What happens if you target it to install the patch?
Installed patches may be pulling information on what windows thinks has been installed but it is still possible in some cases for a machine to become vulnerable again. Look at the patch information and see what detection logic it is using and see if that is valid.
If a patch will not install or installs and still appears vulnerable even after scanning again, then contact LANDesk support providing the vulscan logs and the ID of the patch so that they can look and see if the detection logic is incorrect.
Mark Star - MarXtar LANDesk Enhancements
Home of Power State Notifier & Wake-On-WAN for LANDesk
1 - Go to the client (or write a custom script)
2 - Run "vulscan /clear"
3 - Run "vulscan /reset"
These two commands will delete the Client-side and the Core-side patch information for this client, it's essentially the vulscan way of getting "back into synch".
4 - run a normal vulnerability scan.
You should be fine now.
LANDesk EMEA Technical Lead