Security Patches Management on a Windows Infrastructure
|
|
|
- Earl Simmons
- 10 years ago
- Views:
Transcription
1 Security Patches Management on a Windows Infrastructure Patrick Chambet Eric Larcher EdelWeb ON-X Group [email protected] Accor Services [email protected] EdelWeb
2 Objectives Analyze some of the impacts of recent worm attacks against corporate networks Deduce from that the necessity of a security patches management policy for every computer on the network Describe some useful tools for security patches management Present some policies for patch management on a corporate scale Conclude on the security patches future Page 2
3 Planning Objectives General points : when worms hit the heart of companies Patch management tools Example of a typical policy for patch management on a corporate scale Conclusion Page 3
4 General Points Intrusions have some root ;-) causes 1. A bad configuration of a system 2. A non fixed software vulnerability Fast propagating worms use mostly a software vulnerability to infect a system CodeRed, Nimda, Blaster, Formerly, only Internet exposed servers needed hotfixing Today, spreading worms force admins to update every workstation on the network as well as servers Page 4
5 Worms Evolution The exploitation of new vulnerabilities by some worms is faster and faster Faster and faster worm propagation Time elapsed between the release of a new 11 months vulnerability and its exploitation by a worm days 6 months 5 months 3 weeks Nimda SQL Slammer Welchia Blaster Nachi Propagation speed of the worm hours minutes 1 day Witty CodeRed SQL Nimda Slammer (IIS and (RPC bug) (ISS bug) MIME (SQL Server (RPC DCOM bugs) Resolution / WebDAV Service bug) bugs) Page 5
6 Things We ve Seen A relatively well secured enterprise with an antiviral policy is regularly infected by new virus and worms! Don t ask who ;-) A high skilled consultant from a well-known consulting firm infected the whole network of a big company in France with his laptop Don t ask either Page 6
7 Nightmare Scenario A worm penetrates the internal network of a company attachment, hostile Web server, USB key, laptop of a commercial person or an external worker, 1001 ways! It propagates to every workstation and internal server on not segmented internal networks It crashes some critical applications, randomly modifies some database contents and leaks some confidential information outside of the company The recovery is impossible until the corresponding patch has been rolled out on every computer, otherwise the re-infection is immediate Page 7
8 Statements Security patches management is essential on a corporate scale But the current approaches are not enough Manual Semi-automatic (Windows Update) Need for automation To facilitate the vulnerability and patch watch To be reactive to new threats To test patches before deployment To automate the roll-out Page 8
9 Typical Policy (1/2) WHO? Administrators only Users mustn t apply security patches WHAT? Updates from the vendor only (verification of the origin) Test and approval of the patches by the Administrator and rejection of useless or dangerous ones (in the context of the company) Automatic selection of necessary patches (among approved ones), according to the nature of the target computer Page 9
10 Typical Policy (2/2) WHEN? Automatically, with planning MS recommendations Critical patches within 24 hours, important patches within a month, moderate patches within 4 months and lowimportance patches during the next 12 months WHERE? On every computer, including mobile laptops (return to the office) From one or more central corporate server(s) (the closest) HOW? Automatic background installation Unique reboot, only if necessary Log events during and at the end of the operation Page 10
11 But Patches are not a Panacea I m using nicotine patches to try to quit smoking. Yesterday, I experienced so much withdrawal symptoms that I rolled my patch and smoked it Marc Jolivet, French humorist Page 11
12 Planning Objectives General points : when worms hit the heart of companies Patch management tools Example of a typical policy for patch management on a corporate scale Conclusion Page 12
13 Windows Security Patches HotFix Service Pack n Cumulative patch Security Rollup Package (SRP) Time Service Pack Service Pack n+1 Page 13
14 MBSA 1.2 Microsoft Baseline Security Analyzer Shavlik technology Free version Local or remote scans against Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 systems GUI (mbsa.exe) or command line (mbsacli.exe) tool Ex: to automate the tool set cname=%computername% set uname=%username% "C:\Program Files\MBSA\mbsacli.exe" /nvc /nosum /c %cname% /n IIS+OS+SQL+Password /o %cname% copy "%userprofile%\securityscans\%cname%.xml" "\\%cname%\c$\documents and Settings\%uname% \SecurityScans\ Replaces HFNetChk and MPSA Command line: mbsacli.exe -hf -? Page 14
15 MBSA 1.2 Supported products Windows NT 4.0, 2000, XP, 2003 IIS 4.0, 5.x, 6.0 SQL Server 7.0, 2000 IE Exchange Server 5.5, 2000, 2003 Windows Media Player 6.4+ Microsoft Office (local scans only) MDAC 2.5, 2.6, 2.7, and 2.8 Microsoft Virtual Machine BizTalk Server 2000, 2002, 2004 Commerce Server 2000, 2002 Content Management Server 2001, 2002 Host Integration Server 2000, 2004, and SNA Server 4.0 Page 15
16 MBSA 1.2 Operation (1/2) 1. Analyses the security configuration 2. Detects the most common security configuration errors File system Admin accounts Weak passwords Running services Shares Audit policy ICF configuration (local scan only) Etc. (see the file: Checks.csv) Page 16
17 MBSA 1.2 Operation (2/2) 3. Downloads an XML security reference From the Internet LinkId=18922 = fwlink/?linkid enhttp://download..microsoft. microsoft.com/ com/download/ download/xml/ xml/security/1.0/nt5/ security/1.0/nt5/enus/ us/mssecure.cab mssecure.cab (version 3.32) technet/security/ security/search/ search/mssecure. mssecure.xml shavlik.com/ com/mssecure.cab mssecure.cab (version 4.0) shavlik.com/ com/mssecure. mssecure.xml From an internal MSUS server (scans for approved updates) If MBSA cannot download mssecure.xml, it uses the local copy. So download Shavlik mssecure.xml and use it! (unsupported ) Analyses the update level against the reference Detects missing security patches and Service Packs Page 17
18 MBSA 1.2 Reference mssecure.xml Contains the security updates list since 1998 For each patch are provided Description Download path Path, version and checksum of files Registry keys Updated every time a new security update is released Contains a history of previous hot fixes superceded by cumulative patches or SP Page 18
19 MBSA 1.2 Requirements (1/2) XML parser (MSXML 3.0 with latest SP) IIS common files (on the local computer to scan remote computers) Ports TCP 80 TCP 139, 445 To download mssecure.xml file For remote computers scans The user that launches MBSA must be a local Administrator Page 19
20 MBSA 1.2 Requirements (2/2) Required services Computer being scanned locally Computer performing remote scans Workstation service Server service Workstation service Client for Microsoft Networks Computer being remotely scanned Server service Remote registry service File and Print Sharing Page 20
21 MBSA Limitations (1/2) Note messages displayed for patches that can t be confirmed Products that don t have detection More than one patch for a single product targeted at a particular OS (mssecure.xml schema limitation) DirectX 9.0 for Windows 2000 / XP / 2003 (MS03-030): Note MS Q Please refer to /support for a detailed explanation. Refer to the section on Note Messages. Sometimes can only check Registry keys to determine if a patch is installed MSXML for MS Ex: common Reg key for each Ntdll.dll version in MS03-007, but different file version and checksums When a non-security update overwrites files previously patched, MBSA reports the originally patched files as vulnerable Language of scanned computer determines if checksum checks are performed (/hf, /sum and /nosum options) Page 21
22 MBSA Limitations (2/2) Registry key Patch NOT Installed MS Q The registry key **SOFTWARE\Microsoft\Updates\Windows XP\SP2\KB821557\Type** does not exist. It is required for this patch to be considered installed. File checksum Patch NOT Installed MS Q File C:\Program Files\Common Files\Microsoft Shared\VBA\VBA6\vbe6.dll has an invalid checksum and its file version [ ] is equal to what is expected [ ]. File version Warning MS Q File C:\Program Files\Common Files\Microsoft Shared\TextConv\msconv97.dll has a file version [ ] greater than what is expected [ ]. Page 22
23 Scripting with MBSA 1.2 (1) Scripts for automating MBSA scans Enable large-scale scanning and enable low-rights end-users to check their own compliance without calling the helpdesk batchscan.js, rollup.js scripts Scan an unlimited number of computers or IP addresses from an input file Compiles the results into a single summary report that can be viewed in Internet Explorer More info script.mspx Page 23
24 Scripting with MBSA 1.2 (2) Sample of single summary report XML file open in Internet Explorer Page 24
25 QChain (1/2) Command line tool to manually install several updates and reboot the computer only once Directions for use splaylang=en&familyid=a85c9cfa-e84c c28f f5d Launch updates with the z option (no reboot) Launch qchain Reboot Unnecessary for Windows XP / 2003, that already includes a mechanism for simultaneous updates version management 6/8/61.asp Page 25
26 QChain (2/2) How to script patch off setlocal set PATHTOFIXES="C:\SUS\content\cabs" %PATHTOFIXES%\Q123456_WXP_sp1_x86.exe -z -m %PATHTOFIXES%\Q123321_WXP_sp1_x86.exe -z -m %PATHTOFIXES%\Q123789_WXP_sp1_x86.exe -z -m Etc %PATHTOFIXES%\qchain.exe result.log shutdown.exe t 60 -f Page 26
27 Windows Update (1/2) Online patch checking and updating tool Manual Automatic Automatic Updates Updates service Ideal for small-sized companies Automatic Updates client Service allowing an automatic and background update Requires the BITS service running (Background Intelligent Transfer Service) Verifies that every patch has been correctly installed Registry keys HKLM\SOFTWARE\Microsoft\Updates\Windows [VERSION ]\SP[X]\KBxxxxxx KBxxxxxx [VERSION]\SP[X]\ File list on the disk Version and checksum of every file Page 27
28 Windows Update (2/2) Updates notification (for Administrators only) Page 28
29 MSUS 1.0 SP1 Microsoft Software Update Service A component of Microsoft STPP program (Strategic Technology Protection Program) MSUS manages only Windows security updates But we can see sometimes some exceptions Does not manage applications (by now) Principle One or more internal servers host the security updates The administrator approves the necessary updates Users connect to one of the internal servers to download and launch approved updates Requires IIS on the internal servers Unlike WindowsUpdate, MSUS doesn t verify the serial numbers of the installed software ;-) Page 29
30 MSUS Internals Download of the security reference (XML files) cab Validation of the signature Comparison of the reference with the local database to determine the new updates Download of the new updates and verification of their signatures Update of the synchronization and approbation logs If the planned synchronization fails, SUS retries 3 times with a 30 min interval Page 30
31 MSUS Advanced Architecture Local Administrator Internet Validation Pull Primary MSUS server Replication Secondary MSUS server (ex: validation) Firewall Validation Administrator Pull Secondary MSUS server (ex: production) No update Page 31
32 Policy Elements with MSUS (1) WHO Computer Administrators only The «Automatic Updates» service runs with SYSTEM privileges Users cannot install updates WHAT Windows patches only Security updates Security Rollup Packages Windows critical updates Services Packs Microsoft updates only (signature verification by the SUS server) Updates in 31 languages Automatic selection of appropriate updates (among approved ones), depending on each computer (OS version, language, ) Page 32
33 Policy Elements with MSUS (2) WHEN Automatically (planning: specified time +/- random delay) At boot time if the specified time is exceeded WHERE On every computer HTTP pull from the specified SUS internal server HOW Test and approval of the updates by the Administrator Background transfers and bandwidth optimization (BITS) Automatic installation (background or not) Unique reboot, only if necessary (30% of the time) Synchronization and approbation logs (XML) Page 33
34 Internal Publication Offers multiple internal distribution points for Windows patches Up to clients per SUS server (according to Microsoft) Offers one or more approval and logging points Replication between internal SUS servers based on «Automatic Updates» and BITS services Use of the unused bandwidth Can be very long (sometimes several days!) About 550 Mo per managed language If the user is a local Administrator, he has the choice to apply the patches or not Page 34
35 Deployment MSUS client nloads/recommended/susclient/default.asp Already present in: Windows 2000 SP3 Windows XP SP1 Windows Server 2003 Replaces «Critical Update Notification» Cannot be uninstalled! Client and parameters deployment on workstations using GPOs or ADM files Page 35
36 Client Parameters Local GPO or WUAU.ADM installed in %WINDIR%\INF Registry key: HKLM\SOFTWARE\Policies\Microsoft \Windows\WindowsUpdate\AU SUS server address WUServer key Update schedule (day and time) ScheduledInstallDay key ScheduledInstallTime key Download and installation types AUOptions key Notify for download and / or notify for install Automatic reboot or not NoAutoRebootWithLoggedOnUsers key No automatic restart with logged-on users If the logged-on user is a local Admin, he has the choice Page 36
37 MSUS System Events Client side events can be collected Unable to connect Install ready no recurring schedule Install ready recurring schedule Install Success Install Failure Restart required no recurring schedule Restart required recurring schedule Page 37
38 Outgoing Permissions Sites to authorize for the primary SUS server Sites to forbid for other computers (servers and workstations) Page 38
39 Administration Web based administration Installs IISLockdown and URLScanner on the IIS server HTTPS / SSL administration is possible See Q Server synchronization Updates approbation Set options English and Japanese interfaces only Page 39
40 Approve Updates (1/2) Page 40
41 Approve Updates (2/2) Status New Approved Not approved Updated : new version of an update, just downloaded Temporary unavailable Meta-patching : patching of a patch Unavailable associated update Unfound dependency Note: an update that has already been applied and that is then labeled non approved will not be uninstalled by the AutoUpdate client Page 41
42 Multilingual Updates Mgt 31 languages supported Page 42
43 MSUS Logs (1/2) MSUS activity logs Client status logging (server side) Synchronization and approbation logs (XML format) Downloads and installations status on the statistics server (can be different from the main SUS server) Use of IIS logs to write events %WINDOWS%/system32/LogFiles/W3SVCx/exyy mmddhh.log Updates deployment statistics can be obtained by analyzing the logs (see after) Client side logs Installation success and failure %programfiles%\windowsupdate\v4\iuhist. xml %windir%\windows Update.log Page 43
44 MSUS Logs (2/2) The Automatic Updates client returns status on the following During Self-update: self-update pending After Self-update: self-update success/failure During Detection : initialization success/failure After Detection: detection success, detection failure After Download: download success/declined/failure After Installation: installation success/declined/failure Note: nevertheless, it is recommended to control the state of computers on the network after every update deployment MBSA scan (see before) MBSA log analysis to detect computers on which a patch hasn t been applied successfully Page 44
45 MSUS Log Analysis (1/2) The status entries in IIS logs are in the following format /wutrack.bin?u=<ping_id>&c=<client>&a=<act ivity>&i=<item>&d=<device>&p=<platform>&l= <language>&s=<status>&e=<error>&m=<message >&X=<proxy> Example :09: GET /wutrack.bin V=1&U=cebed56691e b908b01ddbbf7c& C=au&A=w&I=ie60x.internetexplorer6x.ver _platform_win32_nt.5.2.x86.en com_microsoft.q824145_ie_server2003.&d= &P=5.2.ece &L=enUS&S=f&E= &M=ctx%3D5&X= Industry+Update+ Control Page 45
46 MSUS Log Analysis (2/2) The status field indicates the status of the patch installation on the client Possible values are s Succeeded r Succeeded (reboot required) f Failed c Cancelled (by the user) d Declined (by the user) n No items (no update items were available for the client component) p Pending See SUS Statistics Report Page 46
47 Tips and Tricks (1/2) How to force an immediate update detection of the AutoUpdate Client Stop the "Automatic Updates" Service Check that the "AUState" registry value in the HKLM\Software\Microsoft\Windows\CurrentVersion\ WindowsUpdate\Auto Update\ key is set to 2 Delete the "LastWaitTimeout" registry value in the HKLM\Software\Microsoft\Windows\CurrentVersion\ WindowsUpdate\Auto Update\ key Start the "Automatic Updates" Service More scripting tools AUBehave.vbs : reads Automatic Update settings (in the Registry) Autoapproveupdates.vbs : Auto Approve SUS patches (by messing with MSUS dictionaries) SUS_Process_IIS6.vbs : SUS Log Reporting System (by analyzing IIS log files) Etc Etc Page 47
48 Tips and Tricks (2/2) How to automatically modify approved updates SUS stores its updates database in a dictionary object C:\InetPub\wwwroot\autoupdate\dictionar ies\approvedupdates.txt Each update has a record that looks like: com_microsoft.q311889_xp_5081,1@ 0@ 0@ T15:06:35 The first "1" after the description stands for the status of the update 0= unapproved, 1 = approved, 2 = new, etc So a simple search and replace on this field updates MSUS database with new status information, bypassing the manual process SUS Service will then read and update this file when it next does a synchronization with the Windows Update servers Page 48
49 Troubleshooting The same updates are endlessly re-applied on a computer Detection criteria are incorrect, or update installation fails, or the installation succeeds but one detection element isn t recorded See MS KB for detection criteria Some patches and related cumulative patches are installed one by one on a computer MSUS 1.0 doesn t manage cumulative patches. When you approve a cumulative patch, un-approve individual patches embedded in the cumulative patch Page 49
50 MSUS Integration with SMS (1) SMS SUS Feature Pack For SMS 2.0 and SMS 2003 Free Can deploy updates for every platform and application Tracks the status of the client installations Pushes mbsacli.exe to each client to perform local scan (mbsacli.exe /hf) Parses output Page 50
51 MSUS Integration with SMS (2) SMS SUS Feature Pack includes the following tools Security Update Inventory Tool Microsoft Office Inventory Tool for Updates Distribute Software Updates Wizard Web Report Add-ins for Software Updates Elevated-rights Deployment Tool But SMS is expensive For big companies Page 51
52 Patch improvements (1/2) SUS 2.0 = Windows Update Services (WUS), release in S (July?) Download of approved updates only Management of cumulative patches Uninstallation of un-approved patches Report generation Management of other Microsoft applications Unification of WindowsUpdate and OfficeUpdate into MicrosoftUpdate Release of non urgent security patches each month (second Tuesday of the month) Periodical test / roll-out cycles Individual updates that can be deployed together Page 52
53 Patch improvements (2/2) Installation methods reduced from 8 (now) to 2 MSI 3.0 UPDATE.EXE Reduction of updates size Today : reduction by 35% S : reduction by 80% delta patching technology, already working on WindowsUpdate, and improvements with MSI 3.0 Reduction of downtime Today : reduction by 10% of reboots with Windows 2000 / XP / 2003 S : reduction by 30% with Windows 2003 SP1 Up to 70% with the next Server, according to Microsoft Page 53
54 Planning Objectives General points : when worms hit the heart of companies Patch management tools Example of a typical policy for patch management on a corporate scale Conclusion Page 54
55 Policy Example (1/4) Accor Services Presence in more than 34 countries, from Chile to Australia More than 40 subsidiaries Most subsidiaries have rather independent Information Systems Our Goal: Patch Management in a Global Way Definition of a patch policy A central security team watching for new vulnerabilities and patches A new, centralized, information system being deployed worldwide An automated update system for standard computers ( Infrastructure servers and workstations) Page 55
56 Policy Example (2/4) Accor Services Patch Policy 1. A vulnerability is discovered, a new patch is released 2. Evaluation of the scope of the vulnerability and the associate risk for the Company 3. Patch tests on a standard test lab Windows IIS / ASP Exchange SQL Server Etc. Use of VMWare or Virtual PC Page 56
57 Policy Example (3/4) Accor Services Patch Policy (continued) 4. Internal advisory published and sent to all subsidiaries Information on the fixed flaw Exploits availability Vulnerability-specific scanners availability (ex.: eeye) Possible workarounds description Known side effects (detected during tests or reported in security newsletters) 5. Validation of the patch on the infrastructure test lab 6. Download and automated roll out on all PCs (except exceptions) 7. Automated download on all servers Remote manual installation of infrastructure servers Local manual installation for other servers Page 57
58 Policy Example (4/4) Auto download Manual install Internet Pull Central MSUS server (integration) Auto download Auto install Branch MSUS server Replication Firewall Validation Pull Branch MSUS server Security / production teams Auto download Manual install Page 58
59 Problems & Advices Installation problems on few PCs Some systems sometimes can t be patched (too old versions) Ex.: at first, no RPC (MS03-039) patch available for NT4 Workstation and NT4 Server SP5 Some workarounds were found Not always easy to detect patch installation problems MSUS logs show only patch executions, not patch failures MS or other vendors scanners not always very reliable To reduce risks and improve performance, need to schedule patch distribution by geographic areas Use of VMWare or Virtual PC instances for patch testing (reduced number of test computers) Updates installation for remote users They should use Windows Update Possible to quarantine un-patched PCs (MS or third party tools) Page 59
60 Conclusion (1/2) A security patches management policy is mandatory on a global scale for companies Tools exist for all kinds of company size Small size: automatic Windows Update Medium size: MSUS Big companies: MSUS or SMS + SUS Pack Page 60
61 Conclusion (2/2) Hardening software is essential, even when security patches are not applied (yet) Integration into the OS of protection technologies The default security configuration plays a crucial role => see Windows 2003 Personal Firewall (Windows XP / 2003) Memory protection against buffer overflows (Windows 2003) Future technologies at the OS level: TCP / NGSCB Page 61
62 Links (1/2) Patch management Microsoft Patch Management Essentials and mailing list Methodology /security/topics/patch/ White paper susdeployment.asp FAQ susfaq.asp MSUS: Main Page MSUS Overview = Useful articles and tools /Tools/ Page 62
63 Links (2/2) Automatic Updates configuration BITSAdmin tool: Q&A Microsoft Strategic Technology Protection Program MBSA Security Operations Guide for Windows 2000 Server windows2000serv/staysecure/ Page 63
64 Questions & Answers Page 64
KB303215 - Microsoft Network Security Hotfix Checker (Hfnetchk.exe) Tool Is Available
Page 1 of 8 Knowledge Base Microsoft Network Security Hotfix Checker (Hfnetchk.exe) Tool Is Available PSS ID Number: 303215 Article Last Modified on 3/2/2004 The information in this article applies to:
Implementing Security Update Management
Implementing Security Update Management Wayne Harris MCSE Senior Consultant Certified Security Solutions Business Case for Update Management When determining the potential financial impact of poor update
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO Copyright 2005 Shavlik Technologies. All rights reserved. No part of this document may be reproduced or retransmitted in
Securing Your Network Environment. Software Distribution & Patch Management
Securing Your Network Environment Software Distribution & Patch Management Ken Conrad Chief Strategist Microsoft Infrastructure Solutions Analysts International Overview Microsoft s s Patch Management
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Capture Link Server V1.00 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents
Using Microsoft s Free Security Tools Help Secure your Windows Systems taken from Web and Other Sources by Thomas Jerry Scott November, 2003
Using Microsoft s Free Security Tools Help Secure your Windows Systems taken from Web and Other Sources by Thomas Jerry Scott November, 2003 The following chart shows the name and download locations for
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DR V2.0 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents Table of Contents
NCIRC Security Tools NIAPC Submission Summary Microsoft Baseline Security Analyzer (MBSA)
NCIRC Security Tools NIAPC Submission Summary Microsoft Baseline Security Analyzer (MBSA) Document Reference: Security Tools Internal NIAPC Submission NIAPC Category: Operating System Security Management
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0 Page 1 of 9 Table of Contents Table of Contents... 2 Executive Summary...
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak CR V4.1 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents Table of Contents
Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)
Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main
Kaseya 2. User Guide. Version 7.0. English
Kaseya 2 Patch Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS
ALTIRIS Patch Management Solution 6.2 for Windows Help
ALTIRIS Patch Management Solution 6.2 for Windows Help Notice Altiris Patch Management Solution 6.2 2001-2006 Altiris, Inc. All rights reserved. Document Date: February 13, 2007 Protected by one or more
How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
Keeping Up To Date with Windows Server Update Services. Bob McCoy, CISSP, MCSE Technical Account Manager Microsoft Corporation
Keeping Up To Date with Windows Server Update Services Bob McCoy, CISSP, MCSE Technical Account Manager Microsoft Corporation Business Risk Is High Up to 95% of breaches exploit vulnerabilities for which
System Management. What are my options for deploying System Management on remote computers?
Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What
G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy
For Public Use G/On Basic Best Practice Reference Guide Version 6 Make Connectivity Easy 2006 Giritech A/S. 1 G/On Basic Best Practices Reference Guide v.6 Table of Contents Scope...3 G/On Server Platform
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Medical Image Manager (MIM) Version 6.1.
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Medical Image Manager (MIM) Version 6.1.1 Part Number 1G0119 Version 1.0 Eastman Kodak Company, Health Group
Medical Device Security Health Group Digital Output
Medical Device Security Health Group Digital Output Security Assessment Report for the Kodak Color Medical Imager 1000 (CMI-1000) Software Version 1.1 Part Number 1G0434 Revision 2.0 June 21, 2005 CMI-1000
Microsoft Software Update Services and Managed Symantec Anti-virus. Michael Satut TSS/Crown IT Support [email protected]
Microsoft Software Update Services and Managed Symantec Anti-virus Michael Satut TSS/Crown IT Support [email protected] Introduction The recent increase in virus and worm activity has created the
Providing Patch Management With N-central. Version 7.2
Providing Patch Management With N-central Version 7.2 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central
DCA Local Print Agent Push Install
DCA Local Print Agent Push Install PageTrac Support DCA Local Print Agent Push Install System Requirements Each workstation on which you install Local Print Agent must have the following: Windows operating
Patch Management Table of Contents:
Table of Contents: Manage Machines Manage Updates Patch Policy Configure Patch Parameters 153 Chapter 5 - Sadjadi et al. Introduction As new operating system and software updates are released in an ever
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
Providing Patch Management with N-central. Version 9.1
Providing Patch Management with N-central Version 9.1 Contents Patch Management 4 Introduction 4 Monitoring for Missing Patches 4 Setting up Patch Management in N-central 5 Adding a WSUS Server to N-central
Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com
CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise
Streamlining Patch Testing and Deployment
Streamlining Patch Testing and Deployment Using VMware GSX Server with LANDesk Management Suite to improve patch deployment speed and reliability Executive Summary As corporate IT departments work to keep
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
System Security Requirements
System Security Requirements Anti-Virus and Anti-Spyware software. Users are required to have antivirus and anti-spyware software installed on PCs that will be used for remote access to the CHS computer
Providing Patch Management With N-central. Version 7.1
Providing Patch Management With N-central Version 7.1 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central
RES ONE Automation 2015 Task Overview
RES ONE Automation 2015 Task Overview Task Overview RES ONE Automation 2015 Configuration Tasks The library Configuration contains Tasks that relate to the configuration of a computer, such as applying
LOCAL PRINT AGENT OVERVIEW
LOCAL PRINT AGENT OVERVIEW The Local Print Agent is used to collect information from local printing devices. The technology of the local device determines the information reported to the Local Print Agent
Chapter 1 Scenario 1: Acme Corporation
Chapter 1 Scenario 1: Acme Corporation In This Chapter Description of the Customer Environment page 18 Introduction to Deploying Pointsec PC page 20 Prepare for Deployment page 21 Install Pointsec PC page
Northwestern University Dell Kace Patch Management
Northwestern University Dell Kace Patch Management Desktop Patch Management Best Practices Table of Contents: 1. Audience 2. Definition 3. Patch Approaches 4. Guidelines for Review, Test, and Deploy 5.
KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual
KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/
Office 365 Windows Intune Administration Guide
Chapter 7 Office 365 Windows Intune Administration Guide Office 365 is a suite of technologies delivered as a Software as a Service (SaaS) offering. Office 365 reduces the IT costs for businesses of any
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...
Page 1 of 16 Security How to Configure Windows Firewall in a Small Business Environment using Group Policy Introduction This document explains how to configure the features of Windows Firewall on computers
Managed Service Plans
Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely
Patch Management Reference
www.novell.com/documentation Patch Management Reference ZENworks 11 SP4 November 2015 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
NetWrix USB Blocker. Version 3.6 Administrator Guide
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
Patch Management Policy
Patch Management Policy L2-POL-12 Version No :1.0 Revision History REVISION DATE PREPARED BY APPROVED BY DESCRIPTION Original 1.0 2-Apr-2015 Process Owner Management Representative Initial Version No.:
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Pearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
System Planning, Deployment, and Best Practices Guide
www.novell.com/documentation System Planning, Deployment, and Best Practices Guide ZENworks Application Virtualization 9.0 February 22, 2012 Legal Notices Novell, Inc., makes no representations or warranties
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities
Objectives After reading this chapter and completing the exercises, you will be able to: Describe vulnerabilities of Windows and Linux operating systems Identify specific vulnerabilities and explain ways
VMware vcenter Update Manager Administration Guide
VMware vcenter Update Manager Administration Guide Update 1 vcenter Update Manager 4.0 This document supports the version of each product listed and supports all subsequent versions until the document
Sygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
safend a w a v e s y s t e m s c o m p a n y
safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:
IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide
IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 59. Copyright
RL Solutions Hosting Service Level Agreement
RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The
Patch management with WinReporter and RemoteExec
White Paper Patch management with WinReporter and RemoteExec This white paper provides an overview on how to use WinReporter and RemoteExec in conjunction to keep Windows systems updated and immune to
Microsoft Baseline Security Analyzer (MBSA)
Microsoft Baseline Security Analyzer Microsoft Baseline Security Analyzer (MBSA) is a software tool released by Microsoft to determine security state by assessing missing security updates and lesssecure
ANTIVIRUS BEST PRACTICES
ANTIVIRUS BEST PRACTICES Antivirus Best Practices 1. Introduction This guideline covers the basics on Antivirus Software and its best practices. It will help to have an overall understanding of the subject
VMware vcenter Update Manager Administration Guide
VMware vcenter Update Manager Administration Guide vcenter Update Manager 4.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started
Getting started Symantec AntiVirus Corporate Edition Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 10223881 Symantec and the Symantec logo are U.S. registered trademarks
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Patch management with GFI LANguard and Microsoft WSUS
A cost-effective and easy solution for network-wide patch management This white paper provides an overview of how to use GFI LANguard and Microsoft Windows Software Update Services (WSUS) to keep your
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information
Getting started Symantec AntiVirus Business Pack Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 Symantec and the Symantec logo are U.S. registered trademarks of Symantec
Kaspersky Endpoint Security 10 for Windows. Deployment guide
Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses
Patch and Vulnerability Management Program
Patch and Vulnerability Management Program What is it? A security practice designed to proactively prevent the exploitation of IT vulnerabilities within an organization To reduce the time and money spent
GFI Product Manual. Version 6.0. Getting Started Guide
GFI Product Manual Version 6.0 Getting Started Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either
Net Protector Admin Console
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Patch Management Reference
Patch Management Reference ZENworks 11 www.novell.com/documentation Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically
User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
DriveLock Quick Start Guide
Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Nessus scanning on Windows Domain
Nessus scanning on Windows Domain A little inside information and Nessus can go a long way By Sunil Vakharia [email protected] Version 1.0 4 November 2003 About this paper This paper is not a tutorial
SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
START YOUR INVENTORY WITH SCANFRE
START YOUR INVENTORY WITH SCANFRE April 2014 LANDPARK SCANFREE «Quickly estimate your data processing systems before considering their evolution. Landpark Scanfree, solution for your IT asset tracking
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Information security guidelines
Information security guidelines BD Biosciences workstations 8/2014 This document includes the following topics: About this guide (page 2) Software policies (page 3) Virus protection setup and operation
1. Server 2008 - Microsoft FEP 2010 - Instalation
1. Server 2008 - Microsoft FEP 2010 - Instalation 1 2. Windows XP x86 (32bit) - Microsoft FEP 2010 Instalation 2 3 2.1. 4 System Requirements Microsoft Forefront Endpoint Protection 2010 1 System Requirements
Using Microsoft Baseline Security Analyzer 2.2 and Windows Update
Using Microsoft Baseline Security Analyzer 2.2 and Windows Update For HP Thin Clients running Microsoft Windows Embedded Standard 7 Table of contents Microsoft Baseline Security Analyzer 2.2... 2 Preface...
TIME TO LIVE ON THE NETWORK
TIME TO LIVE ON THE NETWORK Executive Summary This experiment tests to see how well commonly used computer platforms withstand Internet attacks in the wild. The experiment quantifies the amount of time
User Guide - English. ServerView Suite. DeskView and ServerView Integration Pack for Microsoft SCCM
User Guide - English ServerView Suite DeskView and ServerView Integration Pack for Microsoft SCCM Edition June 2010 Comments Suggestions Corrections The User Documentation Department would like to know
Disaster Recovery Planning BlackBerry Enterprise Server v4.0 for IBM Lotus Domino
Disaster Recovery Planning BlackBerry Enterprise Server v4.0 for IBM Lotus Domino About Disaster Recovery Disaster recovery is a broad term which can vary amongst different organizations Three main concepts
Installing and Trouble-Shooting SmartSystems
Installing and Trouble-Shooting SmartSystems Requirements: Processor: 2 GHz is recommended for optimum performance Memory/RAM: 2GB is required Disk space: 60MB is required for SmartSystems Server Operating
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
AVG 8.5 Anti-Virus Network Edition
AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective
How To Manage A Patch Management Program
Patch Management Best Practices What is Patch Management? Patch management is the practice of reviewing, understanding, testing, deploying and reconciling the deployment state for software product updates.
CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006
CSE331: Introduction to Networks and Security Lecture 17 Fall 2006 Announcements Project 2 is due next Weds. Homework 2 has been assigned: It's due on Monday, November 6th. CSE331 Fall 2004 2 Summary:
Chapter 4 Application, Data and Host Security
Chapter 4 Application, Data and Host Security 4.1 Application Security Chapter 4 Application Security Concepts Concepts include fuzzing, secure coding, cross-site scripting prevention, crosssite request
Managed Antivirus Quick Start Guide
Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
redcoal EmailSMS for MS Outlook and Lotus Notes
redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: [email protected] Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal
Release Notes P/N 300-003-623 REV A05
EMC NetWorker Module For Microsoft Exchange Server Release 5.0 Release Notes P/N 300-003-623 REV A05 April 8, 2008 These release notes contain supplemental information about EMC NetWorker Module for Microsoft
Hack Your SQL Server Database Before the Hackers Do
Note: This article was edited in Oct. 2013, from numerous Web Sources. TJS At the Install: The default install for SQL server makes it is as secure as it will ever be. DBAs and developers will eventually
