MICROSOFT WINDOWS SERVER UPDATE SERVICES(WSUS) REVIEW. Dominic White and Barry Irwin, Rhodes University.
|
|
|
- Rolf Carr
- 10 years ago
- Views:
Transcription
1 MICROSOFT WINDOWS SERVER UPDATE SERVICES(WSUS) REVIEW Dominic White and Barry Irwin, Rhodes University ABSTRACT On November 16th 2004, Microsoft announced the availability of the Windows Update Service (WUS) Beta. This was half a year later than Microsoft s originally planned release date. This is hardly surprising given the growth in focus and increasing number of patch management solutions over the last year. With the window from vulnerability announcement to exploit release rapidly diminishing, patching has become one of the essential tools on the front-line of the security battle ground. Many organisations have been making do with Microsoft s Software Update Service (SUS) for the last year with many more still looking for a patch management solution. SUS was seen as a quick-fix due to its limited nature, leaving more than one administrator with handfuls of hair due to lack of reporting, limited product support and lack of flexibility. It is hoped WSUS can address these issues. This paper will detail the experience with WSUS from installation to use. It will start with an abridged description of WSUS s installation and configuration, and move on to a tour of its abilities. This is contrasted against SUS to better detail WSUS improvements. The narrative then takes a turn for the technical, with the basic workings of WSUS explained, based on information gleaned from a live packet capture. The SOAP web service is dissected and found to have some security implications. The paper should provide an administrator with a glimpse of the inner workings of WSUS, and an overview of how it can fit into their organisation. This work was undertaken in the Distributed Multimedia Centre of Excellence at Rhodes University, with financial support from Telkom SA, Business Connexion, Comverse, Verso Technologies, THRIP, and the National Research Foundation. The financial assistance from the DAAD foundation is hereby acknowledged. KEY WORDS Windows Server Update Services, Microsoft, WSUS, WUS, SUS, Patch Management Original content in this work is licensed under a Creative Commons Attribution-ShareAlike 2.0 License
2 WINDOWS SERVER UPDATE SERVICES REVIEW 1 INTRODUCTION On November 16th 2004, Microsoft announced the availability of the Windows Update Service (WUS) Beta. This date came half a year after Microsoft originally planned to release the service[1]. Then four months later on March 22nd 2005, Microsoft announced a new release candidate (RC) and a name change, WUS was to be called WSUS (Windows Server Update Services), and on June 8th 2005, Microsoft released WSUS to manufacturing. Given the growth in focus and solutions for patch management over the last year, the delays and changes are hardly surprising. With the window from vulnerability announcement to exploit release rapidly diminishing, patching has become one of the essential tools on the front-line of the security battle field. Many organisations have been making do with Microsoft s Software Update Service (SUS) for the last year with many more still looking for a patch management solution. SUS was seen as a quick-fix due to its limited nature, leaving more than one administrator with handfuls of hair. Microsoft has provided Systems Management Server (SMS) for enterprise patch management and other administration, however the price is not always appropriate, particularly for small to medium enterprises. It is hoped WSUS can address these issues. This review will detail the experience with WSUS from installation to use. It will start with an abridged description of WSUS s installation and configuration and move onto a tour of its abilities. The narrative then takes a turn for the technical, with the basic workings of WSUS explained based on information gleaned from a live packet capture. The review is concluded with a list of useful WSUS resources. 2 WHAT S NEW WSUS introduces a number of new features over SUS, mostly due to the new back-end that Microsoft has implemented, WSUS uses the same back-end technology as Microsoft s Windows Update Service[2]. These new features are: Reporting Features. SUS provided no reporting at all, although the back-end implemented it. This lead to administrators having to rely on third party tools to derive what was going on in their organisation. WSUS provides a host of reporting features, partially fulfilling this much needed customer request. More Updates. In addition to operating system updates, WSUS now provides updates for Office XP and 2003, Exchange and SQL server. It still only provides support for Microsoft products and patches however. Update Filters. The administrative interface provides useful filter options to navigate the thousands of updates. Target Grouping. Machines can now be placed into different groups allowing different update approval options for each group. This is particularly useful for pushing patches to a test lab before large scale deployment. Improved Distribution. WSUS now allows express updates which use binary patching to push only those changes required (called deltas) rather than a whole file. It also supports an improved topology making distributing updates across the organisation easier. Finally, the download on demand feature can ensure that updates are only downloaded when necessary. Patch Options. WSUS now allows several new update approval options which enable WSUS to optionally check if a update is required, install the update or remove the update. WSUS also provides for automatic approval rules for specific updates and target groups. Improved Update Options. The new version of the BITS (Background Intelligent Transfer Service) includes new options which make installing updates on client machines less intrusive and disruptive.
3 New Back-end. WSUS now sports a new back-end finished off with a SQL database. With the option of either SQL server or the free Microsoft Desktop Engine (MSDE). Secure Server Replication. Updates and configurations can be replicated between servers. In addition SSL connections can be used in server to server and server to client connections. 3 INSTALLATION Installing WSUS is fairly straightforward. Microsoft have provided a good description of the process and its options in their WSUS deployment guide[3] along with a brief guide by WindowsSecurity.com[4]. Thus, this section will be fairly brief. 3.1 Topology Before an installation an administrator should be aware of the topologies WSUS affords. With the new grouping options and the ability to distribute WSUS servers, several different topologies are possible. There are four basic models which can then be combined to form fairly complex systems if necessary. There are three primary components used: Microsoft Update (MU), the WSUS server and the WSUS clients, called Automatic Update(AU) clients Default This is the normal way of doing things, with the WSUS server receiving its updates and meta-data from Microsoft Update (in a process called synchronisation) and passing it on to its AU clients. The meta-data contains extended information about the update, such as the licensing and description, and can be separated from the actual update. See figure 1. Figure 1: Default Topology Grouping WSUS s new grouping feature allows AU clients to be grouped separately. Each group can then have its own patch approval options. This is useful for testing, allowing patches to be pushed to a test lab before being pushed to the AU clients in a production group. A machine cannot be part of multiple groups, although this feature is often requested. The need for multiple groups is usually indicative of a poor topology and the additional complexities required to implement it is prohibitive. See figure Chaining As with SUS, WSUS allows for a WSUS server to synchronise from another WSUS server rather than Microsoft Update. This is useful for creating a distributed hierarchical environment. Microsoft recommends that the hierarchy be no more than three levels deep, though they have tested it with up to five levels[3]. With this model a downstream WSUS server will inherit the approval and transfer setting of the upstream WSUS server. Such a topology can also be used as a disconnected architecture where WSUS s
4 Figure 2: Grouped Topology import/export update feature allows for updates to be hand-carried via sneaker net 1 from a connected WSUS server to a disconnected one.see figure 3. Figure 3: Chained Topology Client Download It is not always practical to download updates to the WSUS server for distribution. This is particularly true in mobile environments where the AU clients proximity to the WSUS server is unknown. In such situations the WSUS server can be configured to store only update meta-data. This allows the WSUS server to retain control over update approval without needing to store or distribute the updates themselves. The AU clients can then download the approved updates from Microsoft Update.See figure 4. Figure 4: Client Download Topology 1 Manually delivering patches to each machine without a network.
5 3.2 Requirements WSUS requirements are fairly minimal and typical of the average server. The requirements are described in more detail in the WSUS Deployment Guide[3]. Microsoft recommends a 1GHz machine for less than 500 AU clients and a 2GHz machine for more than 500 AU clients. It should also have at least 1GB of RAM. WSUS requires either Windows Server 2003 or Windows 2000 Server with both requiring the.net framework version 1.1 SP1[5, 6], BITS 2.0[7, 8] and IIS 6.0 and Windows 2000 Server requiring IE 6.0 SP 1[9]. Both should have 30GB of an NTFS file system free for updates and 2GB free for MSDE. Microsoft recommends using SQL Server over MSDE with more than 500 AU clients. MSDE for Windows Server 2003 (now named Windows SQL Server 2000 Desktop Engine or WMSDE) is distributed with the WSUS installer however Windows 2000 Server users will have to download it[10]. WSUS will only install to a Windows 2000 or 2003 Server with the.net framework version 1.1 SP1[5, 6] and IIS 6. Server installation is facilitated by a wizard, which will allow for an upstream WSUS server to be configured, instead of connecting to Microsoft Update. After a successful installation the WSUS administrative interface can be found at where [port] will only be used if WSUS was not installed to the default site, in which case the port will be The automatic updates client has the same requirements as SUS and will only work on Windows 2000 with Service Pack 3 or later, Windows XP and Windows WSUS uses the automatic update (AU) client s self-update feature (present in SUS) to install the new AU client on each machine. However, this won t work on Windows XP machines without service packs installed, as it requires the SUS upgrade[11]. The client is first upgraded from the cab files found in \SELFUPDATE directory of the web server. Once upgraded it installs the new Windows Installer 3.1, BITS 2.0 and WinHTTP 5.1 which are needed to support the new configuration options WSUS affords. Windows XP SP2 already has an updated automatic updates client but will still self-update to the latest version. A more technical description of this process can be found later in this document. 4 CONFIGURATION WSUS configuration is similar to SUS configuration. The behaviour of the WSUS server is controlled through the WSUS administrative interface while the behaviour of the AU clients is handled through group policy or the registry. This section provides a brief introduction to the various configuration settings available. Once again this is documented in greater detail in the WSUS deployment guide[3], with additional information available in the currently more complete SUS deploy guide[12]. 4.1 Server Server configuration is done via the WSUS administration page. Some options are shared with SUS and will not be covered in detail. The WSUS server can be configured to synchronise with either Microsoft Update or another WSUS server, as discussed above. This requires information such as the server and proxy details and a schedule for how often the WSUS server should synchronise. The syntax for entering an upstream server is http: //servername[:port], with [:port] only used if the WSUS server is not using port 80. WSUS now supports updates for Office, Exchange and SQL Server, as compared to SUS which had far fewer updates. Microsoft hopes to expand this to all of their products, and are looking into methods for securely distributing third party updates while maintaining the distribution security of signed updates[13]. Until then WSUS is not a complete patch management solution. This requires that the products, for which WSUS should distribute updates, be selected by adjusting the settings for which products, languages, and
6 class of update e.g. critical updates, security updates, service packs should be managed. Given the much increased number of updates there is an option to automatically approve certain classes of updates. WSUS provides two methods for grouping computers. The first is server side targeting. This allows an administrator to manually place machines that have contacted the WSUS server into chosen groups. The second, more powerful, option allows the clients themselves to advertise to be put in a certain group. This setting is then controlled on the client either through group policy or registry settings. In both cases an administrator needs to create the group on the server. The new distribution options afforded by WSUS allows for bandwidth consideration to be better accounted for. Deferred updates allow meta-data to be downloaded separately from the update files. This allows approvals to be disseminated and the update is only downloaded if required by an AU client connected to the WSUS sever (or a downstream WSUS server). The express installation is uses Microsoft s binary delta compression (BDC)[14] similar to FreeBSD s FREEBSD-UPDATE binary patching[15]. It allows for deltas to be sent to the AU clients. These deltas only contain information that should be changed within selected files rather than a replacement for the entire file. This can often yield large bandwidth savings by reducing patch sizes, particularly for security patches that usually only require a small change. Express installation does incur a cost in the form of a large initial download from to the WSUS server, as a delta for each possible version of the files needs to be distributed. 4.2 Client Side The new background intelligent transfer service (BITS v2.0) and automatic update client allow for several new configuration options on the client side. The addition of these options appears to be Microsoft s response to the criticism of the limited options previous versions provided. In particular the fewer restarts and greater configurability should make the process more pleasant for the desktop user. These options can be modified in several ways; active directory group policy, local group policy or registry settings. These configuration methods are referred to as administrative policies, which are distinct from the user s configuration. A few of the options are common to SUS, therefore the focus will be on the changes and new options. Modifying these via group policy can be done by opening the group policy editor and navigating to Computer Configuration/Administrative Templates/Windows Components/Windows Update, after loading the windows update administrative template, WUAU.ADM (this will automatically be upgraded if done previously with SUS). Modifying the settings via the registry requires that the key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate[\AU] be edited. There are new options related to how update notification are displayed. These notification can occur either before downloading and installation, just before installation, or not at all. The first option prevents the automatic update client s user-interface from being locked when administrative policies are used to configure the client. This allows a local administrator to choose their own notification settings. The next allows for non-administrators to be included in the group of users allowed to receive update notifications. With the introduction of grouping, client-side targeting is a method where an AU client will advertise which group it should be a member of, allowing clients to self-populate groups. Thus there is an option to specify which group the AU client should request membership of. WSUS now takes more advantage of the agent on the AU clients and utilises a periodic check where an AU client will connect and allow the WSUS server to interrogate its patch status. This option is specified in hours. The AU client will connect between the specified time and a random negative 20% offset. Thus if the option is 10 hours the AU client will connect every 8 to 10 hours (as 10 hours - 20% is 8 hours) and this will vary randomly. A separation has been made between updates that require a restart and those than don t. Non-restarting updates can be installed immediately without notifying the relevant user, if the user is configured to receive installation notifications. This allows the administrator to automatically install updates that don t require a restart without disturbing the desktop user unless an update requires a restart. This should reduce disruptions to the end user.
7 In the case of scheduled installations two new options have been provided. One allows a delay to be inserted before continuing with a scheduled restart, and the other allows the amount of time before the user is re-prompted for a scheduled restart to be specified. Minor, but occasionally useful changes. The option to remove links and access to Windows Update was available in SUS, but is often overlooked and is therefore mentioned here. This will remove the link to Windows Update in the start menu and will prevent non-approved updates being installed from Windows Update. This setting can be found in the group policy editor at Computer Configuration/Administrative Templates/Start Menu and Taskbar. In addition to administrative policies, the update client can be manipulated via the command line. This is done by running wuauclt.exe with command line switches. The two switches are: /resetauthorization which will delete the client side cookie, which normally expires after an hour, and contains information such as the target group (more information on this can be found in section 7); and /detectnow which will force the AU client to connect to the WSUS server and check for new approvals. When these switches are used together they must be used in the order they were mentioned i.e. wuauclt.exe /resetauthorization /detectnow. This is particularly useful for debugging machines and forcing an update. 5 PATCHING The process of patching machines is done is six steps: synchronisation, approval, detection, distribution, installation and verification. This section will look at each step, and how WSUS supports it. 5.1 Synchronisation During synchronisation meta-data is downloaded from a central distribution point, in this case Microsoft Update, and disseminated to other WSUS servers and AU clients. This process can also download the updates to the server allowing AU clients to fetch them locally, if WSUS has been configured to do so. WSUS uses BITS to transfer the meta-data and updates in the background and supports resuming the process if it is interrupted. The progress of a synchronisation is displayed on the front page of the WSUS administrative interface. 5.2 Approval WSUS allows three types of approval to be applied to each update: detect only, install and remove. Currently no updates support the remove option, but will in the future as it is a function of the new Windows Installer. The update s approvals can apply to all machines or one group. A group can also inherit its approvals from the global configuration. The interface is far easier to use that SUS allowing updates to be filtered by product, classification, approval, date received and by a text based search. The filtered updates can then be sorted by column. 5.3 Detection Periodically an AU client will connect to the server and provide a list of platform details, installed updates, hardware and drivers. This is then used by the WSUS server to display which updates are needed by the AU client and which have been successfully installed. This is particularly useful for determining the patch status of an organisation. The frequency with which an AU client connects to the WSUS server is configured on the client (see section 4.2). This is where the AU client synchronises meta-data with its WSUS server. 5.4 Distribution Updates are distributed over HTTP using the background intelligent transfer service (BITS), which supports resuming of interrupted downloads and dynamic throttling of downloads to use spare bandwidth. Updates
8 can either be downloaded from a local WSUS server or Microsoft Update depending on the topology (see section 3.1). Distribution has been made more flexible with the introduction of download on demand, where updates are only downloaded to the server when needed, and express updates, which make use of binary patching (see section 4.1). 5.5 Installation Many of the patching improvements in WSUS are due to the new Windows Installer version 3. Microsoft has converged several patching methods in previous versions of Windows Installer into two installerroutines which are supported by the new installer[16]. This demonstrates a maturation of the format. The new MSI packages will also support uninstallation of updates[16], hence the new remove approval setting. In addition these packages will require less restarts and will support binary patching[16], hence the introduction of express updates. Other powerful switches have been added and more details can be found from Microsoft[17]. 5.6 Verification An important part of any patch management solution is the ability to verify that the patch was actually installed. In WSUS this is achieved through the same interface used for detection. The AU clients check in twice, once after downloading and installing updates and again after a machine restart in which the update installation is completed. During this check in the AU client return information on the status and progress of the update s installation, which after the restart, should be completed. 6 REPORTING The single largest problem with SUS was its complete lack of reporting. WSUS offers four reports officially labelled as such. Namely: 1. Status of Updates 2. Status of Computers 3. Synchronisation Results 4. Settings Summary The two most useful are a breakdown of updates or computers which allows an administrator to drill down to see statistics for groups and individual AU clients or updates.. These reports can be filtered by approval and groups, and can then be sorted by each column. This is not the only reporting in WSUS as many other screens provide reporting features, such as the computer and update screens. On the back-end all of the information is stored in a SQL database, allowing ad-hoc queries to be address through third party tools (such as Microsoft Systems Management Console). This is a great improvement over SUS and should satisfy most users, however the inflexibility of the reporting may frustrate some administrators seeking to generate specific reports. 7 PACKET CAPTURE To get a better look at how WSUS does its work, Ethereal 2 was used to perform a packet capture of the communications between an AU client and the WSUS server. This revealed several improvements over SUS. Further, it demonstrated the working of WSUS which have not been published in much detail as yet. No study was done of the interaction between an upstream WSUS server and a downstream one, but this may be done as future work. The testing here was performed on a variety of WUS and WSUS pre-releases and so some of the bugs mentioned may have been resolved. 2
9 7.1 Steps Performed The relevant tasks performed during the packet capture were: 1. A new Windows XP SP1a AU client is joined to the active directory domain. 2. AU client self-updated. 3. The new AU client installs the Windows Installer and BITS updates, required a restart. 4. Logged in with some automatic update activity. The logged in administrator was not informed, although the icon appeared briefly. A restart was required. 5. Logged in and 24 new updates were downloaded. 6. Updates were installed, restart was required. 7. WSUS server synchronised with Microsoft Update. 8. wuauclt.exe /detectnow was run from command line on the AU client. 9. One critical update detected, downloaded and installed. 10. The same critical update was detected, downloaded and installed multiple times until approval was revoked on WSUS server. 7.2 Resulting Network Traffic By comparing the resulting packet capture to the steps performed above, the interactions between the WSUS server and the AU client was discovered. Below is a chronological list of recorded HTTP request traffic between the WSUS server and AU client, and its analysis. Step 1 (from the above section 7.1) Step 2 /IUIDENT.CAB - This stands for Industry Update Identification and is how the client s version is identified. This.cab file along with the rest below was time-stamped by Verisign and signed by Microsoft. If this were the first communication of a machine with a WSUS AU client rather than a SUS AU client (e.g. Windows XP with SP2) then these first three steps are not seen and the traffic would start with a call to WUIDENT.CAB. Once it is determined that this is a SUS client, the self-update from step 2 is performed. The client is instructed to download the relevant.cab files (starting with WACOMP.CAB which contain version information for the individual client files) of the new automatic update client. In this client configuration the files were stored in /SELFUPDATE/AU/X86/XP/EN/ on the IIS server. /WUTRACK.BIN - After the self update the client requests WUTRACK.BIN with a parametrised query string. With SUS, the request of WUTRACK.BIN was used for reporting and statistics on the patch process. The parameters provide information on aspects of the clients behaviour, including platform, activity and the KB of the patch being installed (more information can be found on page 83 of the SUS deploy guide[12]). This method is how third party SUS reporting tools were developed (e.g. K. Hoover s[18] or D. White s [19]). With WSUS the item and activity parameters are not used but platform information is provided. This was the only request to WUTRACK.BIN seen in the whole capture and appears to be left for backwards compatibility. /WUIDENT.CAB - This stands for Windows Update Identification and contains AU client version information. This request includes a datestamp as a parameter. /WUSETUP.CAB - This contains an.inf and.cat file which contain setup information, such as dll version and registration information, for the new automatic update client. This request also includes a datestamp as a parameter.
10 Step 3 Step 4 From here the new automatic update client communicated with the WSUS sever using a SOAP based web service. The format used to describe the SOAP method calls is: [returned information] MethodName (passed information) [config] GetConfig [auth cookie] GetAuthCookie [cookie] GetCookie (encrypted(auth cookie)) After this the returned cookie is encrypted and sent as the preamble to all future transactions. This cookie will contain information such as the target group of the AU client and expires after an hour. RegisterComputer (a SOAP XML file is passed with the full platform information) The full platform information consisted of a description of installed hardware, the operating system version and build and some information on additional software. Some of this information may be considered sensitive. [required update ID s] SyncUpdates (system information, e.g. platform information, installed updates and drivers)... This is how the WSUS server knows what updates are needed on the client. This method is be called several times. The first time it is called the client sends empty update ID parameters. The last time it is called it contains strings of hardware drivers installed on the client, which coupled with the platform information in this call and the previous gives an almost complete picture of both the hardware and software the machine is running. [metadata] GetExtendedUpdateInfo (update meta-data) This includes information such as the EULA and description of each update. [confirmation] ReportEventBatch (meta-data and sync updates status) Information about the status of the client registration is returned. The client passes a large XML file to the server here detailing the status of the updates and once again providing platform information. The first batch of updates is then downloaded as per point 3 above. In this case it is the Windows Installer 3.1 and BITS 2.0 updates. Once installed these will allow the full WSUS functionality to be used. Files are downloaded from subdirectories of the /CONTENT/ virtual directory in chunks, presumably to allow resuming of downloads if the process is interrupted. [confirmation] ReportEventBatch (update download status) Information about the status of the download of the patches. This is sent before the update is installed, but after it is downloaded. According to the WSUS deploy guide, the AU client should request meta-data from the WSUS server again after downloading but before installation[3]. This is to ensure that approvals revoked during the download are not ignored. However there were no separate requests representing this, but it is presumed it would occur here. [confirmation] ReportEventBatch (update installation status) Before the client restarts and after the updates have been installed another report is made. A separate report is made for each installed update.
11 Step 5 After a restart the behaviour seen in point 4 is seen. No notification was received by the logged on administrator, this conflicted with how group policy had been configured. It was assumed that updates for immediate install were being installed as that option had been activated (see section 4.2). However a restart was required, which should not happen if this activity was as a result of immediate updates, as they do not require a restart. This could be due to a misconfigured update, the AU client ignoring group policy settings or an undetected misconfiguration, but it could not be determined at the time. It resulted in the following use of the web service: [confirmation] ReportEventBatch (update installation status) This is a report on the, now complete, installation of the updates installed before the reboot. [location of update file] GetFileLocations (update ID s and file digests) The updates are then downloaded. Once again the AU client should check that none of the approvals for the downloaded updates have been revoked during the download. It is presumed that this check would be part of the GetFileLocations method. The machine is then restarted and 24 updates are available, after which these calls are made: Step 6 and 7 Step 8 [confirmation] ReportEventBatch (update installation progress)... This is presumed to be reporting on the status of the installation of updates from the previous point. [update location] GetFileLocations (update ID s and file digests) The updates are then downloaded and installed. [confirmation] ReportEventBatch (update installation progress) The machine is then restarted during which time the WSUS server synchronised with Microsoft Update. Another call to ReportEventBatch is made to report the successful installation of the updates. Running wuauclt /detectnow resulted in: /WUIDENT.CAB /WUSETUP.CAB These request are made with a datestamp as a parameter. [required update ID s] SyncUpdates (system information, e.g. platform information, installed updates and drivers)... [metadata] GetExtendedUpdateInfo (update meta-data) One update is then downloaded and installed. [confirmation] ReportEventBatch (update installation progress) These are the items of interest. Partial packet captures are available from this site rucus.net/masters/files/wsus-packetcapture.tar.gz for further analysis, and a large more complete capture is available on request.
12 7.3 Analysis From the information above, a pattern of behaviour can be mapped. This pattern was inferred from the behaviour of three different machines performing several updates. When the AU client first contacts the WSUS server it makes two requests, each with a datestamp as a parameter. The files are returned time-stamped and signed. 1. wuident.cab 2. wusetup.cab After this all future interactions (apart from BITS downloading the updates) are done via a web service. After which if the AU client does not have a cookie or its cookie has expired the following handshake is made with the WSUS server: 1. GetConfig 2. GetAuthCookie 3. GetCookie 4. RegisterComputer If the AU client still has a valid cookie, the above does not occur. The cookie is then prepended to all future transactions. If the WSUS server has synchronised with an upstream server since the AU client s last synchronisation, a new synchronisation is performed. This looks like: 1. SyncUpdates 2. GetExtendedUpdateInfo 3. ReportEventBatch 4. Updates are downloaded. If the AU client does not need to synchronise but has pending updates, a call is made to: 1. GetFileLocations 2. Updates are downloaded. A reporting call is made after every action, and would be made after an update sync, update download and update installation. After the updates are downloaded the call is made: 1. ReportEventBatch After the installation of the updates another report is made: 1. ReportEventBatch If a restart is required to install any of the updates, another call is made after the machine has rebooted and, presumably, installed the updates. 1. ReportEventBatch 7.4 Packet Capture Summary Interface On the whole WSUS seems to be better designed. It utilises an open SOAP based web service, keeps track of each interaction and provides far more information on the patching process. SUS on the other hand, required third party log analysers to interpret an obscure query string. The use of a standard web service should make it easier for third party extensions to be created. The large amount of information generated should allow for many different reporting options beyond what WSUS currently offers.
13 7.4.2 Security There are two security worries here, the first is disclosure of sensitive information and the second is interference with the patch process. The downside of the extra information mentioned above is that a lot of information about client machines is being sent as clear-text, this information includes a list of hardware, installed drivers and some software being used. There is enough information to allow an attacker to build a replica system to test attacks on. This is a worry, but it can be mitigated by good network design. The second worry is less troublesome as a man in the middle attack (which the cookie exchange may be vulnerable to) would not be able to circumvent the security of the signed patches. 8 RESOURCES There are several fairly useful resources for WSUS available. Several were quite useful while writing this document. 1. Microsoft s WSUS page[20] 2. The WSUS Wiki[21] 3. SUS Server[22] 4. Patch Management Mailing List[23] 9 CONCLUSION WSUS is definitely a large step in the right direction. It has many great improvements over SUS, which seem to indicate that Microsoft is listening to the consumer and responding to their community security needs. The interface is easy to use and provides some great functionality. The extra features provided on the client-side are equally welcome. Microsoft has developed a good architecture from which their patching strategy can be better managed and built upon. The use of an open SOAP web service allows for extensibility and thought has been put into keeping patch distribution secure. There are some problems with the amount of plain text system information that WSUS makes available on the network which may provide valuable insight to an attacker. However, the most notable problem is that WSUS still only supports a limited range of Microsoft s products and is sorely lacking support for third party updates. Given the number of vulnerabilities in popular products such as Winamp, Adobe Acrobat and Winzip, WSUS does not provide a complete patch management solution. Some of these problems are resolved in Microsoft s Systems Management Server (SMS) and others in third part products available from third party vendors. References [1] M. J. Foley. (2004, July) Microsoft delays by a year delivery of two new patching systems. Microsoft- Watch. [Online]. Available: [2] (2005) Microsoft windows update. Microsoft. [Online]. Available: [3] Windows update services deployment white paper, White Paper, Microsoft, Tech. Rep., November [Online]. Available: [4] A. Zinman. (2004, November) Windows update services review. WindowsSecurity.com. [Online]. Available: [5] (2004, March) Microsoft.net framework version 1.1 redistributable package. Microsoft. [Online]. Available: [6] (2004, August) Microsoft.net framework 1.1 service pack 1 for windows server Microsoft. [Online]. Available:
14 [7] (2004, November) Microsoft windows update services bits 2.0 beta for windows 2000 server. Microsoft. [Online]. Available: betaeulawin2k.mspx [8] (2004, November) Microsoft windows update services bits 2.0 beta for windows server Microsoft. [Online]. Available: betaeulawin2003.mspx [9] (2002, September) Download internet explorer 6 service pack 1. Microsoft. [Online]. Available: [10] (2004, December) Microsoft sql server 2000 desktop engine (msde 2000) release a. Microsoft. [Online]. Available: [11] (2002, June) Automatic updates june Microsoft. [Online]. Available: fwlink/?linkid=22338 [12] Software update services deployment white paper, White Paper, Microsoft, Tech. Rep. [Online]. Available: [13] M. Semilof. (2004, March) Microsoft taking steps to integrate wus with windows. TechTarget. [Online]. Available: [14] Microsoft, Binary delta compression, Tech. Rep., mar [Online]. Available: microsoft.com/downloads/details.aspx?familyid= c-d60a-%497c-ae89-101a3754bad6 [15] C. Percival, An automated binary security update system for freebsd, Master s thesis, Computing Lab, Oxford University, Oxford, [Online]. Available: net/freebsd-update/binup.html [16] P. Thurrott. (2004, April) What you need to know about windows update services. WindowsITPro. [Online]. Available: [17] Microsoft. (2005, March) Description of the new features in the package installer for windows software updates. kb Microsoft. [18] K. Hoover. (2004, June) Ken s sus scripts. [Online]. Available: kjh27/ sus-scripts.html [19] D. White. (2004, December) Sus reporting tools. [Online]. Available: [20] (2005) Microsoft windows update service home. Microsoft Inc. [Online]. Available: http: // [21] M. A. Khaleel. (2005) Windows server update services wiki. [Online]. Available: http: //wsus.editme.com/ [22] S. Korman. (2005) Susserver.com. [Online]. Available: [23] J. Chan. (2005) Patch management mailing list. Shavlik Technologies, LLC. [Online]. Available:
Microsoft Windows Server Update Services Questions & Answers About The Product
Microsoft Windows Server Update Services Questions & Answers About The Product General Information Q. What is Windows Server Update Services (WSUS)? A. WSUS (previously called Windows Update Services)
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO Copyright 2005 Shavlik Technologies. All rights reserved. No part of this document may be reproduced or retransmitted in
Windows Server Update Services 3.0 SP2 Operations Guide
Windows Server Update Services 3.0 SP2 Operations Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide describes how to manage Windows Server Update Services 3.0
Hands-On Lab: WSUS. Lab Manual Expediting WSUS Service for XP Embedded OS
Lab Manual Expediting WSUS Service for XP Embedded OS Summary In this lab, you will learn how to deploy the security update to your XP Pro or XP embedded images. You will also learn how to prepare the
Windows Server Update Services 3.0 SP2 Deployment Guide
Windows Server Update Services 3.0 SP2 Deployment Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide describes how to deploy Windows Server Update Services 3.0
Providing Patch Management With N-central. Version 7.2
Providing Patch Management With N-central Version 7.2 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central
Print Audit 6 Network Installation Guide
Print Audit 6 Network Installation Guide IMPORTANT: READ THIS BEFORE PERFORMING A PRINT AUDIT 6 INSTALLATION Print Audit 6 is a desktop application that you must install on every computer where you want
Deploying Software Updates Using Windows Server Update Services
Deploying Software Updates Using Windows Server Update Services Learning Objectives Overview Prerequisites For more information Scenario After completing this lab, you will have learned: How to configure
Windows Server Update Services 3.0 SP2 Step By Step Guide
Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server
TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION
TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy
Providing Patch Management with N-central. Version 9.1
Providing Patch Management with N-central Version 9.1 Contents Patch Management 4 Introduction 4 Monitoring for Missing Patches 4 Setting up Patch Management in N-central 5 Adding a WSUS Server to N-central
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
Providing Patch Management With N-central. Version 7.1
Providing Patch Management With N-central Version 7.1 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central
Managing Software Updates with System Center 2012 R2 Configuration Manager
Managing Software Updates with System Center 2012 R2 Configuration Manager Managing Microsoft Updates with Configuration Manager 2012 R2 This document is for informational purposes only. MICROSOFT MAKES
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
Northwestern University Dell Kace Patch Management
Northwestern University Dell Kace Patch Management Desktop Patch Management Best Practices Table of Contents: 1. Audience 2. Definition 3. Patch Approaches 4. Guidelines for Review, Test, and Deploy 5.
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...
Page 1 of 16 Security How to Configure Windows Firewall in a Small Business Environment using Group Policy Introduction This document explains how to configure the features of Windows Firewall on computers
Keeping Up To Date with Windows Server Update Services. Bob McCoy, CISSP, MCSE Technical Account Manager Microsoft Corporation
Keeping Up To Date with Windows Server Update Services Bob McCoy, CISSP, MCSE Technical Account Manager Microsoft Corporation Business Risk Is High Up to 95% of breaches exploit vulnerabilities for which
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for
MATCH IT! Antibody v1.2 Software Installation
MATCH IT! Antibody v1.2 Software Installation Table of Contents 1.0 Table of Contents... 1 2.0 Revisions... 2 3.0 Installation Checklist... 3 4.0 Prerequisites... 4 5.0 Database Configuration Options...
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
Pearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15
Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required
RSA Authentication Agent 7.1 for Microsoft Windows Installation and Administration Guide
RSA Authentication Agent 7.1 for Microsoft Windows Installation and Administration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com
StruxureWare Power Monitoring 7.0.1
StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions
HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE
HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
Patch management with GFI LANguard and Microsoft WSUS
A cost-effective and easy solution for network-wide patch management This white paper provides an overview of how to use GFI LANguard and Microsoft Windows Software Update Services (WSUS) to keep your
OneStop Reporting 3.7 Installation Guide. Updated: 2013-01-31
OneStop Reporting 3.7 Installation Guide Updated: 2013-01-31 Copyright OneStop Reporting AS www.onestopreporting.com Table of Contents System Requirements... 1 Obtaining the Software... 2 Obtaining Your
Installation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
Administrators Help Manual
Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service
Education Software Installer 2011
Education Software Installer 2011 Windows operating systems System administrator s guide Trademark notice SMART Notebook, SMART Document Camera, SMART Response, SMART Sync, SMART Classroom Suite, Senteo,
Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.
Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information
Patch Management Table of Contents:
Table of Contents: Manage Machines Manage Updates Patch Policy Configure Patch Parameters 153 Chapter 5 - Sadjadi et al. Introduction As new operating system and software updates are released in an ever
Silect Software s MP Author
Silect MP Author for Microsoft System Center Operations Manager Silect Software s MP Author User Guide September 2, 2015 Disclaimer The information in this document is furnished for informational use only,
DameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
Using RPC over HTTP with Exchange Server 2003 SP1
Using RPC over HTTP with Exchange Server 2003 SP1 Author: Bill Boswell Bill Boswell Consulting, Inc. www.billboswellconsulting.com [email protected] RCP over HTTP has a lot of moving parts
Patch management and security. updates SIMATIC. Process Control System PCS 7 Patch management and security updates. Preface 1
Patch management and security updates SIMATIC Preface 1 Patch management and security updates 2 Practical information 3 Process Control System PCS 7 Patch management and security updates Commissioning
User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation
System Management. What are my options for deploying System Management on remote computers?
Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What
System Center Configuration Manager
System Center Configuration Manager Software Update Management Guide Friday, 26 February 2010 Version 1.0.0.0 Baseline Prepared by Microsoft Copyright This document and/or software ( this Content ) has
RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide
RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com
XMap 7 Administration Guide. Last updated on 12/13/2009
XMap 7 Administration Guide Last updated on 12/13/2009 Contact DeLorme Professional Sales for support: 1-800-293-2389 Page 2 Table of Contents XMAP 7 ADMINISTRATION GUIDE... 1 INTRODUCTION... 5 DEPLOYING
Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3
Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior
How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (
GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
Installation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
7.x Upgrade Instructions. 2015 Software Pursuits, Inc.
7.x Upgrade Instructions 2015 Table of Contents INTRODUCTION...2 SYSTEM REQUIREMENTS FOR SURESYNC 7...2 CONSIDERATIONS BEFORE UPGRADING...3 TERMINOLOGY CHANGES... 4 Relation Renamed to Job... 4 SPIAgent
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For
Management Center. Installation and Upgrade Guide. Version 8 FR4
Management Center Installation and Upgrade Guide Version 8 FR4 APPSENSE MANAGEMENT CENTER INSTALLATION AND UPGRADE GUIDE ii AppSense Limited, 2012 All rights reserved. part of this document may be produced
Server Installation Manual 4.4.1
Server Installation Manual 4.4.1 1. Product Information Product: BackupAgent Server Version: 4.4.1 2. Introduction BackupAgent Server has several features. The application is a web application and offers:
STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
Web Filter. SurfControl Web Filter 5.0 Installation Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company
Web Filter SurfControl Web Filter 5.0 Installation Guide www.surfcontrol.com The World s #1 Web & E-mail Filtering Company NOTICES NOTICES Copyright 2005 SurfControl plc. All rights reserved. No part
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
InventoryControl for use with QuoteWerks Quick Start Guide
InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY
Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012.
Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012. Copyright 1995-2012 Lenel Systems International, Inc. Information
SCCM 2012. How to guide deploying SCCM Client, setting up SUP and SCEP. Hans Chr. Andersen
SCCM 2012 How to guide deploying SCCM Client, setting up SUP and SCEP Hans Chr. Andersen Contents What is Configuration Manager?... 2 Deploying SCCM Client... 3 Client push Installation... 3 SUP Installation...
Installing and Administering VMware vsphere Update Manager
Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document
Quick Start Guide for Parallels Virtuozzo
PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current
How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
BlackBerry Enterprise Server Express for Microsoft Exchange Version: 5.0 Service Pack: 1. Installation and Configuration Guide
BlackBerry Enterprise Server Express for Microsoft Exchange Version: 5.0 Service Pack: 1 Installation and Configuration Guide Published: 2010-03-17 SWD-984521-0317024918-001 Contents 1 Overview: BlackBerry
Server Installation Guide ZENworks Patch Management 6.4 SP2
Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch
Deploying System Center 2012 R2 Configuration Manager
Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
BlackBerry Enterprise Server Express for Microsoft Exchange. Version: 5.0 Service Pack: 4. Upgrade Guide
BlackBerry Enterprise Server Express for Microsoft Exchange Version: 5.0 Service Pack: 4 Upgrade Guide Published: 2013-02-21 SWD-20130221113643226 Contents 1 Overview: BlackBerry Enterprise Server Express...
Administrator s Guide
Attachment Save for Exchange Administrator s Guide document version 1.8 MAPILab, December 2015 Table of contents Intro... 3 1. Product Overview... 4 2. Product Architecture and Basic Concepts... 4 3. System
Administrator s Guide
MAPILab Disclaimers for Exchange Administrator s Guide document version 1.8 MAPILab, December 2015 Table of contents Intro... 3 1. Product Overview... 4 2. Product Architecture and Basic Concepts... 4
ilaw Installation Procedure
ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing
Installation and Administration Guide
Installation and Administration Guide BlackBerry Enterprise Transporter for BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-11-06 SWD-20141106165936643 Contents What is BES12?... 6 Key features
Richmond Systems. SupportDesk Quick Start Guide
Richmond Systems SupportDesk Quick Start Guide Table of Contents SupportDesk Quick Start Guide...1 Introduction...1 Pre-requisites...2 Installation at a Glance...2 Installation...3 Setup Console...13
TANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
AVG 8.5 Anti-Virus Network Edition
AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective
Ad Hoc Transfer Plug-in for Outlook Installation Guide
IPSWITCH TECHNICAL BRIEF Ad Hoc Transfer Plug-in for Outlook Installation Guide In This Document Installing the Ad Hoc Transfer Plug-in for Outlook...1 Silent Install for Ad Hoc Transfer Plug-in for Outlook...3
Inmagic Content Server Workgroup Configuration Technical Guidelines
Inmagic Content Server Workgroup Configuration Technical Guidelines 6/2005 Page 1 of 12 Inmagic Content Server Workgroup Configuration Technical Guidelines Last Updated: June, 2005 Inmagic, Inc. All rights
VMware vcenter Update Manager Administration Guide
VMware vcenter Update Manager Administration Guide Update 1 vcenter Update Manager 4.0 This document supports the version of each product listed and supports all subsequent versions until the document
VMware Software Manager - Download Service User's Guide
VMware Software Manager - Download Service User's Guide VMware Software Manager 1.1 This document supports the version of each product listed and supports all subsequent versions until the document is
SOLARWINDS ORION. Patch Manager Evaluation Guide
SOLARWINDS ORION Patch Manager Evaluation Guide About SolarWinds SolarWinds, Inc. develops and markets an array of network management, monitoring, and discovery tools to meet the diverse requirements of
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
BackupAssist v6 quickstart guide
New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet
Novell ZENworks 10 Configuration Management SP3
AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties
BlackBerry Enterprise Server Version: 5.0. Upgrade Planning Guide
BlackBerry Enterprise Server Version: 5.0 Upgrade Planning Guide SWDT577232-577232-0327090551-001 Contents 1 Overview: BlackBerry Enterprise Server... 3 2 Upgrading a BlackBerry Enterprise Server environment...
Diamond II v2.3 Service Pack 4 Installation Manual
Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance
How to move a SharePoint Server 2007 32-bit environment to a 64-bit environment on Windows Server 2008.
1 How to move a SharePoint Server 2007 32-bit environment to a 64-bit environment on Windows Server 2008. By & Steve Smith, MVP SharePoint Server, MCT Penny Coventry, MVP SharePoint Server, MCT Combined
Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2
Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2 Last revised: November 12, 2014 Table of Contents Table of Contents... 2 I. Introduction... 4 A. ASP.NET Website... 4 B.
BillQuick Agent 2010 Getting Started Guide
Time Billing and Project Management Software Built With Your Industry Knowledge BillQuick Agent 2010 Getting Started Guide BQE Software, Inc. 2601 Airport Drive Suite 380 Torrance CA 90505 Support: (310)
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
SYSTEM REQUIREMENTS...
Contents INTRODUCTION... 1 BillQuick HR Setup Checklist... 2 SYSTEM REQUIREMENTS... 3 HARDWARE REQUIREMENTS... 3 SOFTWARE REQUIREMENTS... 3 Operating System Requirements... 3 Other System Requirements...
Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11
2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information
friendlyway composer network services server
HelpAndManual_illegal_keygen friendlyway composer network services server User manual Contents I Contents Welcome 1 Why composer network services? 2 Support 3 Introduction 4... 4 Getting started with
BitDefender Security for Exchange
Quick Start Guide Copyright 2011 BitDefender 1. About This Guide This guide will help you install and get started with BitDefender Security for Exchange. For detailed instructions, please refer to the
Portions of this product were created using LEADTOOLS 1991-2010 LEAD Technologies, Inc. ALL RIGHTS RESERVED.
Installation Guide Lenel OnGuard 2010 Installation Guide, product version 6.4. This guide is item number DOC-110, revision 1.045, May 2010 Copyright 1995-2010 Lenel Systems International, Inc. Information
Introduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
SOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012
SOLARWINDS ORION Patch Manager Evaluation Guide for ConfigMgr 2012 About SolarWinds SolarWinds, Inc. develops and markets an array of network management, monitoring, and discovery tools to meet the diverse
DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO
DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO Contents Overview...1 System requirements...1 Enterprise Server:...1 Client PCs:...1 Section 1: Before installing...1 Section 2: Download
Best Practices for Implementing Autodesk Vault
AUTODESK VAULT WHITE PAPER Best Practices for Implementing Autodesk Vault Introduction This document guides you through the best practices for implementing Autodesk Vault software. This document covers
