{"id":1816,"date":"2014-05-08T18:10:58","date_gmt":"2014-05-08T18:10:58","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=1816"},"modified":"2020-02-26T10:50:12","modified_gmt":"2020-02-26T15:50:12","slug":"software-assistant-review-part-2","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/software-assistant-review-part-2\/1816\/","title":{"rendered":"Software Assistant Review, part 2"},"content":{"rendered":"<p>This is the continuation of the previous blog about the Kaspersky Security Center functionality, and Software Assistant feature, in particular. The first part is available<a href=\"https:\/\/business.kaspersky.com\/managing-software-within-a-corporate-network\/\" target=\"_blank\" rel=\"noopener nofollow\"> here<\/a>.<\/p>\n<p><b>Vulnerability search in the installed software<\/b><\/p>\n<p>Vulnerability search includes listing installed software. After this list is compiled, Network Agent checks the versions of the installed software\u2019s executable files. Version numbers are compared against the constantly updated vulnerability database and a report on the known vulnerabilities is compiled. Besides that, KSC is able to update the operational system via a Windows Update.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/05\/06020006\/eng18-1-1024x631.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1818\" alt=\"eng18\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/05\/06020006\/eng18-1.png\" width=\"1145\" height=\"706\"><\/a><\/p>\n<p>After receiving the report, the administrator can launch a task to install updates.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/05\/06020005\/eng19-1-1024x604.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1819\" alt=\"eng19\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/05\/06020005\/eng19-1.png\" width=\"1196\" height=\"706\"><\/a><\/p>\n<p><b>Updating software<\/b><\/p>\n<p>After the list of applications and their executables is compiled, an administrator can set the task to update all of the vulnerable software or those for which updates exist.<\/p>\n<p>The database contains information and links to all released updates and patches. The download and installation process consists of several stages:<\/p>\n<p>\u2013\u00a0 EULA check. KSC will download and display EULA for an updated application which the administrator should read and agree to its terms by pressing \u201cAccept All\u201d button.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/05\/06020004\/eng20-1.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1820\" alt=\"eng20\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/05\/06020004\/eng20-1.png\" width=\"819\" height=\"460\"><\/a><\/p>\n<p>\u2013 Choosing update files. There are different ways to update an application: sometimes one has to download a chain of consecutive updates, sometimes it is possibile to use a cumulative collection of the required fixes. By default KSC chooses the shortest chain which contains the maximum numbers of cumulative patches. This can be useful if a new vulnerability, absent from older versions of the software, is discovered in the lastest version.<\/p>\n<p>\u2013 Silent mode settings. In a case of installing updates to a multitude of software or PCs the traditional method \u2013 with the installation window displayed on the endpoint device, choosing options, users pressing keys to continue \u2013 will be less than comfortable. The best option here is \u2018silent mode\u2019 with installation passing undetected for the end user and requiring no action from him or from administrator. In some cases silent mode is launched by special installation keys or an administrator can write a script which would execute all the actions necessary for the installation. KSC also acquires this information from the database.<\/p>\n<p>\u2013 Process halting. In most cases programs being updated need to be halted. KSC must know the program\u2019s process name. Information about it is acquired from the database or administrator enters the process\u2019 name by hand. A Network Agent informs the user that the process is going to be terminated in order to install updates.<\/p>\n<p>\u2013 Error codes identification. After installation is completed the installation package may return an error code, which KSC uses to determine the update results. This information is acquired from the database.<\/p>\n<p>\u2013 Identifying update rollback settings and deinstallation keys. Administrators may have to rollback updated software to an earlier version (in case there is a critical vulnerability discovered in the newer one). This information is acquired from the database.<\/p>\n<p>\u2013 Installation of the updates and results verification. KSC provides an administrator with a report of the ultimate results.<\/p>\n<p>Kaspersky Security Center\u2019s possibilities are not restricted to network software management alone. KSC is also capable of managing mobile devices (Mobile Devices Management functions) we wrote earlier, and remote OS Deployment, which will be soon described here: http:\/\/securelist.com.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We continue our overview of the Kaspersky Security Center functionality and Software Assistant technologies in particular.<\/p>\n","protected":false},"author":209,"featured_media":16158,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2094,2095],"class_list":{"0":"post-1816","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-ksc","10":"tag-software-assistant"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/software-assistant-review-part-2\/1816\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/software-assistant-review-part-2\/1816\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/software-assistant-review-part-2\/1816\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/ksc\/","name":"KSC"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=1816"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1816\/revisions"}],"predecessor-version":[{"id":33133,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1816\/revisions\/33133"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/16158"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=1816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=1816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=1816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}