Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial
Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under
vendor's standard commercial license.
The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express
warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall
not be liable for technical or editorial errors or omissions contained herein.
Acknowledgments
Microsoft, Windows, Windows Vista, Windows NT, and Windows XP are U.S. registered trademarks of Microsoft Corporation.
Intended audience
This document is for the person who installs and configures servers and storage systems. HP assumes you are qualified in the servicing of computer
equipment and trained in recognizing hazards in products with hazardous energy levels.
2-7Miscellaneous Vulnerability and Patch Manager events........................................................................14
5
1 Introduction
HP Insight Vulnerability and Patch Manager is an all-in-one vulnerability assessment and patch management
tool integrated into HP Insight Control, simplifying and consolidating the proactive identification and resolution
of issues that impact server availability into one central console.
IMPORTANT:HP is phasing out the HP Vulnerability and Patch Manager software (VPM) from Insight
Control. Technical support will be offered based on the Technical Support and Upgrade offerings for HP
Insight Control sold through November 2009. HP Insight Control licenses include 1 year of Technical Support
& Update, which you can upgrade to 3, 4, or 5 years. Depending on the purchase date of Insight Control
licenses and technical support extension, support for Vulnerability and Patch Manager functionality will end
no later than November 2012.
Starting with the Insight software 6.0 DVD, Vulnerability and Patch Manger will no longer be available.
However, existing users of the vulnerability and patch management capabilities can upgrade to Vulnerability
and Patch Manger 6.0 by downloading the software and manually installing it on the CMS. You can
download the software from Software depot.
Vulnerability and Patch Manager features
•Combined vulnerability assessment and patch management—A single tool seamlessly combines the
assessment and the remediation of vulnerabilities, reducing operational complexity.
•Integration into Systems Insight Manager—Integration enables you to use existing functionality such as
discovery, identification, scheduling, role-based security, notification, and group-based actions,
eliminating the need to recreate these tasks in multiple tools for vulnerability assessment and patch
management.
•Comprehensive vulnerability assessment—Coverage of vulnerabilities reported in all leading vulnerability
databases ensures comprehensive assessment. Vulnerability assessment identifies vulnerabilities reported
in the Common Vulnerabilities and Exposures (CVE) list, the Federal Computer Incident Response Center
(FedCIRC) vulnerability catalog, the SANS Top 20 Internet Security Vulnerabilities list, the Computer
Emergency Response Team (CERT) advisories list, and the U.S. Department of Energy Computer Incident
Advisories Center (CIAC) bulletins.
•Automated acquisition, scheduled deployment, and continuous enforcement of patches:
Automatically collects new vulnerability updates and patches directly from vendor sources, such
•
as a vendor’s web-based patch repository. Updates can be acquired outside the firewall and
imported into the patch repository in infrastructures where firewall policies prevent HTTP and FTP
downloads.
•Scheduled deployment, scheduled reboots after deployment, and checkpoint-restarts ensure that
patches are deployed with minimal impact on network resources and enable patches to be managed
from a central point.
•Unique desired-state management automatically and continuously ensures that patches remain
applied in their proper state. If patches are corrupt, they are automatically reinstalled to bring the
system to the desired level of patches.
The following figure illustrates the Vulnerability and Patch Manager operation model.
Vulnerability and Patch Manager features6
Service name changes
The following table lists service name changes between Vulnerability and Patch Manager 3.x and 6.x.
Manager items
•••STAT-SCANNER
version
• Acquisition utility
version
Radia services
Version 6.xVersion 3.xVulnerability and Patch
• 7.8• 7.2• RADIA version
6.4.66.4.5
••3.06.0
• HP CA Configuration Server• HP CA Configuration Server
••HP CA Messaging ServerHP CA Messaging Server
••HP CA Patch Manager ServerHP CA Patch Manager Server
Other dependency
checks by Vulnerability
and Patch Manager
Vulnerability and Patch
Manager registry keys:
• Key
• Command
installer removed
• \\VPM\WIN_IA32\acquiretool\setup.exe
••TCP/IPTCP/IP
HP SIM and Vulnerability and Patch Manager
versions, HP SIM 5.3 required
• HKEY_LOCAL_MACHINE\\
SOFTWARE\\Microsoft\\
• HKEY_LOCAL_MACHINE\\
SOFTWARE\\Microsoft\\• HKEY_LOCAL_MACHINE\\
• Stand-alone GUI installer• Command line with /silent, but stand-alone GUI
• \\VPM\WIN_IA32\acquiretool\setup.exe
• Microsoft® SQL Server• Microsoft® SQL Server
••HP SIM and Vulnerability and Patch Manager
versions, HP SIM 5.3 and above required,
HP SIM 6.0 recommended
• HKEY_LOCAL_MACHINE\\
SOFTWARE\\Microsoft\\
Windows\\CurrentVersion\\Uninstall\\Windows\\CurrentVersion\\Uninstall\\
Windows\\CurrentVersion\\Uninstall\\HP Vulnerability And Patch Management_is1
HP Insight Vulnerability And Patch Manager_is1
SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\
Windows\\CurrentVersion\\Uninstall\\HP Vulnerability And Patch Management_is1
Windows\\CurrentVersion\\Uninstall\\
HP Insight Vulnerability And Patch Manager_is1
8Introduction
2 Using Vulnerability and Patch Manager
Prerequisites
The following are the prerequisites for using the Vulnerability and Patch Manager software:
•VPM: Microsoft .NET Framework 3.0 is a requirement for accessing the VPM 6.0 functionalities (as a
requirement for the Radia 7.8 version).
•Acquire Tool: Microsoft .NET Framework 3.0 or later for installing the Acquire tool.
NOTE:If the prerequisites are not met, the Acquisition tool pops up a message to install the prerequisite
softwares before installing the Acquire tool.
Accessing Vulnerability and Patch Manager
To access Vulnerability and Patch Manager from the HP SIM toolbar menu, select Vulnerability and PatchManager from the HP SIM Deploy, Diagnose, or Options menus.
Table 2-1 Interface access
2
Using the interface
Vulnerability and Patch Manager vulnerability information appears in the VPM column of the HP SIM console,
shown circled in the following figure. Initially, the icon depicted in the column displays Vulnerability and
Patch Manager eligibility information for the target system in the specific row. After target servers are licensed
and a vulnerability scan is performed, the column displays the combined status of the last vulnerability scan
on the target system (patch status does not appear in the column). Click the icon to display detailed information
about the system status of the Vulnerability and Patch Manager.
ActionMenu
Configure settings and acquire updates.1
Perform or customize vulnerability scans, and view scan results, patch installation status, patches installed by
VPM, patch reboot status, and the patch repository.
Deploy patches, validate installed patches, and deploy the VPM Patch Agent.3
Prerequisites9
Loading...
+ 18 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.