The patch application status list CSV file can be obtained using the following methods:
Management console (The Download CSV file button on the Patch list window)
Patch information output command - Display patch application status
When obtained from the management console, all patch application statuses are output. When obtained using the patch information output command, patch application statuses for all servers or each server are output.
Clicking the Download CSV file button displays the window to select the storage destination of a CSV file where the list information for each window can be saved.
File name
The name of the CSV file will have the following format:
Management console
patch_list_<patch-type>_<date>.csv |
The obtain patch application status command
Any folder
File location
Any folder
Character encoding
The CSV file will be output using the character encoding for the operating system on the admin server.
Output format
The following information is output.
Item No. | Item name | Maximum length (bytes) | Value format | Remarks |
---|---|---|---|---|
1 | Patch name | 16 | Text | Indicates the patch name of the OS patch. |
2 | Class | 16 | Text | Indicates the classification level of the OS patch. |
3 | Patch type | 32 | Text | Indicates the patch type (the class of WSUS update program). |
4 | Product name | 256 | Text | Indicates the product name. |
5 | Release date | 10 | Text | Indicates the release date of the OS patch. |
6 | Overview | 256 | Text | Indicates an overview (title) of the patch. |
7 | Update ID | 64 | Text | Outputs the Update ID. |
8 | Server name | 256 | Text | Indicates the server name. |
9 | Server ID | 256 | Text | Indicates the server ID. |
10 | Application status | 16 | Text | Indicates the application status.
|
11 | Server group name | 256 | Text | Outputs the server group name. |
12 | Tenant | 64 | Text | Outputs the tenant name. |
13 | IP address | 15 | Text | Indicates the IP address. |
14 | Host name | 256 | Text | Indicates the host name. |
15 | User ID | 64 | Text | Indicates the user ID of the contact user. |
Item No. | Item name | Maximum length (bytes) | Value format | Remarks |
---|---|---|---|---|
1 | Package name | 64 | Text | Indicates the package name. |
2 | Version | 32 | Text | Indicates the version of the package. |
3 | Release | 32 | Text | Indicates the release number of the package. |
4 | Architecture | 16 | Text | Indicates the architecture for the package. |
5 | Release date | 10 | Text | Indicates the date when the package information was registered with Systemwalker Software Configuration Manager. |
6 | Overview | 256 | Text | Indicates an overview (summary) of the package. |
7 | Server name | 256 | Text | Indicates the server name. |
8 | Server ID | 256 | Text | Indicates the server ID. |
9 | Application status | 16 | Text | Indicates the application status.
|
10 | Server group name | 256 | Text | Outputs the server group name. |
11 | Tenant | 64 | Text | Outputs the tenant name. |
12 | IP address | 15 | Text | Indicates the IP address. |
13 | Host name | 256 | Text | Indicates the host name. |
14 | User ID | 64 | Text | Indicates the user ID of the contact user. |
Item No. | Item name | Maximum length (bytes) | Value format | Remarks |
---|---|---|---|---|
1 | Package name | 64 | Text | Indicates the package name. |
2 | Version | 32 | Text | Indicates the version of the package. |
3 | Build release | 32 | Text | Displays the build release number of the package. |
4 | Branch | 16 | Text | Displays the branch number of the package. |
5 | Release date | 10 | Text | Indicates the date when the package information was registered with Systemwalker Software Configuration Manager. |
6 | Overview | 256 | Text | Indicates an overview (summary) of the package. |
7 | Server name | 256 | Text | Indicates the server name. |
8 | Server ID | 256 | Text | Indicates the server ID. |
9 | Application status | 16 | Text | Indicates the application status. Applied |
10 | Server group name | 256 | Text | Outputs the server group name. |
11 | Tenant | 64 | Text | Outputs the tenant name. |
12 | IP address | 15 | Text | Indicates the IP address. |
13 | Host name | 256 | Text | Indicates the host name. |
14 | User ID | 64 | Text | Indicates the user ID of the contact user. |
Item No. | Item name | Maximum length (bytes) | Value format | Remarks |
---|---|---|---|---|
1 | Patch name | 16 | Text | Displays the patch name |
2 | Class | 16 | Text | Outputs the class for the software patch. |
3 | Importance | 32 | Text | Indicates the importance level of the patch.
|
4 | Update type | 16 | Text | Indicates the update type of the patch. Only the patches of which the information collection source is UpdateAdvisor are output.
|
5 | Product name | 256 | Text | Indicates the product name. When the installation destination is configured for the software to which the patches are applied, the installation destination is appended. |
6 | OS | 16 | Text | Indicates the operating system (platform). |
7 | Update title | 256 | Text | Indicates a summary (title) of the patch. |
8 | Release date | 10 | Text | Indicates the date when the package information was registered with Systemwalker Software Configuration Manager. |
9 | Server name | 256 | Text | Indicates the server name. |
10 | Server ID | 256 | Text | Indicates the server ID. |
11 | Application status | 16 | Text | Indicates the application status.
|
12 | Server group name | 256 | Text | Outputs the server group name. |
13 | Tenant | 64 | Text | Outputs the tenant name. |
14 | IP address | 15 | Text | Indicates the IP address. |
15 | Host name | 256 | Text | Indicates the host name. |
16 | User ID | 64 | Text | Indicates the user ID of the contact user. |
17 | ID of the information collection source | 16 | Text | Displays the ID of the information collection source. |
Output examples
Windows patches
Patch name,Class,Patch type,Product name,Release date,Overview,Update ID,Server name,Server ID, Application status,Server group name,Tenant name,IP address,Host name,User ID KB2618451,Required,,Security Updates,Windows Server 2008 R2,2011/12/14,Cumulative security update program for ActiveX Killbits for Windows Server 2008 R2 x64 Edition (KB2618451),4e5da29f-25a1-486a-976f-18425564c30a,kaihatu3_db(VR7NYBNV6W0001),0I6M73PAH@Direct,Not applied,Development Department III,Kobe Office (KOBE),192.168.99.7,VR7NYBNV6W0001,fujitsu_hanako KB2618451,Required,,Security Updates,Windows Server 2008 R2,2011/12/14,Cumulative security update program for ActiveX Killbits for Windows Server 2008 R2 x64 Edition (KB2618451),4e5da29f-25a1-486a-976f-18425564c30a,kaihatsu2_db(V3JZAPW36Y0001),7PE9LHYM8@Direct,Not applied,Development Department II,Kobe Office (KOBE),192.168.99.5,V3JZAPW36Y0001,fujitsu_hanako KB2607047,Recommended,Updates,Windows Server 2008 R2,2011/12/14,Update program for Windows Server 2008 R2 x64 Edition(KB2607047),7ef24779-cfa8-42ee-b1c7-edf6e58b1ef6,kanri_web(VGWCN21KMH0001),0I6M73PAH@Direct,Applied,Admin Department,Tokyo Head Office(TOKYO),192.168.99.18,VGWCN21KMH0001,fujitsu_taro KB2607047,Recommended,Updates,Windows Server 2008 R2,2011/12/14,Update program for Windows Server 2008 R2 x64 Edition(KB2607047),7ef24779-cfa8-42ee-b1c7-edf6e58b1ef6,keiri_db(VZFV6IMIMW0001),SAZYVGV5U@Direct,Not applied,Accounting Department,Tokyo Head Office(TOKYO),192.168.99.11,VZFV6IMIMW0001,fujitsu_taro KB2641690,Required,Critical Updates,Windows Server 2008 R2,2011/11/11,Update program for Windows Server 2008 R2 x64 Edition (KB2641690),f4dc532e-71a7-4bf8-b91b-ee056495a961,kanri_web(VGWCN21KMH0001),0I6M73PAH@Direct,Applied,Admin Department,Tokyo Head Office(TOKYO),192.168.99.18,VGWCN21KMH0001,fujitsu_taro KB2641690,Required,Critical Updates,Windows Server 2008 R2,2011/11/11,Update program for Windows Server 2008 R2 x64 Edition (KB2641690),f4dc532e-71a7-4bf8-b91b-ee056495a961,keiri_db(VZFV6IMIMW0001),SAZYVGV5U@Direct,Applied,Accounting Department,Tokyo Head Office(TOKYO),192.168.99.11,VZFV6IMIMW0001,fujitsu_taro
Linux patches
Package name,Version,Release,Architecture,Release date,Overview,Server name,Site ID,Application status,Server group name,Tenant name,IP address,Host Name,User ID glibc,2.12,1.47.el6_2.56,x86_64,2011-12-06,GNU libc library,kaihatu3_db(VR7NYBNV6W0001),0I6M73PAH@Direct,Not applied,Development Department III,Kobe Office(KOBE),192.168.99.7,VR7NYBNV6W0001,smith_jane glibc-common,2.12,1.47.el6_2.5,x86_64,2011-12-06,generic binary for glibc,locale data,kaihatu3_db(VR7NYBNV6W0001),0I6M73PAH@Direct,Not applied,Development Department III,Kobe Office (KOBE),192.168.99.7,VR7NYBNV6W0001,smith_jane nscd,2.12,1.47.el6_2.5,x86_64,2011-12-06,Naming service caching daemon(nscd),kaihatu3_db(VR7NYBNV6W0001),0I6M73PAH@Direct,Not applied,Development Department III,Kobe Office(KOBE),192.168.99.7,VR7NYBNV6W0001,smith_jane
Solaris patches
Package name,Version,Build release,Branch,release date,Overview,Server name,Site ID,Application status,Server group name,Tenant name,IP address,Host name,User ID entire,0.5.11 (Oracle Solaris 11.1.8.4.0),5.11,0.175.1.8.0.4.0,2014/5/15,entire incorporation including Support Repository Update (Oracle Solaris 11.1.8.4.0).,kaihatu5_db(VR7NYBNV6W0001),0I6M73PAH@Direct,Applied,Development Department III,Kobe Office (KOBE),10.124.164.202,VR7NYBNV6W0001,smith_john entire,0.5.11 (Oracle Solaris 11.1.8.4.0),5.11,0.175.1.8.0.4.0,2014/5/15,entire incorporation including Support Repository Update (Oracle Solaris 11.1.8.4.0).,keiri_db(VZFV6IMIMW0001),SAZYVGV5U@Direct,Applied,Admin Department,Tokyo Head Office (TOKYO),192.168.99.11,VZFV6IMIMW0001,smith_jane entire,0.5.11,5.11,0.175.1.0.0.24.2,2014/5/15,Incorporation to lock all system packages to the same build,kanri_web(VGWCN21KMH0001),0I6M73PAH@Direct,Applied,Admin Department,Tokyo Head Office (TOKYO),192.168.99.18,VGWCN21KMH0001,smith_jane
Software patches
Patch name,Importance,Update type,Product name,OS,Update title,Release date,Server name,Server ID,Application status,Server group name,Tenant name,IP address,Host name,User ID,Information collection source ID T004726WP-01,Security,Urgent,Interstage Application Server Enterprise Edition,Windows,2010/11/11,Interstage HTTP Server security patch,2010-11-11,kaihatu3_db(VR7NYBNV6W0001),0I6M73PAH@Direct,Applied,Development Department III,Kobe Office,192.168.99.7,VR7NYBNV6W0001,smith_jane,UpdateAdvisor T004726WP-03,Security,Urgent,Interstage Application Server Enterprise Edition,Windows,2011/12/20,Interstage HTTP Server security patch,2011-12-20,kaihatu3_db(VR7NYBNV6W0001),0I6M73PAH@Direct,Not applied,Development Department III,Kobe Office(KOBE),192.168.99.7,VR7NYBNV6W0001,smith_jane,UpdateAdvisor T004726WP-03,Security,Urgent,Interstage Application Server Enterprise Edition,Windows,2011/12/20,Interstage HTTP Server security patch,2011-12-20,kaihatu3_db(VR7NYBNV6W0001),0I6M73PAH@Direct,Not applied,Sales Department II,Tokyo Head Office(TOKYO),192.168.99.3,VIYEP46HB80001,smith_john,UpdateAdvisor T005158WP-02,Recommended,Urgent,Interstage Application Server Enterprise Edition,Windows,2011/12/20,Update patch for Interstage J2EE Common Resource,2011-12-20,kaihatu3_db(VR7NYBNV6W0001),0I6M73PAH@Direct,Not applied,Development Department III,Kobe Office(KOBE),192.168.99.7,VR7NYBNV6W0001,smith_jane,UpdateAdvisor