Patch Management. FITS OM Directory Services Administration Contents. Key
|
|
|
- Nelson Simon
- 10 years ago
- Views:
Transcription
1 Patch Management FITS OM Directory Services Administration Contents PM 1 Overview PM 2 Implementation guide PM 3 Operations guide PM 4 Roles and responsibilities PM 5 Patch Management assessment Key Cross reference: Cross reference Framework for ICT Technical Support Operations Management
2 Patch Management Becta 2006 You may reproduce this material free of charge in any format or medium without specific permission, provided you are not reproducing it for profit, material or financial gain. You must reproduce the material accurately and not use it in a misleading context. If you are republishing the material or issuing it to others, you must acknowledge its source, copyright status and date of publication. Publication date March 2006 Originally published online in February 2006 as part of the Becta website While every care has been taken in the compilation of this information to ensure that it is accurate at the time of publication, Becta cannot be held responsible for any loss, damage or inconvenience caused as a result of any error or inaccuracy within these pages. Although all references to external sources (including any sites linked to the Becta site) are checked both at the time of compilation and on a regular basis, Becta does not accept any responsibility for or otherwise endorse any product or information contained in these pages, including any sources. British Educational Communications and Technology Agency, Millburn Hill Road, Science Park, Coventry CV4 7JJ
3 Patch Management PM 1 Overview PM 1.1 What is Patch Management? The goal of Patch Management is to keep the components installed on the network (hardware, software and services) up to date with the latest patches and updates. The network components covered in Patch Management may include: Computers Servers Software Peripherals Cabling Routers and switches Services such as messaging, database, MIS and file storage. PM 1.2 Why have Patch Management? Patch Management is an important part of keeping the components of the network available to the end user. Without regular patching, the ICT infrastructure could fall foul of problems which are fixed by updating regularly the software, firmware and drivers. Poor patching can also allow viruses and spyware to infect the network. Patch Management should be a centralised, managed service that guarantees protection, rather than a user-installed, piecemeal approach that leaves the state of the network unknown. The internet offers schools the opportunity to enhance learning and teaching via new ICT services such as , video conferencing, instant messaging and a huge library of information. However, the downside of internet access is that the school s network is vulnerable to threats of disruption to these services, which may also compromise the reliability, availability and security of the entire network and ICT services. Many of the threats come from malware, which is a term used to describe malicious software such as viruses, Trojans and now spyware. Protecting the network with security measures provides one layer of protection, while educating your users about the threats of spyware and malware provides another layer. Users need to know what to do when they receive an from an unknown source: whether just to delete it, report it to technical support or open it. Users also need to know how to deal with browser plug-ins or instructions from browsers to click here to install updates, as these could easily be spyware attempts to infect that computer. It is possible to counter threats like these with a combination of software and user education. User education needs only to inform users about potential threats and how to deal with them; it does not need to go into detail. As a minimum, users need to know how to inform technical support if they suspect malware activity, or ask if they are unsure about any or browser activity that is unfamiliar to them. This education needs to be frequent enough to keep it in the minds of the users perhaps once a month Becta 2006 FITS OM Patch Management 1
4 in a newsletter or bulletin. To enforce safe practice by users, the school can put in place an acceptable use policy which clarifies what users may and may not do. PM 1.3 Who uses Patch Management? Technical support staff use Patch Management every day as part of their regular maintenance schedule to ensure that the network components are up to date. End users may also be allocated some Patch Management tasks such as keeping their laptop updated with the latest antivirus software. PM 1.4 How Patch Management works Patch Management terms Patch Management uses information from the CMDB (configuration management database) and a network topology (map) managed by the FITS Configuration Management process to provide a clear picture of the components that make up the network and how these are configured. Patch Management focuses on maintaining the availability and security of the technology which supports the ICT services by updating the following in a planned way: Software designed to protect the network against threats such as viruses, Trojans, worms and spyware Unpatched software and drivers. For Patch Management to be effective, the patch administrator (PM 4) needs to have access to information about new patch releases, antivirus and spyware updates, driver updates and so on. You can make a list or spreadsheet of manufacturers websites that hold the patches and updates in the configuration management database to give all technical support staff access to this important information. The patch administrator can create the list and keep it up to date by regularly visiting manufacturer and supplier websites, or by subscribing to mailing lists. Some websites are now beginning to add RSS (really simple syndication) feeds to their sites, which allows the patch administrator to take the headlines from the site and list them all together on one page. The patch administrator can see at a glance the changes that are relevant and then construct a custom page with information about driver updates from multiple suppliers. It is recommended that the patch administrator allocates time for keeping up to date with the latest information about updates for all of the components in the network. Patch or fix Driver Service release or service pack Update Version or build A release of software that includes bug fixes or performance-enhancing changes Software required by the operating system to make a piece of hardware function A release of software that bundles together several patches and/or updates to provide a clear benchmark or level of release (eg This software has Service Release 1 installed. ) A release of software that adds new functionality to an earlier version Software that has a numeric or named attribute denoting its maturity or age (eg Are you on version 1 or 2? ) Higher value increments indicate a more mature release, which is likely to have fewer bugs and to run better than earlier builds. Becta 2006 FITS OM Patch Management 2
5 PM 1.5 What does Patch Management cost? The cost of Patch Management has three aspects: expenditure, people and time. PM Expenditure Patch Management may require subscriptions to vendors of antivirus and antispyware software. As spyware is a relatively new threat to school networks, we have included some additional information on this in Appendix A. Also some hardware manufacturers require you to pay for switch, BIOS and other equipment updates. Once you have bought a product, you normally receive the updates, service packs and patches for free. However, if a new version comes out and you want to move onto that, you usually have to buy the whole product or upgrade to it, for which you have to pay. Manufacturers usually provide hardware drivers at no cost as they are of no value without the purchased hardware. However, if you do not have a valid licence code or serial number for the hardware item, you may not be allowed to download the latest driver free of charge. PM People In a complex network with a high number of components, Patch Management may require a full-time member of staff. However, most schools will allocate Patch Management roles to a technician or the network manager. The patch administrator is responsible for the keeping the network components up to date, but may delegate tasks to others such as technicians, ICT staff or users. PM Time It takes time to keep up to date with manufacturer changes and releases to software and hardware. It also takes time to plan and perform updates and patches. PM 2 Implementation guide When considering the resources required to maintain the network, bear in mind that the more versions of operating systems there are in your school, the more patches and releases you will have to apply, which of course takes more time. This is why we recommend that you limit the number of different types of hardware and operating systems that you buy. PM 2.1 Define your Patch Management policy You may want to include the following in your Patch Management policy A list of computers, servers and peripherals on the network covered under the policy (this information should be available in the configuration management database) Allocation of roles and responsibilities for Patch Management activities Patch Management schedules Becta 2006 FITS OM Patch Management 3
6 A list of which patches and updates will be carried out using the Change and Release Management processes and which can be done without them 4 5 For example updating antivirus definitions is unlikely to require Change Management and Release Management, as there is only a low chance of failure and impact on the users, but upgrades to operating systems should, as these are more prone to failure and the impact of failure on the users could be high. If you decide to carry out a patch or update without Change Management and Release Management, you should still log it, as a record of the information could help with future incident or problem diagnosis. Definition of which attachments and internet downloads are safe to open and how this will be communicated to users. PM 2.2 Prepare to implement Good preparation can make the difference between a successful implementation of Patch Management and an unsuccessful one. Roles and responsibilities Training Start date Communications Materials The first step is to identify the participants and assign roles and responsibilities. We recommend that for the initial implementation you involve as few people as possible so that the tasks can become familiar with minimum impact on the day-to-day workload of the school. The people you select to fulfil the Patch Management roles will depend on how you currently provide technical support and who is involved already. After you have assigned roles and responsibilities, it is important to ensure that those participating in the implementation and subsequent operation of the function understand what is required of them. Use the FITS OM website as training material. A start date is important for any implementation. Choose a date that you can achieve, bearing in mind that you will need to have an up-to-date list of the network components before you start. If you do not have this, you will have to allow time to carry out a full audit or implement FITS Configuration Management. Communication must take place within the implementation team to agree plans, schedule dates and so on, but it is also important to communicate externally and inform the user community of the new function. It is a good idea to send out a regular bulletin or to keep your users informed of changes that have taken place and those that are about to happen. This keeps everyone up to date and helps to mitigate potential problems. Before you can go ahead with the implementation, you will need all the materials and tools required for the function see below for guidelines on maintaining a full up-to-date inventory and using automating tools. PM Full up-to-date inventory Your configuration management database will contain information about each hardware and software component, known in FITS as a configuration item (CI), installed on the network. For Patch Management it is recommended that you also keep the following attribute information for each CI. Becta 2006 FITS OM Patch Management 4
7 Type Computer Operating system Switch Antivirus Antispyware Printer Scanner Updates BIOS, firmware, system board drivers, video driver, network driver Service packs, patches, feature packs Firmware Data file/virus definition update Data file/virus definition update Driver, firmware Driver, firmware PM Automating tools Installing the latest drivers, patches and updates on every computer in school can obviously take a lot of time and may seem like an endless task. However, you can speed up the process using software deployment tools. Tools such as disk imaging or patch management software, along with antivirus administration console software, can help make the task less burdensome. Disk imaging is one method of bringing several computers up to date reasonably quickly. Using Release Management you should be able to document and prepare an image in a consistent way, and then use the Change Management process to deploy the image. PM 2.3 Assigning roles and responsibilities You will need to assign the following roles before implementing the policies: Role Suggested representative Comments Patch administrator (see PM 4.1) Change manager (see ChM 5.6) Release manager (see RM 5.1) Person responsible for implementing and running the Patch Management strategies, eg: Network manager Technician Supplier. Person responsible for managing the assessment and approval of major ICT infrastructure changes or the introduction of new hardware or software, eg: Network manager Technician Supplier. Person responsible for managing the process of planning, building, testing and deploying new hardware or software, eg: Network manager Technician Supplier. Ownership of all updates including: Operating system and application patches for computers and servers Antivirus and antispyware updates Firmware updates for hardware Printer driver updates. If it is decided that the new patch or update requires Change Management, completing a request for change form (see ChM Appendix A) will be necessary. If it is decided that the new patch or update requires Release Management, completing a build and install form (see RM Appendices D and F) will be necessary. Becta 2006 FITS OM Patch Management 5
8 PM 2.4 Implementing Patch Management The Patch Management cycle Audit current state New patch available Acquire patch Patch Management cycle Review deployment Test patch Deploy patch We discuss each step of the cycle below. PM Audit current state Before you can maintain your network, you need to understand its current state. This involves identifying the hardware, software, operating systems applications and their patch levels. Other hardware and peripherals such as printers and switches have firmware that you should also identify. This may seem a big job to start with if you do not have this information to hand in a configuration management database, or on lists or spreadsheets. However, the information is vital for successful Patch Management implementation. There are tools to help you automate and speed up this process, obtainable from your operating system manufacturer or from third-party suppliers, which you may like to consider. Once you know the current state of your network you can begin to plan to bring it up to date by installing the latest drivers, patches, firmware and definitions. The aim of bringing everything up to date is to create a baseline from which you can start regular patch maintenance, as the process is far easier if everything is at the same level to begin with. When you carry out this audit you may find that there are several versions of a product in use. It is easier to manage a smaller number of versions or ideally only one version: the most recent. Managing several versions creates confusion and is more time consuming to support. If you find yourself in this situation, consider upgrading the older products to the latest version, which will probably involve a financial outlay but is worth it in the long run. Becta 2006 FITS OM Patch Management 6
9 PM New patch available News that a new patch is available may come from a variety of sources such as manufacturers websites, suppliers bulletins or technical forums. The patch will usually have some release information explaining what the patch fixes and who should use it. Read the information carefully and ensure that the patch applies to the components and overall network structure of your school. The patch may not be applicable to every component on the network, in which case you need to identify which components require the patch. The patch may also have an importance rating. If a patch is described as critical, it is important to install it as soon as your Change Management process allows because the reliability and security of your network may be at risk. If the patch is not critical, read the information released with it to understand when it should be implemented. If yours is a large network with many hardware components and software applications, you may receive new updates and patches every day. To release each one as it becomes available is time consuming and potentially disruptive to users of the ICT services. In this case you can collect a number of updates and patches into one release as long as you test the release before deployment. It is worth noting that in industry very few organisations with critical services will ever be the first to implement new patches. They prefer to live with known risks rather than implement new patches with unknown risks. PM Acquire patch The next step is to acquire the patch by downloading it from the internet, getting it sent by post or having it ed to you. Some of the new service packs are hundreds of megabytes in size, in which case requesting those on CD will save you bandwidth and download time. PM Test patch Test the patch on a computer or other device reserved for testing (or a limited number of live computers). The testing itself depends on what the patch claims to fix. You may be able to ascertain that the bug has been fixed, although most patches nowadays are for obscure security holes. Once you are satisfied that the computer or other device still works properly and that the patch has not created other faults, continue to the next step. PM Deploy patch This step may involve imaging a computer and deploying the new image, or it may involve visiting every computer affected by the patch. Again, this depends on the tools you have available and the patch management strategy you employ. A point to note is that in industry, companies implement change freezes they never do changes over the pre-christmas period, for example. In the case of schools, it is probably a good idea to have a change freeze during the first day of term and on exam days. Plan any major changes for a time when the users affected are not in school, so that there is enough time to roll back if anything should go wrong. PM Review deployment Once you have deployed the patch, check that none of the computers with the new patch is adversely affected. Also, you need to check that the patch is installed successfully. You cannot assume that the patch has been installed on every computer, as other factors such as lack of disk space, computer shutdown or network problems may have affected the deployment. Becta 2006 FITS OM Patch Management 7
10 Once you have ascertained that the patch has been deployed successfully, update the configuration management database (CMDB) and/or the request for change document associated with this change. Report any incident or problem to the service desk for resolution using Incident Management or Problem Management. PM 2.5 Pilot To pilot your proposed Patch Management function, it is good practice to trial the changes first on a small group of computers. This enables you to experiment with the way that works best for you and your users. In a perfect world, you would have a test lab where you could experiment with different scenarios that reflected your live network. However, most schools do not have this facility, so it is best to test the implementation on a limited number of computers before going live with this function on the entire network. PM 2.6 Review the implementation Review your implementation by asking the following questions. Question Do we have different versions of the same software/hardware? Points to think about Consider upgrading older versions to the most recent version. How long did it take to obtain the latest versions for each item? Include this time when estimating the installation time in future. How easy was it to update each group of items? Did the changes made adversely affect any users? If so, is there anything you could do to mitigate this in the future? Do people understand their roles and responsibilities? Was each step of the implementation covered? If necessary, consider changing the build procedure or creating additional build procedures to cater for this. Consider how you informed users and the timescales involved. Also consider any training implications of the changes made. Inform staff of their involvement in this process and what is expected of them. If not, go back and perform this section again. Becta 2006 FITS OM Patch Management 8
11 PM 3 Operations guide PM 3.1 What needs to be done? Check hardware items for firmware updates. Check software items for patches, updates, service packs and drivers. Check antivirus programs for updates to virus definition files. Check antispyware programs for updates to definition files. Search the internet regularly to find out about new threats, patches or releases. Schools do not always receive this information automatically. PM 3.2 When does it need to be done? For most technical support teams, patch releases are becoming a normal part of life. The frequency of releases is also becoming more regular and less erratic, which makes scheduling their installation easier. In general, software providers supply patches once a month, whereas firmware updates tend to be yearly or six-monthly. Below is a list of network components that require patch management. Computers Apple computers Servers Switches, hubs and routers This list is not comprehensive, so you may well have other items to which you will need to apply patch management. Use the information in your CMDB to create a list of your network components that require patch management. PM Computers As soon as you take a new computer out of its box, it is already out of date! The computer industry moves very fast and within a few weeks of installation, unless you keep it up to date with critical patches, your computer may be in danger of being hacked or damaged, even with the protection of a firewall and antivirus software. To prevent this from causing problems, follow a patch maintenance schedule. Example schedule for computers Check for new software patches. Weekly Monthly Check for the latest antivirus definitions. Check that spyware definitions are up to date. Check for news about new threats, new patches and new releases. Check that drivers (for example video and network) are up to date. Check antivirus engine updates. Six monthly Check for new printer drivers. Check BIOS firmware. Becta 2006 FITS OM Patch Management 9
12 PM Apple computers Apple Mac workstations differ from other computers in that they can only run the Apple Mac operating system, whereas most other computers are able to run several operating systems. This guide applies to Mac OS X or later, since Apple no longer supports Mac OS 9 and earlier versions. Because of this difference, Apple machines have a more clearly defined schedule that you should follow. Example schedule for Apple computers Weekly Monthly Six monthly Annually Check for software updates. Check antivirus definitions. Check for third-party software updates. Check antivirus engine updates. Check for new printer drivers. Check for new operating system version. PM Servers Servers require more attention than personal computers, as servers are more critical. Do not make major changes to servers without going through the Change Management process. Ideally, this even applies to antivirus updates, but it is particularly vital for firmware or software patches. Using Change Management will prevent you from making changes without planning and considering all the implications of that change. Example schedule for servers Weekly Monthly Six monthly Check for new software patches. Check for the latest antivirus definitions. Check for new spyware definitions. Check for new drivers (for example video and network). Check antivirus engine updates. Check for new printer drivers. Check BIOS firmware. PM Switches, hubs and routers Like computers, switches, hubs and routers have software that you may need to update. This tends be in the form of firmware updates. Although manufacturers test firmware thoroughly before releasing it, some bugs or performance loss is still possible in the final release. It is important not to forget firmware updates, since to do so may affect the reliability and security of your school network. Before making changes to switches, hubs or routers, make a backup of the configuration! Some firmware updates can wipe the memory and result in lost configuration. You should check for new updates for switch, hub and router firmware annually. Becta 2006 FITS OM Patch Management 10
13 PM 3.3 Who does it? Technical support staff or third-party suppliers perform most of the activities in Patch Management. However, users can do some of the more routine updates. PM 3.4 How is it measured? There are several ways of measuring Patch Management: The amount of activity (number of patches and updates installed) the process produces The number of hours per week spent on the activity The number of requests for change the process generates Percentage success rate of applied patches Percentage of patches/updates that fail testing Number of patches applied compared to patches issued. It is worth noting the impact of not implementing Patch Management. If you do not use Patch Management, computers may become infected with viruses that spread over the network and seriously affect the reliability and security of all the school's ICT services. PM 4 Roles and responsibilities We have defined the principal roles and their associated responsibilities for Patch Management according to best practice. Schools may need to combine some roles, depending on size, organisational structure and any underlying service level agreements existing between technical support and the school. Role descriptions in the context of the Patch Management function are not job descriptions. Depending on the size and structure of your technical support team, one person may assume more than one role. However, good practice for function management dictates that although different people may be involved in performing activities, there should be only one owner per function. This means that one individual is always accountable for overall function performance and can intervene to make things happen when a function breaks down. PM 4.1 Patch administrator The patch administrator is the function owner with full responsibility for ensuring that Patch Management is performed correctly. In a school, it is likely that the patch administrator role will be shared with other FITS OM function and FITS process roles. As Patch Management works closely with FITS OM Security Administration and FITS Change Management and Release Management, you can combine some of the roles. The patch administrator must keep informed about the release of new updates, drivers, patches and firmware. This may take up considerable time unless the task can be automated (for instance, by notifications from vendors and manufacturers). Key tasks Ensure that all operating systems and software have up-to-date service packs and patches. Keep drivers up to date. Keep firmware on hardware up to date. Keep antivirus and antispyware definitions up to date. Produce Release Management build procedures for major updates to enable other technicians to carry out the updates. Check that installations of patches and updates are successful. Becta 2006 FITS OM Patch Management 11
14 PM 5 Patch Management assessment Below is a table that asks basic questions about Patch Management. If you can answer yes to them all, you are doing fine. If you are answering some of the questions with a no or sometimes, then the table recommends some actions for you to take. Question 1. Have you defined the scope and objectives of the Patch Management function? 2. Have you produced a full hardware and software inventory? 3. Have you a list of hardware and software manufacturers and the items they produce that you own? 4. Have you stored the latest copy of hardware and software updates in the definitive software library (DSL)? 5. Do you have a release plan for installing these updates? 6. Do you inform all staff about the Patch Management function and how it affects them? 7. Have you planned a pilot before implementing the function across the school? 8. Do you check whether updates were installed correctly? 9. Does the Patch Management function have an owner responsible for its day-to-day management and ongoing development? 10. Are those performing the Patch Management function aware of how to do so? 11. Are the end users of the Patch Management function aware of it and conforming to it? 12. Have you documented the activities in the Patch Management function? Recommended action Define the scope of the Patch Management function. Document all activities and allocate them to the technical support staff. If a full up-to-date CMDB or inventory of hardware and software does not exist, implement Configuration Management or perform a full audit. From the inventory, list the hardware manufacturers and software suppliers, plus each item they produce that you own. Make a note of how to obtain the latest update from each company (eg download or order CD). Make sure that the Release Management DSL is up to date with the latest drivers, firmware and updates. This will make updates easy to find in the future. Using Change Management and Release Management, prepare a schedule of when to install updates and create an associated build procedure for each release of changes. Inform staff about Patch Management, what is expected of them and how they are affected by any activities in this function. Prepare to implement a small-scale pilot before implementing this function throughout the school. Once you have installed some updates, check to see if they were indeed installed correctly. Establish a single point of ownership and accountability for the Patch Management function. You can charge this person with implementing the other recommendations in this report through a programme of continuous improvement. Others involved in the Patch Management function will then know whom to contact if they identify any deficiencies in the function. Give staff access to training material and provide experienced staff to help them learn the process. Run an improvement programme to increase function awareness. Mount an awareness campaign to make everyone aware of the tasks performed by the Patch Management function. Without documentation, the function is open to interpretation and will lack a consistent approach. Document the activities and make this documentation available to all staff performing them. The documentation can be used in training and as a reference point. Becta 2006 FITS OM Patch Management 12
15 PM Appendices PM Appendix A Spyware What is spyware? A new type of threat has recently emerged in the form of spyware. Spyware is unlike a virus in that it does not replicate itself to other computers, but it can cause problems with a computer s performance and send personal data back to an unknown source without the use s consent. Suppliers may bundle spyware with legitimate commercial software with the intention of collecting information for the supplier to use in further marketing or product improvements. However, any data collected and sent without the user s consent or knowledge is considered spying. What does spyware do? Spyware can hijack your browser by changing the start page and default search page with its own copy. This can mean that your browser can be further infected with other trojans and viruses or simply annoy you with changes you did not ask for. It is well known that spyware slows computers down by taking up processor time and hard disk space doing whatever it is designed to do. Spyware usually collects and sends back information about the user. This information can include personal details (name, address and so on) plus information about websites visited or, worse, private information such as passwords or credit card information. What can I do to protect against spyware? These days most antivirus companies either sell antispyware software as a separate product or build it into their main antivirus product. There are also many good quality free antispyware programs available. However, these tend to be designed for manual scanning and removal, and may not provide real-time protection. You can download the templates from the FITS OM website Becta 2006 FITS OM Patch Management 13
16 Appendix B Useful links Network administration advice and anecdotes Independent patch management mailing list Antivirus products Antivirus products Antivirus products Antivirus products Antivirus products Antivirus products Antivirus products Antivirus products You can download the templates from the FITS OM website Becta 2006 FITS OM Patch Management 14
TECHNICAL VULNERABILITY & PATCH MANAGEMENT
INFORMATION SECURITY POLICY TECHNICAL VULNERABILITY & PATCH MANAGEMENT ISO 27002 12.6.1 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-12.6.1 Version No: 1.1 Date: 1 st
Release Management. Release Management Contents. Key
Release Management Release Management Contents RM 1 Topic introduction Aim and objectives of this topic.........................1 RM 2 Overview An introduction to the process..................................1
What you need to know to keep your computer safe on the Internet
What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security
IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST
INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
Availability and Capacity Management
Availability and Capacity Availability and Capacity Contents ACM 1 Topic introduction Aim and objectives of this topic........................ 1 ACM 2 Overview An introduction to the process..................................
Managed Service Plans
Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely
GETTING STARTED WITH A COMPUTER SYSTEM FACTSHEET
FACTSHEET When setting up a small business there can be many areas of uncertainty, but getting your IT or computer systems right and connected does not need to be one of them. If your company is either
Patch Management Policy
Patch Management Policy L2-POL-12 Version No :1.0 Revision History REVISION DATE PREPARED BY APPROVED BY DESCRIPTION Original 1.0 2-Apr-2015 Process Owner Management Representative Initial Version No.:
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
AVeS Cloud Security powered by SYMANTEC TM
Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting
Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043
Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
Student Tech Security Training. ITS Security Office
Student Tech Security Training ITS Security Office ITS Security Office Total Security is an illusion security will always be slightly broken. Find strategies for living with it. Monitor our Network with
Karen Winter Service Manager Schools and Traded Services 01823 355267 [email protected]
Somerset Services to Education Providers 2014-2015 SOUTHWEST ONE TECHNOLOGY SERVICES Service Provider: Southwest One Service Category: Academy Schools - Chargeable Contact: Karen Winter Service Manager
Using WMI Scripts with BitDefender Client Security
Using WMI Scripts with BitDefender Client Security Whitepaper Copyright 2009 BitDefender; Table of Contents 1. Introduction... 3 2. Key Benefits... 4 3. Available WMI Script Templates... 5 4. Operation...
When you listen to the news, you hear about many different forms of computer infection(s). The most common are:
Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
What you can do prevent virus infections on your computer
What you can do prevent virus infections on your computer A computer virus is program code which 'hides' in other files and can cause irreparable damage to your computer. Computer viruses spread easily
Version: 2.0. Effective From: 28/11/2014
Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director
ICT OPERATING SYSTEM SECURITY CONTROLS POLICY
ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...
Business Internet Banking / Cash Management Fraud Prevention Best Practices
Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization
Computer Security Maintenance Information and Self-Check Activities
Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.
Business ebanking Fraud Prevention Best Practices
Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special
SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION
SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built
Airtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Information Technology Services
Information Technology Services 2011 Services Guide 77 Accord Park Drive, Suite A10 Norwell, MA 02061 (781) 871-3662 A proactive, preventative approach to IT management. System downtime, viruses, spyware,
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Network Configuration Management
Network Configuration Management Contents Abstract Best Practices for Configuration Management What is Configuration Management? FCAPS Configuration Management Operational Issues IT Infrastructure Library
Countermeasures against Spyware
(2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?
VSI Predict Able. We Focus on Your IT So You Can Focus on Your Business
VSI Predict Able We Focus on Your IT So You Can Focus on Your Business Agenda P Introduction to managed services P Thorough Initial Assessment and Asset Management P 24/7 Monitoring, Alerting and Reporting
Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
How to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.
Threat Protection Tools and Best Practices Objectives 1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders. 2. Threat Vectors Be familiar
Endpoint Protection Small Business Edition 2013?
Symantec Endpoint Protection Small Business Edition 2013 Customer FAQ FAQ: Endpoint Security What is Symantec Endpoint Protection Small Business Edition 2013? is a new solution that offers simple, fast,
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
Reducing the cost and complexity of endpoint management
IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and
Spyware Doctor Enterprise Technical Data Sheet
Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.
How to Install Windows 7 software
Connecting Windows 7 to the network This document outlines the procedure for setting up Windows 7 to use the College and University network. It assumes that the computer is set up and working correctly
always on meet the it department PROPHET managed services ebook Business Group Meet the Always On IT Department
managed services ebook Meet the Always On IT Department meet the always on it department PROPHET Business Group 1 MEET THE ALWAYS ON IT DEPARTMENT As IT gets more complicated it gets easier for the daily
Cyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
Northwestern University Dell Kace Patch Management
Northwestern University Dell Kace Patch Management Desktop Patch Management Best Practices Table of Contents: 1. Audience 2. Definition 3. Patch Approaches 4. Guidelines for Review, Test, and Deploy 5.
Imaging Computing Server User Guide
Imaging Computing Server User Guide PerkinElmer, Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44 (0) 24 7669 0091 E [email protected]
Microsoft Windows Intune: Cloud-based solution
Microsoft Windows Intune: Cloud-based solution So what exactly is Windows Intune? Windows Intune simplifies and helps businesses manage and secure PCs using Windows cloud services and Windows 7. Windows
Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software.
Mapping Your Path to the Cloud A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software. Table of Contents Why the Cloud? Mapping Your Path to the Cloud...4
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD
SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. PREMIER SUPPORT
Schools are strongly advised to choose one option from both categories i.e. 2 Contract Schedules in total.
Agreement reference: Schools IT Support Service (SITSS) Agreement period: 1 April 2015 31 March 2016 Overall Service to be provided Category 1. Technical Support a. Enhanced ICT technical support - a very
LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan
LAW OFFICE SECURITY for Small Firms and Sole Practitioners Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan 1. Introduction CONTENTS 2. Security Consciousness Having a Firm Security
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
STRONGER ONLINE SECURITY
STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
MONTHLY WEBSITE MAINTENANCE PACKAGES
MONTHLY WEBSITE MAINTENANCE PACKAGES The security and maintenance of your website is serious business, and what you don t know can certainly hurt you. A hacked or spamvertised site can wreak havoc on search
SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less
SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. SERVICES BRONZE
Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007
Fully Managed IT Support Proactive Maintenance Disaster Recovery Remote Support Service Desk Call Centre London Office ITVET Limited 2 nd Floor 145 157 St John Street London EC1V 4PY t: +44(0)8704 232
Infocomm Sec rity is incomplete without U Be aware,
Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN
INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. [email protected]
INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library [email protected] Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup
What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.
USER Manual Table of Contents Getting Started What is PC Matic?...4 System Requirements....4 Launching PC Matic.5 How to Purchase a PC Matic Subscription..6 Additional Installations. 6 Registration...6
IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS
IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICES Nortech Remote management IT security Services provide around clock remote Management, real time
ANDRA ZAHARIA MARCOM MANAGER
10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal
Security Consultant Scenario INFO 517-900 Term Project. Brad S. Brady. Drexel University
Security Consultant Scenario INFO 517-900 Term Project Drexel University Author Note This paper was prepared for INFO-517-900 taught by Dr. Scott White. Table of Contents ABSTRACT.1 THE INTERVIEW...2 THE
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE Originator Patch Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director
NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.
NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities
Charter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
Network Support Analyst Ref: 14-182 Salary circa 21,000-22,800 per annum 37 hours per week
Network Support Analyst Ref: 14-182 Salary circa 21,000-22,800 per annum 37 hours per week IT Services are looking to recruit a Network Support Analyst to be responsible for delivering professional first
Preparing Your Personal Computer to Connect to the VPN
Preparing Your Personal Computer to Connect to the VPN (Protecting Your Personal Computer Running Windows) Using the VPN to connect your computer to the campus network is the same as bringing your computer
Information Technology Solutions
Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
SOS Suite Installation Guide
SOS Suite Installation Guide rev. 8/31/2010 Contents Overview Upgrading from SOS 2009 and Older Pre-Installation Recommendations Network Installations System Requirements Preparing for Installation Installing
PC Security and Maintenance
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next
YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege: Guard the Gaps with Patch Management 1.0
Cyber Essentials Scheme
Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these
Schools ICT Support Service (SITSS) Service Level Agreement 2014/15
Schools ICT Support Service (SITSS) Service Level Agreement 2014/15 CONTENTS CONTENTS... 2 1 PRINCIPLES OF THE AREEMENT... 3 1.1 Service Desk... 4 1.2 Remote Support... 4 1.3 Training... 5 1.4 Procurement...
White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for
White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web
ScoMIS Encryption Service
Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend
Frequently Asked Questions
Frequently Asked Questions 1) What does SkyBest Internet Guardian do? Prevents e-mail and image spam from reaching your inbox Halts access to dangerous Web pages Stops Web sites from installing dangerous
Service Catalog. it s Managed Plan Service Catalog
Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is
PATCH MANAGEMENT POLICY PATCH MANAGEMENT POLICY. Page 1 of 5
Page 1 of 5 TABLE OF CONTENTS 1. OVERVIEW... 3 2. DEFINITIONS... 3 3. PURPOSE... 3 4. SCOPE... 3 5. POLICY... 4 6. WORKSTATIONS... 4 7. SERVERS... 4 8. ROLES AND RESPONSIBILITIES... 4 9. MONITORING AND
5 IT Hacks To Reduce IT Support Tickets
5 IT Hacks To Reduce IT Support Tickets Simple steps to reduce your dollar spend to keep your systems up and running. Gartner reports that a well managed computer can be 42% less epensive than an unmanaged
BSM for IT Governance, Risk and Compliance: NERC CIP
BSM for IT Governance, Risk and Compliance: NERC CIP Addressing NERC CIP Security Program Requirements SOLUTION WHITE PAPER Table of Contents INTRODUCTION...................................................
REQUEST FOR PROPOSAL-INFORMATION TECHNOLOGY SUPPORT SERVICES
Isothermal Planning & Development Commission (IPDC) REQUEST FOR PROPOSAL-INFORMATION TECHNOLOGY SUPPORT SERVICES Proposals will be received by the IPDC for Information Technology Support Services. Interested
White Paper - Crypto Virus. A guide to protecting your IT
White Paper - Crypto Virus A guide to protecting your IT Contents What is Crypto Virus?... 3 How to protect yourself from Crypto Virus?... 3 Antivirus or Managed Agents... 3 Enhanced Email Services & Extra
