Tryingto figure this out. It almost seems that our pa220 is blocking windows updates. See my first pic, does session end reason threat mean it stopped the connection? I ask because I cannot get this update to download on any windows 10 pc in my environment see pic 2, it starts to download and stops at 2% then errors out. . Yet it will download at my house.
When viewing logs, click the page/magnifying icon in the far left column. This will show you exactly what happens. Depending on how you have the threats configured, it could have been identified and no action taken. The maginifying glass will show a lot more detail on what happened. Also check the Log Subtype column, it will also tell you what happened, i.e. end, url, deny, drop, etc.
Another thing with MS updates is that they use Akamai. This means that things gets bounced around frequently and the PAN URL/threat cannot keep up with a lot of the ways it does things. You can always try and download the patch manually, .
Sick and tired of Microsoft Server 2016 downloading Microsoft Updates and rebooting production servers whenever it damn well likes. Thinking of skipping trying to prevent this from the server itself, and just blocking access to those update servers at the firewall. Have an MX64 with the Advanced Security License - what is the best way to go about trying to block updates just for the server, while keeping them available for the desktops/laptops? My thinking is that whatever I use to block it on the router, I could just turn that off once a month when I choose to schedule the updates to be done.
Is there a way to see what's actually blocked by the "Deny Software Updates" rule? Is there a list of URLs or something we can look at to see what actually gets blocked if we apply that rule? I'm trying to figure out if it will break any other software that I might want to continue updating or not.
I think it is a really bad idea to block Windows Updates ... you would be better off creating a group policy to change the servers to "prompt only" to do updates, rather than automatically download and install. Security Updates are usually fairly important.
I agree with @PhilipDAth as annoying as they can be sometimes you are better to change the Windows update settings than stop them completely. Security updates help prevent things like ransomware and the last thing you want is a ransomware attack to happen on your watch because you blocked security updates.
There is probably a more sophisticated way of doing this - but this command line will make Windows scan for new updates, and then install them. So you can run this using task scheduler whenever you want.
I am currently trying to use logmein central to view the Windows update status on out computers , i have updated many computers but in central it still shows these machines and requiring updates , some of these week updates weeks ago , but still show that there are updates required, i know that the optional updates are part of this also. i have checks a few machine that are fully updates including the drivers and options updates, but still show that updates are required, is there any way to force LMI to check a machine? is there a current Bug? its just not reliable, i dont trust it.
Hi @wallsy welcome to the GoTo Community. Please ensure
update.microsoft.com has been whitelisted so LogMeIn services are able to check behind the scenes when it does its Windows Update checks. Thanks! Let me know how it goes.
I would recommend you enable debug level logs on all of your computers, as a best practice, and push the Windows Update again right after; Then open a support ticket and upload the debug logs there. Our support team will be able to investigate further that way and provide you with a resolution.
update.microsoft.com is whitelisted, we can see from the computers page the updates status and antivirus , however once I've fully updated a machine, after central telling me that there are 8 updates, it still shows 8 updates pending for a long time. and can be like this for a few days , before it becomes green.
LogMeIn reports '21 important updates' but does not allow us to select to install. When pressing 'Check for updates', it sits there, throws the same error message as the original poster and stays on '21 important updates'. I can confirm that there are no updates available for the affected devices.
I have recently taken over this network and noticed that so many updates are needed to be installed on all servers. We have updated our other servers and have seen no issue but we are hesitating to update DCs due to replication that is happening. We do not want to adversely affect the replication or Active directory.
No reason to treat them differently than any other server. Install your updates as needed. Having multiple DCs (as you do) makes this safer and easier, because everything keeps on running during the reboots.
I know that sometime last year, 2022, when version 9 came out ESET changed something in regards to how the ERA/Protect console detects when computers need or don't need updates. I think it was something about changing the severity of the alert from warning to informative.
The windows update detection was a good way of having feedback to know when workstations were being updated and when they were not and I would really like that functionality back in some form. Either by ESET making it available again, or at the least if there is someway I can do it from my end with dynamics groups or something.
Actually I'm glad that ESET doesn't follow what my WSUS server says, because that's kind of the root of the problem, which is my WSUS isn't pushing out all the updates. (probably because I haven't configured it right) So I often have to tell my workstations to check Microsoft update to get the missing updates.
What I want is for ESET to say "Hey these computers needs updating" as per microsoft, so I can address those workstations, figure out what updates my WSUS server isn't pushing out and tweak it till it does.
then after solving that short term problem, also use ESET to make it easy for me to readily identify what workstations need updates when they do. (Ideally the list will shrink to zero on it's own during patch day. But at the least if there is an issue, I know what workstations need attention, so I don't have to firm wide check every pc on the floor just to find the ones that are having issues.)
internally this been reported by others and its been explained that "This is because we report missing OS updates with informative severity as of v9. Beforehand they were reported with warning severity even if only optional updates were available. "There is an internal conversation regarding changing this and I will submit a market requirement on your behalf to add weight to this conversation. However, please be aware that any changes that are made (if made) will not be added until version 10 of server security.
I don't know who this person was quoting from, but if the severity was lowered from warning to informative, I'm assuming that means the computers won't turn yellow anymore nor would the dynamic group work since it wouldn't be reported as a "functionality problem" that the template listens for. and I'm also assuming this change would extend to the endpoint product as well.
"Computer with outdated operating system" is a completely different issue. It doesn't tell you if there are updates to be installed on that computer. It tells you that you are using an old operating system version (i.e. Windows 7). Those warnings indeed seem to have been disabled (and good riddance, tbh), but the ones for updates in the queue (the ones you want) are still there.
Ok figured out what the issue was, it seems under the default policy for our anti-virus, under settings, user interface, user interface elements and under the "Configure license-related application statuses", which itself is odd because all the application statuses are in here not just license related ones. The "Windows Updates available" checkboxes were unchecked, specifically the 'Send' one that shows the notifications in the console.
I am not sure if this was unchecked by an update or probably someone trying to fix an earlier issue, not placing blame, but once I checked it, I was able to get the workstations that were needing windows updates to show back up in yellow again.
Is there a way to monitor windows updates from Splunk? I have a VBScript that queries a remote machine for update history but for security reasons, our remote registry is turned off on these machines.
Is there a way to simply monitor this history on Splunk? My goal is to match up some of the file system changes that I see on my windows machines to Windows Update timing. I do not want to have to check the update consoles to see what is approved (and this doesn't tell me when they were actually applied).
I know this is old but we just addressed this at work for remote networks that cannot (for a variety of reasons) utilize the windows app. The following query will work to check KB numbers on a Windows box:
Microsoft no longer supports Windows 7, and as such, doesn't release new updates. Any updates available via Windows 7's Windows Update utility are ones that have not been installed since support ended on January 24, 2020.
3a8082e126