Patch and Compliance help

The Patch and Compliance tool window (Tools > Security > Patch and Compliance) is where you perform security scanning, remediation, and related tasks. You can download and manage security content, configure security and compliance scans, configure remediation, customize and apply security scanner display/interaction settings, and view comprehensive security-related information for scanned devices.

The main section for Patch and Compliance introduces this security management tool. In that section you'll find overview and security content subscription information, step-by-step instructions on how to use all of the tool's features, including a description of the tool's interface and functionality, see Understanding and using the Patch and Compliance tool.

This section contains the following online help that describes the Patch and Compliance dialog boxes. From the console interface, these help sections are accessed by clicking the Help button on their respective dialog box.

Patch and Compliance tool window help

About the Select columns dialog box

Use this dialog box to configure data columns for item lists in the Patch and Compliance tool window. You decide which data columns are displayed so that you can sort through long lists of downloaded security definitions and quickly and easily find the information you need for a specific task or situation.

NOTE: Using the CVE ID data column
LANDesk security products support the CVE (Common Vulnerabilities and Exposures) naming standard. With Patch and Compliance you can search for vulnerabilities by their CVE names, and view CVE information for downloaded vulnerability definitions. For more information about the CVE naming convention, LANDesk compatibility with the CVE standard, and how to use CVE identification to find individual vulnerabilities in Patch and Compliance, see Using CVE names when searching for vulnerabilities.

By adding and removing data columns, and moving them up and down in the list (to the left and to the right in the column view), you ensure that important, relevant information is front and center.

About the Manage filters dialog box

Use this dialog box to manage filters you can use to customize the security content that displays in the Patch and Compliance window's item list. You can use filters to streamline a lengthy list.

About the Filter properties dialog box

Use this dialog box to create or edit security content list filters. You can filter by operating system, security risk severity, or any combination of both.

Download security content updates help

About the Download Updates dialog box

Use this dialog box to configure settings for downloading security content updates, proxy server, patch file download location, spyware autofix, and antivirus updates and backups.

After you specify the types of content updates you want to download and the other options on the pages of the Download updates dialog box:

To save your changes on any page of this dialog box, click Apply.

The Download updates dialog box contains the following pages:

Security content downloading considerations

Security Suite content subscriptions

A basic LANDesk Management Suite installation allows you to download and scan for LANDesk software updates, and to create and use your own custom definitions. For all other security content types, such as platform-specific vulnerabilities, spyware, etc., you must have a LANDesk Security Suite content subscription in order to download the associated definitions.

For information about Security Suite content subscriptions, contact your LANDesk reseller, or visit the LANDesk Web site.

Task-specific settings and global settings

Note that only the definition types, languages, and definition and patch download settings are saved and associated with a specific task when you create it. Those three settings are considered task specific.

However, all of the settings on the other pages of the Download updates dialog box are global, meaning they apply to all subsequent security content download tasks. Global settings include: patch download location, proxy server, spyware autofix, security alerts, and antivirus. Any time you change a global settings it is effective for all security content download tasks from that point on.

About the Updates page

Some vulnerability and other definition types, and any associated patches, are language neutral or independent, meaning they are compatible with any language version of the OS or application addressed by that definition. In other words, you don't need a unique language-specific patch to remediate those vulnerabilities because the patch covers all supported languages. For example, Linux and UNIX platforms use only language neutral definitions and patches. However, Microsoft Windows and Apple Macintosh platform vulnerability definitions and patches are nearly always language specific.

When downloading content for any platform (with the appropriate security content subscription), all of the selected platform's language neutral vulnerability definitions are automatically updated by default. If you've selected a Windows or Mac content type, you must also select the specific languages whose definitions you want to update. If you've selected the Sun Solaris or a Linux platform, you do not have to select a specific language because their content is language neutral and will be updated automatically.

About the Proxy settings page

If your network uses a proxy server for external transmissions (such as Internet access), use this page to enable and configure the proxy server settings. Internet access is required for both updating vulnerability information, and for downloading patch files from appropriate Web services.

About the Patch location page

Use this page to specify where patch executables are downloaded.

About the LANDesk Antivirus page

Use this page to configure download options for LANDesk Antivirus virus definition files. Keep in mind this page applies only to actual virus definition files that are used by LANDesk Antivirus; it does not apply to the antivirus scanner detection content (Antivirus updates) that are available in the definition list on the Updates page.

For detailed information, see About the LANDesk Antivirus page on the Download Updates dialog box.

Definition properties help

About the Definition properties dialog box

Use this dialog box to view properties for downloaded content definition types, including vulnerabilities, spyware, security threats, software updates, etc. You also use this page to create your own custom definitions.

This information is read-only for downloaded definitions. For custom definitions, the fields on this dialog box are editable. You can enter identification, attribute, and detection rule details information for a custom definition by using the available fields on this dialog box and on the detection rule properties dialog box. For more information, see Creating custom definitions and detection rules.

Use the left and right arrow buttons (<, >) to view the previous or next definition's property information, in the order they are currently listed in the main window.

The Definition properties dialog box contains the following pages:

About the Definition: General page

You can right-click a detection rule to download its associated patch (or patches), disable/enable the detection rule for security scanning, uninstall its associated patches, or view its properties. You can also double-click a detection rule to view its properties.

If you're working with a custom definition, click Add to create a new detection rule; click Edit to modify the selected rule; or click Delete to remove the selected rule. For more information on custom definitions, see To create custom detection rules.

About the Definition: Description page

About the Definition: Dependencies page

This page displays only if the selected definition has an associated prerequisite definition, or if another definition depends on the selected definition before it can run. You can use this page to make sure your security scan task contains all the definitions necessary to operate properly before scanning devices.

A dependency relationship can exist only for the following security definition types:

About the Definition: Custom Variables page

This page displays ONLY if the selected security definition includes settings or values that can be modified. Some system configuration security threat definitions have variable settings that you can change before including them in a security scan. Typically, antivirus definitions also have custom variable settings.

With custom variables you can fine-tune security threat scanning by modifying one or more setting's values so that the scanner checks for conditions you define, and therefore determines a device to be vulnerable only if that condition is met (i.e., the value you specify is detected).

NOTE: Edit Custom Variables right required
In order to edit custom variable settings, a LANDesk user must have the Edit Custom Variables role-based administration right. Rights are configured with the Users tool.

Every security definition with customizable variables has a unique set of specific values that can be modified. In each case however, the Custom Variables page will show the following common information:

To change a custom variable, double-click the Value field, and either select a value if there's an available drop-down list, or manually edit the value, and then click Apply. Note that some variables are read-only and can't be edited (this is usually indicated in the description).

Custom variable override settings information can be viewed in the device's Inventory view.

NOTE: Custom variable override settings
In some situations you may want to ignore a custom variable settings, or in other words create an exception to the rule. You can do this with a feature called custom variable override settings. Custom variable override settings let you decide which custom variables to essentially ignore when scanning devices so that they are not detected as vulnerable and are not remediated even if they meet the actual conditions of a definition's detection rules. You can create as many custom variable override settings as you like, and apply them to devices using a Change settings task. For more information, see About the Custom variable override settings dialog box.

Detection Rule properties help

About the Detection Rule properties dialog box

Use this dialog box to view detection rule properties for downloaded security content, or to create and edit custom detection rules.

This information is read-only for detection rules belonging to downloaded definitions. For custom definitions, the fields on the pages of this dialog box are editable. You can specify detection rule settings and configure the options on each page in order to create custom detection rules. Furthermore, if the custom detection rule allows remediation, you can add special commands that run during remediation (patch install or uninstall).

You can use the left and right arrow buttons (<, >) to view property information for the previous or next detection rule in the order they are currently listed in the main window.

The Detection rule properties dialog box contains the following pages:

About the Detection rule: General information page

Detection logic pages

The following pages refer to the detection logic used by the selected detection rule to determine whether the vulnerability definition (or other definition type) exists on a scanned device.

About the Detection logic: Affected platforms page

Identifies the operating systems the security scanner will run on to check for this rule's associated definition. In other words, only devices matching the selected platforms will attempt to process this rule. At least one platform MUST be selected. If a target device is running a different operating system, the security scanner quits.

About the Detection logic: Affected products page

If you're creating or editing a custom detection rule, click Configure to open a new dialog box that lets you add and remove products in the list. The list of available products is determined by the security content you've updated via the LANDesk Security service.

About the Detection logic: Files used for detection page

If you're creating or editing a custom detection rule, select the verification method from the Verify using drop-down list. As stated above, the parameter fields are different for each verification method, as described in the following list:

Note that the Search for file recursively option applies to all the file verification methods except for the MSI methods, and causes the scan to search for files in the specified path location and any existing subfolders.

Note that for the File Version, Date, and Size parameters, after specifying the file path and name, you can click the Gather Data button to automatically populate the appropriate value fields.

About the Detection logic: Registry settings used for detection page

IMPORTANT: If there are no registry conditions in the list, AND there were no file conditions on the Files page, the scan fails. In other words, a detection rule must have at least one file or registry condition.

If you're creating or editing a custom detection rule, click Add to make the fields editable allowing you to configure a new registry key condition and expected parameters. A rule can include one or more registry conditions. To save a registry condition, click Update. To delete a registry condition from the list, select it and click Remove.

About the Detection logic: Custom script page

Use this page if you want to write a custom VB script that checks for any other conditions on scanned devices. The security scanner's runtime properties that can be accessed with a custom script to report its results are: Detected, Reason, Expected, and Found.

Click the Use editor button to open your default script editing tool, associated with this file type. When you close the tool you're prompted to save your changes in the Custom Script page. If you want to use a different tool you have to change the file type association.

About the custom vulnerability's product properties: General information page

Use these dialog boxes when creating a custom vulnerability definition that includes a custom product.

You can enter a name, vendor, and version number, and then define the detection logic that determines the conditions for the vulnerability to exist.

These dialog boxes are similar to the properties dialog boxes for downloaded published vulnerability definitions. Please see the corresponding sections above.

This page includes the following options:

About the custom vulnerability's product: Detection logic page

The following pages refer to the detection logic used by the selected detection rule to determine whether the vulnerability definition (or other definition type) exists on a scanned device.

These dialog boxes are similar to the detection logic dialog boxes for downloaded known OS and application vulnerability definitions published by vendors that are described above. For information about the options, see the corresponding sections above.

About the custom vulnerability's product: Detection logic: Files used for detection page

See the Detection logic: Files used for detection page above.

About the custom vulnerability's product: Detection logic: Registry settings keys used for detection page

See the Detection logic: Registry settings used for detection page above.

About the custom vulnerability's product: Detection logic: Custom detection script page

See the Detection logic: Custom script page above.

About the Patch information page

Use this page to define and configure the rule's associated patch file (if one is required for remediation) and the logic used to detect whether the patch is already installed. You can also configure additional patch file install or uninstall commands for customized remediation.

This page and the ones under it refer to the patch file required to remediate a vulnerability. These pages are applicable only if the selected detection rule allows remediation by deploying a patch file. If the detection rule is limited to scanning only, or if the security content type doesn't use patch files for remediation, as in the case of security threats, or spyware, then these pages are not relevant.

Detecting the patch pages

The following pages refer to the detection logic used by the rule to check if the patch is already installed on devices.

IMPORTANT: ALL of the specified conditions for BOTH files and registry settings must be met in order for the patch file to be detected as installed on a device.

About the Detecting the patch: Files used for installed patch detection page

This page specifies the file conditions used to determine whether the patch file is already installed on a device. The options on this page are the same as on the Files page for definition detection logic (see above). However, the logic works conversely when detecting patch installation. In other words, when checking for a patch installation, all of the file conditions specified on this page must be met in order to determine an installation.

About the Detecting the patch: Registry settings used for installed patch detection page

This page specifies the registry key conditions used to determine whether the patch file is already installed on a device. The options on this page are the same as on the Registry settings page for definition detection logic (see above). However, the logic works conversely in this case. In other words, when checking for a patch installation, all of the registry conditions specified on this page must be met in order to determine an installation.

IMPORTANT: ALL of the specified conditions for BOTH files and registry settings must be met in order for the patch file to be detected as installed on a device.

Patch install and uninstall pages

The following pages let you configure additional commands that run when the patch is installed on or uninstalled from affected devices.

This option is available only for custom definitions that allow remediation.

These commands are useful if you need to program specific actions on target devices to ensure successful remediation. Additional commands aren't required. If you don't configure any additional commands, the patch file executes by itself by default. Keep in mind that if you do configure one or more additional commands, you must also include a command that executes the actual patch file with the Execute command.

About the Patch install commands page

Use this page to configure additional commands for a patch install task. The available commands are the same for patch install and uninstall.

The following list describes the commands and their arguments:

The arguments for the Copy command are: Dest (full path where you want to copy the file), not including the filename and Source (full path, and file name, of the file you want to copy).

The arguments for the Execute command are: Path (full path, and file name, where the executable file resides; for the patch file, you can use the %SDMCACHE% and %PATCHFILENAME% variables), Args (command-line options for the executable file; note this field is not required), Timeout (number of seconds to wait for the executable to terminate before continuing to the next command in the list, if the Wait argument is set to true), and Wait (true or false value that determines whether to wait for the executable to terminate before continuing to the next command in the list).

In order for the ButtonClick command to work properly, the Wait argument for the preceding Execute command must be set to false so that the executable doesn't have to terminate before continuing to the button click action.

The arguments for the ButtonClick command are: Required (true or false value indicating whether the button must be clicked before proceeding; if you select true and the button can't be clicked for any reason, remediation quits; if you select false and the button can't be clicked, remediation will continue, ButtonIDorCaption (identifies the button you want clicked by its text label, or its control ID), Timeout (number of seconds it takes for the button you want clicked appears when the executable runs), and WindowCaption (identifies the window or dialog box where the button you want clicked is located).

The arguments for the ReplaceInFile command are: Filename (full path and name of the file you want to edit), ReplaceWith (exact text string you want to add to the file, and Original Text (exact text string you want to replace in the file).

The arguments for the StartService command are: Service (name of the service).

The arguments for the StopService command are: Service (name of the service).

The arguments for the Unzip command are: Dest (full path to where you want to extract a compressed file's contents on a device's hard drive), and Source (full path and filename of the compressed file).

The arguments for the WriteRegistryValue are: Key, Type, ValueName, ValueData, WriteIfDataEmpty

About the Patch uninstall commands page

Use this page to configure additional commands for a patch uninstall task. The available commands are the same for patch install and uninstall. However, the Patch uninstall commands page includes two unique options:

For information on the commands, see About the Patch install commands page.

About the Download associated patches dialog box

Use this dialog box to download patch executable files that are required to remediate the selected vulnerability but that are not currently available on the core server (or in some other specified patch repository location). Required patches must reside in the designated patch location in order for a managed device with a detected vulnerability to be remediated successfully.

Patch and Compliance tasks help

About the Create security scan task dialog box

Use this dialog box to create and configure a scheduled task that runs the security scanner on target devices.

IMPORTANT: LANDesk Script Writers group permission required
In order to create scheduled tasks and policies in the Patch and Compliance tool (for security and compliance scan tasks, and repair tasks), a user must have the LANDesk Script Writers group permission. In other words, they must be part of a group that has the LANDesk Script Writers permission assigned. For more information about role-based administration, see Role-based administration.

You can also run an immediate on-demand security or compliance scan on one or more target devices. Right-click the selected device (or up to 20 multi-selected devices), and either click Security scan and select a scan and repair settings, or click Compliance scan, and then click OK.

This dialog box contains the following options:

About the Create compliance scan task dialog box

Use this dialog box to create and configure a task that runs the security scanner to check target devices specifically for compliance with your security policy based on the contents of the Compliance group.

NOTE: On-demand security and compliance scans
You can also run an immediate security or compliance scan on one or more target devices. Right-click the selected device (or up to 20 multi-selected devices), and either click Security scan and select a scan and repair settings, or click Compliance scan, and then click OK.

This dialog box contains the following options:

About the Change settings task dialog box

Use this dialog box to create and configure a task that changes the default settings on target devices for Patch and Compliance services, including:

With a change settings task you can conveniently change a managed device's default settings (which are written to the device's local registry) without having to redeploy a full agent configuration.

About the Create reboot task dialog box

Use this dialog box to create and configure a generic reboot task.

A reboot task can be useful when you want to install patches (without rebooting) as a single process and then reboot those remediated devices as another separate task. For example, you can run a scan or a patch install task during the day, and then deploy a reboot only task at a more convenient time for end users.

About the Create repair task dialog box

Use this dialog box to create and configure a repair (remediation) task for the following definition types: vulnerabilities, spyware, LANDesk software updates, custom definitions, and security threats with an associated patch. The schedule repair option is not applicable to blocked applications.

This dialog box includes the following pages:

About the Create repair task: General page

About the Create repair task: Patches page

Use this page to show either required patches only or all associated patches for the selected vulnerability. (NOTE: The fields on this page are the same as the fields on the About the Download associated patches dialog box.)

To download patches directly from this page, if they have not already been downloaded and placed in the patch repository, click Download.

About the Multicast options dialog box

Use this dialog box to configure the following Targeted Multicast options for a scheduled security repair task:

The options below let you configure task-specific Targeted Multicast parameters. The defaults should be fine for most multicasts. Here are what the options do:

This value is only used when the domain representative isn't multicasting a file from its own cache. If this parameter isn't specified, then the default minimum sleep time stored on the subnet/domain representative computer will be used. You can use this parameter to limit bandwidth usage across the WAN.

About the Uninstall patch dialog box

Use this dialog box to create and configure an uninstall task for patches that have been deployed to affected devices.

About the Gather historical information dialog box

Use this dialog box to compile data about scanned and detected vulnerabilities on managed devices. This information is used for security reports. You can either gather the data immediately or create a task to collect the data for a specified period of time.

This dialog box contains the following options:

Patch and Compliance settings help

About the Configure scan and repair (and compliance) settings dialog box

Use this dialog box to manage your scan and repair (and compliance) settings. Once configured, you can apply settings to security scan tasks, compliance scan tasks, repair tasks, uninstall tasks, and reboot tasks.

This dialog box contains the following options:

About the Scan and repair (and compliance) settings dialog box's pages

Use this dialog box to create and edit scan and repair settings. Scan and repair settings determine whether the security scanner displays on devices while running, reboot options, user interaction, and the content types scanned.

NOTE: Note on compliance scan settings
The information on this dialog box can also apply to compliance scans, with the Compliance page taking the place of the Scan page. See the About the Compliance page section below for details about the specific settings that apply to compliance scans.

NOTE: Note on reboot task settings
The settings on the Reboot page of this dialog box can also be used for a reboot only task.

You can create as many scan and repair settings as you like and edit them at any time. For example, you can configure a scan and repair settings with a specific notification and reboot scenario for desktop devices, and another scan and repair settings with different reboot options for servers. Or, you can configure an scan and repair settings for Windows vulnerability scanning, and another one for spyware scanning, etc.

Once configured, you can apply scan and repair settings to security scan tasks, repair tasks, uninstall tasks, and reboot tasks.

Scan and repair settings

The settings dialog box contains the following pages:

About the General settings page

About the Scan options page

About the Compliance settings page

NOTE: Compliance security scans
Keep in mind the options on the Compliance page apply to compliance security scans only.

About the Repair options page

About the MSI information page

Use this page if a patch file needs to access its originating product installation resource in order to install any necessary supplemental files. For example, you may need to provide this information when you're attempting to apply a patch for Microsoft Office or some other product suite.

About the Reboot options page

About the Network settings page

Use this page to identify an alternate core server that can be used for security scanning and remediation if the main core server is not available.

NOTE: The syntax for the servername field should be: <servername>:<port number> where port number is the secure port 443 for SSL transmission. If you enter only a servername, without specifying port 443, it defaults to port 80 which is the standard HTTP port.

About the Pilot configuration page

Use this page to create and configure a pilot group for testing security definitions before performing a wider deploying on your entire network.

About the Schedule periodic pilot scan and repair dialog box

This dialog box is shared by several LANDesk management tasks. For details about the options on this dialog box, see About the Schedule dialog box.

About the Spyware scanning page

Use this page to replace (or override) spyware settings from a device's agent configuration.

Real-time spyware detection monitors devices for new launched processes that attempt to modify the local registry. If spyware is detected, the security scanner on the device prompts the end user to remove the spyware.

This page contains the following options:

About the Configure custom variable override settings dialog box

Use this dialog box to manage your custom variable override settings. Once configured, you can apply custom variable override settings to a change settings task and deploy it to target devices to change (or remove) their default custom variable override settings.

Custom variables overrides lets you configure exceptions to custom variable values. In other words, with custom variable override settings you can ignore or bypass a specific custom variable condition so that a scanned device is not determined to be vulnerable.

This dialog box contains the following options:

NOTE: The selected settings may currently be associated with one or more tasks or managed devices. If you choose to delete the settings, devices with that settings still have it and continue to use it until a new change settings task is deployed; scheduled tasks with that settings still run on target devices, as do local scheduler tasks with that settings, until a new configuration is deployed.

About the Custom variable override settings dialog box

Use this dialog box to create exceptions to custom variable settings. Some system configuration security threat definitions have variable settings that you can change before including them in a security scan. Typically, antivirus definitions also have custom variable settings.

With custom variables you can fine-tune security threat scanning by modifying one or more setting's values so that the scanner checks for conditions you define, and therefore determines a device to be vulnerable only if that condition is met (i.e., the value you specify is detected). Custom variables are a global settings, so when you scan for a security definition that includes a custom variable it will always be determined to be vulnerable if that custom variable condition is met.

NOTE: Edit Custom Variables right required
In order to edit custom variable settings, and configure custom variable override settings, a LANDesk user must have the Edit Custom Variables role-based administration right. Rights are configured with the Users tool.

Custom variable override settings information can be viewed in the device's Inventory view.

About the Definition group settings dialog box

Use this dialog box to create, edit, and select settings that control how and where security definitions are downloaded based on their type and/or severity.

This dialog box contains the following options:

About the Definition filter properties dialog box

Use this dialog box to define a definition group settings. These settings control how and where security definitions are downloaded based on their type and/or severity.

This dialog box contains the following options:

About the Alert settings dialog box

Use this dialog box to configure security-related alerting for scanned devices, including both vulnerability and antivirus alerting.

The Alert settings dialog box contains the following pages:

Definitions page

Use this page to configure security alerting. If you've added security definitions to the Alert group, Patch and Compliance will alert you whenever any of those definitions is detected on any scanned device.

Antivirus page

Use this page to configure antivirus alerting.

About the Rollup core settings dialog box

Use this dialog box to enable and configure automatic forwarding of the latest security scan results to a rollup core server on your network. Security scan data forwarding allows you to view real-time vulnerability status for all of your managed devices in a large, distributed enterprise network without having to manually retrieve that data directly from the primary core server.

Every time the security scanner runs it writes a scan results file to a folder called VulscanResults on the core server and notifies the LANDesk Security web service, which adds the file to the core database. If the rollup core settings are enabled and a valid rollup core is identified, the rollup core reads the scan results file into its own database, providing faster access to critical vulnerability information.

The Rollup core settings dialog box contains the following options:

Patch and Compliance toolbar help

About the Purge patch and compliance definitions dialog box

Use this dialog box to completely remove definitions (and their associated detection rules) from the core database.

NOTE: Requires the LANDesk Administrator right

A user must have the LANDesk Administrator right in order to perform this task.

You may want to remove definitions if they have become obsolete, are not working properly, or if the related security risk has been totally resolved.

This dialog box contains the following options:

About the Security scan information view

Use this dialog box to view detailed patch deployment activity and status for scanned devices on your network.

You can view scan results for:

About the Threshold settings dialog box

Use this dialog box to define time periods for security scan (patch deployment) results that appear in the Security scan information dialog box.

About the Security and Patch Information dialog box

Use this dialog box to view detailed security information for selected devices. You can view a device's scan results, detected security definitions, missing and installed patches (or software updates), and repair history.

Use the Clear button to remove all scan information from the database for the selected devices.

You can also right-click a vulnerability (or other security content type) in this view and directly create a repair task, or enable/disable the autofix option for applicable security content types.

Displayed information is based on the selected security content type

The group names and information fields that display on this page are dynamic, depending on the security content type you select from the Type drop-down list. For example, if you select vulnerabilities, the following information fields display: