How To Understand Security Terms In A Microsoft Powerbook (Windows) (Windows 2) (Powerbook) (For A Powerbook) And (Windows 3) (Program) (Permanent) (Netware) (Unwin) (



Similar documents
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Windows Operating Systems. Basic Security

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Microsoft Security Bulletin MS Important

Data Management Policies. Sage ERP Online

Airtel PC Secure Trouble Shooting Guide

PC Security and Maintenance

Microsoft Baseline Security Analyzer (MBSA)

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Computer Security Maintenance Information and Self-Check Activities

How to easily clean an infected computer (Malware Removal Guide)

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Using Windows Update for Windows XP

Maintaining, Updating, and Protecting Windows 7

How to Configure Sophos Anti-Virus for Home Systems

Introduction to Computer Security Table of Contents

Networking Best Practices Guide. Version 6.5

TIME TO LIVE ON THE NETWORK

Computer Viruses: How to Avoid Infection

MailEnable Connector for Microsoft Outlook

Implementing Security Update Management

Release Notes for Websense Security v7.2

Contents. McAfee Internet Security 3

Kaseya 2. User Guide. Version 7.0. English

Security Consultant Scenario INFO Term Project. Brad S. Brady. Drexel University

Common Cyber Threats. Common cyber threats include:

COSC 472 Network Security

Shakambaree Technologies Pvt. Ltd.

Application Intrusion Detection

Infocomm Sec rity is incomplete without U Be aware,

FREQUENTLY ASKED QUESTIONS

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

COB 302 Management Information System (Lesson 8)

Don t Fall Victim to Cybercrime:

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Windows Remote Access

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Countermeasures against Spyware

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

HoneyBOT User Guide A Windows based honeypot solution

PART D NETWORK SERVICES

Known Issues and Work Around

Patch Management Table of Contents:

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

NNT CIS Microsoft SQL Server 2008R2 Database Engine Level 1 Benchmark Report 0514a

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

6WRUP:DWFK. Policies for Dedicated SQL Servers Group

THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005

1 Introduction. Agenda Item: Work Item:

Microsoft STRIDE (six) threat categories

How to troubleshoot Microsoft Volume Shadow copy Service errors

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Unicenter Patch Management

Troubleshooting Guide

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Sophos for Microsoft SharePoint startup guide

Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats

Recommended Practice Case Study: Cross-Site Scripting. February 2007

SQL Backup and Restore using CDP

Student Tech Security Training. ITS Security Office

Sophos Endpoint Security and Control Help

ServerView Integration Pack for Microsoft SCCM

System Administration Training Guide. S100 Installation and Site Management

User Guide - English. ServerView Suite. DeskView and ServerView Integration Pack for Microsoft SCCM

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

HP Server Automation Enterprise Edition

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Symantec Endpoint Protection Analyzer Report

ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Windows Server Update Services 3.0 SP2 Operations Guide

Cyber Security Awareness

HP ProLiant Essentials Vulnerability and Patch Management Pack Release Notes

Sophos Endpoint Security and Control Help. Product version: 11

Advanced Endpoint Protection Overview

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

Best Practice Configurations for OfficeScan 10.0

Using Microsoft s Free Security Tools Help Secure your Windows Systems taken from Web and Other Sources by Thomas Jerry Scott November, 2003

SCCM How to guide deploying SCCM Client, setting up SUP and SCEP. Hans Chr. Andersen

Symantec Endpoint Protection Getting Started Guide

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

McAfee.com Personal Firewall

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

Chapter 14 Computer Threats

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Symantec AntiVirus Corporate Edition Patch Update

Transcription:

Wat is nu eigenlijk: "Windows Update" en "WSUS" Van Hecke Vincent

Microsoft Patch Management Van Hecke Vincent

Topics Terminologie Hoe Microsoft zijn software fixed. Overzicht technologiën en producten: Automatic Updates of WSUS? WSUS Extra s: MBSA,

http://technet.microsoft.com/en-us/library/cc700845.aspx http://support.microsoft.com/kb/824684 TERMINOLOGIE

Important Security Terms Term Vulnerability Threat Attack Countermeasure Definition Software, hardware, a procedural weakness, a feature, or a configuration that could be a weak point exploited during an attack. Also called an exposure. A source of danger. A threat agent attempting to take advantage of vulnerabilities for unwelcome purposes. Software configurations, hardware, or procedures that reduce risk in a computer environment. Also called a safeguard or mitigation.

Software Vulnerabilities Term Buffer overrun (overflow) Privilege elevation (escalation) Validation error (source code) Definition An unchecked buffer in a program that can overwrite the program code with new data. If the program code is overwritten with new executable code, the effect is to change the program's operation as dictated by the attacker. Allows users or attackers to attain higher privileges in certain circumstances. Allows malformed data to have unintended consequences.

Vulnerability Severity Ratings Rating Critical Important Moderate Low Definition A vulnerability whose exploitation could allow the propagation of an Internet worm without user action. A vulnerability whose exploitation could result in compromise of the confidentiality, integrity, or availability of users' data, or of the integrity or availability of processing resources. Exploitability is mitigated to a significant degree by factors such as default configuration, auditing, or difficulty of exploitation. A vulnerability whose exploitation is extremely difficult, or whose impact is minimal.

STRIDE Model of Threat Categories (1/2) Term Spoofing identity Tampering with data Repudiation Definition Illegally obtaining access and use of another person's authentication information, such as a user name or password. The malicious modification of data. Associated with users who deny performing an action, yet there is no way to prove otherwise.(non-repudiation refers to the ability of a system to counter repudiation threats, and includes techniques such as signing for a received parcel so that the signed receipt can be used as evidence.)

STRIDE Model of Threat Categories (2/2) Term Information disclosure Denial of service Elevation (Escalation) of privilege Definition The exposure of information to individuals who are not supposed to have access to it, such as accessing files without having the appropriate rights. An explicit attempt to prevent legitimate users from using a service or system. Where an unprivileged user gains privileged access. An example of privilege elevation would be an unprivileged user who contrives a way to be added to the Administrators group.

Threat Agents (1/3) Term Virus Worm Trojan horse Definition An intrusive program that infects computer files by inserting copies of self-replicating code, and deletes critical files, makes system modifications, or performs some other action to cause harm to data on the computer or to the computer itself. A virus attaches itself to a host program. A self-replicating program, often malicious like a virus, that can spread from computer to computer without infecting files first. Software or e-mail that professes to be useful and benign, but which actually performs some destructive purpose or provides access to an attacker.

Threat Agents (2/3) Term Mail bomb Adware Definition A malicious e-mail sent to an unsuspecting recipient. When the recipient opens the e-mail or runs the program, the mail bomb performs some malicious action on their computer. Any software application or program in which advertising banners are displayed or Pop-up windows appear while the program is running. Adware is considered "Spyware" and is installed without the user's knowledge.

Threat Agents (3/3) Term Spyware Definition Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Once installed, the Spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers. Spyware is similar to a Trojan horse in that users unwittingly install the product when they install something else. A common way to become a victim of Spyware is to download certain peer-to-peer file swapping products that are available today.

Microsoft is committed to protecting customers from security vulnerabilities. As part of this effort, Microsoft makes available periodic releases of software. HOE MICROSOFT ZIJN SOFTWARE FIXED Meer info: Google "Trustworthy Computing"

MSRC Security Bulletin

OVERZICHT TECHNOLOGIEËN EN PRODUCTEN

WU: Windows Update MU: Microsoft Update MOU: Microsoft Office Update WSUS: Windows Server Update Services SCCM: System Center Configuration Manager MUC: Microsoft Update Catalog

Windows Update

Microsoft Update

Via Office toepassing

Via Windows Update

Vergelijking Microsoft Update Windows Update

De weg terug naar Windows Update Want eens de agent gekozen voor MU, blijft deze actief tot de WU agent terug wordt geïnstalleerd.

Microsoft Office Update

Via Windows Update

Het update proces

Het update proces: type updates High priority Critical updates, security updates, service packs, and update rollups. Software (optional) Non-critical fixes for Windows programs Hardware (optional) Non-critical fixes for drivers and other hardware devices

Express vs Custom Express (recommended) displays all high priority updates for your computer so that you can install them with one click. This is the quickest and easiest way to keep your computer up to date. Custom displays high priority and optional updates for your computer. You review and select the updates that you want to install, one by one.

De (ongekende?) opties

WSUS

Situering

Situering

Meerdere WSUS servers

Voordelen WSUS Beter beheer van Microsoft Updates, vooral in grotere omgevingen. Rapportering Mogelijks minder trafiek over de internetlijn, indien gebruik makend van centraal repository

SCCM

SCCM SCCM is eigenlijk grote broer van WSUS. De extra features in SCCM zijn: Inventaris management Geavanceerde rapportering Mogelijkheden om systemen te beheren vanop afstand

SCCM

Microsoft Update Catalog

Windows Update Catalog

AUTOMATIC UPDATES OF WSUS?

The Microsoft way Customer Type Large or Medium Enterprise Large or Medium Enterprise Scenario The organization wants a single, flexible update management solution with an extended level of control that enables them to update (and distribute) all Windows operating systems and applications and also includes an integrated asset management solution. The organization wants a solution for update management only that provides simple updating for Microsoft software initially supporting Windows 2000 and later supporting Office 2003, Office XP, Exchange Server 2000 and later, SQL Server 2000 and later. Customer Choice SCCM WSUS

The Microsoft way Customer Type Scenario Customer Choice Small Business Small Business Consumer The business has at least one Windows server and one IT administrator. All other scenarios All other scenarios WSUS Microsoft Update or Windows Update Microsoft Update or Windows Update

Automatic Updates

Best practise indien: Automatic Updates Installeer overal de Microsoft Update agent (zodat alle software wordt geupdate)

WSUS Meer mogelijkheden Vergt ook onderhoud Server nodig

WSUS

Over WSUS

Over WSUS BITS = Background Intelligent Transfer Service WSUS bevat rapportagemogelijkheden WSUS kan op 2 manieren werken: updates van WSUS halen updates van internet halen Command Line mogelijkheden (wsusutil.exe)

Installatie documentatie Step-by-step guide http://www.microsoft.com/downloads/details.aspx? FamilyID=C8FA2FD1-72F6-4F19-A1B0- F689DAE14BE6&displaylang=en

Installatie

Installatie Keuze poort is by default 80 maar kan 8530 zijn

Configuratie Firewall! http://windowsupdate.microsoft.com http://*.windowsupdate.microsoft.com https://*.windowsupdate.microsoft.com http://*.update.microsoft.com https://*.update.microsoft.com http://*.windowsupdate.com http://download.windowsupdate.com http://download.microsoft.com http://*.download.windowsupdate.com http://wustat.windows.com http://ntservicepack.microsoft.com

Configuratie

Configuratie Groepen

Configuratie De keuze is aan u:

Configuratie TIP

Configuratie TIP SSL? Do not store update file locally? Remote workers

Meer documentatie Operations Guide: http://www.microsoft.com/downloads/details.aspx?f amilyid=66d250fa-670f-4a49-95ec- 2FFDA7691F55&displaylang=en

WSUS Tips

WSUS Tips: Cloning machines Als een voor WSUS geconfigureerde machine wordt gecloned (via Ghost, ) dan moet er een registry keys worden verwijderd: HKLM\Software\Policies\Microsoft\Windows\Windo wsupdate HKLM\Software\Microsoft\Windows\CurrentVersio n\windowsupdate

WSUS Tips: Forefront Forefront gebruikt WSUS voor zijn updates. Dus GPO setting bepaald frequentie voor het zoeken naar nieuwe virusdefinities. Standaard 22u, best op 1u zetten. Optie Allow automatic update immediate installation enabled. Zodat de virusdefinities worden geïnstalleerd zonder schedule in te stellen Zet wel nog een (dagelijkse?) schedule in voor de product updates.

WSUS Tips: Performantie issues svchost/msi performance issue both KB927891 and the new 3.0 client needed http://blogs.technet.com/wsus/archive/2007/04/28/ update-on.aspx

WSUS Tips: Client logging Start, then click Run, type WINDOWSUPDATE.LOG and then click OK. Logging from bottom up. WindowsUpdate.log Is the v6 version windows update.log Is the v4 version http://support.microsoft.com/kb/902093

WSUS Tips 0x80072EE2 0x80072F78 0x80072F76 0x80072EFD 836941 - You receive an "Error 0x80072EE2" or "Error 0x80072EFD" error message when you try to use Windows Update Add Windows Update Web sites to the Trusted Sites list

WSUS Tips 0x80070424 How to troubleshoot problems accessing secure Web pages with Internet Explorer 6 Service Pack 2 (870700) This Windows Update error code is caused by unregistered DLL files for Windows Update or Internet Explorer. On Windows XP SP2 and later this may be resolved using the iexplore /rereg command.

WSUS Tips 0x80244001/0x800A01AD These Windows Update error codes can be caused by a damaged Windows XP XML subsystem. The first step to take is to reregister this component using the command regsvr32 msxml3.dll. If this does not resolve the issue, check for more recently updated MSXML Parser and MSXML components from the following link: http://www.microsoft.com/downloads/results.as px?productid=&freetext=msxml&displaylang=e n

WSUS Tips When accessing the Update site, you receive the 0x800A01AE error. This issue may happen if the current session of Internet Explorer has cached an older version of Wuapi.dll Re-register the Windows Update DLL with the commands below Click Start, click Run, type cmd, and then click OK. Type the following commands. Press ENTER after each command. regsvr32 wuapi.dll regsvr32 wuaueng.dll regsvr32 wuaueng1.dll regsvr32 wucltui.dll regsvr32 wups.dll regsvr32 wups2.dll regsvr32 wuweb.dll

WSUS Tips 0x80248011 This Windows Update error code is normally related to inconsistent or damaged information in the c:\windows\softwaredistribution folder. Stopping the Automatic Updates service then renaming the c:\windows\softwaredistribution folder to SDOLD then restarting the Automatic Updates service normally is the fix for this issue. Note: Renaming this folder will clear the display of previous successful and failed updates.

WSUS Tips 0x800B0001 This Windows Update error code is related to 3 particular DLL files that are not registered in windows correctly. Registering the following files with REGSVR32 normally fixes this issue: Softpub.dll Mssip32.dll Initpki.dll

WSUS Tips 0x8024402C This Windows Update error can be caused by a damaged installation of BITS and corrupted information in the SoftwareDistribution folder. The solution is normally to re-download the BITS updates (KB883357 and KB842773) from the Microsoft.com website, then stop the Automatic Updates service and rename the SoftwareDistribution folder to SDOLD. Reboot the computer and return to Windows Update.

WSUS Tips: Client Firewalls Most third party firewalls such as Norton Personal Firewall block SVCHOST (Generic Host Process Win32) communication by default. This can cause issues with Windows Update as SVCHOST communication is required by the Windows Update client to connect to the Windows Update Servers on the internet.

WSUS Tips: Diag tools Client diag tool Server diag tool http://technet.microsoft.com/enus/wsus/bb466192.aspx

WSUS Tips To enable site tracing for a single visit to the Windows Update site, add &dev=true to the end of the URL, as in the example below: http://update.microsoft.com/windowsupdate/v6/def ault.aspx?ln=en&dev=true

WSUS Tips Backup?

WSUS Links http://technet.microsoft.com/enus/wsus/default.aspx http://www.wsus.info/ http://blogs.technet.com/wsus/default.aspx http://www.wsuswiki.com/

WSUS 3.0 SP2 Beta Overview New Windows Server and Client Version Support Integration with Windows Server 2008 R2 Support for Windows 7 client Support for the BranchCache feature on Windows Server 2008 R2

WSUS 3.0 SP2 Beta Overview WSUS Beta Feature Improvements and Fixes Auto-Approval Rules New functionality lets you specify the approval deadline date and time. You can now apply a rule to all computers or to specific computer groups. Cross-Version Compatibility The user interface is compatible between Service Pack 1 and Service Pack 2 for WSUS 3.0 on both the client and the server.

WSUS 3.0 SP2 Beta Overview Software Updates Stability and reliability fixes for the WSUS server, such as support for IPV6 addresses greater than 40 characters. The approval dialog now sorts computer groups alphabetically by group name. Computer status report sorting icons are now functional in x64 environments. Fixed setup issues with database servers running Microsoft SQL Server 2008.

EXTRA S

MBSA: Scan for vulnerabilites and look for patches Malicious Software Removal Tool Microsoft Security Assessment Tool

Microsoft Technical Security Notifications http://technet.microsoft.com/nlbe/security/dd252948(en-us).aspx

EINDE