core. diff -urN perl-current.orig/configpm perl-current/configpm --- perl-current.orig/configpm Thu Mar 15 20:33:42 2001 +++ perl-current/configpm Thu Mar 15 21:10:59 2001 @@ -418,7 +418,7 @@ print CONFIG <<EOF; =head2 $c -=over +=over 4 EOF $text = 1; diff -urN perl-current.orig/ext/B/B/Bytecode.pm perl-current/ext/B/B/Bytecode.pm --- perl-current.orig/ext/B/B/B...

PATCH: clarify where to patch against
--envbJBWh7q8WU6mo Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Talking about Perl 5 git repo tonight, some questions came up about where development really happens. This patch is a bit of clarification about where/why patches go to blead/maint. -- rjbs --envbJBWh7q8WU6mo Content-Type: text/x-diff; charset=us-ascii Content-Disposition: attachment; filename="0001-very-minor-tweaks-to-description-of-maint-blead.patch" From 1b7ad6bc0c93abd2d9fad847e8449824e529ba24 Mon Sep 17 00:00:00 2001 From: Ricardo SIGNES <rjbs@cpan.org> Date:...

Web resources about - Patch still showing up as not being patched in vulnerability list, yet, when you look at deployment report, shows it being patched successfully?? - novell.zenworks.patch

How NARR8 Successfully Launched On Facebook
I work with NARR8 , a free-to-use application and digital publisher of interactive eBooks. Last month, NARR8 launched its extensive catalog of ...

Goal Setting: Ultimate Guide to Setting Goals Successfully on the App Store on iTunes
Get Goal Setting: Ultimate Guide to Setting Goals Successfully on the App Store. See screenshots and ratings, and read customer reviews.

[LIVE TRADE] How To Trade Binary Options Successfully - Binary Options Signals - YouTube
Show you how to trade binary options successfully with binary options trading signals that you can download http://goo.gl/wqepHL It's actually ...

Third time's a charm: SpaceX successfully launches new probe after two failed attempts
A new probe that will observe and examine space storms has been successfully launched after two previous failed attempts.

Lauren Wells successfully appeals disqualification from world championships
Canberra athlete was disqualified during the 400-metre heats at the world athletics championships in Beijing.

Lauren Wells successfully appeals disqualification from world championships
Canberra athlete was disqualified during the 400-metre heats at the world athletics championships in Beijing.

S. Korea successfully launches satellite
SOUTH Korea has succeeded in its third attempt to launch a satellite into orbit, meeting a high-stakes challenge to national pride a month after ...

Vein grown from stem cells successfully implanted into 10-year-old girl in Sweden
DOCTORS in Sweden successfully replaced a potentially-fatal blocked vein in a 10-year-old girl with one grown from her own stem cells, according ...

Military rocket successfully launched in US
A United Launch Alliance Delta 4 rocket has successfully lifted off from Cape Canaveral Air Force Station.

NASA's Orion successfully completes historic test flight
A NASA spacecraft designed to one day fly astronauts to Mars has made a near-bullseye splashdown in the Pacific Ocean, wrapping up a flawless, ...

Resources last updated: 12/23/2015 10:45:59 AM