Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Contents

Easy heading
linkText4
linkText10
linkText3linkText10
linkText6
linkText5
relatedLinksLabels
linkText2
linkText1
headingTagsH1,H2,H3
linkText1sidebarMaxHeight450
linkType2Page
linkType3Page
linkType1Page
linkType10Page
sidebarTitleON THIS PAGE
linkUrl3
linkUrl4
linkUrl1
linkUrl2
linkUrl10
includedPageModeDisable_Included_Pages
linkText8
linkText7
relatedLinksOrderLabels_First
linkText7sidebarModeOpened
headingNumberingModeDisable_Numbering
linkText9
sidebarMarginRight20
relatedLinksTargetNew_Window
relatedLinksTitleRELATED LINKS
linkUrl9
linkUrl7
linkUrl8linkUrl5
numberedHeadingTagsH1,H2,H3
linkUrl5
linkUrl6
linkType8Page
linkType9Page
linkType6Page
headingLinkTextModeWrap
linkType6linkType7Page
linkType7linkType4Page
linkType4linkType5Page
sidebarWidth240linkType5Page
sidebarTop160
headingLinkExpandModeCollapse_All_By_Default
headingLinkIndent10

...

By understanding and modifying these fields as necessary, you can effectively manage the auto-upgrade process for GYTPOL clients, ensuring that they are always up to date with the latest version and enhancements.

Image RemovedImage Added

Anchor
_Toc141005881
_Toc141005881
Config > SIEM.json

...

By following these steps, you can seamlessly integrate GYTPOL with your SIEM system, enabling the transmission of pertinent data for analysis and monitoring purposes.

Image RemovedImage Added

Anchor
_Toc141005882
_Toc141005882
Config > options.json

...

By following these instructions, you can generate more detailed logs to provide the GYTPOL support team with the necessary insights to assist in resolving any issues or enhancing the system's performance.

Image RemovedImage RemovedImage AddedImage Added


Anchor
_Toc141005883
_Toc141005883
GPMCProxy

...

In essence, this JSON file acts as a filter, ensuring that only devices linked to the approved domains are considered for the Policy Validation process. This targeted approach streamlines the process by narrowing down the focus to specific domains, enhancing the accuracy and relevance of the analysis performed by the Group Policy Modeling Wizard.

Image RemovedImage Added

Anchor
_Toc141005890
_Toc141005890
Config > options.json

...

By understanding and adjusting these settings as needed, you can optimize GYTPOL's reporting intervals and logging detail for effective troubleshooting and monitoring.

Image RemovedImage RemovedImage AddedImage Added

Anchor
_Config_>_URLs.json.
_Config_>_URLs.json.
Anchor
_Toc141005891
_Toc141005891

...

This mechanism ensures that VDI instances under the same Pool name are properly managed and categorized within GYTPOL's UI, irrespective of minor numerical or hyphen variations in their names.

Image RemovedImage Added

Anchor
_Toc141005893
_Toc141005893
Updates

...

When editing any of these parameters within the configuration files, it's essential to bear in mind that restarting the gytpol Updater service is imperative. This reboot guarantees that the modifications are integrated effectively, ensuring the smooth functioning of the service in alignment with the updated configurations.

Image RemovedImage Added

For customers who do not utilize a Cloud API or operate within closed environments, the designated file will lack any entries for "access keys" values. In such cases, this parameter will remain absent from the configuration.

...

During the initial installation process, it's recommended to substitute this file with the version located within the client zip package provided by the GYTPOL team. This ensures that the file's contents are in alignment with GYTPOL's recommended configuration, tailored to the specific client's needs and circumstances.

Image RemovedImage Added

Anchor
_Toc141005896
_Toc141005896
Validator

...

Please ensure to incorporate the appropriate SQL server name and database name in the actual file according to your configuration needs.

Image RemovedImage Added

Anchor
_Toc141005899
_Toc141005899
WebSrv

...

Within this folder, you are expected to store the client files (e.g., MSI, PKG) necessary for the automated update procedure, which was elaborated upon in the Analyzer section. The URL specified in the "clientUpgrade.json" file directs to the contents of this folder, facilitating the seamless auto-update process. This organized approach ensures that the correct client files are accessible for updates and contributes to the efficiency of the auto-update mechanism.

Image RemovedImage Added

Anchor
_websrv_config.json
_websrv_config.json
Anchor
_Toc141005902
_Toc141005902
websrv_config.json

...

If you opt to alter either of these ports, it's imperative to remember that both the HTTP and HTTPS ports need to be changed simultaneously. While you have the flexibility to select different port numbers, it's essential to avoid ports already in use by GYTPOL's internal processes, as indicated in the RsopRepository > URLs.json configuration. This ensures smooth communication while accommodating your specific port preferences.

Image RemovedImage Added

"throttledUrls": This parameter signifies the limit of concurrent reports allowed per second. The default value is set at 50 reports per second. It's strongly recommended not to modify this number unless specifically requested by the GYTPOL team. Any adjustments in this regard should be carried out only under the guidance of GYTPOL's experts. If needed, further troubleshooting steps can be found in the provided resource.

...

"permissions": By default, access to the user interface (UI) is extended to Authenticated Users. The management of roles and permissions is conducted within the UI itself, accessible through the "Roles and Permissions" screen. Users within the designated group gain access to the UI, with their access level aligned to the roles assigned to them. Should no roles be granted, an error message will emerge. If necessary, it's possible to switch the group from Authenticated Users to any security group within the Active Directory. However, it's important to note that mere membership within a group is insufficient; actual access levels are established via the Roles screen. This setup ensures controlled and tailored access to GYTPOL's UI in line with your security requirements.

Image RemovedImage Added

Anchor
_Toc141005903
_Toc141005903
PEM certificate

...

By ensuring that the appropriate permissions are granted, you can facilitate the seamless execution of tasks within the GYTPOL system. This step plays a pivotal role in maintaining the operational integrity and effectiveness of various tasks within the application.

Image RemovedImage Added

Image RemovedImage Added

Anchor
_Toc141005909
_Toc141005909
Error 2147943712

...

  1. Navigate to the Security Options within your system settings.

  2. Locate the option related to storing network credentials.

  3. Confirm that the setting is configured as "Disabled."

Image RemovedImage Added

Anchor
_Toc141005910
_Toc141005910
Tasks not created during server installation

...

Certain services could encounter difficulties when starting after system restarts or updates. Any related errors or issues will be documented in the Application log within the Event Viewer. This log provides valuable information about service startup problems and helps identify any issues that need attention.

Image RemovedImage Added

Image RemovedImage Added

You have multiple options to troubleshoot and identify errors in this situation, with the event log being the most convenient method.

...

  1. Navigate to the folder associated with the service. This information can be found in the "Path to Executable" line in the services section.

  2. Locate the executable file related to the service.

  3. Run the executable by typing its name followed by "--console" and press Enter. For example, if the executable is "Analyzer.exe," you would type "Analyzer.exe --console".

  4. This command will display the service startup process and potentially provide more information about any errors encountered during startup.

Image RemovedImage RemovedImage AddedImage Added

Anchor
_Toc141005918
_Toc141005918
Using --migrate switch

...

By running the service executable with the "--migrate" parameter, you will initiate the database migration process. This process ensures that any required additional tables, columns, keys, and other objects are created within the database according to the product's requirements. Importantly, this approach will also handle any timeouts that might occur during the migration process, allowing the database updates to complete successfully.

Image RemovedImage Added

Anchor
_Toc141005919
_Toc141005919
DB in read-only mode

...

  1. Add the "Everyone" group with Full Control permissions to the security settings of the relevant folder. Ensure that these permissions are applied to all child objects within the folder.

  2. Run the service executable with the "--migrate" parameter and allow the migration process to complete.

  3. Once the migration is successful, remove the "Everyone" group from the folder's security settings.

  4. Start the affected service through the System Services utility.

...

  1. the migration process to complete.

  2. Once the migration is successful, remove the "Everyone" group from the folder's security settings.

  3. Start the affected service through the System Services utility.

...

Could not allocate a new page for database ‘gytpol_<DBNAME>’ because of insufficient disk space in filegroup ‘PRIMARY’

LocalDB (including SQL Express) databases have a maximum disk space allocation of 10GB. If your database file exceeds this limit, the service will fail to start. It's advisable to transfer your databases to an external SQL server, whether it's dedicated or shared. Preferably, opt for a dedicated server for better performance.

Keep in mind that after migration, certain data won't transfer, such as created action rules (mutes, remediations, and auto-remediations) and the activity log of actions.

...

Anchor
_Toc141005920
_Toc141005920
Analyzer won’t start - System.NullReference

...

If a proxy server is configured, it will be displayed in the command output.

Powershell:

$proxySettings = Get-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings'

if ($proxySettings.ProxyEnable -eq 1)

{

Write-Output "Proxy Server: $($proxySettings.ProxyServer)"

}

else {

Write-Output "Proxy is not enabled."

}

If proxy is set, this will be the result:

...

Once you've made this change, a folder named "archive" will be created in the "C:\Program Files\WindowsPowerShell\Modules\gytpol" directory. This folder will contain logs and information that can be shared with the GYTPOL support team for advanced troubleshooting purposes.

Image RemovedImage Added

Each individual task, scan, or remediation action initiated by GYTPOL will generate a corresponding folder containing logs, commands, and results. These folders are valuable for diagnosing any failures or issues during the process.

...

The GYTPOL support team will then be able to analyze the logs and information within the zipped folder to assist in identifying and resolving any issues.

Image RemovedImage Added

To revert the change made to the "archiveEnabled" field and disable the creation of the archive folder, you can follow these steps:

...

By providing the detailed information from the developer tools, the GYTPOL support team will be better equipped to diagnose and address the issue you are encountering with the GYTPOL web application.

Image RemovedImage Added

Anchor
_Toc141005943
_Toc141005943
Error 500 on Analyzer - VDI file

...

By ensuring that the vdiImages.json file is edited correctly and maintains the proper JSON format, you can prevent errors and ensure the smooth functioning of the GYTPOL Analyzer service.

Image RemovedImage RemovedImage AddedImage Added

Anchor
_Toc141005944
_Toc141005944
SQL server and Analyzer service

...

  1. Stop the Existing Instance of gytpolServer: If the gytpolServer task is already running, you should stop the existing instance before making the change.

  2. Modify gytpolServer Task Settings: Open the Task Scheduler and navigate to the gytpol folder in the main Task Scheduler Library. Locate the gytpolServer task and change the task behaviour as shown in the picture below:

Image RemovedImage Added


Anchor
_Toc141005948
_Toc141005948
Policy Validation – error 299 / empty screens / GPMC service is down

...

  • Open the Services application:

    • Press Win + R, type services.msc, and press Enter.

  • Find and select the "gytpol GPMCPROXY" service, right-click on it, and choose "Restart."

  • Find and select the "gytpol Data Repository" service, right-click on it, and choose "Restart."

Image RemovedImage Added