

- INTEGRITY PLUS INSTALLATION PATCH
- INTEGRITY PLUS INSTALLATION SOFTWARE
- INTEGRITY PLUS INSTALLATION CODE
To mitigate this issue, it is highly recommended that vendors provide their applications, upgrades, or patches in a digitally signed and hashed format such that the integrity of the application can be verified.
INTEGRITY PLUS INSTALLATION CODE
Also malicious code could affect the platform on which the application is operated, the network to which the platform is attached, and the communications system with which the application operates.

Any application that is not obtained from its original developing vendor could be modified to add some sort of malicious code that could affect the confidentiality, integrity, and availability of the communications supported by the application. This can be a problem if the application is obtained from a source other than directly from it’s original developing vendor such as a third party download service. It is important that the vendor provided upgrades or patches are not modified during their delivery and installation.
INTEGRITY PLUS INSTALLATION PATCH
However, you can rest assured that Flexera has employed a robust process to ensure confidence that any patch from Flexera has undergone strict scrutiny in terms of security, integrity, and quality to help you deploy the patches with full confidence. There is always some level of risk involved in deploying patches, so it is important to test and ensure expected behavior in your unique environment. For SPS packages additional proactive testing is done by deploying the packages in the live environment on various versions of Windows to ensure the package behavior is as expected. For SPS Packages, the silent command line parameters are wrapped within the installer file, however, for Vendor Patch Module the silent command line parameters are provided external to the installer file. Each is installed with re searched silent command line parameter s to verify a successful, silent installation. All the silent command lines go through an internal QA cycle to ensure the installation performs as expected. QualityĪ lot of time is invested in researching the silent command line parameters for each patch. For SPS packages, we go even further by code sign ing the package. After SVM downloads the patch installer file on the host machine for installation, the hash is calculated again and verified against the hash stored in our database to ensure the file has not tampered during the transit and the integrity of the file is maintained.


A hash for each of the file is calculated and stored in our database. IntegrityĪfter the security test is passed, the files are then stored on Flexera’s download server. Putting the file through multiple scan engines helps us eliminate false positives and to ensure accurate and consistent results. Once acquired, it is scanned for viruses against a multitude of high-profile scan engines. The installer files are never obtained from any third-party source. This applies to both commercial and open-source products. Vendor setups are always obtained from the official vendor or in a special case, a site that the vendor has specified as an official trusted location for their installer. No matter how you leverage Flexera's content, our commitment remain s the same.
INTEGRITY PLUS INSTALLATION SOFTWARE
There are three important aspects we make a priority at Flexera when it comes to the patches provided in Software Vulnerability Manager (SVM) and package data provided in the AdminStudio Package Feed Module (PFM) – Security, Integrity, and Quality.
