U
SING
V
ULNERABILITIES
AND
P
ACKAGES
- 36 -
Vulnerability Name
Vulnerability names typically include the vendor (manufacturer of the vulnerability) and
specific application and version information.
Vulnerability Impacts
The following list describes each level of need for a device to have the vulnerability deployed
and installed. Impacts can be viewed in ascending or descending order by clicking the icon
(up or down arrows respectively) to the right of Impact.
•
Critical
- Novell or the product manufacturer has determined that this patch is critical and
should be installed as soon as possible. Most of the recent security updates fall in to this
category. The patches for this category are automatically downloaded and stored on your
ZENworks Patch Management Server.
•
Critical - 01
- Novell or the product manufacturer has determined that this patch is critical
and should be installed as soon as possible. This patch is older than 30 days and has not
been superseded.
•
Critical - 05
- Novell or the product manufacturer has determined that this patch is critical
and should be installed as soon as possible.These patches have been superceded.
•
Critical - Intl
- An international patch, where Novell or the product manufacturer has
determined that this patch is critical and should be installed as soon as possible. Most of
the recent international security updates fall in to this category. After 30 days international
patches in this category will be moved to Critical - 01.
•
Detection
- These vulnerabilities contain signatures that are common to multiple
vulnerabilities. They contain no associated patches and are only used in the detection
process.
•
Informational
- These vulnerabilities detect a condition that Novell or the product
manufacturer has determined as informational. If the report has an associated package,
you may want to install it at your discretion.
•
Recommended
- Novell or the product manufacturer has determined that this patch,
while not critical or security related is useful and should be applied to maintain the health
of your computers.
•
Software
- These vulnerabilities are software applications. Typically, this includes
software installers. The vulnerabilities will show not patched if the application has not been
installed on a machine.
•
Task
- This category contains tasks which administrators may use to run various detection
or deployment tasks across their network.
Summary of Contents for ZENWORKS PATCH MANAGEMENT 6.4 SP2 - SERVER
Page 1: ...User Guide ZENworks Patch Management 6 4 SP2 ...
Page 44: ...USING ZENWORKS PATCH MANAGEMENT 28 ...
Page 138: ...WORKING WITH DEPLOYMENTS 122 ...
Page 212: ...USING GROUPS 196 ...
Page 236: ...REPORTING 220 ...
Page 308: ...CONFIGURING DEFAULT BEHAVIOR 292 ...
Page 332: ...USING THE AGENT 316 The Agent Control Panel opens Figure 10 19 Agent Control Panel ...