Contents
- Installing third-party software updates
- Scenario: Updating third-party software
- Viewing information about available updates for third-party applications
- Approving and declining software updates
- Synchronizing updates from Windows Update with Administration Server
- Installing updates on devices manually
- Configuring Windows updates in a Network Agent policy
Installing third-party software updates
Kaspersky Security Center allows you to manage updates of software installed on client devices and fix vulnerabilities in Microsoft applications and other software makers' products through installing required updates.
Kaspersky Security Center searches for updates through the update search task and downloads them to the updates repository. After completing the search of updates, the application provides the administrator with information about available updates and vulnerabilities in applications that can be fixed using those updates.
Information about available updates for Microsoft Windows is provided by Windows Update service. Administration Server can be used as Windows Server Update Services (WSUS) server. To use Administration Server as WSUS server, you should configure synchronization of updates with Windows Update. After you have configured data synchronization with Windows Update, Administration Server provides updates to Windows Update services on devices in centralized mode and with the set frequency.
You can also manage software updates through a Network Agent policy. To do this, you should create a Network Agent policy and configure software updating in the corresponding windows of the New Policy Wizard.
The administrator can view a list of available updates in the Software updates subfolder included in the Application management folder. This folder contains a list of updates for Microsoft applications and other software makers' products retrieved by Administration Server that can be distributed to devices. After viewing information about available updates, the administrator can install them to devices.
Kaspersky Security Center updates some applications by removing the previous version of the application and installing the new one.
A user interaction may be required when you update a third-party application or fix a vulnerability in a third-party application on a managed device. For example, the user may be prompted to close the third-party application if it's currently open.
For security reasons, any third-party software updates that you install by using the Vulnerability and Patch Management feature are automatically scanned for malware by Kaspersky technologies. These technologies are used for automatic file check and include anti-virus scan, static analysis, dynamic analysis, behavior analysis in the sandbox environment, and machine learning.
Kaspersky experts do not perform manual analysis of third-party software updates that can be installed by using the Vulnerability and Patch Management feature. In addition, Kaspersky experts do not search for vulnerabilities (known or unknown) or undocumented features in such updates, as well as do not perform other types of analysis of the updates other than the specified in the paragraph above.
Before installing the updates to all of the devices, you can perform a test installation to make sure installed updates will cause no failures to the operation of applications on the devices.
You can find the details of third-party software that can be updated through Kaspersky Security Center by visiting the Technical Support website, on the Kaspersky Security Center page, in the Server Management section.
Scenario: Updating third-party software
This section provides a scenario for updating third-party software installed on the client devices. The third-party software includes applications from Microsoft and other software vendors. Updates for Microsoft applications are provided by the Windows Update service.
Prerequisites
Administration Server must have a connection to the internet to install updates of third-part software other than Microsoft software.
By default, internet connection is not required for Administration Server to install Microsoft software updates on the managed devices. For example, the managed devices can download the Microsoft software updates directly from Microsoft Update servers or from Windows Server with Microsoft Windows Server Update Services (WSUS) deployed in your organization's network. Administration Server must be connected to the internet when you use Administration Server as WSUS server.
Stages
Updating third-party software proceeds in stages:
- Searching for required updates
To find the third-party software updates required for the managed devices, run the Find vulnerabilities and required updates task. When this task is complete, Kaspersky Security Center receives the lists of detected vulnerabilities and required updates for the third-party software installed on the devices that you specified in the task properties.
The Find vulnerabilities and required updates task is created automatically by the Administration Server Quick Start Wizard. If you did not run the Wizard, create the task or run the Quick Start Wizard now.
How-to instructions:
- Administration Console: Scanning applications for vulnerabilities, Scheduling the Find vulnerabilities and required updates task
- Kaspersky Security Center 13.1 Web Console: Creating the Find vulnerabilities and required updates task, Find vulnerabilities and required updates task settings
- Analyzing the list of found updates
View the SOFTWARE UPDATES list and decide which updates you want to install. To view detailed information about each update, click the update name in the list. For each update in the list, you can also view the statistics on the update installation on client devices.
How-to instructions:
- Administration Console: Viewing information about available updates
- Kaspersky Security Center 13.1 Web Console: Viewing information about available third-party software updates
- Configuring installation of updates
When Kaspersky Security Center received the list of the third-party software updates, you can install them on client devices by using the Install required updates and fix vulnerabilities task or the Install Windows Update updates task. Create one of these tasks. You can create these tasks on the TASKS tab or by using the SOFTWARE UPDATES list.
The Install required updates and fix vulnerabilities task is used to install updates for Microsoft applications, including the updates provided by the Windows Update service, and updates of other vendors' products. Note that this task can be created only if you have the license for the Vulnerability and Patch Management feature.
The Install Windows Update updates task does not require a license, but it can be used to install Windows Update updates only.
To install some software updates you must accept the End User License Agreement (EULA) for the installation software. If you decline the EULA, the software update will not be installed.
You can start an update installation task by schedule. When specifying the task schedule, make sure that the update installation task starts after the Find vulnerabilities and required updates task is complete.
How-to instructions:
- Administration Console: Fixing vulnerabilities in applications, Viewing information about available updates
- Kaspersky Security Center 13.1 Web Console: Creating the Install required updates and fix vulnerabilities task, Creating the Install Windows Update updates task, Viewing information about available third-party software updates
- Scheduling the tasks
To be sure that the update list is always up-to-date, schedule the Find vulnerabilities and required updates task to run the task automatically from time to time. The default frequency is once a week.
If you have created the Install required updates and fix vulnerabilities task, you can schedule it to run with the same frequency as the Find vulnerabilities and required updates task or less often. When scheduling the Install Windows Update updates task, note that for this task you must define the list of updates every time before starting this task.
When scheduling the tasks, make sure that an update installation task starts after the Find vulnerabilities and required updates task is complete.
- Approving and declining software updates (optional)
If you have created the Install required updates and fix vulnerabilities task, you can specify rules for update installation in the task properties. If you have created the Install Windows Update updates task, skip this step.
For each rule, you can define the updates to install depending on the update status: Undefined, Approved or Declined. For example, you may want to create a specific task for servers and set a rule for this task to allow installation of only Windows Update updates and only those ones that have Approved status. After that you manually set the Approved status for those updates that you want to install. In this case the Windows Update updates that have the Undefined or Declined status will not be installed on the servers that you specified in the task.
The usage of the Approved status to manage update installation is efficient for a small amount of updates. To install multiple updates, use the rules that you can configure in the Install required updates and fix vulnerabilities task. We recommend that you set the Approved status for only those specific updates that do not meet the criteria specified in the rules. When you manually approve a large amount of updates, performance of Administration Server decreases and may lead to Administration Server overload.
By default, the downloaded software updates have the Undefined status. You can change the status to Approved or Declined in the SOFTWARE UPDATES list (OPERATIONS → PATCH MANAGEMENT → SOFTWARE UPDATES).
How-to instructions:
- Administration Console: Approving and declining software updates
- Kaspersky Security Center 13.1 Web Console: Approving and declining third-party software updates
- Configuring Administration Server to work as Windows Server Update Services (WSUS) server (optional)
By default, Windows Update updates are downloaded to the managed devices from Microsoft servers. You can change this setting to use the Administration Server as WSUS server. In this case, the Administration Server synchronizes the update data with Windows Update at the specified frequency and provides updates in centralized mode to Windows Update on networked devices.
To use the Administration Server as WSUS server, create the Perform Windows Update synchronization task and select the Use Administration Server as WSUS server check box in the Network Agent policy.
How-to instructions:
- Administration Console: Synchronizing updates from Windows Update with Administration Server, Configuring Windows updates in a Network Agent policy
- Kaspersky Security Center 13.1 Web Console: Creating the Perform Windows Update synchronization task
- Running an update installation task
Start the Install required updates and fix vulnerabilities task or the Install Windows Update updates task. When you start these tasks, updates are downloaded and installed on managed devices. After the task is complete, make sure that it has the Completed successfully status in the task list.
- Create the report on results of update installation of third-party software (optional)
To view detailed statistics on the update installation, create the Report on results of installation of third-party software updates.
How-to instructions:
- Administration Console: Creating and viewing a report
- Kaspersky Security Center 13.1 Web Console: Generating and viewing a report
Results
If you have created and configured the Install required updates and fix vulnerabilities task, the updates are installed on the managed devices automatically. When new updates are downloaded to the Administration Server repository, Kaspersky Security Center checks whether they meet the criteria specified in the update rules. All new updates that meet the criteria will be installed automatically at the next task run.
If you have created the Install Windows Update updates task, only those updates specified in the Install Windows Update updates task properties are installed. In future, if you want to install new updates downloaded to the Administration Server repository, you must add the required updates to the list of updates in the existing task or create a new Install Windows Update updates task.
Viewing information about available updates for third-party applications
To view a list of available updates for third-party applications installed on client devices,
In the Advanced → Application management folder in the console tree, select the Software updates subfolder.
In the workspace of the folder, you can view a list of available updates for applications installed on devices.
To view the properties of an update,
In the workspace of the Software updates folder, in the context menu of the update, select Properties.
The following information is available for viewing in the properties window of the update:
- On the General section you can view the Update approval status:
- Undefined—the update is available in the list of updates, but is not approved for installation.
- Approved—the update is available in the list of updates and approved for installation.
- Declined—the update is declined for installation.
- On the Attributes section you can view the values of the Installed automatically field:
- The Automatically value is displayed if the Install required updates and fix vulnerabilities task can install updates for the application. The task automatically installs new updates from the web address provided by the vendor of third-party software.
- The Manually value is displayed if Kaspersky Security Center cannot install updates for the application automatically. You can install updates manually.
The Installed automatically field is not displayed for Windows application updates.
- List of client devices for which the update is intended.
- List of system components (prerequisites) that have to be installed before the update (if any).
- Software vulnerabilities that the update will fix.
Approving and declining software updates
The settings of an update installation task may require approval of updates that are to be installed. You can approve updates that must be installed and decline updates that must not be installed.
For example, you may want to first check the installation of updates in a test environment and make sure that they do not interfere with the operation of devices, and only then allow the installation of these updates on client devices.
The usage of the Approved status to manage third-party update installation is efficient for a small amount of updates. To install multiple third-party updates, use the rules that you can configure in the Install required updates and fix vulnerabilities task. We recommend that you set the Approved status for only those specific updates that do not meet the criteria specified in the rules. When you manually approve a large amount of updates, performance of Administration Server decreases and may lead to Administration Server overload.
To approve or decline one or several updates:
- In the console tree, select the Advanced → Application management → Software updates node.
- In the workspace of the Software updates folder, click the Refresh button in the upper right corner. A list of updates appears.
- Select the updates that you want to approve or decline.
The information box for the selected objects appears on the right side of the workspace.
- In the Update approval status drop-down list, select Approved to approve the selected updates or Declined to decline the selected updates.
The default value is Undefined.
The updates for which you set the Approved status are placed in a queue for installation.
The updates for which you set the Declined status are uninstalled (if possible) from all devices on which they were previously installed. Also, they will not be installed on other devices in future.
Some updates for Kaspersky applications cannot be uninstalled. If you set the Declined status for them, Kaspersky Security Center will not uninstall these updates from the devices on which they were previously installed. However, these updates will never be installed on other devices in future. If an update for Kaspersky applications cannot be uninstalled, this property is displayed in the update properties window: in the Sections pane select General, and in the workspace the property will appear under Installation requirements. If you set the Declined status for third-party software updates, these updates will not be installed on devices for which they were planned but have not yet been installed. Updates will still remain on devices on which they were already installed. If you have to delete them, you can manually delete them locally.
Synchronizing updates from Windows Update with Administration Server
If you have selected Use Administration Server as a WSUS server in the Update management settings window of the Quick Start Wizard, the Windows Update synchronization task is created automatically. You can run the task in the Tasks folder. The functionality of a Microsoft software update is only available after the Perform Windows Update synchronization task is successfully completed.
The Perform Windows Update synchronization task only downloads metadata from Microsoft servers. If the network does not use a WSUS server, each client device downloads Microsoft updates from external servers independently.
To create a task for synchronizing Windows Updates with Administration Server:
- In the Advanced → Application management folder in the console tree, select the Software updates subfolder.
- Click the Additional actions button and select Configure Windows Update synchronization in the drop-down list.
The Wizard creates the Perform Windows Update synchronization task displayed in the Tasks folder.
The Windows Update Center Data Retrieval Task Creation Wizard starts. Follow the instructions of the Wizard.
You can also create the Windows Update synchronization task in the Tasks folder by clicking Create a task.
Microsoft regularly deletes outdated updates from the company's servers so the number of current updates is always between 200,000 and 300,000. In Kaspersky Security Center 10 Service Pack 2 Maintenance Release 1 and earlier versions, all updates were retained: no outdated updates were deleted. As a result, the database continuously grew in size. To reduce disk space usage and database size, deletion of outdated updates that are no longer present on Microsoft update servers has been implemented in Kaspersky Security Center 10 Service Pack 3.
When running the Perform Windows Update synchronization task, the application receives a list of current updates from a Microsoft update server. Next, Kaspersky Security Center compiles a list of updates that have become outdated. At the next start of the Find vulnerabilities and required updates task, Kaspersky Security Center flags all outdated updates and sets the deletion time for them. At the next start of the Perform Windows Update synchronization task, all updates flagged for deletion 30 days ago are deleted. Kaspersky Security Center also checks for outdated updates that were flagged for deletion more than 180 days ago, and then deletes those older updates.
When the Perform Windows Update synchronization task completes and outdated updates are deleted, the database may still have the hash codes pertaining to the files of deleted updates, as well as corresponding files in the %AllUsersProfile%\Application Data\KasperskyLab\adminkit\1093\.working\wusfiles files (if they were downloaded earlier). You can run the Administration Server maintenance task to delete these outdated records from the database and corresponding files.
Step 1. Defining whether to reduce traffic
When Kaspersky Security Center synchronizes updates with Microsoft Windows Update Servers, information about all files is saved in the Administration Server database. All files required for an update are also downloaded to the drive during interaction with the Windows Update Agent. In particular, Kaspersky Security Center saves information about express update files to the database and downloads them when necessary. Downloading express update files leads to decreased free space on the drive.
To avoid a decrease in disk space volume and to reduce traffic, you can disable the Download express installation files option.
If this option is selected, express update files are downloaded when running the task. By default, this option is not selected.
Step 2. Applications
In this section you can select applications for which updates will be downloaded.
If the All applications check box is selected, updates will be downloaded for all existing applications, and for all applications that may be released in the future.
By default, the All applications check box is selected.
Step 3. Update categories
In this section, you can select categories of updates that will be downloaded to the Administration Server.
If the All categories check box is selected, updates will be downloaded for all existing updates categories, and for all categories that may appear in the future.
By default, the All categories check box is selected.
Step 4. Updates languages
In this window you can select localization languages of updates that will be downloaded to Administration Server. Select one of the following options for downloading localization languages of updates:
Step 5. Selecting the account to start the task
In the Selecting an account to run the task window, you can specify which account to use when running the task. Select one of the following options:
Step 6. Configuring a task start schedule
On the Configure task schedule Wizard page, you can create a schedule for task start. If necessary, specify the following settings:
- Scheduled start:
- Run missed tasks
- Use automatically randomized delay for task starts
- Use randomized delay for task starts within an interval of (min)
Step 7. Defining the task name
In the Define the task name window, specify the name for the task that you are creating. A task name cannot be more than 100 characters long and cannot include any special characters ("*<>?\:|
).The default value is Perform Windows Update synchronization.
Step 8. Completing creation of the task
In the Finish task creation window, click the Finish button to finish the wizard.
If you want the task to start as soon as the wizard finishes, select the Run the task after the Wizard finishes check box.
The newly created Windows Update synchronization task will appear in the list of tasks in the Tasks folder of the console tree.
Installing updates on devices manually
If you have selected Find and install required updates on the Update management settings page of the Quick Start Wizard, the install required updates and fix vulnerabilities task is created automatically. You can run or stop the task in the Managed devices folder on the Tasks tab.
If you have selected Search for required updates in the Quick Start Wizard, you can install software updates on client devices through the Install required updates and fix vulnerabilities task.
You can do any of the following:
- Create a task for installing updates.
- Add a rule for installing an update to an existing update installation task.
- In the settings of an existing update installation task, configure a test installation of updates.
A user interaction may be required when you update a third-party application or fix a vulnerability in a third-party application on a managed device. For example, the user may be prompted to close the third-party application if it's currently open.
Installing updates by creating an installation task
You can do any of the following:
- Create a task for installing certain updates.
- Select an update and create a task for installing it and similar updates.
To install specific updates:
- In the Advanced → Application management folder in the console tree, select the Software updates subfolder.
- In the workspace, select the updates that you want to install.
- Do any of the following:
- Right-click one of the selected updates in the list, and then select Install update → New task.
- Click the Install update (create task) link in the information box for the selected updates.
- Make your choice in the displayed prompt about installing all previous application updates. Click Yes if you agree to the installation of successive application versions incrementally if this is required for installing the selected updates. Click No if you want to update applications in a straightforward fashion, without installing successive versions. If installing the selected updates is not possible without installing previous versions of applications, the updating of the application fails.
The Updates Installation and Vulnerabilities Fix Task Creation Wizard starts. Follow the steps of the Wizard.
- On the Selecting an operating system restart option page of the Wizard, select the action to perform when the operating system on client devices must be restarted after the operation:
- On the Configure task schedule page of the Wizard, you can create a schedule for task start. If necessary, specify the following settings:
- On the Define the task name page of the Wizard, specify the name for the task that you are creating. A task name cannot be more than 100 characters long and cannot include any special characters ("*<>?\:|).
- On the Finish task creation page of the Wizard, click the Finish button to close the Wizard.
If you want the task to start as soon as the Wizard finishes, select the Run the task after the Wizard finishes check box.
After the Wizard completes its operation, Install required updates and fix vulnerabilities appears in the Tasks folder.
You can enable automatic installation of system components (prerequisites) prior to installation of an update in the Install required updates and fix vulnerabilities task properties. When this option is enabled, all required system components are installed before the update. A list of the required components can be found in properties of the update.
In the properties of Install required updates and fix vulnerabilities task, you can allow installation of updates that upgrade application to a new version.
If the task settings provide rules for installation of third-party updates, the Administration Server downloads all relevant updates from their vendors' websites. Updates are saved to the Administration Server repository and then distributed and installed on devices where they are applicable.
If the task settings provide rules for installation of Microsoft updates and the Administration Server acts as a WSUS server, the Administration Server downloads all relevant updates to the repository and then distributes them to managed devices. If the network does not use a WSUS server, each client device downloads Microsoft updates from external servers independently.
To install a certain update and similar ones:
- In the Advanced → Application management folder in the console tree, select the Software updates subfolder.
- In the workspace, select the update that you want to install.
- Click the Run Update Installation Wizard button.
The Update Installation Wizard starts.
The Update Installation Wizard features are only available under the Vulnerability and Patch Management license.
Follow the steps of the Wizard.
- On the Search for existing update installation tasks page, specify the following settings:
- If you choose to search for existing update installation tasks and if the search retrieves some tasks, you can view properties of these tasks or start them manually. No further actions are required.
Otherwise, click the New update installation task button.
- Select the type of the installation rule to be added to the new task, and then click the Finish button.
- Make your choice in the displayed prompt about installing all previous application updates. Click Yes if you agree to the installation of successive application versions incrementally if this is required for installing the selected updates. Click No if you want to update applications in a straightforward fashion, without installing successive versions. If installing the selected updates is not possible without installing previous versions of applications, the updating of the application fails.
The Updates Installation and Vulnerabilities Fix Task Creation Wizard starts. Follow the steps of the Wizard.
- On the Selecting an operating system restart option page of the Wizard, select the action to perform when the operating system on client devices must be restarted after the operation:
- On the Select devices to which the task will be assigned page of the Wizard, select one of the following options:
- On the Configure task schedule page of the Wizard, you can create a schedule for task start. If necessary, specify the following settings:
- On the Define the task name page of the Wizard, specify the name for the task that you are creating. A task name cannot be more than 100 characters long and cannot include any special characters ("*<>?\:|).
- On the Finish task creation page of the Wizard, click the Finish button to close the Wizard.
If you want the task to start as soon as the Wizard finishes, select the Run the task after the Wizard finishes check box.
When the Wizard finishes, the Install required updates and fix vulnerabilities task is created and displayed in the Tasks folder.
In addition to the settings that you specify during task creation, you can change other properties of a created task.
Upgrading to a new version of the application may cause a malfunction of dependent applications on devices.
Installing an update by adding a rule to an existing installation task
To install an update by adding a rule to an existing installation task:
- In the Advanced → Application management folder in the console tree, select the Software updates subfolder.
- In the workspace, select the update that you want to install.
- Click the Run Update Installation Wizard button.
The Update Installation Wizard starts.
The Update Installation Wizard features are only available under the Vulnerability and Patch Management license.
Follow the steps of the Wizard.
- On the Search for existing update installation tasks page, specify the following settings:
- If you choose to search for existing update installation tasks and if the search retrieves some tasks, you can view properties of these tasks or start them manually. No further actions are required.
Otherwise, click the Add an update installation rule button.
- Select the task to which you want to add a rule, and then click the Add rule button.
Also, you can view properties of the existing tasks, start them manually, or create a new task.
- Select the type of the rule to be added to the selected task, and then click the Finish button.
- Make your choice in the displayed prompt about installing all previous application updates. Click Yes if you agree to the installation of successive application versions incrementally if this is required for installing the selected updates. Click No if you want to update applications in a straightforward fashion, without installing successive versions. If installing the selected updates is not possible without installing previous versions of applications, the updating of the application fails.
A new rule for installing the update is added to the existing Install required updates and fix vulnerabilities task.
Configuring a test installation of updates
To configure a test installation of updates:
- In the console tree, select the Install required updates and fix vulnerabilities task in the Managed devices folder on the Tasks tab.
- In the context menu of the task, select Properties.
The properties window of the Install required updates and fix vulnerabilities task opens.
- In the properties window of the task, in the Test installation section select one of the available options for test installation:
- Do not scan. Select this option if you do not want to perform a test installation of updates.
- Run scan on selected devices. Select this option if you want to test updates installation on selected devices. Click the Add button and select devices on which you need to perform test installation of updates.
- Run scan on devices in the specified group. Select this option if you want to test updates installation on a group of devices. In the Specify a test group field, specify a group of devices on which you want to perform a test installation.
- Run scan on specified percentage of devices. Select this option if you want to test updates installation on some portion of devices. In the Percentage of test devices out of all target devices field, specify the percentage of devices on which you want to perform a test installation of updates.
- Upon selecting any option except Do not scan, in the Amount of time to make the decision if the installation is to be continued, in hours field specify the number of hours that must elapse from the test installation of updates until the start of installation of the updates on all devices.
Configuring Windows updates in a Network Agent policy
To configure Windows Updates in a Network Agent policy:
- In the console tree, select Managed devices.
- In the workspace, select the Policies tab.
- Select a Network Agent policy.
- In the context menu of the policy, select Properties.
The properties window for the Network Agent policy opens.
- In the Sections pane, select Software updates and vulnerabilities.
- Select the Use Administration Server as a WSUS server option to download Windows updates to the Administration Server and then distribute them to client devices through Network Agent.
If this option is not selected, Windows updates are not downloaded to the Administration Server. In this case, client devices receive Windows updates directly from Microsoft servers.
- Select the set of updates that the users can install on their devices manually by using Windows Update.
On devices running Windows 10, if Windows Update has already found updates for the device, the new option that you select under Allow users to manage installation of Windows Update updates will be applied only after the updates found are installed.
Select an item in the drop-down list:
- Select the Windows Update search mode:
- Select the Scan executable files for vulnerabilities when running them option if you want to scan executable files for vulnerabilities while the files are being run.
- Make sure that editing is locked for all the settings that you have changed. Otherwise, the changes do not apply.
- Click Apply.