How can I deploy System Center 2012 Endpoint Protection Definition Updates from a UNC file share

Introduction

One of the user definable sources for updates for Endpoint Protection definition updates is an UNC file share, but how you populate that share can mean success or failure when it comes to deploying definition updates from a UNC file share for System Center 2012 Endpoint Protection using System Center 2012 Configuration Manager SP1.

In addition to populating the share correctly, you also need to define your AntiMalware Policy UNC path source correctly otherwise the definition updates will never be found.

In this post I’ll explain how you can set this up and how to verify it’s working.

Step 1. Create a Share and populate with folders

First of all on your chosen server create a folder called SCEP_UNC_DEFS and share it to Domain Users and Domain Computers.

Create the SCEP_UNC_DEFS share

Beneath this folder create another folder called Updates with two sub folders for both architectures like so

SCEP folders within the share

Step 2. Populate the share with definition updates

Now that we’ve created our template folder structure we need to populate it with the actual definition updates for the prospective architecture.

For x64, download the following files and place them in the X64 folder.

For x86, download the following files and place them in the X86 folder.

files downloaded

Step 3. Create a new Antimalware Policy

In the Assets and Compliance workspace, expand Endpoint Protection, select Antimalware Policies, right click and choose Create AntiMalware Policy, give it a name like Custom SCEP UNC DEF policy and select Definition Updates from the available choices (you may of course add more sections but for the purpose of this post this is sufficient).

Definition Updates

Click on Set Paths and enter the path to the Updates folder which is a sub directory of the SCEP_UNC_DEFS file share, click on Add when done.

eg: \\server\scep_unc_defs\updates

set paths

Next click on Set Source, make sure to select Updates from UNC Shares and use the UP button to bring this to the top choice (if you want it as the first option checked when more than one source is selected).

Updates from UNC file shares

Step 4. Create a collection to target the Antimalware Policy

Right click on Devices Collections,  and choose create device collection, give it a suitable name like Endpoint Protection UNC_DEFS

create device collection

you can populate it however you want (queries or direct membership) and then move it to somewhere suitable if required.

Endpoint Protection UNC_Defs collection

Step 5. Change the Antimalware Policy priority

right click on your new antimalware policy and choose Increase Priority, make this the highest priorty you can as SP1 uses Client side merge of AntiMalware policies and we want this source for definition updates to take priority on any computers in this collection.

increase priority

Step 6. Deploy the Antimalware Policy

Right click on the AntiMalware Policy and choose Deploy

Deploy Antimalware Policy

point it to the collection we created above

target collection

 Step 7. Verify the UNC file share is being used

Now everything is in place to deploy definition updates via an UNC file share, but we need to prove that don’t we. On a Windows client computer that you’ve added to our collection we created above, run the following Configuration Manager client action, Machine Policy Retrieval & Evaluation Cycle.

Machine Policy Retrieval & Evaluation CycleThis will ensure that our client has the latest Antimalware Policies targeted to it including the one we created above, to verify that our policy is indeed targeted to this computer please see this post, you should see something similar to the following in the registry, depending on what Antimalware Policies are applied to this client however we are only interested in our Custom SCEP UNC Def policy and it is indeed listed below.

registry verified

Do not proceed with the verification until your Windows client has our Custom SCEP_UNC_Def policy applied. Once done, open an Administrative command prompt and browse to the following folder C:\Program Files\Microsoft Security Client\ and execute the following command MpcmdRun.exe -SignatureUpdate as per below screenshot.

signature update finished

If all went well then you’ll see Signature Update Finished. Open the following log file for final verification C:\Users\Administrator\AppData\Local\Temp\MpCmdRun.Log and you should see search started (UNC Share)  along with the following text, Update Completed Successfully. (hr: 0x00000000)

search started (UNC Share)

You can open the SCEP client, click on the updates tab and review the Definition Update versions for further verification.

up to dateAnd there you have it, your SCEP client has updated it’s definition updates from your UNC file share as specified in your Custom Antimalware Policy, and you’ve proven the fact !.

Troubleshooting Tip:

If you fail to get this to work and see the following error instead,

Error: Signature Update failed with hr=80070002

then verify you are pointing at the correct UNC File share directory as listed in my guide above then try again.

UNC share pointing at wrong folder

Summary

System Center 2012 Configuration Manager SP1 is a powerful management solution and you can use custom antimalware policies to update Endpoint Protection via multiple or single sources, including using UNC file shares, this ability gives great flexibility and control over how you want those definition updates deployed.

If you’d like to automate the download of those definition updates please review the following post.

until next time, from Seattle,

cheers

niall

This entry was posted in Uncategorized. Bookmark the permalink.

One Response to How can I deploy System Center 2012 Endpoint Protection Definition Updates from a UNC file share

  1. Pingback: System Center 2012 Configuration Manager Step By Step Guides | just another windows noob ?

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.