NetIQ Secure Configuration Manager Windows Agent |
Version 5.9 |
Release Notes |
Date Published: September 2012 |
Installing and Upgrading Agents |
NetIQ® Secure Configuration ManagerTM Windows Agent version 5.9 (Windows agent) includes new features, improves usability, and resolves several previous issues. Many of these improvements were made in direct response to suggestions from our customers. We thank you for your time and valuable input. We hope you continue to help us ensure our products meet all your needs. You can post feedback in the Secure Configuration Manager forum on Qmunity, our community Web site that also includes product notifications, blogs, and product user groups. For more information about this version and for the latest release notes, see the Secure Configuration Manager Documentation Web site. To download this product, see the Secure Configuration Manager Product Upgrade Web site. What's New?The Windows agent collects security information from one or more Windows computers in one or more domains. You can use the Secure Configuration Manager console to automatically install and uninstall agents on Windows computers to manage systems running a variety of Windows operating systems as well as Microsoft SQL Server, Internet Information Services (IIS), Oracle, Active Directory, and Network Attached Storage (NAS) endpoints. For more information about Windows agent computer requirements, proxy requirements, and permissions, see the Installation and Configuration Guide for NetIQ Secure Configuration Manager Windows Agent. The following sections outline the key features and functions provided by this version, as well as issues resolved in this release.
Update Windows Agents from the Secure Configuration Manager ConsoleThis version enables Windows agents to receive software updates through the deployment feature in the Secure Configuration Manager console. After installing this version for all your Windows agents, you can use the console to deploy hotfixes and service packs to multiple agents concurrently. To reduce the impact on environment performance, you can schedule the updates to occur at specified times. Receive Patch Database Content Automatically Pushed from Core ServicesThis version enables Windows agents to receive updates for patch assessment that Secure Configuration Manager Core Services automatically pushes out. When you run the AutoSync service to download the latest available patch information, Core Services can push those updates to your agents with the latest patch database file before you run the patch assessment security checks for your endpoint. Enhancements and Software FixesThis version includes software fixes that resolve several previous issues.
Adds Support for Using System Variables When Querying Certain File or Directory ObjectsThis version enables you to use system variables when running queries against the following objects in the Windows namespace:
You use the following variables to specify values for these objects:
(ENG235626) New .msi Installation File Resolves Several Previous IssuesThe new NetIQSecurityAgentForWindows.msi installation file for this version resolves the following issues related to using the previous SecurityAgentForWindows.msi file:
Deployment of a Windows Agent Fails
Cannot View a List of Systems Where Deployment Fails
Secure Configuration Manager Might Display 0 and 1 Results Instead of True and False for IIS Web Site Objects and AttributesSecure Configuration Manager now displays True and False when reporting the status of IIS Web site object and attributes. (ENG297173) Uninstallation Process Does Not Remove All FilesWhen you remove the Windows agent from a computer using the uninstall program, such as the Remote Deployment wizard or the remove programs utility in the Windows Control Panel, the program now remove all files from the agent installation folder (by default C:\Program Files\NetIQ\Vulnerability Manager Agent).(ENG310022)
Cannot Deploy an Agent when the Deployment Account Password includes a Blank SpaceSecure Configuration Manager now allows you to specify an account for deployment where the password contains a blank space. However, you cannot specify a password if the first character is a blank space. (ENG322765) Deployed Agents Do Not Register AutomaticallyAgents deployed successfully to remote computers, particularly Windows 2003 Server systems, now register automatically with Core Services. (ENG262432) New Numbering Scheme for the Windows Agent VersionWith this version, the Windows agent version number changes to a new scheme that more closely resembles versioning supported by Microsoft Corporation. The new version number uses a MM.NN.BBBB.SHHH format. For example, 5.9.755.0000. The following table explains the scheme.
Under certain circumstances, the Windows operating system might report to Secure Configuration Manager that an agent is version 5.9.755.1 when the agent really is at version 5.9.755.0001, which represents this release plus one hotfix. This discrepancy occurs because Microsoft commonly removes the leading zeroes in numbers. System RequirementsThis version requires NetIQ Secure Configuration Manager 5.9. Installing and Upgrading AgentsThis version enables you to install new agents or upgrade existing ones. You can upgrade from the following agent versions:
NetIQ Corporation recommends that you review the following considerations before installing or upgrading to this version:
For more information about installing, upgrading, and deploying the Windows agent, see the Installation and Configuration Guide for NetIQ Secure Configuration Manager Windows Agent included in the installation kit. For more information about installation, contact Technical Support. Verifying the Windows Agent InstallationTo verify that the Windows agent installation was successful, on the computer where you installed the Windows agent, open the Control Panel utility for adding and removing programs. The currently installed programs should include NetIQ Security Agent for Windows 5.9. Known IssuesNetIQ Corporation strives to ensure our products provide quality solutions for your enterprise software needs. The following issues are currently being researched. If you need further assistance with any issue, please contact Technical Support.
Effective Policy Object Has Some Restrictions in Collecting Group Policy Object DataThe following limitations apply to the Effective Policy object:
Special Steps Required to Uninstall Previous Versions of the Agent from a 64-bit ComputerYou must follow a special procedure to uninstall previous versions of the Windows agent on a 64-bit computer if you used the SecurityAgentForWindows.msi file to upgrade or install a previous version of the agent. This issue applies to computers running the following 64-bit operating systems:
For more information about the special procedure, see NetIQ Knowledge Base article NETIQKB72423. CIS Policy Setting Security Check Reports a Not Configured Status for Some Disabled PoliciesThe CIS Policy Setting security check verifies whether an endpoint complies with specified policy settings. This check reports the following group policies as not configured when the policies are disabled:
(DOC310546) Security Checks Report Proxied Endpoints as Offline When Windows Firewall is Enabled
Contact InformationOur goal is to provide documentation that meets your needs. If you have suggestions for improvements, please email Documentation-Feedback@netiq.com. We value your input and look forward to hearing from you. For detailed contact information, see the Support Contact Information Web site. For general corporate and product information, see the NetIQ Corporate Web site. For interactive conversations with your peers and NetIQ experts, become an active member of Qmunity, our community Web site that offers product forums, product notifications, blogs, and product user groups. Legal NoticeNetIQ Secure Configuration Manager is protected by United States Patent No: 5829001 and 7707183. THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, NETIQ CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of NetIQ Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of NetIQ Corporation. Some companies, names, and data in this document are used for illustration purposes and may not represent real companies, individuals, or data. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. © 2012 NetIQ Corporation and its affiliates. All Rights Reserved. U.S. Government Restricted Rights: If the software and documentation are being acquired by or on behalf of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at any tier), in accordance with 48 C.F.R. 227.7202-4 (for Department of Defense (DOD) acquisitions) and 48 C.F.R. 2.101 and 12.212 (for non-DOD acquisitions), the government's rights in the software and documentation, including its rights to use, modify, reproduce, release, perform, display or disclose the software or documentation, will be subject in all respects to the commercial license rights and restrictions provided in the license agreement. Check Point, FireWall-1, VPN-1, Provider-1, and SiteManager-1 are trademarks or registered trademarks of Check Point Software Technologies Ltd. ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the USA. All other company and product names mentioned are used only for identification purposes and may be trademarks or registered trademarks of their respective companies. For purposes of clarity, any module, adapter or other similar material ("Module") is licensed under the terms and conditions of the End User License Agreement for the applicable version of the NetIQ product or software to which it relates or interoperates with, and by accessing, copying or using a Module you agree to be bound by such terms. If you do not agree to the terms of the End User License Agreement you are not authorized to use, access or copy a Module and you must destroy all copies of the Module and contact NetIQ for further instructions. If this product claims FIPS compliance, it is compliant by use of one or more of the Microsoft cryptographic components listed below. These components were certified by Microsoft and obtained FIPS certificates via the CMVP. 893 Windows Vista Enhanced Cryptographic Provider (RSAENH) 894 Windows Vista Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) 989 Windows XP Enhanced Cryptographic Provider (RSAENH) 990 Windows XP Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) 997 Microsoft Windows XP Kernel Mode Cryptographic Module (FIPS.SYS) 1000 Microsoft Windows Vista Kernel Mode Security Support Provider Interface (ksecdd.sys) 1001 Microsoft Windows Vista Cryptographic Primitives Library (bcrypt.dll) 1002 Windows Vista Enhanced Cryptographic Provider (RSAENH) 1003 Windows Vista Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) 1006 Windows Server 2008 Code Integrity (ci.dll) 1007 Microsoft Windows Server 2008 Kernel Mode Security Support Provider Interface (ksecdd.sys) 1008 Microsoft Windows Server 2008 1009 Windows Server 2008 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) 1010 Windows Server 2008 Enhanced Cryptographic Provider 1012 Windows Server 2003 Enhanced Cryptographic Provider (RSAENH) This product may also claim FIPS compliance by use of one or more of the Open SSL cryptographic components listed below. These components were certified by the Open Source Software Institute and obtained the FIPS certificates as indicated. 918 - OpenSSL FIPS Object Module v1.1.2 - 02/29/2008 140-2 L1 1051 - OpenSSL FIPS Object Module v 1.2 - 11/17/2008 140-2 L1 1111 - OpenSSL FIPS Runtime Module v 1.2 - 4/03/2009 140-2 L1 Note: Windows FIPS algorithms used in this product may have only been tested when the FIPS mode bit was set. While the modules have valid certificates at the time of this product release, it is the user's responsibility to validate the current module status. EXCEPT AS MAY BE EXPLICITLY SET FORTH IN THE APPLICABLE END USER LICENSE AGREEMENT, NOTHING HEREIN SHALL CONSTITUTE A WARRANTY AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS, AND WARRANTIES INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTY OR CONDITION OF FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY EXCLUDED TO THE EXTENT ALLOWED BY APPLICABLE LAW AND ARE EXPRESSLY DISCLAIMED BY NETIQ, ITS SUPPLIERS AND LICENSORS. | ||||||||||||||||||||||||||||