Scenario#1: |
Scenario#1: If you analyze with the Security Tools category and do auto-remediation you must exclude bulletins starting with IVA. The best way is to setup an exclusion smart group for bulletins starting with IVA. If you are manually remediating patches either selectively remediate to avoid these bulletins or exclude the IVA bulletins from your analysis with a catalog smart group that excludes them. Catalog Patch Analysis Scenario#2: Defect #DRBLG-128424 has been filed and is fixed in TSSA version 22.2.00 If a Hotfix is needed, please open a case with BMC and share following details: 1. Screenshot of the problem 2. Catalog Update Job logs 3. <AppserverInstallDir>/NSH/br/stdlib/feed-common-1.0.jar 4. <AppserverInstallDir>/NSH/br/stdlib/feed-common-1.0-SNAPSHOT.jar ( Available only on Windows application server) 5. md5sum value of the above jar files 6. TSSA application server exact version and OS of the appserver Scenario#3: The issue occurs due to the patch vendor's Content Delivery Networks (CDN) not working due to a failed TLS certificate binding between the Microsoft TLS Certificate and the catalog.s.download.windowsupdate.com endpoint Scenario#4: Download the required certificate (from ZScaler) and rename this with <Certificate_Name>.cer extension. Please follow the steps below :
|