{"id":1236,"date":"2015-04-23T16:19:48","date_gmt":"2015-04-23T14:19:48","guid":{"rendered":"http:\/\/www.satinfo.es\/noticies\/?p=1236"},"modified":"2015-04-23T16:21:03","modified_gmt":"2015-04-23T14:21:03","slug":"publicacion-del-parche-9-para-epo-4-6-epo-4-6-9","status":"publish","type":"post","link":"https:\/\/www.satinfo.es\/noticies\/2015\/publicacion-del-parche-9-para-epo-4-6-epo-4-6-9\/","title":{"rendered":"Publicaci\u00f3n del Parche 9 para ePO 4.6 (ePO 4.6.9)"},"content":{"rendered":"<p style=\"text-align: left;\" align=\"center\">McAfee ha publicado el parche 9 acumulativo para ePolicy Orchestrator 4.6 quedando como versi\u00f3n ePO 4.6.9 Build 130<\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\"><br \/>\nEsta versi\u00f3n a sido desarrollada para su uso con las siguientes versiones de McAfee \u00ae ePolicy Orchestrator \u00ae (McAfee ePO\u2122):<br \/>\n<\/span><\/p>\n<ul>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">ePolicy Orchestrator 4.5.7 (build 166 o superior)<\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">ePolicy Orchestrator 4.6.4 (build 202 o superior)<\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">ePolicy Orchestrator 4.6.6 (build 176 o superior)<\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">ePolicy Orchestrator 4.6.7 (build 278 o superior)<\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">ePolicy Orchestrator 4.6.4 (build 112 o superior)<\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\"><span style=\"color: #ff0000;\"><span style=\"text-decoration: underline;\"><b>IMPORTANTE:<\/b><\/span><\/span> <b>Una posterior actualizaci\u00f3n de<\/b> <span style=\"color: #000000;\"><b>ePO 4.6.<\/b><\/span><span style=\"color: #000000;\"><b>9<\/b><\/span><span style=\"color: #000000;\"><b> a 5.0.0, 5.0.1, 5.1.0, <\/b><\/span><span style=\"color: #000000;\"><b>5.1.1 o 5.3.0 no ser\u00e1 posible ni estar\u00e1 soportada. <\/b><\/span><span style=\"color: #000000;\"><b>En su lugar se recomienda actualizar McAfee ePO 4.6.<\/b><\/span><span style=\"color: #000000;\"><b>9<\/b><\/span><span style=\"color: #000000;\"><b> directamente a McAfee ePO 5.1.<\/b><\/span><span style=\"color: #000000;\"><b>2<\/b><\/span><span style=\"color: #000000;\"><b>, que se publicar\u00e1 durante el segundo trimestre de 201<\/b><\/span><span style=\"color: #000000;\"><b>5<\/b><\/span><span style=\"color: #000000;\"><b>.<\/b><\/span><\/span><\/p>\n<p class=\"western\" align=\"left\">McAfee ha calificado esta actualizaci\u00f3n como <span style=\"text-decoration: underline;\"><b>Mandatory<\/b><\/span><b> <\/b>(obligatoria). Aplique esta actualizaci\u00f3n lo antes posible.<\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">Para obtener m\u00e1s informaci\u00f3n acerca de clasificaci\u00f3n de parches, consulte el art\u00edculo de la base de conocimientos de McAfee <a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=KB51560\" target=\"_blank\">KB51560<\/a>.<\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"color: #800000;\"><span style=\"font-size: small;\"><span style=\"text-decoration: underline;\"><b>Problemas conocidos:<\/b><b><br \/>\n<\/b><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">Para obtener una lista de problemas conocidos de esta versi\u00f3n, consulte el art\u00edculo de la base de conocimientos de McAfee <a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=KB83249\" target=\"_blank\">KB83249<\/a><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"color: #008000;\"><span style=\"font-size: small;\"><span style=\"text-decoration: underline;\"><b>Componentes actualizados<\/b><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">Este parche actualiza los siguientes componentes:<\/span><\/span><\/p>\n<ul>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">Java Runtime 1.7.0_u71<\/span><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">OpenSSL 1.0.1k<\/span><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">RSA SSL-J 6.1.4<\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" align=\"left\"><span style=\"color: #008000;\"><span style=\"font-size: small;\"><span style=\"text-decoration: underline;\"><b>Problemas resueltos<\/b><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">Estos son algunos de los problemas que resuelve esta revisi\u00f3n:<\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"color: #ff0000;\"><span style=\"text-decoration: underline;\"><b>Directorio Activo<\/b><\/span><\/span><span style=\"color: #ff0000;\"><b>:<\/b><\/span><\/p>\n<ul>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">Tras reiniciar el controlador de dominio ya no se deniegan los accesos a la consola ePO con usuarios de AD. En anteriores versiones se mostraba el error \u00abFailed login attempt: User has no permission sets\u00bb y no era posible acceder al servidor ePO hasta que \u00e9ste se hubiese reiniciado.<\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\">Esta versi\u00f3n soluciona un problema por el cual se a\u00f1aden sistemas duplicados en el \u00e1rbol de sistemas, durante una sincronizaci\u00f3n AD, en ciertas condiciones<\/span><span style=\"font-size: small;\">.<\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" align=\"left\"><span style=\"color: #ff0000;\"><span lang=\"es-ES\"><span style=\"text-decoration: underline;\"><b>Tareas cliente y de servidor<\/b><\/span><\/span><\/span><span style=\"color: #ff0000;\"><span lang=\"es-ES\"><b>:<\/b><\/span><\/span><\/p>\n<ul>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">Ya es posible ejecutar tareas concurrentes de acumulaci\u00f3n de datos.<\/span><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">Esta versi\u00f3n soluciona un problema de rendimiento en tareas de acumulaci\u00f3n de datos de equipos gestionados que requer\u00edan m\u00e1s tiempo para ejecutarse en ePO 4.6 que en ePO 4.5.<\/span><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">Esta versi\u00f3n soluciona el error \u00abunexpected error\u00bb que aparece cuando se crea una tarea de purga.<\/span><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">Las llamadas de activaci\u00f3n se ejecutan correctamente aunque el equipo tenga un campo de descripci\u00f3n de m\u00e1s de 128 caracteres.<\/span><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">Al lanzar una llamada de activaci\u00f3n y pinchar en el bot\u00f3n OK la p\u00e1gina vuelve a a pantalla d\u00f3nde se inici\u00f3 la acci\u00f3n en lugar de mostrar el mensaje \u00abWebpage Expired\u00bb.<\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"><br \/>\n<\/span><\/span><\/span><span style=\"color: #ff0000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"><span style=\"text-decoration: underline;\"><b>Actualizaciones <\/b><\/span><\/span><\/span><\/span><span style=\"color: #ff0000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"><span style=\"text-decoration: underline;\"><b>de seguridad<\/b><\/span><\/span><\/span><\/span><span style=\"color: #ff0000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>:<\/b><\/span><\/span><\/span><\/span><\/p>\n<ul>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\">E<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\">sta versi\u00f3n utiliza Java <\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\">1.7.0_u71.<\/span><\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\">E<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\">sta versi\u00f3n utiliza SSLv3.<\/span><\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\">E<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\">sta versi\u00f3n utiliza OpenSSL 1.0.1k<\/span><\/span><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" align=\"left\"><span style=\"color: #ff0000;\"><span style=\"text-decoration: underline;\"><b>Nota<\/b><\/span><\/span><span style=\"color: #ff0000;\"><b>:<\/b><\/span> Antes de realizar la actualizaci\u00f3n del parche se recomienda tener en cuenta los pasos especificados en la checklist de McAfee <a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=KB71825\" target=\"_blank\">KB71825<\/a><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><a href=\"https:\/\/www.satinfo.es\/db\/antivirus\/epo\/epo469l.zip\" target=\"_blank\"><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><span style=\"text-decoration: underline;\"><b>Pulse aqu\u00ed para descargar ePO 4.6.9<\/b><\/span><\/span><\/span><\/a><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><b><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><span lang=\"es-ES\">SATINFO<\/span><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\">, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\">SERVICIO DE ASISTENCIA T\u00c9CNICA INFORMATICA<\/span><\/span> <span style=\"font-size: small;\"><span lang=\"es-ES\">23<\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"> de <\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\">Abril<\/span><\/span> <span style=\"font-size: small;\"><span lang=\"es-ES\">de 201<\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\">5<\/span><\/span><\/b><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>McAfee ha publicado el parche 9 acumulativo para ePolicy Orchestrator 4.6 quedando como versi\u00f3n ePO 4.6.9 Build 130 Esta versi\u00f3n a sido desarrollada para su uso con las siguientes versiones de McAfee \u00ae ePolicy Orchestrator \u00ae (McAfee ePO\u2122): ePolicy Orchestrator 4.5.7 (build 166 o superior) ePolicy Orchestrator 4.6.4 (build 202 o superior) ePolicy Orchestrator 4.6.6 <a href='https:\/\/www.satinfo.es\/noticies\/2015\/publicacion-del-parche-9-para-epo-4-6-epo-4-6-9\/' class='excerpt-more'>[&#8230;]<\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[655,890,892],"tags":[124,717,214,20,716],"class_list":["post-1236","post","type-post","status-publish","format-standard","hentry","category-655","category-mcafee","category-todos","tag-4-6","tag-epo-4-6-9-build-130","tag-epolicy-orchestrator","tag-mcafee","tag-parche-9","category-655-id","category-890-id","category-892-id","post-seq-1","post-parity-odd","meta-position-corners","fix"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/1236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/comments?post=1236"}],"version-history":[{"count":0,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/1236\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/media?parent=1236"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/categories?post=1236"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/tags?post=1236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}