Software Vulnerability Manager with Scanning and Patching Capabilities

To successfully scan and create updates, the following should also be present when using Software Vulnerability Manager:

1. Internet Explorer 11 or higher with Software Vulnerability Manager Plug-in installed (in order for Software Vulnerability Manager to connect to WSUS and to create packages successfully, Internet Explorer must be run as administrator in most cases - right-click and select Run as administrator).
2. In Internet Explorer Tools > Internet options > Advanced, ensure Use TLS 1.2 are selected.
3. WSUS Administration Console matching your WSUS server's version.
4. Visual C++ Redistributable for Visual Studio 2012.
5. Microsoft .NET Framework runtime 4 or later.
6. If the WSUS Self-Signed Certificate is going to be used, and the user wishes to provision the certificate through the Patching > WSUS/System Center > Deployment function, Remote Registry service must be enabled on the clients.
7. Select the target hosts where the certificate is to be installed (CTRL+ mouse click for multiple selection), right-click and select Verify and Install Certificate.

Note:If your organization allows specific URL to access to the Internet, and you are having problems downloading or verifying a patch, ensure the CRLs are allowed; examine the logs to identify the download's source, and examine the certificate at that address for its CRL distribution points.

To successfully run patching on Windows 8.1 and Server 2012 R2:

1. On the Windows Server machine, from the Server Manager, go to Add Roles & Features > Features.
2. Select the Appropriate Installation Type (Role-Based & Feature Based as opposed to Remote Desktop Services Installation).
3. Select the local server as the Destination Server for the installation.
4. Click Next to bypass the Server Roles menu and go to the Features menu.
5. Within the Features menu, scroll down the list and find the Remote Server Administration Tools (RSAT).
6. Expand the RSAT feature menu and locate the Role Administration Tools list of features.
7. Expand the list and find Windows Server Update Services Tools.
8. Enable this feature and all additional sub-features listed underneath it (API and PowerShell cmdlets and User Interface Management Console).
9. Proceed to the end of the Add Roles & Features Wizard by clicking Next and then Install.
10. Restart Windows and launch Software Vulnerability Manager from a web browser (for example Internet Explorer).