Jump to content


  • Content Count

  • Joined

  • Last visited

Community Reputation

0 Neutral

My Information

  • Location
  • Agent Count
    750 - 1000 Agents
  1. @Joe.McCall thanks for taking the time to reply. It certainly seems like by changing the approach and trying to use a GUI based tool that attempts to manage all aspects of updating a system, Intel is making it a bit more difficult to accomplish some of the tasks. the tool still downloads the packages the same fashion the old application handled it but the approach is certainly a bit more complicated than it has to be. I will take a look and see if I can come up with some sort of solution that can work for our needs. Thanks for your time
  2. @Joe.McCall I came across your post regarding the bios Update and the script that you configured to get this accomplished last year. Have you worked on a solution that uses the new HPIA tool from HP? I haven't explored the options using HPIA but figured that i could ask what others were doing to avoid trying to re-invent the wheel.
  3. Hello All, I was curious to know if any of you have configured your Windows Store for auto update or disabled updates with CWA? I know that you can manage this with Group Policy, registry or allow the end users to handle them as well. We allow the store to run as some of the useful features (Calculator /Photos /Video Player) are Apps from the store and would not run without it. I didn't see anything in our CWA instance that pointed to Store updates and wanted to know how others are handling this. A recent vulnerability was discovered in a Store application (HVEC codec) which is an optional download but certainly posses a risk in any environment where it exists. The vulnerability does not have a patch but requires a download from the Microsoft Store to remediate. Since we don't currently manage Windows Store with CWA, I didnt know if it was worth the task to configure something via registry, that would rely on EDF /groups and scripts or to just go the Group Policy route.
  4. Thanks for the reply BlueToast. Has anyone had any success with any workarounds to avoid having to manually log into every host?
  5. Hello All- We have identified a failed state for the Intel Meltdown & Wanna cry out of the box scripts on some of our devices. The error points to a Failed to Create temporary file and it details "failed to create temporary file. Username: domain\username. Profile folder not found. Validate user has previously logged into the system. We generally do not log into the host machines with the admin account that we configured in CWA and thus there would be no profile. Other scripts both cmd and Powershell that do no require a temporary file execute with no issues or errors. Has anyone had this issue and what would be a quick way to resolve this? We do not have a problem creating the profile if we had a way to automate this on all of the hosts to avoid having to manually log into the hosts. ** I have tried to execute notepad.exe via cmd or powershell as a script and ran as admin but this does not create the profile.** If i log in with my user account and select to run command as the admin account it will execute and create the profile. Any feedback would be greatly appreciated.
  6. Hello All- I have an open ticket with support and have yet to identify a root cause and was wondering if anyone else has experienced this in the past. We have 2 web servers that upon reboot, the LT service will continually start / stop and will create multiple entries in the Event Log. I have tried to remove the application /agent completely and re-installed it on those devices and the issue is persistent. The difference between these two servers and others in the environment is that they are Web Servers and report multiple Ip addresses on the device. The installation completes successfully, but the LTerror log does not complete and notes an encryption error. These two servers did report successfully when we first performed the onboarding and then we started to notice the issue after the servers would perform their weekly reboot. Any help would be greatly appreciated.
  7. SteveYates- Thanks for the reply. I think I have an idea of how to approach some of these out of the normal cycle patching to have these applied outside of the normal cycle.
  8. Hello All- I was wondering how most of you are handling zero day patches in your environment and how you schedule and push deployments for some of these CVE's / KB's to the applicable devices outside of your normal patch schedule. I configured our environment to run on a test group of clients the week of patch Tuesday and then run against the bulk production the week after that. This works great when most of the patches released are not exploited out in the wild. I know that i can push some action with patch manager, but is there a better way to schedule and apply this globally same day that works even if i my schedule does on the week of patch Tuesday. Thanks for the replies and suggestions
  9. Captain- interested in how you applied your monitor to identify the hop returned. I want to setup something similar and want to exclude all of the possible hops and just identify the gateway and collect that as an EDF. Since we will have different devices returning different results, i am curious as to how we can achieve just collecting the gateway and not the full returned route details.
  10. Pcl- I ran through a similar problem when I was trying to create a report to breakdown the assets we manage and identify the OS counts for EOL purposes. I created a report using one of the templates and have configured the automated delivery with no issues. Do other scheduled report run with no issues? Does setting the output in a different format make any difference? Do all of the data source / image referenced in the report exist?
  11. Hi all- We are implementing a vdi solution in our environment and as I read through the thread, it brought up some questions in regards of how we would be able to manage this effectively. We have our Master image with no users actively using the VDI desktops as of yet. We want to manage and update the master image as we understand that by updating and maintaining this will replicate the changes to the other vdi desktops for the users. What approach should we take, are there any known issues that we should be aware of? We are on prem and are using ver 19.0.250 of automate with Control. Any help or suggestions would be appreciated.
  12. Hello All- I have been looking for a way to report on our current OS Build and break that down by ver (release) so we know what devices are in need of an update as we have some 1607-1809 in the environment. The executive summar and other reports just do a breakdown based on ver 7/8/10 and it doesnt help much to understand what needs the feature update. Has any one built a report that does this OS breakdow that details that OS build /release? I know that I can report via Dataviews as it does detail the information there but this is not an automated solution. Any help or direction would be greatly appreciated.
  13. Cubert- I notice that the thread here is a bit old but i wanted to know if this currently supports V19 of CWA? What we are looking for is just to have the ability to view the user accounts as shown in the screenshots and then export the data to excel for auditing purposes. We dont want to implement any changes or actions right away, we just want to have a way to collect the data and filter through it to find possible issues. Does this plugin support that function without any need to apply actions?
  14. Thanks all for the suggestions to try and provide a solution to our inquiry. I was finally able to configure a solution that appears to be working at the moment and will need to keep an eye whenever we perform an update of our instance to possibly go back and recreate the configuration. What I ended up doing to make this work was as follows: Step 1- Create AV scanner entry as explained in this doc and specific to Carbon Black as noted in this other link with the exception noted: https://forums.connectwise.com/community/f/connectwise-automate/41642/virus-scan-configuration-for-carbon-black-cb-defense https://imgur.com/gallery/ZhKj9Eh Exception- instead of using rpgmr (32/64) I just used rpmgr.exe in the program location field and rpmgr* in the ap process field Step 2- Access the local MySQL db and find the av scanner table and update the scanner entries that I created manually and move their id to a higher priority entry number. After completing this, it was a matter of refreshing the agent to collect the latest data and then I was able to find that the av solution was identified and running.
  15. Any update on the attachment being unavailable for download?
  • Create New...