

Processed file: c:\windows\system32\config\RegBack Processed file: c:\windows\system32\config\Journal Setting registry 'HKEY_LOCAL_MACHINE\SOFTWARE\Kace\KBot Configuration\hiveps' value 'key' equal to '152' succeeded Icacls c:\windows\system32\config\*.* /inheritance:eĬhecking if registry 'HKEY_LOCAL_MACHINE\SOFTWARE\Kace\KBot Configuration\hiveps' value 'key' is equal to '151' did not succeed: (0) Basic script I have tried to run is below: Where am I going wrong? Has anyone else used Kace SMA to install a workaround for this vulnerability? This still fails to find the vssadmin.exe file, and also is unable to run the WMI commands either. Similarly, this will run fine locally on my PC but not through kace, still complaining that VSSAdmin I have tried to explicitly specify the path to VSSAdmin but it still fails: C:\windows\system32\vssadmin.exe : The term 'C:\windows\system32\vssadmin.exe' is not recognized as the name of aĪlternatively, I have tried the following script from JoranSlingerland. Check the spelling of the name, or if a path was included, verify It fails when running through kace with an error: vssadmin.exe : The term 'vssadmin.exe' is not recognized as the name of aĬmdlet, function, script file, or operable program. I have written a powershell script which works fine locally, using the vssadmin command. My plan was to push a powershell script from Kace to set the permissions, remove existing shadow copies and create a new restore point. The suggested workaround from microsoft is below: I looking to see if anyone has managed to push a workaround for the above vulnerability via the Kace SMA? First time here, I'm a systems admin at a medium sized organisation!
