Daniel,

This is awesome. Would you mind sharing the entire script?


Thanks,
Brian

________________________________
From: listsadmin@lists.myitforum.com <listsadmin@lists.myitforum.com> on behalf 
of Daniel Ratliff <dratl...@humana.com>
Sent: Wednesday, April 20, 2016 3:20:13 PM
To: ms...@lists.myitforum.com
Subject: [mssms] RE: Bulletins and manual patching

Our packaging team uses the PADT, so its got a decent amount of logic in there. 
Here is the Install phase.

              ##*===============================================
              ##* PRE-INSTALLATION
              ##*===============================================
              [string]$installPhase = 'Pre-Installation'

              ## Show Welcome Message, close Internet Explorer if required, 
allow up to 3 deferrals, verify there is enough disk space to complete the 
install, and persist the prompt
              ## Show-InstallationWelcome -CloseApps 'iexplore' -AllowDefer 
-DeferTimes 3 -CheckDiskSpace -PersistPrompt

              ## Show Progress Message (with the default message)
              Show-InstallationProgress

              ## <Perform Pre-Installation tasks here>
              Stop-Process -Name 'wfcrun32'
              Stop-Process -Name 'wfica32'
              Execute-Process -Path 'ReceiverCleanupUtility.exe' -Parameters 
"/silent"

              ##*===============================================
              ##* INSTALLATION
              ##*===============================================
              [string]$installPhase = 'Installation'

              ## Handle Zero-Config MSI Installations
              If ($useDefaultMsi) { Execute-MSI -Action 'Install' -Path 
$defaultMsiFile }

              ## <Perform Installation tasks here>
              Execute-Process -Path 'CitrixReceiver.exe' -Parameters "/silent 
ALLOWADDSTORE=N  INSTALLDIR=`"C:\Program Files (x86)\Citrix`" 
ADDLOCAL=ReceiverInside,ICA_Client,USB,DesktopViewer,Flash,Vd3d 
SERVER_LOCATION=https://xenappserver.com";

              ##*===============================================
              ##* POST-INSTALLATION
              ##*===============================================
              [string]$installPhase = 'Post-Installation'

              ## <Perform Post-Installation tasks here>
              Set-RegistryKey -Key 
'HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Citrix\ICA Client\CEIP' -Name 
'Enable_CEIP' -Value 0 -Type DWORD


Daniel Ratliff

From: listsadmin@lists.myitforum.com [mailto:listsadmin@lists.myitforum.com] On 
Behalf Of Brian McDonald
Sent: Wednesday, April 20, 2016 3:27 PM
To: ms...@lists.myitforum.com
Subject: [mssms] Re: Bulletins and manual patching


Daniel,



The version of Receiver we have is 14.3, although there may be others out there.



I have downloaded the latest Citrix Receiver from the vendor's website. 
https://www.citrix.com/downloads/citrix-receiver/windows/receiver-for-windows-latest.html
 Which installs as 14.4.0.8014.



Following these steps: http://support.citrix.com/article/CTX202002 I created an 
application in SCCM and deployed it to a test machine. CitrixReceiver.exe 
/silent doesn't seem to work packaged in SCCM. I get 1603 errors. I've tried 
both Application and Package deployments.



Can you tell me how you're doing the install?



Thanks,

Brian





________________________________
From: listsadmin@lists.myitforum.com<mailto:listsadmin@lists.myitforum.com> 
<listsadmin@lists.myitforum.com<mailto:listsadmin@lists.myitforum.com>> on 
behalf of Daniel Ratliff <dratl...@humana.com<mailto:dratl...@humana.com>>
Sent: Tuesday, April 19, 2016 12:43:28 PM
To: ms...@lists.myitforum.com<mailto:ms...@lists.myitforum.com>
Subject: [mssms] RE: Bulletins and manual patching

The first one we are still tracking down ourselves, but your 2nd one is easy, 
its Citrix Reciever. You have 12.1, the latest I think is 14.4. We push 
Receiver out to all devices as we are a heavy XenApp/XenDesktop shop. We just 
use a standard package.

Daniel Ratliff

From: listsadmin@lists.myitforum.com<mailto:listsadmin@lists.myitforum.com> 
[mailto:listsadmin@lists.myitforum.com] On Behalf Of Brian McDonald
Sent: Tuesday, April 19, 2016 12:14 PM
To: ms...@lists.myitforum.com<mailto:ms...@lists.myitforum.com>
Subject: [mssms] Re: Bulletins and manual patching


Jason,



For the vulnerabilities we are getting dinged on we have exhausted our 
capabilities within SCCM to perform patching. We are using Shavlik for 3P 
stuff, but these are all one-offs that we are battling. Here are two of the 
really big ones causing us some major issues. Neither one of these have a 
'patch' that you can download from Microsoft to install. I'm trying to get an 
idea of how other folks attack these. Every week we get a lit of workstations 
with vulnerabilities. All of these vulnerabilities aren't anything we can 
download directly from Microsoft. It typically requires scripting, creating a 
package in SCCM and pushing it out to fix manually. Here are a few. I'd be very 
surprised if no one else has ran into these.



Thanks,

Brian



Microsoft Malware Protection Engine Remote Code Execution Vulnerability 
(2846338)

Description: A remote code execution vulnerability is present in some versions 
of Microsoft Malware Protection Engine.

Observation: The Microsoft Malware Protection Engine is a part of the following 
products: Microsoft Forefront Client Security, Microsoft Forefront Endpoint 
Protection, Microsoft Forefront Security for SharePoint, Microsoft System 
Center Endpoint Protection, Microsoft Malicious Software Removal Tool, 
Microsoft Security Essentials, Microsoft Security Essentials Prerelease, 
Windows Defender , etc. A remote code execution vulnerability is present in 
some versions of Microsoft Malware Protection Engine. It's caused when the 
Microsoft Malware Protection Engine does not properly scan a specially crafted 
file. Attackers could exploit this vulnerability to execute arbitrary code in 
the security context of the LocalSystem account.

Common Vulnerabilities Exposures (CVE) ID: CVE-2013-1346

Recommendation: The vendor has released an advisory to address the issue. 
http://technet.microsoft.com/en-us/security/advisory/2846338

False Output: Windows Defender engine version: 1.1.7604.0~KB2846338



Citrix XenApp Online Plug-in / Receiver Remote Code Execution

Description: A remote code execution vulnerability is present in some versions 
of Citrix XenApp Online Plug-in and Citrix Receiver.

Observation: The flaw is due to an unspecified error. Successful exploitation 
by a remote attacker could result in the execution of arbitrary code if the 
victim is convinced into opening a malicious file from an SMB or WebDAV share.

Common Vulnerabilities Exposures (CVE) ID: CVE-2012-4603

Recommendation: The vendor has released an update to address the issue: 
http://support.citrix.com/article/CTX134681

False Output: Citrix online plug-in - web, 12.1.0.30

________________________________
From: listsadmin@lists.myitforum.com<mailto:listsadmin@lists.myitforum.com> 
<listsadmin@lists.myitforum.com<mailto:listsadmin@lists.myitforum.com>> on 
behalf of Jason Sandys <ja...@sandys.us<mailto:ja...@sandys.us>>
Sent: Monday, April 18, 2016 1:24:45 PM
To: ms...@lists.myitforum.com<mailto:ms...@lists.myitforum.com>
Subject: [mssms] RE: Bulletins and manual patching

I've never seen a security bulletin hotfix not be in the WSUS catalog. Can you 
give an example of one?

J

From: listsadmin@lists.myitforum.com<mailto:listsadmin@lists.myitforum.com> 
[mailto:listsadmin@lists.myitforum.com] On Behalf Of Brian McDonald
Sent: Monday, April 18, 2016 1:16 PM
To: ms...@lists.myitforum.com<mailto:ms...@lists.myitforum.com>
Subject: [mssms] Bulletins and manual patching


How are folks handling security vulnerabilities that do not sync up with 
WSUS/SCCM? I'm trying to grasp how to best approach patches that require manual 
package creation in SCCM, such as MS Security Bulletins. This seems to be a 
never ending battle and we have a very lean team.



Thanks,

Brian




The information transmitted is intended only for the person or entity to which 
it is addressed
and may contain CONFIDENTIAL material. If you receive this material/information 
in error,
please contact the sender and delete or destroy the material/information.


The information transmitted is intended only for the person or entity to which 
it is addressed
and may contain CONFIDENTIAL material. If you receive this material/information 
in error,
please contact the sender and delete or destroy the material/information.




Reply via email to