Radia - General Discussions

 
 
Jim Longo
Acquiring .NET Patches using Radia

When acquiring the .NET security updates there is a top-level KB number that includes the .NET sub products.

As an example, For 2-2019, the .NET the top-level bulletin is KB4487078 which includes the 3 sub .NET sub products/kb numbers (KB4483451, KB4483455, KB4483458). The 3 sub kb numbers are included under the top-level kb number.

An acquisition for MS-KB4487078 will acquire all 3 sub kb numbers/patches (KB4483451, KB4483455, KB4483458) under a single bulletin MS-KB4487078.

 

See the KB article below for more details.

https://support.microsoft.com/en-us/help/4487078/security-and-quality-rollup-updates-for-net-framework-3-5-1-to-4-7-2

 

Security and Quality Rollup updates for .NET Framework 4.7.2, 4.7.1, 4.7, 4.6.2, 4.6.1, 4.6, 4.5.2, and 3.5.1 for Windows 7 SP1 and Server 2008 R2 SP1 (KB 4487078)


4483451 Description of the Security and Quality Rollup for .NET Framework 4.7.2, 4.7.1, 4.7, 4.6.2, 4.6.1, and 4.6 for Windows 7 SP1 and Server 2008 R2 SP1 and for .NET Framework 4.6 for Server 2008 SP2 (KB4483451)

4483455 Description of the Security and Quality Rollup for .NET Framework 4.5.2 for Windows 7 SP1, Server 2008 R2 SP1, and Server 2008 SP2 (KB4483455)

4483458 Description of the Security and Quality Rollup for .NET Framework 3.5.1 for Windows 7 SP1 and Server 2008 R2 SP1 (KB4483458)

 

To determine the top-level kb number for .Net visit a .NET kb article on the web for any of the .NET products and the find additional information section. The Security Update Summary page lists all security patches released by Microsoft. 

https://portal.msrc.microsoft.com/en-us/security-guidance/summary

 

Using KB4483451 as an example we can identify the top-level kb number as 4487078.

 

https://support.microsoft.com/en-us/help/4483451/description-security-and-quality-rollup-for-net-framework-4-6-to-4-7-2

 

Additional information about this update


For more information about this update as it relates to Windows 7 Service Pack 1 (SP1) and Windows Server 2008 R2 SP1, see the following article in the Microsoft Knowledge Base:


4487078 Security and Quality Rollup updates for .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 7 SP1 and Server 2008 R2 SP1 (KB 4487078)

 

0 0
Jim Longo
How to retire bulletins from the CSDB editor in Production using RadDButil and Perform a Patch DB Synchronization

NOTE: Before retiring bulletins from the CSDB editor it is very important to un-entitle the bulletins from Radia Policy first. If bulletins are retired before removing them from policy the result will be a 650 error during the Radia agent connect.

 

There are 2 ways to remove old bulletins from the CSDB editor.

 

1.> Use the Console and add the bulletins to the retire section and run an acquisition. During the next acquisition the bulletins listed in the retire section are removed from the CSDB editor. This method may not be available in Production if the acquisitions are not executed in Production. If acquisitions are not executed in Production follow the steps it item #2 below.

 

 

2.>   If acquisitions are not executed in production use the RadDButil command line to remove old bulletins from the CSDB editor. The following example will remove MS-KB4462214 from the CSDB editor. The raddbutil.exe is in the ConfigurationServer/bin folder.

 

Copy this syntax into notepad and create a batch file named radDButil_Patch_Delete.bat in the ConfigurationServer/bin folder to it can be reused when needed. Change the bulletin ID to the bulletin ID that will be retired.

 

raddbutil.exe delete -walk 1 -ignore PRIMARY.SYSTEM.PROCESS.*+PRIMARY.SYSTEM.ZMETHOD.*+PRIMARY.PATCHMGR.CMETHOD.*+PRIMARY.PATCHMGR.METADATA.*+PRIMARY.PATCHMGR.OPTIONS.*+PRIMARY.PATCHMGR.PATCHARG.*+PRIMARY.PATCHMGR.PRODUCT.*+PRIMARY.PATCHMGR.RELEASE.*+PRIMARY.PATCHMGR.SP.*+PRIMARY.PATCHMGR.PG2PR.*+PRIMARY.PATCHMGR.PROGROUP.*-preview 0 PRIMARY.PATCHMGR.ZSERVICE.MS-KB4462214(SYNC)

  

When using RadDButil to remove old bulletins it may be necessary to Perform a DB Synchronization from the console to remove the bulletins from the Patch ODBC database and reporting.

 

 

0 0
Jim Longo
How to manage 3rd party software (Notepadd++) with Patch Manager using a custom XML file. 

Applicable to Win7, Win8.1, Win10

 

Custom XML files can be used to manage many 3rd party updates via Radia Patch Manager. Below is an example of using a custom XML file to manage Notepad ++. This concept can be expanded to include many 3rd party software updates. 

 

In the following example, Notepad++ will be installed if it does not exist and updated if it exists. This desired state can be changed depending on customer needs. For instance, we can change the desired state to only update Notepad++ if it exists and ignore if it does not exist.

 

Radia Service Name

NOTEPAD-PP-7-6-4

 

Steps:

1.> Copy the NOTEPAD-PP-7-6-4.xml into the PSL\RCA\Data\PatchManager\patch\custom folder.


2.> Acquire NOTEPAD-PP-7-6-4 using the following technote.

 

https://support.accelerite.com/hc/en-us/community/posts/360030207912-How-to-create-an-acquisition-job-without-updating-the-wsusscn2-cab-file

 

3.> Assign NOTEPAD-PP-7-6-4 in policy to install or update Notepad++ to 7.6.4 using Radia Patch Manager.

 

Copy the following code into a text file and rename the file to NOTEPAD-PP-7-6-4.xml

 

<Bulletin PopularitySeverityID="0" Rollback="N" Type="Security" URL="https://notepad-plus-plus.org" FAQURL="https://notepad-plus-plus.org" MitigationSeverityID="0" Vendor="MICROSOFT" Supported="Yes" ImpactSeverityID="0" SchemaVersion="1.0" PreReqSeverityID="0" CVEName="" DateRevised="20190309" Source="custom" Name="NOTEPAD-PP-7-6-4" Title="NOTEPAD++ 6.9.1" DatePosted="20190309" Platform="winnt">
 <Products>
<Product Name="Windows 7 (MU)" FixedInRelease="0" Tag="bfe5b177-a086-47a0-b102-097e4fa1f807">
            <Releases>
                <Release Name="Windows 7 (MU)" Tag="bfe5b177-a086-47a0-b102-097e4fa1f807">
                    <Patch Rollback="N" VerifyCmdline="" PatchURL="https://notepad-plus-plus.org/repository/7.x/7.6.4/npp.7.6.4.Installer.exe" Architecture="x86" Reboot="N" InstallCmdline="/S" Language="en" MSSUSName="" SupercededByBulletin="" SupercededByMSPatch="" OSVersion="" PatchFileName="" ObjectType="winnt.patch" ProbeCmdline="" Superceded="" Platform="winnt" UninstallCmdline="" QNumber="7640000" >
                        <PatchSignature>
<FileChg Name="notepad++.exe" CRC32="" Gmttime="" Path="C:\Program Files\Notepad++" Size="" Checksum="" Gmtdate="" Version="7.6.4.0" DesiredState="!E=8,EQ=0,GT=0,LT=8" ReportThreshold="1" Use="VERSION" />
                        </PatchSignature>
                    </Patch>
                    <Patch Rollback="N" VerifyCmdline="" PatchURL="https://notepad-plus-plus.org/repository/7.x/7.6.4/npp.7.6.4.Installer.x64.exe" Architecture="amd64" Reboot="N" InstallCmdline="/S" Language="en" MSSUSName="" SupercededByBulletin="" SupercededByMSPatch="" OSVersion="" PatchFileName="" ObjectType="winnt.patch" ProbeCmdline="" Superceded="" Platform="winnt" UninstallCmdline="" QNumber="7640000" >
                        <PatchSignature>
<FileChg Name="notepad++.exe" CRC32="" Gmttime="" Path="C:\Program Files\Notepad++" Size="" Checksum="" Gmtdate="" Version="7.6.4.0" DesiredState="!E=8,EQ=0,GT=0,LT=8" ReportThreshold="1" Use="VERSION" />
                        </PatchSignature>
                    </Patch>
                </Release>
            </Releases>
        </Product>
  <Product Name="Windows 8.1(MU)" FixedInRelease="0" Tag="6407468e-edc7-4ecd-8c32-521f64cee65e">
            <Releases>
                <Release Name="Windows 8.1(MU)" Tag="6407468e-edc7-4ecd-8c32-521f64cee65e">
                    <Patch Rollback="N" VerifyCmdline="" PatchURL="https://notepad-plus-plus.org/repository/7.x/7.6.4/npp.7.6.4.Installer.exe" Architecture="x86" Reboot="N" InstallCmdline="/S" Language="en" MSSUSName="" SupercededByBulletin="" SupercededByMSPatch="" OSVersion="" PatchFileName="" ObjectType="winnt.patch" ProbeCmdline="" Superceded="" Platform="winnt" UninstallCmdline="" QNumber="7640000" >
                        <PatchSignature>
<FileChg Name="notepad++.exe" CRC32="" Gmttime="" Path="C:\Program Files\Notepad++" Size="" Checksum="" Gmtdate="" Version="7.6.4.0" DesiredState="!E=8,EQ=0,GT=0,LT=8" ReportThreshold="1" Use="VERSION" />
                        </PatchSignature>
                    </Patch>
                    <Patch Rollback="N" VerifyCmdline="" PatchURL="https://notepad-plus-plus.org/repository/7.x/7.6.4/npp.7.6.4.Installer.x64.exe" Architecture="amd64" Reboot="N" InstallCmdline="/S" Language="en" MSSUSName="" SupercededByBulletin="" SupercededByMSPatch="" OSVersion="" PatchFileName="" ObjectType="winnt.patch" ProbeCmdline="" Superceded="" Platform="winnt" UninstallCmdline="" QNumber="7640000" >
                        <PatchSignature>
<FileChg Name="notepad++.exe" CRC32="" Gmttime="" Path="C:\Program Files\Notepad++" Size="" Checksum="" Gmtdate="" Version="7.6.4.0" DesiredState="!E=8,EQ=0,GT=0,LT=8" ReportThreshold="1" Use="VERSION" />
                        </PatchSignature>
                    </Patch>
                </Release>
            </Releases>
        </Product>
<Product Name="Windows 10 (MU)" FixedInRelease="0" Tag="A3C2375D-0C8A-42F9-BCE0-28333E198407">
            <Releases>
                <Release Name="Windows 10 (MU)" Tag="A3C2375D-0C8A-42F9-BCE0-28333E198407">
                    <Patch Rollback="N" VerifyCmdline="" PatchURL="https://notepad-plus-plus.org/repository/7.x/7.6.4/npp.7.6.4.Installer.exe" Architecture="x86" Reboot="N" InstallCmdline="/S" Language="en" MSSUSName="" SupercededByBulletin="" SupercededByMSPatch="" OSVersion="" PatchFileName="" ObjectType="winnt.patch" ProbeCmdline="" Superceded="" Platform="winnt" UninstallCmdline="" QNumber="7640000" >
                        <PatchSignature>
<FileChg Name="notepad++.exe" CRC32="" Gmttime="" Path="C:\Program Files\Notepad++" Size="" Checksum="" Gmtdate="" Version="7.6.4.0" DesiredState="!E=8,EQ=0,GT=0,LT=8" ReportThreshold="1" Use="VERSION" />
                        </PatchSignature>
                    </Patch>
                    <Patch Rollback="N" VerifyCmdline="" PatchURL="https://notepad-plus-plus.org/repository/7.x/7.6.4/npp.7.6.4.Installer.x64.exe" Architecture="amd64" Reboot="N" InstallCmdline="/S" Language="en" MSSUSName="" SupercededByBulletin="" SupercededByMSPatch="" OSVersion="" PatchFileName="" ObjectType="winnt.patch" ProbeCmdline="" Superceded="" Platform="winnt" UninstallCmdline="" QNumber="7640000" >
                        <PatchSignature>
<FileChg Name="notepad++.exe" CRC32="" Gmttime="" Path="C:\Program Files\Notepad++" Size="" Checksum="" Gmtdate="" Version="7.6.4.0" DesiredState="!E=8,EQ=0,GT=0,LT=8" ReportThreshold="1" Use="VERSION" />
                        </PatchSignature>
                    </Patch>
                </Release>
            </Releases>
        </Product>
  </Products>
</Bulletin>

0 0
Jim Longo
Silverlight 5.1.41212.0 breaks WUA on Windows 10 / Windows 10 WUA troubleshooting

I recently worked on a case where the WUA agent was not working on newly imaged Windows 10 systems after patch Tuesday February 2019.

It was determined that an old version of Silverlight was the root cause of the problem and the resolution was to install a newer version of Silverlight

 

Problem:
Silverlight 5.1.41212.0 breaks the WUA agent on newly imaged Windows 10 systems after patch Tuesday February 2019.

 

Resolution:
Installing Silverlight 5.1.50915.0 resolves the issue.

 

NOTE: If manually updating Silverlight to 5.1.50915 resolves the problem and you want to automate the Silverlight update via Radia Patch Manager open a case requesting the custom XML file MSC-KB4023307. This is currently available for Win7, Win8.1, and Win10 systems. if you require additional OS's please add the OS's to the case when opening the request. 

 

Error in the patch connect log:
20190218 09:59:46 Info: Current version of WUA is 10.0.14393.2097
20190218 09:59:46 Info: Current version of MSI is 5.0.14393.0
20190218 09:59:46 Info: WUA Scan file is C:\PROGRA~2\PSL\RCA\Agent\Lib\WUA\wsusscn2.cab
20190218 09:59:46 Info: WUA Catalog Size : 537695760 bytes & Date/Time : Tue Feb 12 2:42:16 AM Eastern Standard Time 2019
20190218 09:59:58 Info: Registering Service 99b5bd9a-87e0-4cc6-9887-715a7e903cec
20190218 10:07:11 Error: The system cannot find the file specified.
while executing
"com::Invoke $updateSearcher Search [list VT_BSTR Type='Software']"
20190218 10:07:11 Error: Error in WUA scan : The system cannot find the file specified.
20190218 10:07:11 Error: WUA Scan failed with The system cannot find the file specified., please ensure c:\Windows\SoftwareDistribution is being excluded from virus scans
20190218 10:07:11 Error: No scan result found
while executing
"error "No scan result found""
(procedure "run_scan" line 139)
invoked from within
"run_scan"
(procedure "load_scan_results" line 21)
invoked from within
"load_scan_results"
20190218 10:07:11 Error: Error in WUA scan : No scan result found

 

 

Troubleshooting WUA on Windows 10:

 

Run Powershell offline scan to check WUA (Scan-UpdatesOffline.ps1)

https://gallery.technet.microsoft.com/Using-WUA-to-Scan-for-f7e5e0be

 

Copy the wsusscn2.cab file into c:/temp or change the .ps1 path to wsusscn2.cab, 

If successful the output should look like this:

 

Run PowerShell to convert WindowsUpdate data to readable format 

 

Get-WindowsUpdateLog

 

Output is sent to the desktop and should look like the following:

 

2019/02/23 07:05:54.1338811 11096 132176 Agent           Added update 79E70BC9-237E-4486-9AC8-DD8A85880A4E.200 to search result

2019/02/23 07:05:54.1339173 11096 132176 Agent           Found 7 updates and 97 categories in search; evaluated appl. rules of 1732 out of 2703 deployed entities

 

 

The following shows the WindowsUpdateLog output of a corrupt WUA agent

 

1600/12/31 19:00:00.0000000 704   1356                  Unknown( 14): GUID=fa8efdd1-a34b-3ee9-325f-d42a4a03e8df (No Format Information found).

1600/12/31 19:00:00.0000000 704   1356                  Unknown( 15): GUID=fa8efdd1-a34b-3ee9-325f-d42a4a03e8df (No Format Information found).

1600/12/31 19:00:00.0000000 704   1356                  Unknown( 16): GUID=fa8efdd1-a34b-3ee9-325f-d42a4a03e8df (No Format Information found).

0 0
Jim Longo
Windows 10 1709 to 1803 Branch Update using Radia Patch Manager

 A Radia customer recently asked if Radia Patch Manager can be used to manage Windows 10 Branch Updates. 

 

 The short answer is yes, it is possible to use Radia Patch Manager to update Windows 10 to a newer branch but it may be more advantageous to use Radia Software or OS Manager to manage Windows 10 Branch Updates because there is more functionality built into Software/OS Management processes.

 

 Radia Patch Manager is more of a drop and run scenario where Radia Patch Manager delivers the Branch Update Media and a script to initiate the update. This can be done with 2 services to deliver the content and execute the update on separate occasions, or a single service to deliver and execute the update at the same time.  

 

 Below is an overview of using Radia Patch Manager to deliver the Branch Update media, a script to execute the Branch Update, and a custom descriptor file to acquire/manage the delivery of a Branch Update.

 

 While this is not considered to be the best way of updating Windows 10 Branch Updates, this example provides some insight into the flexibility of Radia Patch Manager to provide custom content delivery and execution.. 

 

 Windows 10 Branch Update  overview:

 

1.>   Download and execute the latest MediaCreationTool.

2.>   Extract Windows.iso, rename the Windows folder to Windows_1803_ESD

3.>   Use component select mode to publish WINDOWS_1803_ESD to the PATCHMGR Domain. (For this example, folder renamed to Windows_1803_ESD and location is C:/temp).

 

4.>   The Windows_1803_ESD service should now be present in the PATCHMGR.ZSERVICE Domain. The service will deliver the media to the agent if the media doesn’t exist. The media can be staged on the agent in the c:/temp/Windows_1803_ESD folder using a custom Patch service, or a compiled script to copy the media to the agent over the Network prior to the install event. The install event and media delivery can be run separately in different Patch services.

 

5.>   Create, compile and acquire the installation script using a custom Descriptor file to manage Windows 1803. (.vbs compiled to .exe). Modify the command line with the desired install options, Example: include /Noreboot to stop the automatic reboot after the Branch Update is installed.

 

install_1809.vbs/exe

 

MSBU-WIN1803.xml

 

6.>   The MSBU-WIN1803 Patch service should now be present in the CSDB. In this example, only Windows 10 1607/1703/1709 systems are applicable and will execute if ReleaseID is not set to 1803 in the registry.

 In the PATCHMGR Domain locate the MSBU_WIN1803 service, right click/show connections, locate and drag Windows_1803_ESD service onto the MSBU_WIN1803 service.

 

8.>   Assign MSBU_WIN1803 in Policy and run a patch connect from a Windows 10 1709 system.

 

9.>   The MSBU_WIN1803 will be at risk since the ReleaseID is not set to1803 and the sub service WINDOWS_1803_ESD will deliver the OS. Once WINDOWS_1803_ESD is delivered MSBU_WIN1803 will execute installing/upgrading Windows 10 to 1803.

 

 And finally the compliance reporting.

 

1 1
Jim Longo
Patch Tuesday: December 2018

Hello Radia community,

 

As soon as we confirm the latest wsusscn2.cab file has been updated we will update this thread with more details.

 

Please review the full list of kb numbers below and adjust your acquisition accordingly.

 

Security Update website:

https://portal.msrc.microsoft.com/en-us/security-guidance/summary

 
*For custom bulletin requests please open a case with Accelerite support and provide the kb numbers, OS/ARCHETECTURE(32/64).

 

1 0
Jim Longo
Radia 9.1/9.2 Patch Manager new Architecture added for arm64

 When acquiring Windows 10 content with X64 selected the acquisition acquires both x64 and arm64 content. To disable the acquisition or arm64 content, a new Architecture for arm64 has been added to the console via an updated patch.tkd module.

 Please open a support case to obtain the latest patch.tkd module for Radia 9.1/9.2.

 

Radia 9.1 Hotfix ID: QCCR1C56982

Radia 9.2 Hotfix ID: QCCR1C56983

 

 

Problem/Purpose  : Patch manager options to not acquire win10 arm patches.

  

Patch/Hotfix Version  : 9.1/9.2

 

Applicable platforms : Microsoft Windows

 

Steps to apply the hotfix on core:

 

1. Stop the RCA Patch Manager Server service

2. Take a backup of the existing <InstallDir>/PatchManager/modules/patch.tkd file.

3. Replace the existing <InstallDir>/PatchManager/modules/patch.tkd with the new patch.tkd

4. Start the RCA Patch Manager Server service

 

Screen shot showing the new Architecture for arm64.

 

0 0
Jim Longo
Acquisition server data clean-up

Radia Patch Manager users who do not use the metadata model will acquire patch data into the Acquisition server. This data is not automatically deleted after the acquire process publishes content into the CSDB. Over time this data can build into several hundred GB's.

 Once this data is published to the CSDB the data can be deleted using the following steps.

  • On the acquisition server, Navigate to the data/PatchManager/patch/Microsoft folder.
  • Delete only the folders that contain the patch content. (Example: MS15, MS16, MS17, MS-KB).
  • Do not delete the bulletins (.xml) or the wsus/wua folders.

0 1
Jim Longo
Patch Tuesday: November 2018
Microsoft has not yet released the November wsusscn2.cab file. As soon as we confirm the latest wsusscn2.cab file has been updated we will update this thread with more details.
 
Please review the full list of kb numbers below and adjust your acquisition accordingly.
 
Security Update website:
 
 
 
*For custom bulletin requests please open a case with Accelerite support and provide the kb numbers, OS/ARCHETECTURE(32/64).
10 0
Jim Longo
How to create an acquisition job without updating the wsusscn2.cab file / Custom XML

 In some instances it is not necessary to update the wsusscn2.cab file on each acquisition. For instance, custom XML files are independent of the wsusscn2.cab file. Also, If you run multiple acquisitions on or after Patch Tuesday and the wsusscn2.cab file is current, the subsequent acquisitions can skip the download and extraction of the current wsusscn2.cab file until the next update.

 The following example is for custom XML files to acquire and manage third party content, however, the syntax to skip the wsusscn2.cab file can be applied to any acquire job.

 

 Copy the custom XML files into the data/PatchManager/patch/custom folder prior to acquisition. 

 

1.> Create a new custom acquisition job named custom. This can be reused to acquire custom content by updating the Bulletins with the bulletin ID’s to be acquired.


2.> In the Command Line Overrides section add the following syntax to disable the wsusscn2.cab file update. This will speed up the acquire process by bypassing the wsussnc.2cab file download and extraction.

 

-SKIP_WSUSSCNCAB_DOWNLOAD Y -SKIP_WSUSSCNCAB_EXTRACTION Y

 

3.> Enter the bulletins to be acquired separated by a comma. In this example we are using 2 custom bulletins to manage Notepad++ and FileZilla via Radia Patch Manager.


4.> Set Force and Replace to Y to automatically update the CSDB with the latest bulletin data. Only use Force and Replace set to Y when re-acquiring specific content, otherwise set both to N.


5.> Set acquire Microsoft patches to Yes.


6.> Run the acquire and check the CSDB editor for the bulletins.

0 2
Jim Longo
Radia 10 command line acquisitions linked to an acquire job for exclusions

  Radia 10 users, when running an acquisition via a command line there are a couple of new command line options including a new ARCH entry and Released date range to limit the acquired content.

 When using a command line to acquire content it is recommended to link to an acquire job to utilize the exclusion list and use command line options to tailor each acquire job to streamline the acquisition process and limit the amount of unwanted data that is acquired. 

1.> Command line acquire to acquire Win7 32bit only and update the wsusscn2.cab file. Linked to a Win7 acquire job for exclusions.

nvdkit-rca-patch.exe modules\patch.tkd acquire -config etc\patch.cfg,etc\Win7.acq  -SKIP_WSUSSCNCAB_DOWNLOAD N -SKIP_WSUSSCNCAB_EXTRACTION N -arch MICROSOFT::x86 -patches_released_since 09/12/2018 -patches_released_till 09/12/2020
 
2.> Command line acquire for Win10 64bit only, do not update the wsussc2,cab file. Linked to a Win10 acquire job. Since a new Architecture was added in the latest Radia 10 patch.tkd file both x64 and amd64 should be used to acquire all 64bit content. Also, if this acquire job is run after an acquire job that updated the wsusscn2.cab file for the month, there is no need to update the wsusscn2.cab file again so it can be bypassed using the -SKIP switches set to Y. This will cut down on the amount of time the second acquire job runs. 

nvdkit-rca-patch.exe modules\patch.tkd acquire -config etc\patch.cfg,etc\Win10.acq -SKIP_WSUSSCNCAB_DOWNLOAD Y -SKIP_WSUSSCNCAB_EXTRACTION Y -arch MICROSOFT::x64,MICROSOFT::amd64 -patches_released_since 09/12/2018 -patches_released_till 09/12/2020
 
 
1.> -config links the command line to the acquire job.

         -config etc\patch.cfg,etc\Win7.acq 
         -config etc\patch.cfg,etc\Win10.acq
 
     2.> -SKIP to update the wsusscn2.cab file. Y/N

         -SKIP_WSUSSCNCAB_DOWNLOAD Y -SKIP_WSUSSCNCAB_EXTRACTION Y
  
 3.> -arch to set the architecture. For 64bit acquisitions use both x64 and amd64 to acquire all x64 content.

        -arch MICROSOFT::x64,MICROSOFT::amd64
        -arch MICROSOFT::x86
 
  4.> Date range to limit the acquisition results. Using a future date for the till switch so it doesn’t need to be updated each month until 9/12/2020.

        -patches_released_since 09/12/2018 -patches_released_till 09/12/2020
0 0
Jim Longo
Radia 10 Patch Manager new Architecture added for arm64

  Radia 10 users,

 When acquiring Windows 10 content with X64 selected the acquisition acquires both x64 and arm64 content. To disable the acquisition or arm64 content, a new Architecture for arm64 has been added to the console via an updated patch.tkd module. Please open a support case to obtain the latest patch.tkd module for Radia 10. 

 

 Hotfix ID: QCCR1C56330: 

 

Problem/Purpose  : Patch manager options to not acquire win10 arm patches.

 

Patch/Hotfix Version  : 10.0

Patch/Hotfix Level  : CP1

Applicable platforms  : Microsoft Windows

Attached hotfix files : patch.tkd

Steps to apply the hotfix on core:

 1. Stop the RCA Patch Manager Server service

 2. Take a backup of the existing <InstallDir>/PatchManager/modules/patch.tkd file.

 3. Replace the existing <InstallDir>/PatchManager/modules/patch.tkd with the new patch.tkd

 4. Start the RCA Patch Manager Server service

 

Screen shot showing the new Architecture for arm64.

 

 

0 0
Casey Brennan
Configuring usage in enterprise environment

I've deployed the usage agent to a few clients and collected usage data.  In an enterprise globally distributed network, how does one set the collection destination?  Also, is the usage data sent in compressed format?  And what is the difference between the UMINVENT and UMCOLLCT classes?  It seems that collecting the data on an agent software connect will be adequate -- so there should be no need to schedule a collection outside of that.  There is a best practices guide on the web site but it's a bit dated -- is there any other documentation which defines all the usage classes and attributes and best practices for Radia 10?

7 0
Jim Longo
October wsusscn2.cab file is not yet available

October wsusscn2.cab file is not yet available; we are monitoring the situation and will send an update once the wsusscn2lcan has been updated by Microsoft.

1 0
John Edmondson
June 2018 - Wsusscn2.cab file not yet available

Just noting that an updated June 2018 cab file is not available yet as far as I can tell.   If anyone is having a different experience please confirm.

5 0
Libor Janda
Upgrade Windows 10 to 1803

Hello all,

are somewhere described instructions how to upgrade older Windows 10 machines to 1803 using Patch manager (preferred) or Software manager without use of OS manager?

4 0
Yury Carrero
Shortcut is not removing after removing service

Using Radia 10 I unentitled a service that creates a shortcut in the computer's desktop however the shortcut is never removed from the computer. is there something that needs to be done in order for the icon to be removed from the deskop

0 0
Farhan Mohammed
Acquisition server

Hi is there a way to figure out what the version of Patch acquisition server is?

 

Thanks

2 0
Farhan Mohammed
What is SAP

Hi I was wondering what SAP is in HPCA/Radia, how is it useful?, what is SAP connect? What does it do on the client? What information does it hold? What does a SAP connect do?

1 0
Ishant Walia
Auto download of latest patches

Hi Experts,

Could you please help me knowing the process to Auto download the latest patches.

Also please suggest how to remove old patches completely.

 

Any help will be highly appreciated.

Thanks,

 

0 0
Ishant Walia
change logo of radia agent shortcut

Hi experts,

Please tell, How can we change the logo of agent desktop shortcut ?

Any help will be highly appreciated.

 

thanks,

 

0 0
Ishant Walia
publish an exe package

Hi Experts,

I have published an exe package to deploy, but facing issue while executing.

Could you please help in this.

Below is the bat file i'm using:

C:\Package\DLP_HYB\TRITONAP-ENDPOINT-x64 /s /v"WSCONTEXT=45f97d9df5f81c712635a69a07193f18-1 /qn"

Service installation method:

NATIVE CMD /C C:\Package\DLP_HYB\dlp_hyb.bat

 

Is it right or modification needs to be done ?

0 0
Ishant Walia
patch deployment and patch connect best practise

Hi Experts,

Kindly help me in below concern.

How to get the information of patches pending /deployed (patch inventory)on fresh agent devices.

I get to know that need to run Patch Connect without any bulletin and it will get the information of patch inventory. Is it the process? because its not happening in my case.

Can i automate the download the latest patch ?

How to remove to old patches from Radia ?

Please help me understand this.

 

Thanks, 

5 0
Ishant Walia
Restart/shutdown agent with a popup message

HI Experts,

Need to restart the agent machine with a popup message before 5 min.

Please help achieve this.

Thanks,

1 0
Ishant Walia
Java Patching

Hi Experts,

need to download java patches.

Please help in getting latest KB for that.

Thanks,

0 0
Ishant Walia
third party patching Firefox, Winrar pkg creation

HI Experts,

I need to do patching of third party product like firefox and winrar.

I believe this can only be done by publishing the pkg and then scheduling the job. correct me if wrong ?

Could you please suggest on command i need to add for installation ?

Thanks,

2 0
Ishant Walia
time to download a patch

Hi Experts,

I 'm downloading patch of size 70 MB. its downlaoded in 15 sec. But now its taking time in other steps.

Please help understand this.

Thanks,

 

0 0
Ishant Walia
auto download patch &third party patch

Hi Experts,

Please help in below.

Can we auto schedule the download of patches form internet to Radia core server ?

Also please suggest can we download third party patch in Radia apart from the default one.

Thanks,

 

7 0
Ishant Walia
Ptach and security connect not working

Hi Experts,

I ran patch and security connect on agent machines but nothing is showing in reports. either it fails or not.

Also the agent count displaying is  Zero only.

Please help in this.

1 0
Ishant Walia
Error deplyoing anything

Hi experts,

I'm getting the below error , while trying to deploying anything on agent machines.

RADPINIT pinit_rc:[209] - [Error transferring physical application files from server.]

Please suggest on this.

 

9 0

Top Contributors