A Best Practice Approach to Third Party Patching
|
|
- Phoebe Nichols
- 8 years ago
- Views:
Transcription
1 A Best Practice Approach to Third Party Patching Mike Grueber Senior Product Manager 1
2 Effective patch management is essential 90% of successful attacks occurred against previously known vulnerabilities where a patch or secure configuration standard was already available. Terrence Cosgrove Gartner Symposium/IT Expo Managing the Next Generation Desktop SYMANTEC VISION
3 Agenda 1 Importance of third party applications 2 The 4A model: A best practice approach 3 Tips and tricks 4 Additional resources SYMANTEC VISION
4 Top 15 Most Vulnerable Applications Application Total High Medium Low Score Apple Safari Mozilla Firefox Goggle Chrome Microsoft Internet Explorer Adobe Flash Player Adobe Reader Java Runtime Environment Adobe Acrobat Adobe Air Mozilla SeaMonkey Microsoft Office Mozilla Thunderbird Adobe Shockwave Player Oracle Database Server Microsoft Visio Based on data feeds from National Vulnerability Database SYMANTEC VISION
5 Internet Browsers and Plug-Ins IT organizations must strive for continuous improvement in vulnerability detection and rapid security patch management, especially in often overlooked non-microsoft components that are web-facing. All internet-based applications especially browsers and browser plug-ins (i.e., Adobe and Apple QuickTime), should be a top patching priority. Gartner Research Note, Top 10 Steps to Avoid Malware Infections SYMANTEC VISION
6 Internet Security Report Year in Review 30% increase in overall number of vulnerabilities (6,253) 161% increase in new vendors affected by vulnerabilities Chrome and Safari vulnerabilities on the rise 346 vulnerabilities affecting browser plug-ins SYMANTEC VISION
7 Third Party Coverage Altiris Patch Management Solution 7.1 SP1+ 7-Zip Citrix Virtual Desktop Agent Opera Adobe Acrobat Citrix XenApp Oracle OpenOffice.Org Adobe AIR Citrix XenDesktop Rarlab WinRAR Adobe Flash EMC Mozy RealPlayer Adobe In-Design Foxit Reader RealVNC Adobe Reader Google Chrome RIM Blackberry Desktop Manager Adobe Shockwave Player Google Desktop Skype AOL Instant Messenger Google Earth SourceForge.Net Audacity Applie itunes Google Picasa SourceForge.Net FileZilla Apple QuickTime Google Talk SourceForge.Net Pidgin Apple Safari HP System Management Homepage Sun Java Runtime Environment Citrix Delivery Controller SDK LibreOffice UltraVNC Citrix MetaFrame XP for Microsoft Windows Lightning UK ImgBurn Citrix Password Manager Console/Agent/Plug-In Mozilla Firefox WinZip Citrix Presentation Server for Microsoft Windows Mozilla SeaMonkey Wireshark VLC Media Player Citrix Provisioning Services Mozilla Thunderbird Yahoo Messenger Citrix Single Sign-On Console/Agent Nullsoft Winamp SYMANTEC VISION
8 The 4A model: A best practices approach SYMANTEC VISION
9 The Primary Challenge Help Security and Operations teams strike an optimal balance between risk and cost Security Team: Risk Vulnerabilities: Coverage Timeliness Operations Team: Impact & Cost Patches & Workarounds: Coverage Accurate priorities Optimal process Minimal impact SYMANTEC VISION
10 The 4A Model Security Team Compliance Report Impact Report Risk Assessment Computer and Server Admins Change Management Team Remediation Strategy SYMANTEC VISION
11 The 4A Model Assessment Phase Primary Role: Security Officer Inputs: Security advisories/bulletins and threat management alerts/feeds List of endpoints that are likely to have a given vulnerability Goals: Learn as soon as possible about potential updates Perform an initial evaluation of the situation Assign a priority to updates Promptly notify the appropriate people/organizations Output: Risk Assessment assigning priority to each update SYMANTEC VISION
12 Assessment Phase Nature of Vulnerability SYMANTEC VISION
13 Assessment Phase Impact on Your Environment SYMANTEC VISION
14 Assessment Phase - Define Custom Severity Levels SYMANTEC VISION
15 Assessment Phase - Assign Custom Severity Levels SYMANTEC VISION
16 The 4A Model Analysis Phase Primary Role: Change Manager Input: Risk Assessment Goals: Identify the full scope Assess the potential impact Deliver the Remediation Strategy Output: Remediation Strategy, which identifies updates to be applied, endpoints to be targeted and excluded, roll back plan, etc. SYMANTEC VISION
17 Analysis Phase Release Vehicles Monthly Releases Severity 2 updates Rollout to begin on Thursday following second Tuesday of each month (i.e. Patch Tuesday ) Bi-annual Releases Severity 3 updates Rollout to begin on Thursday following monthly release during February and August Out of Band Releases Severity Level 1 updates No set rollout schedule SYMANTEC VISION
18 Analysis Phase Phased Rollouts To mitigate risk, rollout updates to different groups of computers in phases Test environment (lab) Pilot group (often subset of IT group, or power users of an application) Production (computers in production environment often broken down into multiple groups) If problems discovered during testing Defer rollout of update Exclude certain computers from rollout In addition to prioritizing updates, also prioritize groups of computers to which update will be distributed Business criticality Likelihood of exposure to vulnerability System availability requirements System redundancy SYMANTEC VISION
19 The 4A Model Application Phase Primary Role: Computer/Server Administrator Input: Remediation Strategy Goals: Apply software updates on a timely basis Apply software updates in a manner that appropriately mitigates the risks involved Output: Compliance Report verifying that required updates have been successfully applied to a requisite percentage of relevant endpoints SYMANTEC VISION
20 Application Phase Phased Rollouts Release Date Test Group (Lab) Pilot Group (IT) Production Group #1 Production Group #2 Production Group #3 SYMANTEC VISION
21 Application Phase Phased Rollouts SYMANTEC VISION
22 Application Phase Phased Rollouts SYMANTEC VISION
23 Application Phase - Compliance Report Verify that expected compliance rate was achieved according to terms of SLA Note that Compliance Rate is calculated based on computers that have been scanned SYMANTEC VISION
24 The 4A Model Advancement Phase Primary Roles: All involved in process Inputs: Goals: Lessons learned Data analysis Ongoing evaluation and fine-tuning of process Continuous improvement Output: Process improvements SYMANTEC VISION
25 Tips and Tricks SYMANTEC VISION
26 Installing under System Account Some third party vendor packages (e.g. Sun JRE) cannot be installed under System Account By default, Patch policies install updates under the System Account The account used to install each package can be configured in Resource Manager SYMANTEC VISION
27 Disabling previously installed versions in use Updates to Sun JRE require that previously installed versions be disabled before installing a new version/update The batch file which drives the installation of Sun JRE updates does not disable previously installed versions before attempting to install the new version/update, as this could result in unexpected user disruption Workaround is documented in release notes (i.e. Add 'tskill java /A' command to batch file) SYMANTEC VISION
28 Disabling previously installed versions in use View command line information in Resource Manager SYMANTEC VISION
29 Disabling previously installed versions in use Locate batch file in folder for package associated with update Modify batch file SYMANTEC VISION
30 Maintaining application customizations Third party vendors such as Adobe sometimes address security issues in packages that install a full version of the application rather than in a hot fix that only updates the affected files Updates distributed as full installation packages may fail to preserve customizations made to previously installed versions of the application (e.g. turning off an auto update feature) Customizations can be preserved by: Running a separate task following installation of the update; Creating a transform file, adding the transform file to the package folder associated with the update, and creating a custom command line for the update package SYMANTEC VISION
31 Application Customizations - Adobe Flash Auto-update configuration settings stored in mms.cfg file For Flash 8 and later, mms.cfg is stored in the following location: Windows NT, 2000: \\WINNT\System32\Macromed\Flash Windows XP, Vista: \\WINDOWS\System32\Macromed\Flash Windows 64 bit: \\Windows\SysWOW64 Parameter Default Description AutoUpdateDisable 0 0 allows auto-update based on user settings. 1 disables auto-update. SilentAutoUpdateEnable 1 0 allows background update. 1 disables background update. For more information, see: kb/administration-configure-auto-update-notification.html SYMANTEC VISION
32 Application Customizations - Adobe Acrobat and Reader Three ways to customize installation Command line Changes to registry following distribution Customization wizard For more information, see Enterprise Administration Guide: ttachments/acrobat_enterprise_administration.pdf SYMANTEC VISION
33 Adobe Acrobat and Reader Command Line Set value of Windows Installer properties on command line e.g. msiexec /i "[UNC PATH]\AdbeRdr1010_en_US.msi" EULA_ACCEPT=YES /qn SYMANTEC VISION
34 Adobe Acrobat and Reader Registry changes Administrator s Information Manager (dictionary of 450 registry/plist preferences) Example #1 Disable automatic updates and remove associated user interface items SYMANTEC VISION
35 Adobe Acrobat and Reader Registry Changes Example #2 Disable prompts for upgrades to next major version (e.g to 11.0) For more information, see download/attachments/ /aim.air SYMANTEC VISION
36 Adobe Acrobat and Reader Customization Wizard Free utility that enables pre-deployment installation customization Creates transform file that gets applied to.msi at installation time See: ftp://ftp.adobe.com/pub/adobe/acrobat/win/10.x/ /misc/ SYMANTEC VISION
37 Adding Transform File to Software Update Package SYMANTEC VISION
38 Creating Custom Command Line SYMANTEC VISION
39 Additional Resources For tips and tricks on installing applications and updates to those applications, see IT Ninja (formerly AppDeploy): For informative discussions among system administrators regarding the distribution of software updates, subscribe to the Patch Management Mailing List: For more questions and answers regarding use of the Altiris Patch Management Solution, see Symantec Connect: SYMANTEC VISION
40 Thank you! Mike Grueber Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 40
Patch Management Solutions Test
Patch Management Solutions Test A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: 5 th June, 2013, last update: 19 th July, 2013 Executive Summary From May to July
More informationMiradore Management Suite Application support for Patch Management
Miradore Management Suite Application support for Patch Management This is a list of supported applications in Q1/2016. New software and software versions are added continuously. Vendor Product Min Version
More informationThe Importance of Patching Non-Microsoft Applications
The Importance of Patching Non-Microsoft Applications Technical WHITE PAPER The Importance of Patching Non-Microsoft Applications In the past, organizations patched only Microsoft operating systems. As
More informationPRODUCTS SUPPORTED BY SOFTWARE UPDATER
PRODUCTS SUPPORTED BY SOFTWARE UPDATER LAST UPDATED: 04 AUGUST 2015.NET Framework.NET Framework.NET Framework.NET Framework SP3.NET Framework 1.1.NET Framework 1.1.NET Framework 2.0.NET Framework 2.0.NET
More informationThe Importance of Patching Non-Microsoft Applications
The Importance of Patching Non-Microsoft Applications Technical WHITE PAPER The Importance of Patching Non-Microsoft Applications In the past, organizations patched only Microsoft operating systems. As
More informationThe Importance of Patching Non-Microsoft Applications
The Importance of Patching Non-Microsoft Applications Technical WHITE PAPER The Importance of Patching Non-Microsoft Applications In the past, organizations patched only Microsoft operating systems. As
More informationClosing the Vulnerability Gap of Third- Party Patching
SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage
More informationComplete Patch Management
Complete Patch Management Complete - Flexible Unique In- Depth Secunia CSI 7 Corporate Software Inspector Take control of the vulnerability threat and optimize your IT security investments. The Secunia
More informationSymantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide
Symantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide Altiris Patch Management Solution for Windows 7.5 SP1 from Symantec User Guide The software described in this book is
More informationContent Quarterly, Q4 2015 Supported Platforms and Applications
Product Guide Content Quarterly, Q4 2015 Supported Platforms and Applications Platforms and applications supported by Micro Focus ZENworks Patch Management versions 11.4.1 and newer. October 2015 Version
More informationTackling Third-Party Patches
Tackling Third-Party Patches VMware vcenter Protect Update Catalog Delivers an Efficient, Effective Way to Extend an Organization s SCCM Infrastructure Technical WHITE PAPER Companies around the world
More informationContent Quarterly, Q4 2014
Supported Platforms and Applications Platforms and applications supported by Lumension Patch and Remediation. November 18, 2014 Version 5.13 Copyright 2014 Lumension Security, Inc.; all rights reserved
More informationContent Quarterly, Q2 2015 Supported Platforms and Applications
Product Guide Content Quarterly, Q2 2015 Supported Platforms and Applications Platforms and applications supported by Micro Focus ZENworks Patch Management. April 30, 2015 Version 5.14 Table of Contents
More informationHEAT Software Content Quarterly Q4 2015
HEAT Software Content Quarterly Q4 2015 Supported Platforms and Applications October 1, 2015 Version 6.0 Contents About HEAT Software... 3 About this Document... 3 Patch Quality Assurance Summary... 4
More informationAltiris Patch Management Solution for Windows 7.1 from Symantec Release Notes
Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes The software described in this book is furnished
More informationUP L04 Introduction to 3 rd Party Patching Using the 4A Model Hands-On Lab
UP L04 Introduction to 3 rd Party Patching Using the 4A Model Hands-On Lab Description The objective of this course is to introduce students to the various concepts of 3rd party patching. Students will
More informationCA Client Automation: Patch Manager - Supported Patches
CA Client Automation: Patch Manager - Supported Patches Laural Gentry Sr. Principal Product Manager April 2012 CA Online Content Research Team 2 This published document was based on current information
More informationmanagement Patch ControlNow TM Whitepaper Fixing vulnerabilities before they are exploited.
management Patch ControlNow TM Whitepaper Fixing vulnerabilities before they are exploited. Table of Contents Introduction 3 Importance of patch management 4 Balancing security with reliability 6 Why cloud-based
More informationPatch Management for Windows. User s Guide
Patch Management for Windows User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003, 2011. US Government
More informationEndpoint Business Products Testing Report. Performed by AV-Test GmbH
Business Products Testing Report Performed by AV-Test GmbH January 2011 1 Business Products Testing Report - Performed by AV-Test GmbH Executive Summary Overview During November 2010, AV-Test performed
More informationUser State Migration Tool USMT 4.0
User State Migration Tool USMT 4.0 The USMT Process Upgrade Applications 1 XP SP2 Run ScanState Store locally or across the network 2 Deployment Server The USMT Process Upgrade Applications 1 XP Windows
More informationDupaco Cafe Secure your business Your time is valuable how F-Secure can help you make the most out of it
Dupaco Cafe Secure your business Your time is valuable how F-Secure can help you make the most out of it 21 st November 2012, Voorthuizen Knut Vatnestrøm, Technical Service Manager Michael Dahl, Director
More informationContent Quarterly, Q3 2014
Supported Platforms and Applications Platforms and applications supported by Lumension Patch and Remediation. July 9, 2014 Version 5.12 Copyright 2014 Lumension Security, Inc.; all rights reserved Table
More informationReducing the Complexity of Virtualization for Small and Midsized Businesses
Reducing the Complexity of Virtualization for Small and Midsized Businesses Deploying an SMB-Specific SaaS Solution to Simplify Virtualization and Increase IT Productivity WHITE PAPER Executive Summary
More informationAltiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide
Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide The software described in this book is furnished
More information76% Secunia Vulnerability Review. Key figures and facts from a global IT-Security perspective. Published February 26, 2014. secunia.
Secunia Vulnerability Review 2014 Key figures and facts from a global IT-Security perspective Published February 26, 2014 76% Browser Vulnerabilities 7540 893 7540 731 7540 727 7540 441 7540 208 7540 207
More informationHEAT Endpoint Security Umfassender Schutz vor Hacker-Angriffen. Mario Schwalm HEAT Endpoint Security 20.04.2016
HEAT Endpoint Security Umfassender Schutz vor Hacker-Angriffen Mario Schwalm HEAT Endpoint Security 20.04.2016 2015 HEAT Software. All Rights Reserved. Proprietary and Confidential 18 Produkt Portfolio
More informationCustom Project Work with Continuum Tech Advantage
Custom Project Work with Continuum Tech Advantage Our Tech Expertise Your Tech Advantage Continuum Tech Advantage is an exciting program that lets our partners leverage the technical personnel, resources
More informationCA Client Automation
CA Client Automation Supported Content for CA Patch Manager and Supported Application Signature Content April 2015 Contents CA Content Research Team... 3 CA Patch Manager Content... 3 Operating Systems
More informationFive steps to improve your network s health
Five steps to improve your network s health On April 7, 2014, just when some people were beginning to feel more confident that their approach to network security was resulting in strong protection, an
More informationThe cloud server setup program installs the cloud server application, Apache Tomcat, Java Runtime Environment, and PostgreSQL.
GO-Global Cloud 4.1 QUICK START SETTING UP A WINDOWS CLOUD SERVER AND HOST This guide provides instructions for setting up a cloud server and configuring a host so it can be accessed from the cloud server.
More informationAltiris Patch Management Solution for Windows 7.1 SP2 from Symantec Release Notes
Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec Release Notes Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec Release Notes The software described in this book is
More informationLumension Endpoint Management and Security Suite
Lumension Endpoint Management and Security Suite Patch and Remediation Module Evaluation Guide July 2012 Version 1.1 Copyright 2009, Lumension L.E.M.S.S:LPR - Table of Contents Introduction... 3 Module
More informationUPK and UPK Professional Technical Specifications
UPK and UPK Professional Technical Specifications Version 12.1.0.2 October 2015 Table of Contents Introduction... 3 Multi-user Developer Install... 3 Server Requirements for a Multi-user Developer Install...
More information15. juli 2013. Norman Enterprise Security NESEC
Norman Enterprise Security NESEC Agenda What is NESEC Product overview Pricing Campaigns Migration Collaterals Norman Enterprise Security What is NESEC? An agile solution suite that reduces complexity
More informationTech Training Classroom Software Last updated: 12/17/15
Tech Training Classroom Software Last updated: 12/17/15 Redwood Hall, Room G6 (POST), Birch Hall, Rooms 105 / 107 (Birch Lab A / B) Each: 19 seat classroom (18 student, 1 instructor) Birch Lab A - New
More informationAccessing Windows 7 in the Student Labs
Accessing Windows 7 in the Student Labs This document explains how to access and use Windows 7 and some of the software installed on Windows 7, such as Microsoft Office 2010, on the student lab computers.
More informationWhat's New in BlackBerry Enterprise Server 5.0 SP4 for Novell GroupWise
What's New in BlackBerry Enterprise Server 5.0 SP4 for Novell GroupWise Upgrade paths Enhancements to the setup application Administrators can upgrade to BlackBerry Enterprise Server 5.0 SP4 for Novell
More informationNorthwestern University Dell Kace Patch Management
Northwestern University Dell Kace Patch Management Desktop Patch Management Best Practices Table of Contents: 1. Audience 2. Definition 3. Patch Approaches 4. Guidelines for Review, Test, and Deploy 5.
More informationNINITE PRO INTEGRATION WITH LABTECH REMOTE MONITORING AND MANAGEMENT
NINITE PRO INTEGRATION WITH LABTECH REMOTE MONITORING AND MANAGEMENT VERSION 1.1 PREPARED BY: BRANDON CARL POINTSOLVE TECHNOLOGY, INC. CONTENTS Introduction... 3 Requirements... 4 Setup... 5 Extra Data
More informationLANDESK Service Desk. Supported Platforms and Feature Compatibility
LANDESK Service Desk Supported Platforms and Feature Compatibility LANDESK SERVICE DESK SUPPORTED PLATFORMS This document contains information, which is the confidential information and/or proprietary
More informationHP Business Service Management
HP Business Service Management Software Version: 9.26 Windows operating system RUM for Citrix - Best Practices Document Release Date: September 2015 Software Release Date: September 2015 RUM for Citrix
More informationPCI DSS Requirement 6.1 - Installed Security Updates by Host Report
Report Description This report lists installed patches grouped by computer, including URL links providing further information on each installed patch. Generated on Generated by 6/3/2011 12:34:48 PM calin
More informationEXTENSIVE FEATURE DESCRIPTION SECUNIA CORPORATE SOFTWARE INSPECTOR. Non-intrusive, authenticated scanning for OT & IT environments. secunia.
Non-intrusive, authenticated scanning for OT & IT environments The situation: convenience vs. security Interconnectivity between organizations and corporate networks, the internet and the cloud and thus
More informationIBM Endpoint Manager Version 9.1. Patch Management for Mac OS X User's Guide
IBM Endpoint Manager Version 9.1 Patch Management for Mac OS X User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Mac OS X User's Guide Note Before using this information and the product
More informationIBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
More informationIT Quick Reference Guides Using the Application Catalog and Software Center
IT Quick Reference Guides Using the Application Catalog and Software Center Software Guides This guide covers how to use the Application Catalog to install software, and the Software Center to manage,
More informationBlackBerry Enterprise Server for Microsoft Office 365 preinstallation checklist
BlackBerry Enterprise Server for Microsoft Office 365 preinstallation checklist This document lists the preinstallation requirements that must be met before you install the BlackBerry Enterprise Server
More informationSNOW LICENSE MANAGER (7.X)... 3
SYSTEM REQUIREMENTS Products Snow License Manager Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner External Data Provider Snow Distribution
More informationW H I T E P A P E R. Patch Support. KBOX Systems Management Appliance Patch Content Summary, Q4 2009
W H I T E P A P E R Patch Support KBO Systems Management Appliance Patch Content Summary, Q4 2009 Copyright 2009 KACE Networks, Inc. All rights reserved. KBO 1000 SERIES TABLE OF CONTENTS Patch Quality
More informationOBIEE : Browser and Operating System Compatibility. Including Known Issues and Solutions
OBIEE : Browser and Operating System Compatibility Including Known Issues and Solutions Contents PREFACE... 2 SUPPORTED BROWSERS AND OPERATING SYSTEMS... 3 SUMMARY OF KNOWN BROWSER/OS ISSUES:... 4 ISSUE
More informationIn order to get the most out of your Bert Rodgers courses, it is important to ensure that your computer meets some minimum system requirements.
System Requirements In order to get the most out of your Bert Rodgers courses, it is important to ensure that your computer meets some minimum system requirements. Please select your preferred or current
More informationPatch management: Fixing vulnerabilities before they are exploited
GFI White Paper Patch management: Fixing vulnerabilities before they are exploited Managing and administering software updates remains one of the most challenging and resource-intensive tasks an IT Department
More informationFree and Legal Software You Can Download By Tom Krauser
Free and Legal Software You Can Download By Tom Krauser Here is a list of free programs that you can download for your personal use. They are legal and free for you to install. Some may have restrictions
More informationRightNow November 09 Workstation Specifications
RightNow November 09 Workstation Specifications This document includes the workstation specifications required for using RightNow November 09. Additional requirements for Outlook Integration, RightNow
More informationQUICK START. GO-Global Cloud 4.1 SETTING UP A LINUX CLOUD SERVER AND HOST INSTALL THE CLOUD SERVER ON LINUX
GO-Global Cloud 4.1 QUICK START SETTING UP A LINUX CLOUD SERVER AND HOST This guide provides instructions for setting up a cloud server and configuring a host so it can be accessed from the cloud server.
More informationSpine Warranted Environment Specification
Spine Warranted Environment Specification 2015 Richard Trusson June 2015 1 Copyright 2015, Health and Social Care Information Centre. Contents Introduction 3 Scope 3 Intended Audience 4 Approach 4 Changes
More informationClosing the Antivirus Protection Gap
A comparative study on effective endpoint protection strategies May 2012 WP-EN-05-07-12 Introduction Corporate economic concerns have put increased pressure on already limited IT resources in recent years
More informationWhy The Security You Bought Yesterday, Won t Save You Today
9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About
More informationFoxit Reader Deployment and Configuration
Copyright 2004-2015 Foxit Software Incorporated. All Rights Reserved. No part of this document can be reproduced, transferred, distributed or stored in any format without the prior written permission of
More informationPatch Management for Red Hat Enterprise Linux. User s Guide
Patch Management for Red Hat Enterprise Linux User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003,
More informationMicrosoft Windows Apple Mac OS X
Products Snow License Manager Snow Inventory Server, IDP, IDR Client for Windows Client for OS X Client for Linux Client for Unix Oracle Scanner External Data Provider Snow Distribution Date 2014-04-02
More informationSystem Planning, Deployment, and Best Practices Guide
www.novell.com/documentation System Planning, Deployment, and Best Practices Guide ZENworks Application Virtualization 9.0 February 22, 2012 Legal Notices Novell, Inc., makes no representations or warranties
More informationORACLE USER PRODUCTIVITY KIT V3.6.1 TECHNICAL SPECIFICATIONS (WITH ENABLEMENT SERVICE PACK 3)
ORACLE USER PRODUCTIVITY KIT V3.6.1 TECHNICAL SPECIFICATIONS (WITH ENABLEMENT SERVICE PACK 3) KEY FEATURES AND BENEFITS DRIVE USER PRODUCTIVITY AND MITIGATE RISK. FEATURES Single, synchronized authoring
More informationSecunia Vulnerability Review
Secunia Vulnerability Review 2015 Key figures and facts on vulnerabilities from a global information security perspective Published March 25, 2015 15,435 13,114 9,878 Index Global Trends All Products 3
More informationHouston Community College. Information Technology Service Level. Agreement (SLA) CUSTOMER SUPPORT DEPARTMENT
1 Houston Community College Information Technology Service Level Agreement (SLA) CUSTOMER SUPPORT DEPARTMENT 2 Document Revision History Date Author Revision Description 02/20/2009 Wayne Ayers 1.1 IT Customer
More informationVulnerability Scanning and Patch Management
Vulnerability Scanning and Patch Management Vulnerability Scanning and Patch Management Security vulnerabilities remain amongst the most disruptive and damaging types of problem experienced in real-world
More informationTracking Anti-Malware Protection 2015
Tracking Anti-Malware Protection 2015 A TIME-TO-PROTECT ANTI-MALWARE COMPARISON TEST Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to measure
More informationUPK Professional Technical Specifications VERSION 11.1
UPK Professional Technical Specifications VERSION 11.1 Table of Contents Introduction... 3 Multi-user Install... 3 Server Requirements for a Multi-user Install... 3... 3... 3... 3 Client Requirements for
More informationClient System Requirements for Brainloop Secure Dataroom as of Version 8.30
Client System Requirements for Brainloop Secure Dataroom as of Version 8.30 Copyright Brainloop AG, 2004-2014. All rights reserved. Document version 2.0 All trademarks referred to in this document are
More informationDell KACE K1000 System Management Appliance Version 5.4. Patching and Security Guide
Dell KACE K1000 System Management Appliance Version 5.4 Patching and Security Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without
More informationMcAfee Data Loss Prevention Endpoint 9.4.100
Release Notes Revision A McAfee Data Loss Prevention Endpoint 9.4.100 For use with McAfee epolicy Orchestrator Contents About this release New features Enhancements Installation instructions Known issues
More informationHP Business Service Management
HP Business Service Management For the Windows and Linux operating systems Software Version: 9.23 High Availability Fine Tuning - Best Practices Document Release Date: December 2013 Software Release Date:
More informationMinimum Computer System Requirements
Minimum Computer System Requirements http://ualr.edu/blackboard/welcome/system- requirements/ The following minimum hardware and software requirements are necessary in order to access an online class through
More informationMicrosoft Windows Apple Mac OS X
Products Snow License Manager Snow Inventory Server, IDP, IDR Client for Windows Client for OSX Client for Linux Client for Unix Oracle Scanner External Data Provider Snow Distribution Date 2014-02-12
More informationTaking a Proactive Approach to Patch Management. B e s t P r a c t i c e s G u i d e
B e s t P r a c t i c e s G u i d e It s a fact of business today: because of the economy, most organizations are asking everyone, including the IT staff, to do more with less. But tight budgets and the
More informationAdobe Acrobat 9 Deployment on Microsoft Systems Management
Adobe Acrobat 9 Deployment on Microsoft Systems Management Server white paper TABLE OF CONTENTS 1. Document overview......... 1 2. References............. 1 3. Product overview.......... 1 4. Installing
More informationTo ensure you have the appropriate equipment and settings please review the following: Software and Hardware Recommendations.
Step 2- Computer Check Before you attempt to login to University resources it is important to make sure your computer will support an online course, or an accelerated course with an online component. It
More informationToad for Oracle 12.5.1. Installation Guide
Toad for Oracle 12.5.1 Installation Guide Contents Installation Requirements 3 System Requirements 3 Required Windows Privileges 7 Install Toad 8 Install or Upgrade Toad 8 Install Toad on Citrix or Remote
More informationPractical Patch Compliance
Practical Patch Compliance Relieving IT Security Audit Pain, From the Data Center to the Desktop Microsoft s System Center Configuration Manager doesn t handle every aspect of Linux/UNIX and third-party
More informationThis walk-through was created using Windows XP as a guide, however alternate versions of the Windows OS will be very similar in procedure as well.
Important!: If you are working from a computer within your office environment, it may be advisable to have your local IT/Helpdesk personnel validate that this software meets acceptable standards prior
More informationCommissioners Deanna Tanner Okun, Chairman Charlotte R. Lane Daniel R. Pearson Shara L. Aranoff Irving A. Williamson Dean A.
The U.S. International Trade Commission is an independent, nonpartisan, quasi-judicial federal agency that provides trade expertise to both the legislative and executive branches of government, determines
More informationStudent ANGEL FAQs. General Issues: System Requirements:
Student ANGEL FAQs General Issues: What is ANGEL? How do I log in? What is my username and password? How do I activate my account? I forgot my C number/password, what do I do? I registered after the first
More informationSynergis Software 18 South 5 TH Street, Suite 100 Quakertown, PA 18951 +1 215.302.3000, 800.836.5440 www.synergissoftware.com version 20150330
Synergis Software 18 South 5 TH Street, Suite 100 Quakertown, PA 18951 +1 215.302.3000, 800.836.5440 www.synergissoftware.com version 20150330 CONTENTS Contents... 2 Overview... 2 Adept Server... 3 Adept
More informationMcAfee Data Loss Prevention Endpoint 9.3.416
Release Notes Revision A McAfee Data Loss Prevention Endpoint 9.3.416 For use with McAfee epolicy Orchestrator Contents About this release Resolved issues Installation instructions Known issues Find product
More informationMcAfee Data Loss Prevention Endpoint 9.4.0
Release Notes Revision A McAfee Data Loss Prevention Endpoint 9.4.0 For use with McAfee epolicy Orchestrator Contents About this release New features Enhancements Installation instructions Known issues
More informationSC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that
More informationAccessing Websites. Mac/PC Compatibility: QuickStart Guide for Business
Accessing Websites Mac/PC Compatibility: QuickStart Guide for Business 2 Accessing Websites QuickStart Guide for Business The Basics People use the web for research, entertainment, and business. And it
More informationEMC Smarts SAM, IP, ESM, MPLS, NPM, OTM, and VoIP Managers 9.4 Support Matrix
EMC Smarts SAM, IP, ESM, MPLS, NPM, OTM, and VoIP Managers 9.4 Version 9.4.0.0 302-001-488 REV 01 Abstract Smarts 9.4 Suite can be installed in a typical or a fully distributed, multi-machine production
More informationApplications Life-cycle Management
Windows Desktop Applications Life-cycle Management Sebastien Dellabella, Rafal Otto Internet Services Group IT Department Agenda Components of the Windows application management activity at CERN Application
More informationRightNow CX November 2011 Workstation Specifications
RightNow CX November 2011 Workstation Specifications This document includes the workstation specifications required for using RightNow CX November 2011. Additional requirements for Outlook Integration,
More informationSoftware Aulas 091 094 Curso 2015 2016
Adobe Acrobat 8 Professional Italiano, Español, Nederlands 8.1 Adobe Systems Adobe Acrobat 8.1.0 Professional 8.0 Adobe Systems Adobe Acrobat Reader DC Español 15.10 Adobe Systems Incorporated Adobe AIR
More informationStandard Client Configuration Requirements
Test Developer s Studio (TDS) Standard Client Configuration Requirements Information Technologies (IT) Content Applications Development Group (CADG) Version 1.0 February 20, 2008 Copyright 2008 by NCS
More informationPLATO Learning Environment System and Configuration Requirements for workstations. October 27th, 2008
PLATO Learning Environment System and Configuration Requirements for workstations October 27th, 2008 Windows 2000 Professional with SP4 Windows XP Professional with SP2 Windows XP Home Edition with SP2
More informationFive Tips to Reduce Risk From Modern Web Threats
Five Tips to Reduce Risk From Modern Web Threats By Chris McCormack, Senior Product Marketing Manager and Chester Wisniewski, Senior Security Advisor Modern web threats can infect your network, subvert
More informationWhat s New with Enterprise Vault 11? Symantec Enterprise Vault 11 - What's New?
What s New with Enterprise Vault 11? 1 Disclaimer Any information regarding pre-release Symantec offerings, future updates or other planned modifications is subject to ongoing evaluation by Symantec and
More informationEMC Smarts SAM, IP, ESM, MPLS, NPM, OTM, and VoIP Managers 9.4.1 Support Matrix
EMC Smarts SAM, IP, ESM, MPLS, NPM, OTM, and VoIP Managers 9.4.1 Version 9.4.1.0 302-002-262 REV 01 Abstract Smarts 9.4.1 Suite can be installed in a typical or a fully distributed, multi-machine production
More informationThis document lists the configurations that have been tested for the Oracle Primavera P6 version 7.0 release.
Oracle Primavera P6 Tested Configurations Release Version: 7.0 Date: November 2014 Revision: 7.0.0.0.16 This document lists the configurations that have been tested for the Oracle Primavera P6 version
More informationAccess 2013 55 4h15. Access 2010 55 4h10. Access 2007 36 2h14. Access 2007 (UK) 58 4h42. ACDSee 15 37 3h35. Acrobat Pro Extended 9 30 2h36
Access 2013 55 4h15 Access 2010 55 4h10 Access 2007 36 2h14 Access 2007 (UK) 58 4h42 ACDSee 15 37 3h35 Acrobat Pro Extended 9 30 2h36 Acrobat Reader Pro XI 56 6h06 Adobe Reader X 19 1h33 Android 4.1 41
More informationInformation about Pop-ups and Pop-up Blockers
Information about Pop-ups and Pop-up Blockers When browsing the WWW via the Internet, you will encounter pop-ups. Pop-up ads or popups are often forms of online advertising on the World Wide Web intended
More information