1 of 1 people found this helpful
If they used LANDesk for staging the file on the systems, it would only live for 2 - 14 days by default before being removed from cache.
Of course, that is if you used the normal means within LANDesk to copy / stage the file. If you moved it to the clients another way, it could still be there.
How was the file moved there?
What location was it copied too?
Give us a bit more info and we might be able to help.
Thank you for replying, James!
Your questions got me thinking, then I ended up answering my own question.
Basically, since it is considered a "vulnerability," I queried by vulnerability.
Attached is the query I ultimately used.
And since some of you might ask, the reason I added the line "computer"."os"."Name". Not Like "server" was so that I would accidentally get any servers in my query. We have some new people that have installed incorrect agents and are in the process of correcting that.
James, thanks again for your questions, because that's pretty much what pushed me in the right direction.
XPSP2 no WXP-SP3.bmp 1,002.2 K