Categories

  • Announcements regarding the VulnDetect project

    14 Topics
    123 Posts
    T
    Version 3.4.0.0 is the latest Stable release. It can be downloaded from here: https://vulndetect.com/dl/agents/secteerSetup-3.4.0.0.exe https://vulndetect.com/dl/agents/secteerSetup-3.4.0.0.msi
  • Post requests for apps that are missing

    352 Topics
    2k Posts
    OLLI_SO
    Meantime Versions 2.18.4 and 2.18.5 were released. Here the version info of 2.18.5: File name and path: C:\Users\olive\AppData\Local\Programs\PLITCH\PLITCH.exe Product Name: PLITCH Internal Name: PLITCH.dll Original Filename: PLITCH.dll File Description: PLITCH Company: PLITCH Legal Copyright: Legal Trademarks: Comments: File Version String: 2.18.5.0 File Version: 2.18.5.0 Product Version String: 2.18.5+d5d023cac37e6398062fb9016f8cfbebd4401c07 Product Version: 2.18.5.0
  • Post requests for apps that you wish to see updated automatically

    23 Topics
    38 Posts
    T
    The release notes are out: https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/continuous/dccontinuoussept2025qfe.html#dccontinuoussepttwentytwentyfiveqfe This is the official fix for the printing issue: 4529876: Data loss in printing PDF on Reader and Acrobat The packages for Acrobat/Reader in VulnDetect and PatchPro was released earlier this morning.
  • Announcements regarding the VulnDetect project

    58 Topics
    58 Posts
    T
    How to automate tag assignments based on host facts This guide explains how you can automatically assign VulnDetect tags based on information collected directly from hosts - such as hardware details, OS version, Intune enrollment status, and other system facts. The approach uses a PowerShell script executed through a Custom Software deployment. The script gathers host information and outputs structured data that our backend service reads and converts into tags. Overview A PowerShell script runs on hosts using Custom Software deployment. The script collects system facts and outputs JSON. A background job processes that output and creates or assigns tags automatically. Step 1 - Create a Custom Software configuration Create a Custom Software configuration containing: The assignMyTags.ps1 script The functions.ps1 helper script (these scripts are provided as examples, to show how the output should look like, please adjust to your needs). The configuration must be named with the following prefix: assignMyTags: <something> Example: assignMyTags: hardwareFacts The prefix is required because the backend automation looks for deployments using this naming pattern. Custom Deployment Configuration: [image: 1773047494726-custom-deployment-configuration-assignmytags.png] Step 2 - Create a Deployment Job Create a deployment job using the Custom Software configuration. The deployment job must be named with this prefix: Custom deployment assignMyTags: <something> Example: Custom deployment assignMyTags: hardwareFacts The backend job relies on this prefix to locate the deployment results. Custom Deployment Job: [image: 1773047505302-create-custom-deployment-job-assignmytags.png] Step 3 - Contact Support Once your deployment job is created and executed on hosts, contact Support. We will enable a background cron job that: retrieves the script output creates any missing tags assigns the tags to the relevant hosts The background job can run up to once per hour. Tag naming recommendations You are free to choose your own tag names, but we recommend using a clear prefix so automated tags are easy to identify. Example: auto.cpu-model: Intel Core i7-1260P auto.tpm-version: 2.0 auto.laptop-model: ThinkPad T14 Gen 3 Only certain characters are allowed in tag names. Any unusual characters will automatically be removed by the background script. Versioning tags Inside the PowerShell script you will find two settings: $amtName $amtVersion Example: $amtName = "hardwareTags" $amtVersion = "2" These values control tag generations. When the version number is incremented, the backend automation will automatically remove older tags with the same name. This makes testing easier and prevents duplicate or outdated tags from accumulating. Example workflow: hardwareTags v1 -> test -> change script -> hardwareTags v2 -> old v1 tags automatically removed The version must be an integer. Updating dynamic tags If your tags represent dynamic values (for example Intune enrollment status or disk encryption state), we can also help configure periodic redeployment of the Custom Software job. This allows the host facts to be refreshed regularly so tags remain accurate over time. Contact Support if you would like to enable this. Summary This mechanism allows you to: Automatically tag hosts based on real system data Maintain consistent tagging across your environment Easily iterate and test tag definitions using versioning Keep tags updated through scheduled deployments If you have questions or want help setting this up, feel free to reach out to Support.
  • Detection errors and issues should be posted here

    451 Topics
    2k Posts
    G
    @OLLI_S -> solved 3.0.23 is now the official version
  • Detection errors and issues should be posted here

    45 Topics
    149 Posts
    G
    @Tom : Nvidia app and its former (unsafe) versions are now reported in one bundle. Unsafe 7zip version which is bundled with this soft is still not reported with Nvidia app bundle but separately.
  • This category will be used to keep track of user contributed suggestions

    143 Topics
    472 Posts
    OLLI_SO
    I am using the CSV export on a daily base, it is really very useful. But sone things should really be improved. Recommended Version For some tools (like “MiTeC Icon Explorer") the recommended version (5.2.0) is older, than the installed version (5.3.0). In the list of applications you do not show a recommended version. In my CSV export I have 15 applications, where the recommended version is different, but only for 3 entries the recommended version is newer. Therefore, the recommended version should not be exported, when it is older or equal to the installed version. Export Tool Collections All tools from "Sysinternals" are bundled as "Sysinternals Suite". The whole suite including all apps is not exported. You should export the package headline ("Sysinternals Suite") and also all included tools. I do not know if it causes trouble when the package headline ("Sysinternals Suite") has an empty column "File". Identical naming for Apps in Tool Collections All tools from Sysinternals begin with the text "Sysinternals" (like "Sysinternals DebugView" or "Sysinternals Process Explorer") what is great, when you sort the exported CSV. Also all tools from MiTeC begin with the text "MiTeC". But only some tools from NirSoft begin with the text "NirSoft" and none of the tools from Nenad Hrg begin with "Nenad Hrg". Export status "Patch" and "Update" In the UAT instance you show the status "Patch" and "Update". This status is not yet exported, but it is really very helpful! Please consider these suggestions for the CSV export.
  • This category will be used to keep track of bugs reported by users

    48 Topics
    284 Posts
    G
    This issue is fixed for quite a long time.
  • Feel free to discuss what was good or bad in Secunia PSI and what you expect from VulnDetect

    19 Topics
    71 Posts
    T
    The reported Notepad++ supply-chain incident, as described in public reporting, was limited to the application’s built-in auto-update mechanism. SecTeer VulnDetect does not use or depend on the Notepad++ auto-updater. All Notepad++ packages distributed through SecTeer are downloaded directly from the official vendor source and processed through SecTeer’s own validation pipeline. This includes: Verification of the Authenticode signature where the vendor provides signed binaries Malware scanning using Microsoft Defender Additional reputation-based checks as a supplementary control SecTeer packages are released independently of the vendor’s auto-update channel and are not delivered through the update mechanism involved in the reported incident. As a result, SecTeer did not distribute compromised code, and SecTeer’s distribution infrastructure was not impacted. A system could only have received the compromised update if the built-in Notepad++ auto-update feature was enabled on the system In short: SecTeer’s update mechanism was not involved in the incident, and no compromised Notepad++ packages were delivered through the SecTeer platform.