About
Careers
Support
Partners
Community
Contact
Product
Overview
IT Discovery
IT Inventory
IT Analytics
Features
Integrations
Use Cases
IT Asset Management
Cybersecurity
Active Directory Audit
Installing Software & Patches
Automated IT Inventory
Pricing
Resources
Support Knowledge Base
Videos
Testimonials
Vulnerability Updates
Patch Tuesday
Blog
Free Download
Lansweeper
»
Report Questions
»
SWAPGS Report
Active Topics
Search
Join Now
Login
Notification
Error
OK
SWAPGS Report
Posted:
Wednesday, August 7, 2019 3:34:46 PM(UTC)
brodiemac
Member
Original Poster
Posts: 19
0
Like
I got the email about the
audit report
for this provided by LANSweeper. I copied the code and ran the report but it is all wrong. It shows most of my environment being vulnerable but when researching the
vulnerabilities
and checking machines marked as vulnerable, they all had the required patches. Anyone else seeing this?
#1
brodiemac
Member
Original Poster
Posts: 19
posted:
8/7/2019 4:37:52 PM(UTC)
So I'm guessing LANSweeper uses the Get-HotFix Powershell command to get the hotfix information as the result of that command matches what is listed for these computers. Since we are using WSUS, there are several that are not listed using this command. I found
this article
that explains an alternate method of listing hotfixes installed this way. How would I go about integrating this command into LANSweeper to list installed hotfixes from WSUS?
User Profile
View All Posts by User
View helpful posts
#2
Lennart
Member
Posts: 5
posted:
8/8/2019 6:47:15 AM(UTC)
I'm getting several clients marked as missing KB4507453 regarding to the report.
But they are updated to max, and can´t find any more windows updates.
I´m not using WSUS.
Any ideas?
/BR Lennart
User Profile
View All Posts by User
View helpful posts
#3
Esben.D
Member
Administration
Posts: 1,966
posted:
8/8/2019 12:34:42 PM(UTC)
Have you checked whether the report lists assets with outdated data (look in the comments column)?
Might be best to just hit the rescan assets button in the report, just to be safe.
The data itself is taken from the Win32_QuickFixEngineering WMI class.
To check you can run
get-wmiobject Win32_QuickFixEngineering
in PowerShell
User Profile
View All Posts by User
View helpful posts
#4
Bginchereau
Member
Posts: 1
posted:
8/12/2019 2:25:22 PM(UTC)
Originally Posted by: brodiemac
I got the email about the
audit report
for this provided by LANSweeper. I copied the code and ran the report but it is all wrong. It shows most of my environment being vulnerable but when researching the
vulnerabilities
and checking machines marked as vulnerable, they all had the required patches. Anyone else seeing this?
The search criteria for the report does not include the all inclusive patches that have been put out.
EX: Win 10 build 1709 - the report looks for KB4507455, but patch KB4507465 REPLACED the previous but still includes the fix. The report shows the machine as out of date due to not looking for the updated patch.
You could go back through the report code and add these new patches, but it would be a lot easier with an update report.
User Profile
View All Posts by User
View helpful posts
Active Discussions
TPM scanning
by
gene@sca
Last post:
Yesterday
at 10:40:24 PM(UTC)
Bulk AssetLock set
by
tcooper
Last post:
Yesterday
at 6:24:15 PM(UTC)
Set AssetType based on Model?
by
tcooper
Last post:
Yesterday
at 6:16:57 PM(UTC)
Public IP Address
by
David Goodwin
Last post:
Yesterday
at 4:57:14 PM(UTC)
Exchange Scan in v7 and DAG
by
Peter.Riederer
Last post:
Yesterday
at 8:42:48 AM(UTC)
Asset Scanning - Change Types
by
DNuhija
Last post:
12/12/2019 5:40:47 PM(UTC)
Plundervolt
by
NWSF
Last post:
12/12/2019 5:10:14 PM(UTC)
MSI Package
by
Stefano Magri
Last post:
12/12/2019 3:34:16 PM(UTC)