NetIQ Secure Configuration Manager Windows Agent

Version 5.9

Release Notes

Date Published: September 2012

 
 

 

NetIQ® Secure Configuration ManagerTM Windows Agent version 5.9 (Windows agent) includes new features, improves usability, and resolves several previous issues. Many of these improvements were made in direct response to suggestions from our customers. We thank you for your time and valuable input. We hope you continue to help us ensure our products meet all your needs. You can post feedback in the Secure Configuration Manager forum on Qmunity, our community Web site that also includes product notifications, blogs, and product user groups.

For more information about this version and for the latest release notes, see the Secure Configuration Manager Documentation Web site. To download this product, see the Secure Configuration Manager Product Upgrade Web site.

What's New?

The Windows agent collects security information from one or more Windows computers in one or more domains. You can use the Secure Configuration Manager console to automatically install and uninstall agents on Windows computers to manage systems running a variety of Windows operating systems as well as Microsoft SQL Server, Internet Information Services (IIS), Oracle, Active Directory, and Network Attached Storage (NAS) endpoints.

For more information about Windows agent computer requirements, proxy requirements, and permissions, see the Installation and Configuration Guide for NetIQ Secure Configuration Manager Windows Agent.

The following sections outline the key features and functions provided by this version, as well as issues resolved in this release.

Update Windows Agents from the Secure Configuration Manager Console

This version enables Windows agents to receive software updates through the deployment feature in the Secure Configuration Manager console. After installing this version for all your Windows agents, you can use the console to deploy hotfixes and service packs to multiple agents concurrently. To reduce the impact on environment performance, you can schedule the updates to occur at specified times.

Receive Patch Database Content Automatically Pushed from Core Services

This version enables Windows agents to receive updates for patch assessment that Secure Configuration Manager Core Services automatically pushes out. When you run the AutoSync service to download the latest available patch information, Core Services can push those updates to your agents with the latest patch database file before you run the patch assessment security checks for your endpoint.

Enhancements and Software Fixes

This version includes software fixes that resolve several previous issues.

Adds Support for Using System Variables When Querying Certain File or Directory Objects

This version enables you to use system variables when running queries against the following objects in the Windows namespace:

  • File or Directory
  • File or Directory Control Access Entry
  • File or Directory System Access Control Entry
  • Content Line

You use the following variables to specify values for these objects:

  • %CommonProgramFiles%
  • %CommonProgramFiles(x86)%
  • %CommonProgramW6432%
  • %ProgramFiles%
  • %ProgramFiles(x86)%
  • %ProgramW6432%
  • %SystemDrive%
  • %SystemRoot%
  • %TEMP%
  • %TMP%
  • %windir%

(ENG235626)

New .msi Installation File Resolves Several Previous Issues

The new NetIQSecurityAgentForWindows.msi installation file for this version resolves the following issues related to using the previous SecurityAgentForWindows.msi file:

  • The previous .msi installation package fails to install the Windows agent on a computer running a non-English operating system. The setup program looks for a group named "User" in English. The .msi installation package in this version can install the Windows agent on a computer running a non-English operating system. (ENG278913)
  • You cannot not install the NetIQ® Secure Configuration Manager Module for SCAP (SCAP module) on a computer where you installed a Windows agent using the previous .msi file. You can now locally install or deploy the SCAP module 1.4 from the Secure Configuration Manager console to a computer that hosts this version of the Windows agent. For more information about deploying agent packages from the console, see the Installation and Configuration Guide for NetIQ Secure Configuration Manager Windows Agent. (DOC309545)
  • You cannot use the previous .msi file to install the agent on a computer running an operating system with the German language. The installation process succeeds, but the NetIQ Security Agent for Windows service (Windows agent service) does not start. (ENG305134)
  • Some directories remain on the computer after you uninstall the agent. This issue occurs only when you have used the previous .msi file to install the agent. (ENG302181)
  • You use the previous .msi file to update an agent on a 64-bit computer, and then cannot uninstall the agent. (ENG290544)

Deployment of a Windows Agent Fails

Issue:

During the Windows agent deployment process, the console does not set permissions correctly on the temp directory under certain conditions. As a result, the NetIQSecurityAgentForWindows.msi program cannot install or uninstall the agent on remote computers. For example, when you specify credentials that have administrative permissions on the remote computer but not on the local computer, the deployment process fails. (ENG288424)

Fix:

To access the necessary files, Secure Configuration Manager sets the correct permissions on the temporary directory when you specify a non-Administrator account for the local computer.

Cannot View a List of Systems Where Deployment Fails

Issue:

After deploying to multiple remote computers concurrently, you cannot determine whether deployment fails for some agents. (ENG281660)

Fix:

Secure Configuration Manager adds a report to the Completed jobs queue that provides useful information about the deployment job, including successful systems, failed systems, and an explanation of the failure.

Secure Configuration Manager Might Display 0 and 1 Results Instead of True and False for IIS Web Site Objects and Attributes

Secure Configuration Manager now displays True and False when reporting the status of IIS Web site object and attributes. (ENG297173)

Uninstallation Process Does Not Remove All Files

When you remove the Windows agent from a computer using the uninstall program, such as the Remote Deployment wizard or the remove programs utility in the Windows Control Panel, the program now remove all files from the agent installation folder (by default C:\Program Files\NetIQ\Vulnerability Manager Agent).(ENG310022)

Note
Before removing the agent from the computer, ensure that you have unregistered and deleted the agent from Secure Configuration Manager. For more information, see the User Guide for NetIQ Secure Configuration Manager.

Cannot Deploy an Agent when the Deployment Account Password includes a Blank Space

Secure Configuration Manager now allows you to specify an account for deployment where the password contains a blank space. However, you cannot specify a password if the first character is a blank space. (ENG322765)

Deployed Agents Do Not Register Automatically

Agents deployed successfully to remote computers, particularly Windows 2003 Server systems, now register automatically with Core Services. (ENG262432)

New Numbering Scheme for the Windows Agent Version

With this version, the Windows agent version number changes to a new scheme that more closely resembles versioning supported by Microsoft Corporation. The new version number uses a MM.NN.BBBB.SHHH format. For example, 5.9.755.0000. The following table explains the scheme.

Symbol Represents
MM Major version of the product
NN Minor version of the product
BBBB Build number
S Service pack number
HHH Count of applied hotfixes

Under certain circumstances, the Windows operating system might report to Secure Configuration Manager that an agent is version 5.9.755.1 when the agent really is at version 5.9.755.0001, which represents this release plus one hotfix. This discrepancy occurs because Microsoft commonly removes the leading zeroes in numbers.

Return to Top

System Requirements

This version requires NetIQ Secure Configuration Manager 5.9.

Return to Top

Installing and Upgrading Agents

This version enables you to install new agents or upgrade existing ones. You can upgrade from the following agent versions:

  • 5.7 Service Pack 2
  • 5.8
  • 5.8 Service Pack 1
  • 5.8 Service Pack 2

NetIQ Corporation recommends that you review the following considerations before installing or upgrading to this version:

  • If you want to install or upgrade an agent on a local computer, use the NetIQSecurityAgentForWindows.msi setup program included in the installation kit.
  • If you want to install or upgrade the agent on remote computers, use the Deployment wizard in the Secure Configuration Manager console. Before using the remote deployment feature, you must locally install or upgrade at least one agent in each domain. Secure Configuration Manager uses this first upgraded agent as a Deployment Agent for the domain. Once an agent is upgraded, Secure Configuration Manager can automatically assign it as a Deployment Agent. For more information about deployment and Deployment Agents, see the Installation and Configuration Guide for NetIQ Secure Configuration Manager Windows Agent and the User Guide for NetIQ Secure Configuration Manager.
  • The Secure Configuration Manager 5.9 setup program automatically adds a Windows agent to the Core Services computer. If a Windows agent already exists on the computer, the setup program upgrades the agent to this version. Secure Configuration Manager also assigns this agent as the default Deployment Agent for the computer's domain.
  • Before using the Deployment feature in the console to upgrade older agents, you might need to specify a fully qualified host name (FQHN) for the agent computer. Secure Configuration Manager needs to know in which domain each agent resides so that Core Services can assign a Deployment Agent to use for deploying version 5.9 to the agents.

  • If you do not immediately upgrade your Windows agents after upgrading to Secure Configuration Manager 5.9, you must apply Hotfix 73282 to the agents. This hotfix updates the certificate file that ensures communication between the agent and Core Services.

    You must also continue running a Windows agent on a computer other than the Core Services computer. The agent computer must be running your current agent version and have the Standalone Deployment Wizard installed locally. You can use the standalone wizard to push the hotfix to your older agents. You cannot use the Secure Configuration Manager console to deploy Hotfix 73282.

  • You can deploy version 5.9 to your Windows agents without Hotfix 73282 applied. However, you must re-register the agents after deployment. Secure Configuration Manager cannot communicate with the agents until they are successfully registered.

  • During installation and deployment, the installation program makes the following changes on the target computer:
    • Automatically grants the "Log on as a service" right to the specified account for the Windows agent service.
    • Enables the Services utility in the Windows Control Panel to automatically restart the Windows agent service after a failure.
  • If you want to use an upgraded agent as a Deployment Agent, you might need to modify the run-as account for the NetIQ Security Agent for Windows service on that agent's computer. The service account for Deployment Agents must have the credentials to deploy to remote computers. For example, specify a domain administrator account. When you upgrade a Windows agent, the setup program persists the agent settings, including baselines and registry key settings.
  • If you upgrade an agent that communicates with Core Services on a port other than the default ports, you must manually re-register the upgraded agent. When the upgraded agent registers with Secure Configuration Manager Core Services, the default communication port changes from 1626 to 1627.
  • This version does not install these release notes or the Installation and Configuration Guide for NetIQ Secure Configuration Manager Windows Agent included in the installation kit. To maintain the latest documentation on the console computer, copy the files to the Documentation folder, by default \%Program Files%\NetIQ\Secure Configuration Manager\Documentation.
  • You can upgrade a Windows agent that has the NetIQ Secure Configuration Manager Module for SCAP (SCAP module) installed on the agent computer.
  • If you want to re-deploy an agent that has already been successfully deployed to a remote computer, you must uninstall the agent first. For example, you might want to change the credentials of the Windows agent service or resolve issues with the agent. The Deployment wizard does not change the settings for a previously installed agent, even though you modify the settings as part of the deployment process. The Windows agent setup program prevents you from installing an agent when the same version already exists on the computer, but the Deployment wizard does not.

For more information about installing, upgrading, and deploying the Windows agent, see the Installation and Configuration Guide for NetIQ Secure Configuration Manager Windows Agent included in the installation kit. For more information about installation, contact Technical Support.

Return to Top

Verifying the Windows Agent Installation

To verify that the Windows agent installation was successful, on the computer where you installed the Windows agent, open the Control Panel utility for adding and removing programs. The currently installed programs should include NetIQ Security Agent for Windows 5.9.

Return to Top

Known Issues

NetIQ Corporation strives to ensure our products provide quality solutions for your enterprise software needs. The following issues are currently being researched. If you need further assistance with any issue, please contact Technical Support.

Effective Policy Object Has Some Restrictions in Collecting Group Policy Object Data

The following limitations apply to the Effective Policy object:

  • Due to data integrity issues, Microsoft APIs prevent the Windows agent from running Effective Policy object queries against some GPOs.
  • The Windows agent cannot collect GPO settings information when the agent runs as the Local System account on queried endpoints. The Windows agent must have Administrative permissions on the endpoint to run the queries. (DOC304630)

Special Steps Required to Uninstall Previous Versions of the Agent from a 64-bit Computer

You must follow a special procedure to uninstall previous versions of the Windows agent on a 64-bit computer if you used the SecurityAgentForWindows.msi file to upgrade or install a previous version of the agent. This issue applies to computers running the following 64-bit operating systems:

  • Windows XP Professional
  • Windows Server 2003
  • Windows Vista Business
  • Windows Vista Enterprise
  • Windows Server 2008 Standard
  • Windows Server 2008 Enterprise

For more information about the special procedure, see NetIQ Knowledge Base article NETIQKB72423.

CIS Policy Setting Security Check Reports a Not Configured Status for Some Disabled Policies

The CIS Policy Setting security check verifies whether an endpoint complies with specified policy settings. This check reports the following group policies as not configured when the policies are disabled:

  • Disable remote Desktop Sharing
  • Do not process the legacy run list
  • Do not process the run once list
  • Require trusted path for credential entry
  • Restrictions for Unauthenticated RPC clients

(DOC310546)

Security Checks Report Proxied Endpoints as Offline When Windows Firewall is Enabled

Issue:

When the Windows Firewall is enabled on an endpoint computer managed by proxy, security check results might report the endpoint as Offline. This issue occurs because the firewall settings do not include exceptions for the proxy agent, which blocks the agent from gathering data. (DOC311358)

Workaround:

Enable Remote Administration and Windows Remote Management, in the Windows firewall settings on the endpoint computer, for inbound and outbound communications.

Return to Top

Contact Information

Our goal is to provide documentation that meets your needs. If you have suggestions for improvements, please email Documentation-Feedback@netiq.com. We value your input and look forward to hearing from you.

For detailed contact information, see the Support Contact Information Web site.

For general corporate and product information, see the NetIQ Corporate Web site.

For interactive conversations with your peers and NetIQ experts, become an active member of Qmunity, our community Web site that offers product forums, product notifications, blogs, and product user groups.

Return to Top

Legal Notice

Return to Top