Implementing Security Update Management



Similar documents
Keeping Up To Date with Windows Server Update Services. Bob McCoy, CISSP, MCSE Technical Account Manager Microsoft Corporation

FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO

NCIRC Security Tools NIAPC Submission Summary Microsoft Baseline Security Analyzer (MBSA)

Securing Your Network Environment. Software Distribution & Patch Management

Using Microsoft s Free Security Tools Help Secure your Windows Systems taken from Web and Other Sources by Thomas Jerry Scott November, 2003

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Microsoft Baseline Security Analyzer (MBSA)

LESSON Windows Server Administration Fundamentals. Understand Updates

Lesson Plans Administering Security in a Server 2003 Network

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Medical Device Security Health Group Digital Output

Patch management with GFI LANguard N.S.S. & Microsoft WSUS

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

What Nobody Told You About Hardening SQL Server

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

Total Defense Endpoint Premium r12

Windows Operating Systems. Basic Security

Cisco Advanced Malware Protection for Endpoints

Symantec Client Management Suite 8.0

Quick Heal Exchange Protection 4.0

Microsoft Software Update Services and Managed Symantec Anti-virus. Michael Satut TSS/Crown IT Support

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

Protecting Your Organisation from Targeted Cyber Intrusion

Chapter 4 Application, Data and Host Security

BM482E Introduction to Computer Security

System Security Policy Management: Advanced Audit Tasks

ALTIRIS Patch Management Solution 6.2 for Windows Help

BEST PRACTICES. Systems Management.

Desktop and Laptop Security Policy

Patch management with GFI LANguard and Microsoft WSUS

Patch management and security. updates SIMATIC. Process Control System PCS 7 Patch management and security updates. Preface 1

Locking down a Hitachi ID Suite server

Vulnerability Assessment: The Right Tools to Protect Your Critical Data

Endpoint protection for physical and virtual desktops

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

Windows Server 2008 Thomas Lee

Windows 2003 Server Hardening Checklist

Hosts HARDENING WINDOWS NETWORKS TRAINING

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Introduction. PCI DSS Overview

PI Server Security Best Practice Guide Bryan Owen Cyber Security Manager OSIsoft

VMware vcenter Update Manager Administration Guide

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

A Decision Maker s Guide to Securing an IT Infrastructure

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

VMware vcenter Update Manager Administration Guide

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Medical Image Manager (MIM) Version 6.1.

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

Audit Tools That Won t Break the Bank

KB Microsoft Network Security Hotfix Checker (Hfnetchk.exe) Tool Is Available

Patch Management. Is it recommended to patch an Industrial Automation Control System and, if so, why? Siemens AG All Rights Reserved.

Security Solution Architecture for VDI

Microsoft Security Bulletin MS Important

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Windows XP Support stops on 8. April 2014

INCIDENT RESPONSE CHECKLIST

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

IT Security Standard: Computing Devices

ZENworks Patch Management. Doc Hodges Opportunity Response Team Novell, Inc.

Using Windows Update for Windows XP

Q A F 0 3. ger A n A m client dell dell client manager 3.0 FAQ

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1

Microsoft Windows Server Update Services Questions & Answers About The Product

How To Manage A Patch Management Program

System Center Configuration Manager

Securing SharePoint 101. Rob Rachwald Imperva

How To Secure An Rsa Authentication Agent

Planning for Windows Server 2008 Servers

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Best Practices for Outdoor Wireless Security

ABB s approach concerning IS Security for Automation Systems

Transcription:

Implementing Security Update Management Wayne Harris MCSE Senior Consultant Certified Security Solutions Business Case for Update Management When determining the potential financial impact of poor update management, consider: Downtime Remediation time Questionable data integrity Lost credibility Negative public relations Legal defenses Stolen intellectual property

Understanding the Vulnerability Timeline Most attacks occur here Product shipped Vulnerability discovered Vulnerability disclosed Update made available Update deployed by customer Understanding the Exploit Time Line Most attacks occur here Product shipped Vulnerability discovered Malware Attack Vulnerability disclosed Days between update and exploit Product Nimda Vulnerabilit Vulnerabilit 331 shipped y y SQL Slammer discovered disclosed 180 Welchia/Nachi 151 Blaster 25 Sasser 14 Update Most made attacks Update occur here deployed available by customer Update made available Days between update and exploit have decreased Update deployed by customer

Microsoft Update Severity Ratings Rating Critical Important Moderate Low Definition Exploitation could allow the propagation of an Internet worm with user action Exploitation could result in compromise of user data or the availability of processing resources Exploitation is serious, but is mitigated to a significant degree by default configuration, auditing, need for user action, or difficulty of exploitation Exploitation is extremely difficult or impact is minimal See Microsoft Security Bulletin Search on the Microsoft TechNet Web site Update Time Frames Severity rating Recommended update time frame Recommended maximum update time frame Critical Within 24 hours Within two weeks Important Within one month Within two months Moderate Low Depending on expected availability, wait for next service pack or update rollup that includes the update, or deploy the update within four months Depending on expected availability, wait for next service pack or update rollup that includes the update, or deploy the update within one year Deploy the update within six months Deploy the update within one year, or choose not to deploy at all

Improving the Updating Experience Your need Reduce update frequency Reduce updating complexity Reduce risk of update deployment Reduce update size Improve tool consistency Improve tool capabilities Microsoft response Reduced frequency of non-emergency update releases from once per week to once per month Reduced number of update installer technologies Improved update quality and introduced update rollback capability Developed delta updating technology to reduce update size Developing consistent tools Developing more capable tools Defense in Depth Using a layered approach: Increases an attacker s risk of detection Reduces an attacker s chance of success Data Application Host Internal Network Perimeter Physical Security Policies, Procedures, & Awareness ACLs, encryption, EFS Application hardening, antivirus OS hardening, authentication, patch management, HIDS Network segments, IPSec, NIDS Firewalls, Network Access Quarantine Control Guards, locks, tracking devices Security documents, user education

Requirements for Successful Update Management Project management, four-phase update management process Effective Processes People who understand their roles and responsibilities Tools and Technologies Effective Operations Products, tools, automation Update Management Process Assess Inventory 12 34 computing assets Assess Assess Identify Evaluate Deploy threats and vulnerabilities and Plan Determine Inventory Discover Determine Prepare the best for source computing new whether deployment for updates assets the information Determine update about new Assess threats is actually whether and required updatesdeploy the update to updates are Plan targeted vulnerabilities relevant the release computers to your of the Assess your software distribution Determine environment update Review infrastructure the the deployment best source 1 for Assess Assess operational information Obtain Build the update, release about confirm new it is effectiveness updates safe Perform acceptance testing Determine Assess your if software update is a Deploy normal distribution change infrastructure or an Deploy Prepare emergency for deployment 4 Deploy the Assess update operational to targeted computers effectiveness Review the deployment Identify Discover new updates Determine whether updates are relevant to your environment Obtain update, confirm it is safe Determine if update is a normal change or an emergency 2 Identify 1 Assess 2 Identify Evaluate Evaluate and Plan and Plan Determine whether the 2 3 4 update is actually required Deploy Evaluate Plan the release of the update and Plan Build the release Perform acceptance testing

Microsoft Update Management Guidance Guide: Patch Management Process How To: Implement Patch Management How To: Use Microsoft Baseline Security Analyzer (MBSA) How To: Perform Patch Management Using SMS Microsoft Server Windows Update Services Deployment Guide The guide and articles are available on the Patch Management page of the Microsoft TechNet Web site The WSUS deployment guide is available on the Microsoft Windows Server Update Services Deployment Guide page of the Microsoft Windows Server System Web site Choosing an Update Management Solution Customer type Scenario Solution Consumer All scenarios Microsoft Update Small organization Medium-sized or large enterprise Has no Windows servers Has one to three Windows 2000 or newer servers and one IT administrator Wants an update management solution with basic control to update Windows 2000 and newer versions of Windows Wants a single flexible update management solution with extended level of control to update and distribute all software Microsoft Update MBSA and WSUS MBSA and WSUS Systems Management Server

Update Management Solution for Consumers and Small Organizations Update management solution based on Protect Your PC: 1. Use an Internet firewall 2. Get computer updates Microsoft Update 3. Use up-to-date antivirus software Deploy Windows XP SP 2 See the Protect Your PC page on the Microsoft Security at Home Web site Demonstration 1: Configuring Automatic Updates Configuring Automatic Updates

Office Update Benefits: Single location for office updates Easy to use Can download delta or full-file versions of updates Limitation: Does not support Automatic Updates; updating must be initiated manually The Microsoft Update site includes Office updates and supports Automatic Updates Visit the Downloads page of the Microsoft Office Online Web site Update Management Solution for Small and Medium-Sized Organizations Size of organization Small Medium or large Scenario Has one to three servers running Windows 2000 or later and one IT administrator Wants an update management solution with basic level of control that updates computers running Windows 2000, Windows XP, and Windows Server 2003 and some Microsoft applications Update management solution MBSA and WSUS MBSA and WSUS

MBSA Benefits Scans systems for: Missing security updates Potential configuration issues Works with a broad range of Microsoft software Allows an administrator to centrally scan multiple computers simultaneously MBSA is a free tool, and can be downloaded from the Microsoft Baseline Security Analyzer page on the Microsoft TechNet Web site MBSA Considerations MBSA reports important security issues: Password weaknesses Guest account not disabled Auditing not configured Unnecessary services installed IIS security issues Internet Explorer zone settings Automatic Updates configuration Windows XP firewall configuration

MBSA How It Works Windows Download Center WSUSScan.cab MBSA Computer MBSA Scan Options MBSA has two scan options: MBSA graphical user interface (GUI) MBSA standard command-line interface (mbsacli.exe) When scanning for security updates, you can configure MBSA to: Update the Microsoft Update Agent on all scanned computers Use a WSUS server as the update source Use Microsoft Update as the update source

Demonstration 2: Using the Microsoft Baseline Security Analyzer Scan a computer using MBSA Review an MBSA report Examine the Mbsacli.exe command-line tool WSUS Benefits Gives administrators control over update management Administrators can review, test, and approve updates before deployment Simplifies and automates key aspects of the update management process Can be used with Group Policy, but Group Policy is not required to use WSUS Easy to implement Free tool from Microsoft

Comparing SUS and WSUS Common Features Can only update computers running Windows XP, Windows 2000, or Windows Server 2003 No option for pushing updates clients must pull updates from the server WSUS Enhancements Expanded support for Microsoft products such as Office, SQL Server, and Exchange Server Can create and manage computer groups More options for managing updates More options for configuring agents More efficient use of network bandwidth WSUS How It Works Microsoft Update Firewall Pilot Computers Group WSUS Server Client Computers Group WSUS Administrator Windows Servers Group

WSUS Deployment Scenarios Microsoft Update Firewall Independent WSUS Server Regional Client Computers Main Office WSUS Server Disconnected WSUS Server Remote Office Client Computers Replica WSUS Server Main Office Client Computers WSUS Client Component The client component of WSUS is Automatic Updates Can be configured to pull updates either from corporate WSUS server or from Microsoft Update Three ways to configure Automatic Updates: Centrally, by using Group Policy Manually configure clients Use scripts to configure clients WSUS requires a compatible Automatic Updates client

WSUS Server Component The server component of WSUS is Windows Server Update Services Can synchronize updates from Microsoft Update on a schedule Provides a Web-based administrative GUI Has several built-in default security features Provides synchronization and update reports Uses MSDE or SQL Server database to store update metadata, events, and settings Interface is localized in 17 languages How to Use WSUS On the WSUS server: 1 Administer the WSUS server at http://<server name>/wsusadmin 2 3 4 Configure the WSUS server synchronization schedule and settings Create client computer groups and assign computers Review, test, and approve updates On each WSUS client: Configure Automatic Updates on the client to use the WSUS server

Demonstration 3: Implementing Windows Server Update Services Configure Windows Server Update Services Configure Group Policy Settings for WSUS clients Distribute updates using WSUS View WSUS reports Migrating from SUS to WSUS To migrate from SUS to WSUS: You can install SUS and WSUS on the same computer You can migrate updates and approvals Use the WSUSUTIL.exe command-line tool Configure the clients to use the WSUS server Use the Automatic Update self-update feature to update the client For computers running Windows XP with no Service Packs, first install the SUS Automatic Update client

Update Management Solution for Medium-Sized and Large Organizations Capability WSUS SMS 2003 Supported Platforms for Content Supported Content Types update Distribution Control Windows 2000 Windows XP Windows Server 2003 Security and security rollup updates, critical updates, and service packs for the above operating systems and updates for some Microsoft applications Basic Windows NT 4.0 Windows 98 Windows 2000 Windows XP Windows Server 2003 All updates, service packs, and updates for the above operating systems; supports updates and application installations for Microsoft and other applications Advanced Systems Management Server Benefits For a full software distribution update management solution, use: System Management Server 2003 or System Management Server 2.0 with SUS Feature Pack Benefits of using System Management Server: Gives administrators comprehensive control over update management Automates key aspects of update management Can update a broad range of Microsoft products Can be used to update third-party software and install other software updates or applications

Systems Management Server MBSA Integration MBSA integration included with SMS 2003 and the WSUS Feature Pack for SMS 2.0 Scans SMS clients for missing security updates using mbsacli.exe /hf 1 2 3 4 SMS directs client to run local MBSA scan Client performs scan, returns data to SMS server SMS server parses data to determine which computers need which security updates Administrator pushes missing updates only to clients that require them Systems Management Server Considerations Limitations of System Management Server: Command-line syntax must be configured for unattended installation of each update Microsoft Office updates require extraction to edit a settings file for unattended installation International updates must be manually downloaded from a Web page

Systems Management Server How It Works Microsoft Update Firewall System Management Server Distribution Point System Management Server Clients System Management Server Distribution Point System Management Server Site Server System Management Server Clients System Management Server Clients Best Practices for Update Management Implement a good update management process Choose a update management solution that meets your organization s needs Subscribe to the Microsoft Security Notification Service Make use of Microsoft guidance and resources Keep your systems up to date

Session Summary Implementing security updates promptly is a critical component in a security management plan Update management needs to follow your standard network management processes For small and medium-sized business, MBSA and WSUS together provide an excellent update management solution Next Steps Find additional security training events: The Microsoft Security Events and Webcasts Web site Sign up for security communications: The Microsoft TechNet Web site Order the Security Guidance Kit: The Microsoft TechNet Web site Get additional security tools and content: The Microsoft Security Web site