Patch Management Marvin Christensen /CIAC
|
|
|
- Esmond Wilkerson
- 10 years ago
- Views:
Transcription
1 Patch Management Marvin Christensen /CIAC US DOE Cyber Security Group 2004 Training Conference May 26, 2004 Management Track 11:00 am 11:45 pm UCRL-CONF CIAC This work was performed under the auspices of the U.S. Department of Energy by University of California Lawrence Livermore National Laboratory under contract No. W-7405-Eng-48.
2 This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the University of California nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or the University of California, and shall not be used for advertising or product endorsement purposes.
3 Agenda Why patches What is patch management Phases of a patch management tool Microsoft s approach Unix vendors 3 rd party patch management vendors SafePatch
4 Why Patches Fix flaws in software programs Correct program logic Add features and capability Handle exceptions and error conditions Close security and authentication problems Quick and easy way to update signatures Aliases Also known as updates Other disciplines refer to them as recalls
5 Who Distributes Patch OS Vendors Microsoft, SUN, Red Hat, Apple, etc. Servers Web, SMTP, FTP, Database, BIND, etc, Applications Adobe, , browsers, printers, etc. Networking Cisco, Firewall, routers, etc. Security Tools IDS, Anti-virus, proxy servers, etc.
6 Dec-03 Feb-04 Apr CIAC Bulletins Issued Publications vs Revisions Revisions Initial Publications Aug-01 Oct-01 Dec-01 Feb-02 Apr-02 Jun-02 Aug-02 Oct-02 Dec-02 Feb-03 Apr-03 Jun-03 Aug-03 Oct-03 Jun-01 Apr-01 Feb-01 Dec-00 Oct-00
7 Bulletins by Vendor/Category Publications by Vendor Microsoft Redhat Debian Sun Apache Other Feb-01 Apr-01 Jun-01 Aug-01 Oct-01 Dec-01 Feb-02 Apr-02 Jun-02 Aug-02 Oct-02 Dec-02 Feb-03 Apr-03 Jun-03 Aug-03 Oct-03 Dec-03 Feb-04 Apr-04 Dec-00 Oct-00
8 How Much Time Do I Have
9 Things to Consider Agent or Agent-less Will client software be permitted? Coverage / Scalability Are all platforms included? Are business critical systems included? Timely How quick can patches be deployed? Can emergency patches be immediately installed? Cost What is the initial cost to purchase and deploy? What are the ongoing maintenance costs?
10 Benefits of Patch Management Reduction in manual effort to update software Central reporting and administration Reduction in time that systems are vulnerable
11 Requirements for Successful Patch Management The following are required for any organization to deploy a successful patch management and control software updates: Effective operations, including people who understand their roles and responsibilities Tools and technologies that are most appropriate for effective patch management Effective project management processes
12 Four Phases to Patch Management
13 Phase 1: Interrogate Microsoft calls it Assess Typically requires a client agent w/privileges Conduct software inventory and determine what you have Hardware type and version Software application/product Version Patch level Security policy
14 Phase 2: Identify Determine what software update are available and identify those that you want to install Must trust the source of information Vendor site Download tool Does the patch actually fix the problem? Verify the integrity of software updates for installation
15 Phase 3: Evaluation Determine what software updates are relevant What is the level of threat Verify system is vulnerable Determine resource criticality Interdependencies on security and non-security patches Build patches, if necessary, for each platform Verify that patches can be installed safely
16 Phase 4: Deploy Determine how best to distribute and install patches Available disk space Network bandwidth Expertise of user base Business critical systems Distribute software patches to systems Install software patch Consider roll-back capabilities Need sufficient privileges and permissions Allocate sufficient time to install System/Application restart for changes to take effect
17 Phase 5: Problems Computers offline Insufficient disk space Insufficient permissions Exclusion for known systems Negative impact on other applications Ability to handle special cases
18 Microsoft s Patch Management Strategy Microsoft Baseline Security Analyzer (MBSA) Windows Update Software Update Service (SUS) SUS Feature Pack for SMS 2.0 Note, all tools rely on Microsoft s Security Patch Bulletin Catalog (mssecure.xml) Zvpebfbsg znxrf vg qvssvphyg gb hfr gurve cngpu qngnonfr orpnhfr gurl xrrc punatvat sbezngf.
19 Microsoft Baseline Security Analyzer (MBSA) MBSA is a superset of the HFNetChk (Hotfix Network Check) technology Supports security updates and service packs Provides an easy-to-use interface and additional command line capabilities Ability to scan multiple systems Does not deploy and install patches Can be integrated with SUS Tools available for checking misconfigured system settings
20 Windows Update Comes with 2000 and XP Can be configured to auto install Complete package including installation Typically user initiated
21
22
23
24
25 Software Update Service (SUS) Downloads patches from Microsoft and stores locally Uses MS Windows Update client Allows Administrative control over published patches No domain restrictions Free from MS
26 System Management Server (SMS) Advanced Microsoft s patch manager Complete patch management package Determines patch status Distributes patches Installs patches Generates reports Allows administrative control of all patches Supports security patches and service packs
27 Sun Microsystems Sun's standard patch management tool Solaris Patch Manager Base PatchPro Analysis Engine Installed on the client host Inventories system and current patch level Obtains patch database from SUN Supporting infrastructure that resides at Sun Patch knowledge database Host analysis modules Digitally signed patches Processes to ensure that the components work together
28 RedHat Red Hat Network Clients request updates from RedHat Server Client profiles are stored on RedHat Server RedHat Network Satellite Server Clients connect locally Internet access is not required Client profiles are stored locally Access control to only authorized systems
29 3 rd Party Patchers PatchLink -- HFNetChkPro -- Update Expert -- BigFix Patch Manager Ecora Patch Manager Patch Management -- Patch Management --
30 SafePatch Info Created in 1996 Deployed in DOE, DoD, DOJ In 2000, Received Government Technology Leadership Award
31 SafePatch SafePatch determines what patches need to be installed and checks the checksums of your system files and ensures that they are authentic and up-to-date: provides automated analysis, distribution, notification, and installation of security patches.
32 SafePatch SafePatch Unix v1.2.2 Released 10/10/2002 Solaris ( ) Red Hat Linux ( ) SafePatch Windows v1.0 Released 07/09/2003 Windows 2000
33 SafePatch Unix Architecture
34 SafePatch Windows Architecture
35 SafePatch s Future SafePatch was one of the first patch management solutions. Maintenance costs continue to increase 1. Increase funding to support SafePatch 2. Technology transfer to commercial vendor 3. Make source code available to other government agency (i.e., OSTI)
36 Conclusion Patch Management is a process, not just a tool Vendors are assuming more responsibility for maintaining software Vendor and non-vendor solutions are becoming available Cost is a major criteria for DOE sites One-size does not fit all Progress is being made at many DOE/NNSA sites DOE/NNSA sites are still looking for a better solution
37 Resources/References Microsoft Windows Server 2003 Security Management, by Jan De Clercq A Patchwork Quilt, by David W. Tschanz, Patch Work Gets Harder, By Cameron Sturdevant,
A Systems Approach to HVAC Contractor Security
LLNL-JRNL-653695 A Systems Approach to HVAC Contractor Security K. M. Masica April 24, 2014 A Systems Approach to HVAC Contractor Security Disclaimer This document was prepared as an account of work sponsored
Securing Your Network Environment. Software Distribution & Patch Management
Securing Your Network Environment Software Distribution & Patch Management Ken Conrad Chief Strategist Microsoft Infrastructure Solutions Analysts International Overview Microsoft s s Patch Management
Patch Management for Red Hat Enterprise Linux. User s Guide
Patch Management for Red Hat Enterprise Linux User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003,
WinMagic Encryption Software Installation and Configuration
WinMagic Encryption Software Installation and Configuration Don Mendonsa, Faranak Nekoogar, Harry Martz Lawrence Livermore National Laboratory Livermore, CA 94551 Work performed on the Science & Technology
Product comparison. GFI LanGuard 2014 vs. Microsoft Windows Server Update Services 3.0 SP2
Product comparison GFI LanGuard 2014 vs. Microsoft Windows Server Update Services 3.0 SP2 General features GFI LanGuard 2014 Microsoft WSUS 3.0 SP2 Scheduled scans Agent-less r Agent-based Integration
Product comparison. GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release)
Product comparison GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release) GFI LanGuard 2014 Windows Intune General features Scheduled scans Agent-less r Agent-based Integration with Active
IBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
LESSON 6.3. 98-365 Windows Server Administration Fundamentals. Understand Updates
Understand Updates Lesson Overview In this lesson, you will learn about: Update management Microsoft Baseline Security Analyzer (MBSA) Windows Server Update Services Anticipatory Set What is the Windows
THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005
THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005 13 DECEMBER 2005 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
IBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
NCIRC Security Tools NIAPC Submission Summary Microsoft Baseline Security Analyzer (MBSA)
NCIRC Security Tools NIAPC Submission Summary Microsoft Baseline Security Analyzer (MBSA) Document Reference: Security Tools Internal NIAPC Submission NIAPC Category: Operating System Security Management
Patch and Vulnerability Management Program
Patch and Vulnerability Management Program What is it? A security practice designed to proactively prevent the exploitation of IT vulnerabilities within an organization To reduce the time and money spent
Cisco Security Agent (CSA) Network Admission Control (NAC)
Cisco Security Agent (CSA) Network Admission Control (NAC) Pascal Delprat Security Consultant Cisco France Vincent Bieri Marketing Manager, Security EMEA Technology Marketing Organisation 1 Agenda CSA
Red Hat Enterprise Linux and management bundle for HP BladeSystem TM
HP and Red Hat are announcing a specially priced software bundle for customers deploying Red Hat Linux on HP BladeSystem servers. HP will offer Red Hat Enterprise Linux and management bundle that combines
HP Server Automation Enterprise Edition
HP Server Automation Enterprise Edition Software Version: 10.0 User Guide: Server Patching Document Release Date: June 13, 2013 Software Release Date: June 2013 Legal Notices Warranty The only warranties
IBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
Building CHAOS: an Operating System for Livermore Linux Clusters
UCRL-ID-151968 Building CHAOS: an Operating System for Livermore Linux Clusters Jim E. Garlick Chris M. Dunlap February 21, 2002 Approved for public release; further dissemination unlimited DISCLAIMER
Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems
PNNL-19266 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems SV Singh AI Thronas January
Kaspersky Endpoint Security 10 for Windows. Deployment guide
Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses
Installing and Administering VMware vsphere Update Manager
Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Patch Management for Windows. User s Guide
Patch Management for Windows User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003, 2011. US Government
Deep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
Network Defense Specialist. Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems
Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems Page 1 of 12 Course Description The Network Defense Series from EC-Council Press is comprised of 5 books
Lenovo Partner Pack for System Center Operations Manager
Lenovo Partner Pack for System Center Operations Manager Lenovo Enterprise Product Group Version 1.0 December 2013 2013 Lenovo. All rights reserved. Legal Disclaimers: First paragraph is required. Trademark
SapphireIMS 4.0 Asset Management Feature Specification
SapphireIMS 4.0 Asset Management Feature Specification v1.4 All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission
Patch Management SoftwareTechnical Specs
Patch Management SoftwareTechnical Specs 1. Scalable: a. The PMS (Patch Management Software)must be scalable(can grow as network grows). b. The PMSmust be able to support more than 10k nodes from a single
Nimsoft Monitor Compatibility Matrix October 17, 2013
Nimsoft Monitor Compatibility Matrix October 17, 2013 1 Nimsoft Monitor Compatibility Matrix Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided
Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
Five ways to simplify the vulnerability management lifecycle. Scott Sidel, CISSP, CEH, ETC May 2005
Five ways to simplify the vulnerability management lifecycle Scott Sidel, CISSP, CEH, ETC May 2005 Why do we patch? No system is perfect. Vulnerabilities ship out-of-the-box Threats on the wire Even while
IBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
Configuring Apple Mail for Mac OS X (Mountain Lion)
Configuring Apple Mail for Mac OS X (Mountain Lion) This document assumes that you already have Apple Mail installed on your computer and you are ready to configure Apple Mail. Table of Contents Configuring
GFI Product Comparison. GFI LanGuard 2011 vs Microsoft Baseline Security Analyzer 2.2
GFI Product Comparison GFI LanGuard 2011 vs Microsoft Baseline Security Analyzer 2.2 General features GFI LanGuard 2011 MBSA 2.2 Scheduled scans r Agent-less Agent-based Integration with Active Directory
60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li
60467 Project 1 Net Vulnerabilities scans and attacks Chun Li Hardware used: Desktop PC: Windows Vista service pack Service Pack 2 v113 Intel Core 2 Duo 3GHz CPU, 4GB Ram, D-Link DWA-552 XtremeN Desktop
Deep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison
Deep Security Intrusion Detection & Prevention (IDS/IPS) Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security. The document also outlines a comparison
HP Universal CMDB. Software Version: 10.20. Support Matrix
HP Universal CMDB Software Version: 10.20 Support Matrix Document Release Date: January 2015 Software Release Date: January 2015 Legal Notices Warranty The only warranties for HP products and services
Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide
Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide The software described in this book is furnished
RES ONE Automation 2015 Task Overview
RES ONE Automation 2015 Task Overview Task Overview RES ONE Automation 2015 Configuration Tasks The library Configuration contains Tasks that relate to the configuration of a computer, such as applying
BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture
BladeLogic Software-as-a- Service (SaaS) Solution Help reduce operating cost, improve security compliance, strengthen cybersecurity posture February 20, 2014 Contents The Configuration Security Compliance
Citadel Security Software Inc.
i Citadel Security Software Inc. Hercules Vulnerability Assessment and Remediation Overview Document Number: 205-01-0007 Hercules v3.5.1 Document Version: 1.0 February 2005 Acknowledgements THIS SOFTWARE
User Guidance. CimTrak Integrity & Compliance Suite 2.0.6.19
CimTrak Integrity & Compliance Suite 2.0.6.19 Master Repository Management Console File System Agent Network Device Agent Command Line Utility Ping Utility Proxy Utility FTP Repository Interface User Guidance
Evaluation Guide. Evaluator s Guide to Get the Maximum Benefit Out of a GFI LanGuard Trial
Evaluation Guide Evaluator s Guide to Get the Maximum Benefit Out of a GFI LanGuard Trial The information and content in this document is provided for informational purposes only and is provided "as is"
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as
ZENworks Patch Management. Doc Hodges Opportunity Response Team Novell, Inc.
ZENworks Patch Management Doc Hodges Opportunity Response Team Novell, Inc. Are you prepared for business continuity threats? Unstable, malfunctioning systems resulting from attacks by viruses, worms and
Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1
Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite
Requirements for Upgrading from MetaLib 3.13 to MetaLib 4. Version 4
Requirements for Upgrading from MetaLib 3.13 to MetaLib 4 Version 4 CONFIDENTIAL INFORMATION DISCLAIMER The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse
Tivoli Endpoint Manager for Security and Compliance Analytics. Setup Guide
Tivoli Endpoint Manager for Security and Compliance Analytics Setup Guide Setup Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation
BES10 Cloud architecture and data flows
BES10 Cloud architecture and data flows Architecture: BES10 Cloud solution Component APNs BlackBerry Cloud Connector BES10 Cloud BlackBerry Infrastructure Company directory Devices GCM Other third-party
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Introduction to Computer Administration. System Administration
Introduction to Computer Administration System Administration System Administration System Administration Duties of System Administrator Types of Administrators/Users Operating Systems Supporting Administration
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO Copyright 2005 Shavlik Technologies. All rights reserved. No part of this document may be reproduced or retransmitted in
Patch Management Policy
Patch Management Policy L2-POL-12 Version No :1.0 Revision History REVISION DATE PREPARED BY APPROVED BY DESCRIPTION Original 1.0 2-Apr-2015 Process Owner Management Representative Initial Version No.:
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation
Lumension Endpoint Management and Security Suite
Lumension Endpoint Management and Security Suite Patch and Remediation Module Evaluation Guide July 2012 Version 1.1 Copyright 2009, Lumension L.E.M.S.S:LPR - Table of Contents Introduction... 3 Module
The software can be downloaded from the Spiceworks web site at: http://www.spiceworks.com.
Spiceworks 2.0 Review One of the biggest headaches a network or system administrator faces is managing all of the equipment, software and services their network provides. From servers to workstations,
v5.2 Installation Guide for Websense Enterprise v5.2 Embedded on Cisco Content Engine
v5.2 Installation Guide for Websense Enterprise v5.2 Embedded on Cisco Content Engine Websense Enterprise Installation Guide 1996 2004, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San
TECHNICAL NOTE 08/04 IINTRODUCTION TO VULNERABILITY ASSESSMENT TOOLS
TECHNICAL NOTE 08/04 IINTRODUCTION TO VULNERABILITY ASSESSMENT TOOLS 1 OCTOBER 2004 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor
Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1
Measurably reducing risk through collaboration, consensus & practical security management 2013 CIS Security Benchmarks 1 Background City University of New York s Rights and Benefits as a CIS Security Benchmarks
Citadel Security Software Inc.
i Citadel Security Software Inc. Hercules Vulnerability Assessment and Remediation Overview Document Number: 205-01-0007 Hercules v4.1 Document Version: 1.0 May 2006 Acknowledgements THIS SOFTWARE AND
Configuring Outlook 2010 for Windows
Configuring Outlook 2010 for Windows This document assumes that you already have Outlook 2010 installed on your computer and you are ready to configure Outlook. Table of Contents Configuring Outlook 2010
HP ProLiant Essentials Vulnerability and Patch Management Pack Release Notes
HP ProLiant Essentials Vulnerability and Patch Management Pack Release Notes Supported platforms... 2 What s new in version 2.1... 2 What s new in version 2.0.3... 2 What s new in version 2.0.2... 2 What
Configuring Outlook 2016 for Windows
Configuring Outlook 2016 for Windows This document assumes that you already have Outlook 2016 installed on your computer and you are ready to configure Outlook. Table of Contents Configuring Outlook 2016
IBM Endpoint Manager for Server Automation
IBM Endpoint Manager for Server Automation Leverage advanced server automation capabilities with proven Endpoint Manager benefits Highlights Manage the lifecycle of all endpoints and their configurations
Deep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison
Deep Security/Intrusion Defense Firewall - IDS/IPS Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security and Intrusion Defense Firewall. The document
Resolving the Top Three Patch Management Challenges
LANDesk Technical White Paper Resolving the Top Three Patch Management Challenges Technical White Paper Visit www.landesk.com for more information. To the maximum extent permitted under applicable law,
Automated Patch Management Service
Service Data Sheet Automated Patch Management Service Establishes elements for successful and proactive Automated Patch Management strategy for anti-virus signature screens, OS security patching and DeltaV
Setting up an icap Server for ISG- 1000/2000 AV Support
Application Note Setting up an icap Server for ISG- 1000/2000 AV Support Version 1.1 Ronald Ng AJTAC Engineer AV/DI/UF Specialist Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA
Requesting Nodes, Processors, and Tasks in Moab
LLNL-MI-401783 LAWRENCE LIVERMORE NATIONAL LABORATORY Requesting Nodes, Processors, and Tasks in Moab D.A Lipari March 29, 2012 This document was prepared as an account of work sponsored by an agency of
DEPLOYMENT GUIDE. Websense Enterprise Websense Web Security Suite TM. v6.3.1
DEPLOYMENT GUIDE Websense Enterprise Websense Web Security Suite TM v6.3.1 1996 2009, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published June 13, 2007 Printed
Microsoft Technologies
NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use
Patch management point solution. Platform. Patch Management Point Solution
Markets, R. Colville, M. Nicolett Research Note 18 March 2003 Patch Management: Identifying the Vendor Landscape As the importance of patch management increases, it is important to understand the limitations
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
CA Client Automation
CA Client Automation Supported Content for CA Patch Manager and Supported Application Signature Content April 2015 Contents CA Content Research Team... 3 CA Patch Manager Content... 3 Operating Systems
Best Practices for Deploying and Managing Linux with Red Hat Network
Best Practices for Deploying and Managing Linux with Red Hat Network Abstract This technical whitepaper provides a best practices overview for companies deploying and managing their open source environment
DocuShare Installation Guide
DocuShare Installation Guide Publication date: February 2011 This document supports DocuShare Release 6.6.1 Prepared by: Xerox Corporation DocuShare Business Unit 3400 Hillview Avenue Palo Alto, California
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise 1. Introduction Information security means protecting information
GB-OS Version 6.2. Configuring IPv6. Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: [email protected] Web: www.gta.com
GB-OS Version 6.2 Configuring IPv6 IPv6201411-01 Global Technology Associates 3505 Lake Lynda Drive Suite 115 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: [email protected] Web: www.gta.com
Open Vulnerability and Assessment Language (OVAL ) Validation Program Test Requirements (DRAFT)
NIST Interagency Report 7669(Draft) Open Vulnerability and Assessment Language (OVAL ) Validation Program Test Requirements (DRAFT) John Banghart Stephen Quinn David Waltermire NIST Interagency Report
HP OpenView Patch Manager using Radia Version 3.0
HP OpenView Patch Manager using Radia Version 3.0 Summary of Changes in Support of Microsoft Update Wayne Dalesio and Ben Sweetser HP OpenView Configuration Management 2004 Hewlett-Packard Development
ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK
ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK KEY FEATURES PROVISION FROM BARE- METAL TO PRODUCTION QUICKLY AND EFFICIENTLY Controlled discovery with active control of your hardware Automatically
