Scanning and remediating devices

This section provides information on scanning managed devices for a variety of security risks (such as OS and application vulnerabilities, software updates, spyware, system configuration exposures, etc.); remediating affected devices; and generating security alerts, logging, and reports.

NOTE: Managing security content and patches
For information on downloading and organizing security content, working with patches, and using custom definitions, see Managing security content and patches.

Read this section to learn about:

Scanning devices

Remediating devices

Other patch and compliance management tasks

Scanning devices for security risks

Traditionally, security scanning meant checking the currently installed versions of operating system and application specific files and registry keys on a device against the most current known vulnerabilities in order to identify and resolve security risks. LANDesk Security services offers expanded security content types, enabling you to scan for and remediate even more of today's prevalent security risks and exposures.

Depending on your Security Suite content subscription, you can scan for:

NOTE: Security Suite content subscriptions
For information about Security Suite content subscriptions, contact your LANDesk reseller, or visit the LANDesk Web site.

How Patch and Compliance scans for different security risks

The table below describes how the security scanner searches for each type of security risk:

When scanning for... Patch and Compliance scans by...

LANDesk software updates

Using software update definitions published by LANDesk to check for the latest LANDesk software versions.

Windows vulnerabilities

Using vulnerability definitions published by LANDesk (based on official vendor security bulletins to check for known operating system and/or application vulnerabilities).

Macintosh vulnerabilities

Using vulnerability definitions published by LANDesk (based on official security bulletins to check for known vulnerabilities).

Linux/UNIX vulnerabilities

Using vulnerability definitions published by LANDesk (based on official security bulletins to check for known vulnerabilities).

Custom definitions

Using custom vulnerability definitions created by a LANDesk Administrators to check for a user-defined platform, application, file, or registry settings conditions.

Security threats

Using security threat definitions published by LANDesk to check for local Windows system configuration errors and exposures. You can modify security threat definitions that use editable custom variables to check for specific conditions.

Spyware

Using spyware detection definitions that check for instances of spyware programs on scanned devices. Patch and Compliance uses the LANDesk Software license monitoring tool's softmon.exe program to monitor for spyware. You can also enable real-time spyware monitoring and blocking with a device's agent configuration.

Driver updates

Using third-party driver update definitions that check for driver versions.

Software updates

Using third-party software update definitions that check for software versions.

Antivirus updates

Using antivirus scanner detection definitions (NOT actual virus definition/pattern files) that check for:
- installation of common antivirus scanner engines (including the LANDesk Antivirus tool)
- real-time scanning status (enabled or disabled)
- scanner-specific pattern file versions (up to date or old)
- last scan date (whether the last scan is within the maximum allowable time period specified by the administrator)

Blocked applications

Using application definitions published by LANDesk (or user-defined application definitions) to immediately deny end user access to the application by editing the local registry. Remediation is NOT a separate procedure. Patch and Compliance uses the LANDesk Software license monitoring tool's softmon.exe program to deny access to specified application executables, even if the executable file name has been modified, by reading the file header information. (See the legal disclaimer for the blocked application type.)

To understand how Patch and Compliance remediates these different content types, see the How Patch and Compliance remediates different security risks.

Configuring the content of a security scan

After reviewing downloaded definitions and deciding which items you want to scan for, you can perform customized security assessment on managed devices by moving definitions into their respective Scan groups. When the security scanner runs, it always reads the contents of the Scan group and scans for those specific definitions (IMPORTANT: If that type is selected in the task's scan and repair settings). Before scanning devices, you should always make sure the appropriate definitions are in the Scan group. You can move definitions into and out of the Scan group manually at any time.

You can also update security content which, by default, automatically adds new definitions into the Scan group.

NOTE: Blocked applications are placed in the Unassigned group by default
Keep in mind that the blocked application type is handled differently than the other types. By default, blocked application definitions are placed in the Unassigned group, not in the Scan group.

Security scans add patch and compliance information to a device's inventory in the core database. This information can be used to generate specific queries, policies, and reports. To view this information, right-click the device and then click Security and Patch Information.

NOTE: Caution about moving definitions from the Scan group
When you move definitions from the Scan to the Don't Scan group, the current definition assessment information (information located in the core database about which scanned devices detected those definitions) is removed from the core database and is no longer available in either the definition Properties dialog boxes or in the device Security and Patch Information dialog boxes. To restore that information, you would have to move the definitions back into the Scan group and run the scan again.

Creating security and compliance scan tasks

The security scanner can be run directly at a device (Click Start | All Programs | LANDesk Management | Security Scanner). The security scanner can also be run as a scheduled task or a policy from the core server.

IMPORTANT: LANDesk Script Writers group permission required
In order to create scheduled tasks and policies in the Patch and Compliance tool and the Security Configurations tool (for security and compliance scan tasks, repair tasks, and change settings tasks), a user must have the LANDesk Script Writers group permission. In other words, they must belong to a group that has the LANDesk Script Writers permission assigned. For more information about role-based administration, see Role-based administration.

Scheduled tasks can be thought of as a push distribution because the task is pushed from the core server to devices, while a policy is considered a pull distribution because the policy agent on the device checks the core server for applicable policies and then pulls the patch from the core server.

To create a security scan task
  1. Click Tools > Security > Patch and Compliance.
  2. Make sure security content has been updated recently.
  3. Make sure the Scan group contains only those definitions you want to scan for.
  4. Click the Create a task toolbar button, and then click Security scan. The Create security scan task dialog box displays.



  5. Enter a name for the scan.
  6. Specify whether the scan is a scheduled task or a policy-based scan, or both.
  7. Select a scan and repair settings from the available list (or create a custom settings for this scan), to determine how the scanner operates on end user devices.
  8. Click OK. For a scheduled task scan, you can now add target devices and configure the scheduling options in the Scheduled tasks tool.

NOTE: Compliance security scans
With the Patch and Compliance tool you can also create a compliance-specific scan task, that checks target devices for compliance with your customized security policy. A compliance scan is based on the contents of the Compliance group (and the options specified on the compliance settings), and can be run as a scheduled task, a policy, and even initiated by LANDesk Antivirus when a virus is detected that can't be removed or quarantined.

Running an on-demand security or compliance scan

You can also run an immediate on-demand scan on one or more target devices.

To do this, right-click the selected device (or up to 20 multi-selected devices), click Security / Compliance scan now, select a scan and repair settings, choose the type of scan, and then click OK.

About the security scan log file

The security scanner writes a log file for the most recent scan on the device called vulscan.log, and also saves the last five log files in chronological order by number. These log files record useful information about the time of the scan, language, platform, and the processes run by the scan.

Viewing the most recent security scan dates in the device Inventory

To see when the last security scan was run on a device, right-click the device, click Inventory, and then scroll down to the Last Scan Dates in the right-hand pane of the Inventory view.

Configuring scan options with scan and repair settings

Patch and Compliance gives you complete control over what the end user sees, device reboot behavior, and the level of interaction the end user is allowed when the security scanner runs on devices. For example, depending on the purpose or scheduled time of a scan you may want to show the end user scanner progress and give them the opportunity to cancel or defer an assessment scan or patch deployment remediation. You can do this by creating and applying scan and repair settings.

Scan and repair settings is also where you determine the content of a security scan, by selecting specific definition types.

You can create and apply scan and repair settings (a saved set of configured options) to scan tasks. You can create as many scan and repair settings as you like. Some scan and repair settings might be well suited for a variety of scanning or remediation tasks, while others might be specifically designed for a single task.

All of the scan and repair settings you create are stored in the Scan and Repair group located under Settings in the tree view.

To create scan and repair settings
  1. In the Patch and Compliance tool window, click the Configure settings toolbar button, and then click Scan and repair settings.
  2. Click New. Or, you can click Edit or Configure on any of the task dialog boxes that let you apply an scan and repair settings.



  3. Enter a name for the scan and repair settings.
  4. Specify the various settings on each page as desired for the particular task (scan, repair, reboot). For more information about an option, click Help.

Once configured, you can apply scan and repair settings to security scan tasks, repair tasks, uninstall tasks, reboot tasks, and change settings tasks.

NOTE: Compliance settings
With the Patch and Compliance tool you can also create compliance-specific settings, that determine when the frequent security scan runs and how detected risks are remediated. A compliance scan is based on the contents of the Compliance group (and the options specified on the compliance settings), and can be run as a scheduled task, a policy, and even initiated by LANDesk Antivirus when a virus is detected that can't be removed or quarantined.

Changing a device's default scan and repair settings

A device's default scan and repair settings are deployed as part of the initial agent configuration. When a task has a different scan and repair settings associated or assigned to it, the default settings are overridden. You can also choose to use the device's default settings by selecting it when you create a task.

At some point you may want to change these default scan and repair settings on certain devices. Patch and Compliance provides a way to do this without having to redeploy an entirely new and complete agent configuration. To do this, use the Change settings task located in the drop-down list of the Create a task toolbar button.

The dialog box that appears allows you to enter a unique name for the task, specify whether it is a scheduled task or policy, and either select an existing scan and repair settings as the default or use the Edit button to create a new scan and repair settings as the default for target devices.

Using custom variables and custom variable override settings

With custom variables you can fine-tune security threat scanning by modifying one or more setting's values so that the scanner checks for conditions you define, and therefore determines a device to be vulnerable only if that condition is met (i.e., the value you specify is detected). Some system configuration security threat definitions have variable settings that you can change before including them in a security scan. Typically, antivirus definitions also have custom variable settings.

NOTE: Edit Custom Variables right required
In order to edit custom variable settings, a LANDesk user must have the Edit Custom Variables role-based administration right. Rights are configured with the Users tool.

Every security definition with customizable variables has a unique set of specific values that can be modified. In each case however, the Custom Variables page will show the following common information:

To change a custom variable, double-click the Value field, and either select a value if there's an available drop-down list, or manually edit the value, and then click Apply. Note that some variables are read-only and can't be edited (this is usually indicated in the description).

NOTE: Custom variable override settings
In some situations you may want to ignore a custom variable settings, or in other words create an exception to the rule. You can do this with a feature called custom variable override settings. Custom variable override settings let you decide which custom variables to essentially ignore when scanning devices so that they are not detected as vulnerable and are not remediated even if they meet the actual conditions of a definition's detection rules. A user must have the Edit Custom Variables right in order to create or edit a custom variable override settings. You can create as many custom variable override settings as you like, and apply them to devices using a Change settings task. For more information, see About the Custom variable override settings dialog box.

Viewing detected security data

If the security scanner discovers any of the selected definitions on target devices, this information is reported to the core server. You can use any of the following methods to view detected security data after running a scan:

By the Detected group

In the Patch and Compliance tool window, select the Detected group to view a complete listing of all definitions detected by the most recent scan.

The Scanned column indicates how many devices were scanned for a definition, and the Detected column shows how many of those devices are affected by that definition.

By a definition

Right-click a definition, and then click Affected computers to view a list of devices on which the definition was detected by the most recent scan.

By the device Security and Patch Information dialog box

Right-click a specific device in the network view, and then click Security and Patch Information to view detailed security assessment information and patch deployment status for the device.

You can also select multiple devices in the network view, right-click the group, and then click Security and Patch Information to view a list of definitions discovered on one or more of those devices. When you select a definition in the list, the devices on which the definition was detected by the most recent scan display in the bottom pane.

By the Scan Information dialog box

In the Patch and Compliance tool window, click the Scan information toolbar button to view detailed patch deployment activity and status for scanned devices on your network. You can view scan results for computers not recently reporting, computers with no results, and computers needing patches by selected severity type.

Forwarding security scan results to a rollup core

If you're working in a large, distributed enterprise network, you may want to forward the latest security scan results to a rollup core server located in a specific region in order to facilitate access to real-time vulnerability information for all of your managed devices. You can enable automatic and immediate security scan results forwarding by defining the rollup core settings in the Patch and Compliance tool.

Every time the security scanner runs it writes a scan results file to a folder called VulscanResults on the core server and notifies the LANDesk Security web service, which adds the file to the core database. If the rollup core settings are enabled and a valid rollup core is identified, the rollup core reads the scan results file into its own database, providing faster access to critical vulnerability information.

To enable the immediate forwarding of security scan results to a rollup core
  1. In the Patch and Compliance tool window, click the Configure settings toolbar button, and then click Rollup core settings.
  2. Select the Send scan results to rollup core immediately check box.
  3. Enter the name of the rollup core you want to receive the latest security scan results.
  4. If you want to use the default URL (location on the rollup core) where the scan results file is written, select the Use default rollup URL check box. Otherwise, you can clear the check box and enter a preferred address.

Remediating devices that detected security risks

Once you've updated security content for the content types you've have a license or subscription for, scanned devices, determined which detected security exposures require attention, and downloaded patches, the next step in implementing Patch and Compliance security is to remediate (or repair) the security problem).

Remediation solutions and actions are different depending on the type of security risk. Furthermore, some remediation can be done remotely with the Patch and Compliance tool, while other remediation tasks must be done manually. For example, vulnerabilities are remediated by deploying and installing the necessary security patches on affected devices, while spyware is remediated by removing the infecting spyware itself, and a system configuration security threat is typically remediated by editing the registry or changing some other platform-specific settings.

Remediation for different security risks

Remediation for each type of security risk (i.e., content type) is described below:

Known vulnerabilities

For known vulnerabilities, remediation entails deploying and installing the appropriate security patch. Windows and Macintosh vulnerability remediation can be performed via the console, as a scheduled task, or policy-based remediation, or as an autofix scan. However, Linux and UNIX vulnerability remediation must be done manually at the affected device.

Custom definitions

For custom definitions, remediation can consist of deploying a custom patch or script that addresses the exposure. Like known vulnerability remediation, custom vulnerability repair tasks can be done via the console.

LANDesk software updates

For LANDesk software updates, remediation means the proper version upgrade is installed. You can do this via the console.

Security threats

For security threats (local Windows system or platform configuration errors and exposures), remediation means applying the configuration settings specified by the security threat definition. You can do this via the console. You can also modify security threat definitions that use editable custom variables to apply customized settings.

Some security threats must be remediated manually at the affected device. To find out whether a security threat can be remediated from the console, view its Repairable column value (Yes or No) in the item list view.

Firewall detection and configuration (using Windows firewall settings and security threat definitions)

For Windows firewall configurations, remediation means applying configuration settings specified by Windows firewall settings or predefined security threat definitions.

Windows firewall settings are associated with a change settings task to enable/disable the firewall, and configure firewall settings including exceptions, inbound rules, and outbound rules (for services, ports, programs) on target devices running the following Windows platforms:

Additionally, LANDesk Security provides predefined security threat definitions that let you scan for, detect, and configure firewall settings on managed devices running specific Windows platforms. The following security threat definitions let you scan for and modify firewall configurations:

The Windows firewall security threat properties includes custom variables that let you configure Windows firewall settings. You can use these security threat definitions to scan for your specified settings and return a vulnerability condition if those settings are not matched. You can then use the customized definition in a repair task in order to turn on or off the firewall as well as change or reconfigure the firewall settings on the scanned device.

NOTE: Windows GPO could change firewall settings
You should be aware that it is possible for a Windows Group Policy Object (GPO) to interfere with firewall settings configured with the security scanner. For example, the firewall settings you define in the Configure the Windows Firewall security threat's custom variables dialog box and that are then implemented by a security scanner repair task could be changed back to their original value according to how the settings are defined in an active Group Policy Object.

Spyware

For spyware, remediation consists of removing the violating spyware application. This can be done remotely from the console with a repair task.

You can also configure a device for real-time spyware monitoring (scanning, detection, and removal). In order to use real-time spyware monitoring, you must enable the settings in the device's agent configuration. On the Spyware page of the Agent configuration dialog box, select the appropriate spyware monitoring options to enable real-time spyware monitoring and end user notification. Real-time spyware monitoring uses the LANDesk Software license monitoring tool's softmon.exe program to monitor for spyware and to create log files that are read by the security scanner when it scans for spyware definitions on target devices.

NOTE: Autofix must be enabled for real-time spyware monitoring
In order for real-time spyware scanning and detection to work, downloaded spyware definitions must have the autofix option enabled. You can manually enable the autofix option for spyware definitions in item lists in the Patch and Compliance tool window. Or you can configure spyware definition updates so that the autofix option is turned on by default when spyware definitions are downloaded.

Blocked applications

For blocked applications, remediation is NOT a separate task. Application blocking takes place as part of the security scan itself, by editing the registry on the local hard drive to disable user access to any unauthorized applications.

Patch and Compliance uses the LANDesk Software license monitoring tool's softmon.exe program to deny access to specified application executables, even if the executable file name has been modified, by reading the file header information.

Antivirus updates

Antivirus updates are available for several common antivirus products, including LANDesk Antivirus. See the Definition types list in the Download updates dialog box to see the antivirus scanner engines that are supported, meaning the antivirus scanners you can download detection definitions for.

NOTE: Antivirus scanner detection content versus virus definition content
Antivirus updates does not imply actual virus definition (or pattern) files. When you download third-party antivirus updates, only scanner detection content is downloaded to the default repository, but scanner-specific virus definition files are not downloaded. However, when you download LANDesk Antivirus updates, both the scanner detection content AND the LANDesk Antivirus-specific virus definition files are downloaded. LANDesk Antivirus virus definition files are downloaded to a separate location on the core server. The default virus definition file repository is the \LDLogon\Antivirus\Bases folder.

Antivirus updates are scanner definitions that detect:

When you deploy a security scan with antivirus scanner detection definitions, the security scanner checks whether an antivirus scanner engine is installed on managed devices, whether real-time scanning is enabled or disabled, whether the scanner's pattern files is up to date, and when the latest scan was run on the device. You can remotely enable real-time scanning if it's turned off.

How Patch and Compliance remediates different security risks

The table below describes how Patch and Compliance remediates each type of security risk:

When remediating... Patch and Compliance remediates by...

LANDesk software updates

Deploying and installing the appropriate LANDesk software update.

Windows vulnerabilities

Deploying and installing the required patch files (patch files must already be downloaded to the local patch repository).

Macintosh vulnerabilities

Deploying and installing the required patch files

Linux/UNIX vulnerabilities

Remediation is performed manually at the affected device.

Custom definitions

Deploying and installing patch files, if the associated detection rule allows remediation, and if the specified patch files are available.

Security threats

Applying configuration settings specified by the security threat definition. You can do this via the console. You can also modify security threat definitions that use editable custom variables to apply customized settings. Some security threats must be remediated manually at the affected device. To find out whether a security threat can be remediated from the console, view its Repairable column value (Yes or No) in the item list view.

Spyware

Removing the detected spyware instance. See the spyware section above for more information on real-time spyware detection and removal.

Driver updates

Deploying and installing the appropriate third-party driver update.

Software updates

Deploying and installing the appropriate third-party software update.

Antivirus updates

Allowing you to re-enable real-time scanning if it's been turned off. The other antivirus scanner detection definitions return status information about specific antivirus scanner engine installations, pattern file versions, and last scan dates (related issues can't be remediated remotely from the console).

Blocked applications (published and custom)

Denying access to the application, even if the program's executable file name has been changed, by reading the file header information. Remediation in this case is NOT a separate procedure. Application blocking is done during the security scan process. The security scan immediately denies end user access to the application by editing the registry. (See the Legal disclaimer for the blocked applications type.)

To understand how Patch and Compliance scans for these different content types, see the How Patch and Compliance scans for different security risks.

Remediating from the console

As stated above, Windows and Macintosh vulnerabilities, custom definitions, LANDesk software updates, and blocked applications can be remediated from the console. The Remediation methods section below describes these different methods.

Intelligent patch deployment remediation

Patch and Compliance performs an intelligent remediation by installing only those patches that are needed on each individual device, not all of the patches referenced by all of the vulnerabilities included in the repair job. The tool also takes advantage of LANDesk's enhanced package deployment capabilities for fast and efficient patch deployment, such as: Targeted Multicast, peer download, and checkpoint restart. For more detailed information about these software distribution features, see Software distribution.

Remediating one or more definitions at a time

You can remediate a single detected definition or a set of them with any of the three remediation methods described below.

To remediate one definition at a time, right-click the item and then click Repair.

To remediate a set of definitions together, copy definitions from any of the content groups into a custom group (see Understanding and using the Patch and Compliance tool, right-click the group, and then click Repair). The Auto Fix method isn't available for custom groups; however, you can multi-select definitions in a listing, right-click and select Auto Fix.

Remediating Linux and UNIX devices manually

Supported Windows and Macintosh devices can be remediated remotely from the console, but other platforms such as Linux and UNIX Sun Solaris can only be scanned from the console, not remediated.

You must manually install the appropriate patches on both Linux and UNIX devices in order to remediate them.

Remediation methods

Patch and Compliance provides the following methods to remediate affected devices from the console:

Scheduled task remediation can be thought of as a push distribution because the patch is pushed from the core server to devices, while a policy is considered a pull distribution because the policy agent on the device checks the core server for applicable policies and then pulls the patch from the core server.

Using a scheduled repair task

Scheduling a remediation or repair task is useful if you want to set up the task to run at a specific time in the future, or as a recurring task. Patch and Compliance uses the Scheduled Tasks tool to configure and process a scheduled repair task.

Scheduled task remediation is supported on both Windows and Macintosh devices.

IMPORTANT: LANDesk Script Writers group permission required
In order to create scheduled tasks and policies in the Patch and Compliance tool and the Security Configurations tool (for security and compliance scan tasks, repair tasks, and change settings tasks), a user must have the LANDesk Script Writers group permission. In other words, they must belong to a group that has the LANDesk Script Writers permission assigned. For more information about role-based administration, see Role-based administration.

To create a scheduled repair task
  1. Click Tools > Security > Patch and Compliance.
  2. Right-click a single definition from one of the content groups, or right-click a custom group of definitions, and then click Repair. Or, you can click the Create a task toolbar button, and then click Repair. The Create repair task dialog box displays.



  3. Edit the Task name if you want to change the name of the repair task.
  4. Click the Repair as a scheduled task check box.
  5. (Optional) If you want this repair task to be divided into two parts: a staging task that deploys the necessary patches to affected devices, and the actual repair task that installs the patch, click the Split into staging task and repair task.
  6. Specify which devices you want to repair. If you want the current affected devices automatically added to the target list in the Scheduled Tasks window, click the Add all affected devices check box. The vulnerable devices are those devices where the vulnerability was detected by the last scan. You can also add more targets once the task is created in the Scheduled Tasks window.
  7. If you want patches to be deployed using Targeted Multicast, select the Use multicast check box. To configure Multicast options, click the Multicast Options button. See About the Multicast options dialog box below for details.
  8. If you want to use peer download strictly for patch deployment, click the Download patch only from local peers check box. If this option is selected, the patch file is only deployed if it currently resides in either the device local cache or on a peer on the same subnet. This option conserves network bandwidth, but note that for the patch installation to be successful, it must be in one of these two places.
  9. Specify whether to only download the patch and not deploy and install it on affected devices.
  10. Select a scan and repair settings for this repair task. The scan and repair settings determines the scanner display, reboot, and user interaction behavior on scanned devices, as well as the actual content that is being scanned.
  11. Click OK.
  12. The task appears in the Scheduled Tasks window with the job name specified above, where you can further customize the target device list and configure scheduling options.

Using a repair policy (Windows only)

Policy-based remediation offers flexibility by letting you dynamically target devices based on the results of a custom LDAP or core database query. For example, you can configure a remediation policy so that it runs only on devices in a particular directory container, or only on devices running a specific OS (or any other inventory attribute that can be queried). Patch and Compliance uses policies in the Scheduled tasks/Software distribution tool to configure and process remediation policies.

NOTE: Supported platforms for policy-based remediation
Policy-based remediation is supported on Windows devices only. Macintosh devices can't be remediated via the application policy method.

In order to be remediated by a policy, a device must have the Software distribution agent installed. When the agent runs, it checks the core database for policies that might apply to it. If such policies exist, a dialog appears at the device showing recommended and optional policies (required policies are automatically applied).

Remediation (repair) policies operate in much the same way as application policies do, except you're distributing patch files instead of application files. Policy management prerequisites, task flow, policy types, and static and dynamic targeting are essentially identical between repair policies and application policies.

To create a policy-based remediation
  1. Click Tools > Security > Patch and Compliance.
  2. Right-click a single definition from one of the content groups, or right-click a custom group of definitions, and then click Repair. Or, you can click the Create a task toolbar button, and then click Repair. The Create repair task dialog box displays.
  3. Edit the Task Name if you want to change the name of the repair task.
  4. Select the Repair as a Policy check box.
  5. If you want to create a new query, based on this vulnerability definition, that can be used later to scan other managed devices, select the Add a query check box.
  6. If you want to use peer download strictly for patch deployment, click the Download patch only from local peers check box. If this option is selected, the patch file is only deployed if it currently resides in either the device local cache or on a peer on the same subnet. This option conserves network bandwidth, but note that for the patch installation to be successful, it must be in one of these two places.
  7. Specify whether to only download the patch and not deploy and install it on affected devices.
  8. Select a scan and repair settings for this repair policy. The scan and repair settings determines the scanner display, reboot, and user interaction behavior on scanned devices, as well as the actual content that is being scanned.
  9. Click OK.
  10. The new policy appears in the Policies group in the Scheduled Tasks window with the name specified above. From there you can add static targets (users or devices) and dynamic targets (query results), and configure the policy's type and frequency.

Using an autofix repair

Auto Fix is a convenient, integrated method for quick remediation in cases where you don't want to create a scheduled task or policy-based repair task. For example, if there is a new known vulnerability that you want to scan for and repair in a single process, you can use the Auto Fix feature.

Auto fix is available for the following content types: vulnerabilities, spyware, LANDesk software updates, and custom definitions.

NOTE: Requirements for using Auto Fix
Only Administrators or users with the Patch Manager right AND the Default All Machines scope can enable the Auto Fix feature for applicable definitions. LANDesk users without either the LANDesk Administrator or Patch Manager right won't even see this option on a definition's shortcut (right-click) menu. For more information on rights and scope, see Role-based administration.

Auto fix has to be enabled in two places in order to work properly. First, the auto-fix option must be turned on, and secondly the scan and repair settings must be applied to the scheduled scan task. If either one of these two item's autofix option is NOT enabled, autofix will not happen.

When Auto Fix is enabled in both places mentioned above, the next time the security scanner runs (either manually or via a scan task), Patch and Compliance automatically deploys and installs the required patch on any affected device. With Auto Fix, if a patch requires a reboot, the target device always automatically reboots.

You can enable Auto Fix for an individual definition, or a multi-selected group of definitions at once.

To configure Auto Fix remediation
  1. In the Patch and Compliance tool window, right-click one or more selected definitions from one of the content groups, and then click Autofix when scanning. (NOTE: You can't enable autofix on a custom group.)
  2. Now run the security scanner on the devices you want to scan and automatically remediate using a scheduled security scan task with an scan and repair settings where the autofix option is enabled.

What happens on a device during remediation

Automated remediation entails deploying and installing patches on managed devices, by any of the three methods described in the sections above.

It is important to remember that a repair job can include remediation for one or more detected security definitions. Furthermore, a single detected definition can require the installation of one or more patches to fix. Because of these factors, remediation might imply the installation of just one patch file on the device, or the installation of several patch files on the device, depending on the number and type of detections.

Almost all patch files install silently, meaning transparently, requiring no user interaction at the end user device itself. Some Windows 9.x patches and non-English patches do not install silently. You can tell whether a patch installs silently or not by checking the Silent Install column in a patch listing. For more information, see Understanding and using the Patch and Compliance tool earlier in this section.

Configuring security scanner display and interaction on end user devices

However, whether a patch file can install silently or not, you can now configure how much you want the security scanner to display and prompt for input on the end user device with the scan and repair settings feature.

NOTE: Consolidated reboot
If a patch file installation requires a reboot (AND the Never reboot option isn't selected on the Reboot page of the scan and repair settings applied to the task in question), Patch and Compliance first installs ALL of the specified task's patches on the device, and then reboots the device once.

Additional commands (for custom definitions only)

Custom definition remediation can include special additional commands that are defined when you create a custom detection rule. Additional commands run in the order specified on that rule's Commands tab, and according to the arguments for each command. Additional commands can run before, during, or after the patch file itself executes.

Viewing patch and compliance information for scanned devices

As mentioned above, one way to view scanned security data is by device. To do this, right-click a single device or a group of selected devices, and then click Security and Patch Information.

This page provides many useful functions. With one or more devices selected, you can:

You can also right-click definitions and detection rules in their respective item lists to run common tasks for one or more affected devices.

Viewing the most recent security scan dates in the device Inventory

To see when the last security scan was run on a device, right-click the device, click Inventory, and then scroll down to the various Last Scan Dates in the right-hand pane of the Inventory view.

Verifying remediation status

After performing remediation on affected devices, Patch and Compliance reports the status of each patch installation. You can check the status of patch installation per vulnerability/definition and per target device.

To verify patch installation on a device
  1. Run the security scanner on the device.
  2. Right-click a remediated device in the network view, and then click Security and Patch Information.
  3. Click the Installed Patches object in the left-hand pane.
  4. Select the Patch Information fields at the bottom of the dialog box.

The Install status field indicates whether the installation was successful. Possible states include: Succeeded, Failed, and Failed to Download.

Clearing vulnerability scan and repair status by vulnerability

If a patch installation failed, you must first clear the install status information before attempting to install the patch again. You can clear the install (repair) status for the selected device by clicking Clear on the Security and Patch Information dialog box. You can also clear the patch install status by vulnerability.

You can clear vulnerability scan and repair status information for all devices affected by a vulnerability (or vulnerabilities with the Clear scan/repair status dialog box. As stated above, if a patch installation fails, you must first clear the install (repair) status before attempting to install the patch again.

You can also use this dialog box to remove vulnerability scan information from the database for one or more vulnerabilities.

To clear vulnerability scan and repair status, right-click the vulnerability and select Clear scan/repair status, select the desired options, and then click Clear.

Other patch and compliance management tasks

The following section describes other tasks you can perform with the Patch and Compliance tool.

Creating a scheduled reboot task

Patch and Compliance provides a tool that lets you create a device reboot task. A reboot task can be useful when you want to install patches, without rebooting, as a single process and then reboot those remediated devices as another separate task. For example, you can run a scan or a patch install task during the day, and then deploy a reboot only task at a more convenient time for end users.

To create a reboot task
  1. Click Tools > Security > Patch and Compliance.
  2. Click the Create a task toolbar button, and then click Reboot.
  3. Specify whether the reboot is a scheduled task or a policy-based scan, or both.
  4. Select a scan and repair settings from the available list (or create a custom settings just for this scan task), to determine how the scanner operates on end user devices. (NOTE: Only the reboot settings in the scan and repair settings are used by a reboot task.)
  5. Click OK. For a scheduled task, you can now add target devices and configure the scheduling options in the Scheduled tasks tool. For a policy, the new policy appears in the Application Policy Management window with the task name specified above, where you can add static targets (users or devices) and dynamic targets (query results), and configure the policy's type and frequency.

Using patch and compliance alerts

You can configure patch and compliance security alerting so that you can be notified when specific vulnerabilities are detected on managed devices in your system. Patch and Compliance's vulnerability alerting uses the standard LANDesk alerting tool.

A vulnerability must copied to the Alert group in order to generate an alert when detected. A vulnerability in the Alert group is a copy, and also resides in the Scan group. After placing the desired vulnerability definitions in the Alert group (either manually, or by specifying the severity level vulnerabilities to automatically be placed during downloads), you can configure the alert interval in the Configure alerts dialog box.

To configure alerting
  1. Specify which vulnerabilities will generate an alert by manually placing downloaded vulnerability definitions into the Alert group.
  2. Or click the Configure settings toolbar button, and then click Alert settings.
  3. Specify a minimum alert interval for alerting.
  4. To configure security alerting, select the definitions (by severity level) you want to be automatically placed in the Alert group during a download process. You can select more than one vulnerability severity level. These vulnerability definitions will also automatically be placed in the Scan group.
  5. If you want to configure antivirus alerting, select the antivirus events you want to generate alerts.
  6. Click OK.

Using patch and compliance reports

Patch and Compliance information is represented by several reports in the Reports tool. These reports provide useful information about security risk assessment, compliance, patch deployment, and remediation status for scanned devices on your network, for each of the various security risk content types.

In order to access the Reports tool, and generate and view reports, a user must have the LANDesk Administrator right (implying full rights) and the specific Reporting roles.

For more information about using the Reports tool, see Reports.