SlideShare ist ein Scribd-Unternehmen logo
1 von 87
Downloaden Sie, um offline zu lesen
Ethical Hacking and
Countermeasures
Version 6
d lModule LXV
Patch Management
Module Objective
This module will familiarize you with:
• Hotfixes and Patches
• Patch management
• Patch Testing
• Understanding Patch Monitoring and Management
• Types of Patches Defined by Microsoft
• Opsware Server Automation System (SAS)
P h M Ch kli• Patch Management Checklist
• Best Practices for Patch Management
• Patch Management Tools
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Module Flow
Hotfi es and Patches Patch Management Patch TestingHotfixes and Patches Patch Management Patch Testing
Opsware Server
Automation System
Types of Patches
Defined by Microsoft
Patch Monitoring
and Management Automation SystemDefined by Microsoftand Management
Best Practices for
Patch Management
Patch Management
Tools
Patch Management
Checklist
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Hotfixes and Patches
A hotfix is a code that fixes a bug in a product. Theo s a code a es a bug a p oduc e
users may be notified through emails or through the
vendor’s website
Hotfixes are sometimes packaged as a set of fixes
known as combined hotfix or service pack
A patch can be considered as a repair job in a piece
f i bl A t h i th i di tof programming problem. A patch is the immediate
solution provided to users
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
What is Patch Management
“Patch management is a process to ensure that the appropriatePatch management is a process to ensure that the appropriate
patches are installed on a system”
It involves:
• Choosing, verifying, testing, and applying patches
• Updating previously applied patches with current
patches
Listing patches applied previously to the current• Listing patches applied previously to the current
software
• Recording repositories, or depots, of patches for
easy selection
A i i d d l i li d t h
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
• Assigning and deploying applied patches
Patch Testing
The first step in patch testing is the verification of patch source andp p g p
integrity which helps you to ensure that update is valid and it is not altered
The major components of patch
• Digital signatures
h k
The major components of patch
testing include:
• Checksums
• Integrity verification
Patch testing process takes place in
• Testing Patch Installation
l h
Patch testing process takes place in
three different categories:
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
• Testing Application Patches
• Testing Service Patches
Understanding Patch Monitoring
and Managementand Management
Steps in the Patch Management framework are as follows:
1
• Identify the patch location
• Identify new patches and verify the patch’s authenticity by installing
2
y p y p y y g
each patch on an isolated system, and determine the time frame
• Ensure that both patch testing and risk assessment of patch
deployment are processed at one place3 deployment are processed at one place
4
• Deploy the patch
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
4
Understanding Patch Monitoring
and Management (cont’d)and Management (cont d)
Create a Change Process:
• Creating a change management process is like updating software that is
required for a system
g
q y
• Before starting the change management process, switch off the server, and
start the process from a small log
i f d f h h h i h f
Monitor the Patch Process:
• Microsoft suggested a four phase approach that monitors the software
updates designed for the management control:
• Assess
• Identify
E l t d Pl
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
• Evaluate and Plan
• Deploy
Types of Patches Defined by
MicrosoftMicrosoft
Microsoft releases patches to facilitate updates to the Windows OS and
Microsoft applicationsMicrosoft applications
• Such patches fix known problems, or bugs, in an OS or application and are shipped
in three formats:
• A code that fixes a bug in a product
• Also referred as security fixes or Quick Fix Engineering (QFE) Fixes
Hotfixes
Also referred as security fixes or Quick Fix Engineering (QFE) Fixes
• Merges updates of several Hotfixes into a single update file
Roll-ups
• Merges updates of several Hotfixes into a single update file
An pdate to a soft are ersion that fi es a b g
Service packs
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
• An update to a software version that fixes a bug
• Include fixes not previously released and introduces new functionality
Opsware Server Automation System
(SAS)(SAS)
Opsware Server Automation System (SAS) is the data center automation
d t f h i f h t IT i tproduct of choice for heterogeneous IT environments
It gives administrators the ability to monitor systems and apply configuration
h i if f hichanges across many servers in a uniform fashion
Servers can be provisioned from the same pre defined baseline from the startServers can be provisioned from the same pre-defined baseline from the start
Configuration tracking is used to detect changes that are made andg g g
administrators are notified of the changes
The administrator can then use Opsware to rollback the change or propagate
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
The administrator can then use Opsware to rollback the change or propagate
the change throughout the server environment
Opsware Server Automation System
(SAS) (cont’d)(SAS) (cont d)
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Patch Management Toolsg
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: UpdateExpert
UpdateExpert is a Windows administration
h h lprogram that helps you to secure your
systems by remotely managing service packs
and hotfixes
Microsoft constantly releases updates for the
OS and mission critical applications, which
fix security vulnerabilities and system
stability problems
UpdateExpert enhances security, keeps
systems up-to-date, eliminates sneaker-net,
improves system’s reliability and QoS
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
improves system s reliability and QoS
UpdateExpert: Screenshot
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: Qfecheck
Qfecheck allows customers to diagnose and
eliminate the effects of anomalies in theeliminate the effects of anomalies in the
packaging of hotfixes for Microsoft
Windows
Qfecheck.exe determines which hotfixes
are installed by reading the information
stored in the following registry key:stored in the following registry key:
• HKEY_LOCAL_MACHINESOFTWAREMicr
osoftUpdates
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: HFNetChk
HFNetChk is a command-line tool that enables the administrator to check the
patch status of all the machines in a network remotelyp y
It does this function by referring to an XML database that Microsoft constantly
updates
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
cacls.exe Utility
Built-in Windows 2000 utility (cacls.exe) can set access
control list (ACLs) permissions globallycontrol list (ACLs) permissions globally
To change permissions on all executable files to
System:Full Administrators:Full:System:Full, Administrators:Full:
•C:>cacls.exe c:myfolder*.exe /T /G System:F
Administrators:F
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: Shavlik NetChk Protect
Shavlik NetChk protect is a tool that automates the management of critical
security patches spyware malware and unwanted software applications fromsecurity patches, spyware, malware, and unwanted software applications from
one console
It offers a solution for detecting, removing, and managing critical threats and
l biliti ith ti l bilit tvulnerabilities with active vulnerability management
Maintain secure, policy-compliant networks through automatic and
ti t di ti d tcontinuous assessment, remediation, and management
Features:
• Patch Scanning
• Extensive Reporting
• Patch development
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
• Spyware Management
• Desktop Application Control
Shavlik NetChk Protect:
Screenshot 1Screenshot 1
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Shavlik NetChk Protect:
Screenshot 2Screenshot 2
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Shavlik NetChk Protect:
Screenshot 3Screenshot 3
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: Kaseya Patch Management
Kaseya Patch Management is used to keep your servers, workstations,
and remote computers up to date with the latest security patches andand remote computers up-to-date with the latest security patches and
updates
It provides the automatic discovery of all missing patches and updates
• Complete automation for patch discovery and deployment patch
Features:
p p y p y p
• Location, deployment method, and parameter control reliable
and up to date patch data base
• Complete rollback
• Comprehensive history and reporting
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
• Comprehensive history and reporting
• Rapid deployment
Kaseya Patch Management:
Screenshot 1Screenshot 1
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Kaseya Patch Management:
Screenshot 2Screenshot 2
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Kaseya Patch Management:
Screenshot 3Screenshot 3
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: IBM Tivoli Configuration
ManagerManager
IBM's configuration manager provides Microsoft client and server softwareg g p
patch automation capabilities in distributed environments
Obt i k di t ib t d i t ll Mi ft ft t h d dObtains, packages, distributes, and installs Microsoft software patches needed
by client systems in distributed customer environments
Features:
• Gathers software patch signature files and distributes them to client machines
• Scans clients
• Determines missing patches
• Packages patches
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Packages patches
• Builds patch deployment plans
• Distributes required patches to clients
IBM Tivoli Configuration Manager:
Screenshot 1Screenshot 1
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
IBM Tivoli Configuration Manager:
Screenshot 2Screenshot 2
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: LANDesk Patch Manager
LANDesk's Patch Manager includes a subscription service that collects and
l h f hanalyzes patches for heterogeneous environments
It scans managed devices to identify application and operating systemg y pp p g y
vulnerabilities
It monitors the status of each install and provides bandwidth throttling, staging,
d d t il d li d li ti b d f tiand detailed policy and compliance reporting across a broad range of operating
systems
It i d ti it b l ti t ith ti l bilit iIt increases productivity by evaluating systems with active vulnerability scanning
It is used to gain control with a single tool to research review and download
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
It is used to gain control with a single tool to research, review, and download
available patches
LANDesk Patch Manager:
ScreenshotScreenshot
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: ConfigureSoft Enterprise
Configuration Manager (ECM)Configuration Manager (ECM)
ECM centralizes and automates the monitoring, managing and auditing of
hardware and software configurations across Windows UNIX and Linuxhardware and software configurations across Windows, UNIX, and Linux
platforms
It automatically discovers new systems and tracks configuration changes at
h d l d i l h il bili f h l h i f i ischeduled intervals to ensure the availability of the latest patch information is
available
• Vulnerabilities assessment and remediation
Features:
• Regulatory & operational compliance
• Configuration management & control
• Change management
• Risk prevention and security management
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
• Risk prevention and security management
• System optimization
ConfigureSoft Enterprise Configuration
Manager (ECM): Screenshotg ( )
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: BladeLogic Configuration
ManagerManager
BladeLogic Configuration Manager is a component of the BladeLogic
O ti M it f d t t t ti d tOperations Manager suite of data center automation products
It features a cross-platform command line interface that supports a single-sign
i f h i i lon using a range of authentication protocols
It supports a policy-based approach whereby changes are applied to a policy,pp p y pp y g pp p y
and then synchronized with the target servers
All user communication is encrypted, and all user actions are logged and canyp , gg
be authorized based on a user’s role
It allows IT organizations to monitor patch configure and update servers
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
It allows IT organizations to monitor, patch, configure, and update servers
across platforms and data centers
BladeLogic Configuration
Manager: ScreenshotManager: Screenshot
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: Microsoft Baseline Security
Analyzer (MBSA)Analyzer (MBSA)
Microsoft baseline security analyzer determines critical updates and the
required updates on the target computer
It scans for common security mis-configuration errors on target computers
It supports two interface for scanning:
• GUI Scan (Mbsa.exe)
• Command Line Interface (Mbsacli.exe)
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
MBSA: Scanning Updates in GUI
ModeMode
MBSA d fi i i d di l h l f hMBSA defines scanning options and displays the results of the
security scan in the MBSA window
It scans and reports on updates designated as critical security
updates by the Windows Update site
Procedure:
• Open MBSA
• Enable the check For security updates option
• Scan completion display XML file for the respective computer
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Scan completion display XML file for the respective computer
MBSA: Screenshot
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
MBSA: Scanning Updates in
Command-line Version
The MBSA command line interface supports two types of scan namely:The MBSA command line interface supports two types of scan namely:
•mbsacli [/c|/i|/r|/d domainname|ipaddress|ipaddressrange]
[/n option] [/sus SUS server|SUS filename] [/s level]
MBSA-style
scan
[/n option] [/sus SUS server|SUS filename] [/s level]
[/nosum] [/nvc] [/o filename] [/e] [/l] [/ls] [/lr report
name] [/ld report name] [/v] [/?] [/qp] [/qe] [/qr] [/q]
[/f] [/unicode]
•mbsacli /hf [-h hostname] [-fh filename] [-i ipaddress] [-
fip filename] [-r ipaddressrange] [-d domainname] [-n] [-sus
SUS server|SUS filename] [-fq filename] [-s 1] [-s 2] [-
HFNetChk-
style scan
| ] [ q ] [ ] [ ] [
nosum] [-sum] [-z] [-v] [-history level] [-nvc] [-o option]
[-f filename] [-unicode] [-t] [-u username] [-p password] [-
x] [-?]
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: QChain
Qchain allows to install multiple security updatesQchain allows to install multiple security updates
It evaluates the drivers DLLs and executable files updated by each security updateIt evaluates the drivers, DLLs, and executable files updated by each security update
It creates a batch file for the security update installationIt creates a batch file for the security update installation
Batch file installs each security update with:
• -z switch to prevent reboots after each security update installation
• -m switch to enable unattended installs
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
m switch to enable unattended installs
Qchain: Screenshot 1
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Qchain: Screenshot 2
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Qchain: Screenshot 3
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: BigFix Enterprise Suite
(BFS)(BFS)
BigFix Enterprise Suite platform provides patch management
solution for distributed and multiplatform networks
Roll back feature helps in securing the system in case of patches that
misfiremisfire
It enables audit trial of every action and step taken on each computer
during the patch management process
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
BigFix Enterprise Suite (BFS):
Screenshot 1Screenshot 1
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
BigFix Enterprise Suite (BFS):
Screenshot 2Screenshot 2
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: Shavlik NetChk Protect
Shavlik NetChk protect is a patch management solution for larger networks
d i ti l itand organizational units
Features:
• Drag-n-Drop patch management interface controlled by the user enables
scanning of the required groups
• Security configuration management mitigates organizational costs and
provides the security associated with the expensive breachesprovides the security associated with the expensive breaches
• It automates the platforms and products such as Windows NT, XP,2000,
etc
• Performs scheduled scans
• Uses options such as Command line scanning and scanning and
Benefits:
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Uses options such as Command line scanning and scanning and
deployment with SQL server database
Shavlik NetChk Protect:
ScreenshotScreenshot
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: PatchLink Update
PatchLink Update is a patch and vulnerability solution for large networksp p y g
It scans networks for security holes using fingerprint technology
It translates security policies into automated and continuous protection against
network vulnerabilitiesnetwork vulnerabilities
Features:
• Customized subscription notifications to include the required platforms
and languages
• Improved transaction/query efficiency that increases performance and
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
scalability
• Proxy server authentication that increases deployment security
PatchLink Update: Screenshot
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: SecureCentral PatchQuest
SecureCentral PatchQuest is a web-based patch management software that
manages and distributes security patches across various platformsmanages and distributes security patches across various platforms
Four stages in working:
• System addition & discovery
• Patch assessment or scanning
• Patch download and deployment
• Reporting• Reporting
Features:
• Flexible modes of operation
• Web-based administration console for universal secure-access to data views
and configurations
• Cross platform product installation
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
• Cross-platform product installation
• Array of reports to facilitate quick access to the data required
SecureCentral PatchQuest:
Screenshot 1Screenshot 1
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
SecureCentral PatchQuest:
Screenshot 2Screenshot 2
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: Patch Authority Ultimate
Patch authority ultimate is ScriptLogic’s comprehensive and enterprise-
class patch management solutionclass patch management solution
It prevents attacks and exploits through centralized control of updates
on all Windows desktops and serverson all Windows desktops and servers
Benefits:
• Leading patch database and scan engine
• Selection, distribution, deployment, and reporting are all part of this
comprehensive solution
• Management reports show overall patch status across the networkg p p
• Centralized management of patch policy and status for all computers, local
and remote, on the LAN and across the Internet
• A baseline of patches can be created to establish a "secure" machine
• Enhanced security with central management of service status configuration
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
• Enhanced security with central management of service status, configuration,
logon accounts, and scheduled task configuration
Patch Authority Ultimate:
ScreenshotScreenshot
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: ZENworks Patch Management
ZENworks Patch Management is a piece of
automated patch management software
It can be used to protect your network from the
viruses by automating the process of discovering
security alerts retrieving the patches and deployingsecurity alerts, retrieving the patches, and deploying
the right ones to the right machines at the right time
to prevent problems
It provides patches for more than 40 different
operating systems, applications, and software
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
ZENworks Patch Management:
ScreenshotScreenshot
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: Ecora Patch Manager
Eroca Patch Manager automates system discovery, patch assessment,
d h ll k dand patch installation on workstations and servers
Features:
• Agent-less or optionally agent-based
• Views missing patches by systems, applications, specific patches, or
Features:
according to your policy
• Patches any Windows application Microsoft supports, other
companies' Windows-based patches, or patches for home grown
applicationsapplications
• Has automated patch roll-back on one or more machines
• Logically groups systems for ease of management
• Scheduled patch deployment
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
p p y
Ecora Patch Manager:
Screenshot 1Screenshot 1
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Ecora Patch Manager:
Screenshot 2Screenshot 2
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: Service Pack Manager
Service Pack Manager enables system administrators to fix security vulnerabilities and
stability problems in Windows NT/2000/XP/2003 and additional Microsoft products
It allows to remotely detect, track, monitor, and install Windows NT/2000/XP/2003 Service
Packs and Hotfixes on the enterprise networks from a central console
Remote inventory, research, and deployment of the security vulnerabilities patches and
stability updates make Service Pack Manager a highly cost-effective tool when used on thestability updates make Service Pack Manager a highly cost effective tool when used on the
enterprise LANs and WANs
The installation status of hundreds of hotfixes can be detected quickly on any number of
remote computers
It makes the task of maintaining security of the large networks viable
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
It makes the task of maintaining security of the large networks viable
Service Pack Manager:
ScreenshotScreenshot
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: Altiris Patch Management
SolutionSolution
Altiris Patch Management Solution software proactively manages patches and
f d b i h ll i l i d d li f hsoftware updates by automating the collection, analysis, and delivery of patches
across your enterprise
It helps you to decrease the costs involved in delivering patches throughout your
enterprise and integrates with Altiris Recovery Solution for stable-state rollback
It provides improved functionality in the analysis, collection, and distribution of
OS and application updates
It improves business continuity and accelerates IT systems’ security by reducing
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
p y y y y g
the need for extended patch test cycles
Altiris Patch Management Solution:
Screenshot 1Screenshot 1
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Altiris Patch Management Solution:
Screenshot 2Screenshot 2
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: BMC Patch Manager
BMC Patch Manager enables you to manage and deploy security and functional
patches on desktops laptops PDAs and serverspatches on desktops, laptops, PDAs, and servers
By automating critical patch management functions (patch collection,
preparation, testing, staging, deployment, auditing), it helps you to save time,preparation, testing, staging, deployment, auditing), it helps you to save time,
improve response times, and reduce attack-related risks
Features:
• Provides patch-testing capabilities that allow administrators to group test
patch installations within sample environments
• Allows you to deploy patches based on security policies for ongoing
operations or specific tasks for emergency deploymentsoperations or specific tasks for emergency deployments
• Identifies vulnerabilities, automatically delivers critical patches, and fixes
to thousands of endpoints, and verifies deployment success
• Allows you to proactively manage the distribution of patches including
functional, anti-virus, and security patches to lower patch management
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
functional, anti virus, and security patches to lower patch management
costs
BMC Patch Manager: Screenshot
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: Hotfix Reporter
Hotfix Reporter is a tool that works in conjunction with the Microsoft Network Security
Hotfix Checker (HfNetChk) tool to scan your network server for missing patchesHotfix Checker (HfNetChk) tool to scan your network server for missing patches
HfNetChk scans your system for missing patches, but displays the results in a raw, plain-
text, and unfriendly format
Hotfix Reporter converts the HfNetChk’s raw output into an HTML page, complete with
clickable links, making it easy to download the necessary patches from Microsoft
Features:
C t HfN tChk t t i t f i dl HTML• Converts HfNetChk output into user-friendly HTML
• Tells you if the scan gave different results than the last time it was run, making it easy to
quickly tell if any new patches have been released
• Displays Microsoft security bulletin numbers and knowledgebase article numbers as
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
clickable links
• Shows the most recent patches first
Hotfix Reporter: Screenshot
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: Numara Patch Manager
Numara Patch Manager is a tool used to update and download patches for
i f ’ i d li i i kMicrosoft’s operating systems and applications across your entire network
It allows you to assess the patch status of all Microsoft-based workstations asy p
well as validate any existing patches that have been installed
It create baseline patch groups and scan groups of workstations to determineIt create baseline patch groups and scan groups of workstations to determine
which ones are compliant and which ones are not
It can also be used to perform patch scans during non-business hours or off-peakIt can also be used to perform patch scans during non business hours or off peak
bandwidth periods
Administrators can reboot workstations immediately or at a specified date or
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Administrators can reboot workstations immediately or at a specified date or
time
Numara Patch Manager:
ScreenshotScreenshot
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: TrueUpdate
TrueUpdate is a comprehensive solution for software developers wanting to
i i d i bili i i h i f li iintegrate automatic updating capabilities into their software applications
It gives you a robust client/server framework for determining required updates,
and then retrieving and applying the necessary patches or installation filesand then retrieving and applying the necessary patches or installation files
using standard Internet protocols
Features:
• The client can easily be integrated into existing software or installed as
a standalone application
• Compatible with any update/patching method, from full setups and
eatu es:
p y p /p g p
self-contained binary patches to download and extract from zip files
• The system is always up-to-date with the latest software and patches
• Includes more than 250 high level actions with everything from
registry editing and file copying to web server script interaction and
h
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
much more
TrueUpdate: Screenshot 1
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
TrueUpdate: Screenshot 2
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
TrueUpdate: Screenshot 3
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: FlashUpdate
FlashUpdate is a software update solution for windows developersFlashUpdate is a software update solution for windows developers
It allows you to create manage and distribute your software updates and patchesIt allows you to create, manage, and distribute your software updates and patches
in a flash
• Advanced Patch Engine provides up to 98% file compression
Features:
• Advanced Patch Engine provides up to 98% file compression
• Adaptive patch creation for optimal patch size and speed efficiency
• Support for all file types, including executable files, system files, data files,
and documents
• Native support for shared and locked files
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
pp
• Helps to prevent software piracy
FlashUpdate: Screenshot
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: Microsoft Software Update
Services (SUS)Services (SUS)
Software Update Services (SUS) supports updating for a broader set of MicrosoftSoftware Update Services (SUS) supports updating for a broader set of Microsoft
products and provides robust management and reporting features
It connects through your firewall to the windows update site and allows IT
administrators to import critical updates, security updates, and service packs
Administrators can receive e-mail notification when updates are added to their
SUS pipeline
It consists of both client-side and server-side components to provide a basic
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
p p
solution to critical update management
Microsoft Software Update Services
(SUS): Screenshot 1(SUS): Screenshot 1
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Microsoft Software Update Services
(SUS): Screenshot 2(SUS): Screenshot 2
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: Prism Patch Manager
Prism Patch Manager automatically secures windows systems from
software vulnerabilities by managing the entire software patchingsoftware vulnerabilities by managing the entire software patching
process
It manages the software patching process such as discovering
vulnerabilities, acquiring and testing patches, and deploying patches
It delivers comprehensive reporting to demonstrate patch compliance to
management and auditors
It reduces organizational risk, improves IT productivity, and lowers the
f IT i f i
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
cost of IT infrastructure maintenance
Prism Patch Manager:
Screenshot 1Screenshot 1
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Prism Patch Manager:
Screenshot 2Screenshot 2
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Tool: Patch-Magic
Patch-Magic updates all computer systems in your network
It avoids viruses and worms, and minimizes security risks
It can be used to scan each system individually, to discover necessary patches and
updates, and to install them remotely
• Intuitive view and description of missing patches
A t t t h d l d d i di id l d l t
Features:
• Automates patch download and individual deployment
• Identifies and removes remote malware in your LAN
• Time scheduler for scans, deployment, and data base update
• Supports virus scanning proxy servers / firewalls
C t li d t f t h t th l ti f h i ( t h lib )
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
• Centralized storage of patches at the location of your choice (patch library)
• Intelligent reboot handling
Patch-Magic: Screenshot
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Patch Management Checklist
H ft d h d l t h ?How often and when do you apply patches?
Who can deploy and/or authorize updates?
How are patches tested prior to rollout?
What problems will trigger a rollback?
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
What problems will trigger a rollback?
Best Practices for Patch
ManagementManagement
Test the patch before rollout to ensure that the applied patch is compatible with other
applicationsapplications
You need to have a rollback version when the applied patch fails
Do not deploy multiple patches simultaneously across the network as it will halt other
applications and will be inconvenient for users
D l th t h ft d ti h b t i i d f i t hDeploy the patches after production hours as reboot is required for maximum patches
Always check for latest releases to minimize downtime as often a user calls or virus
initiates a frantic search for a missing patch
If you patch regularly, you need to keep track of what fixes were applied, when, for
auditing and reporting
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Follow the defined patch process which specifies who may approve patches and
procedures to deploy them
Summary
A hotfix is a code that fixes a bug in a productA hotfix is a code that fixes a bug in a product
Patch Management is the process of correcting deficiencies andg p g
updating software with the latest features
Windows patch management involves: testing, deployment, andp g g, p y ,
validation
i f S f d S i (S S) h i d dMicrosoft Software Update Services (SUS) hosts windows updates
Designing a deployment plan to distribute patch on a timely basis is
EC-Council
Copyright © by EC-Council All Rights Reserved.
Reproduction is Strictly Prohibited
Designing a deployment plan to distribute patch on a timely basis is
one of the best practices in the patch management

Weitere ähnliche Inhalte

Was ist angesagt?

API Training 10 Nov 2014
API Training 10 Nov 2014API Training 10 Nov 2014
API Training 10 Nov 2014Digital Bond
 
Prioritized Approach Twenty Critical Controls 2008
Prioritized Approach Twenty Critical Controls 2008Prioritized Approach Twenty Critical Controls 2008
Prioritized Approach Twenty Critical Controls 2008Donald E. Hester
 
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1Tripwire
 
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaDigital Bond
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1Lisa Niles
 
Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacionrubychavez
 
Achieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security AutomationAchieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security AutomationTripwire
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Digital Bond
 
Critical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseCritical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseRishu Mehra
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldDigital Bond
 
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Digital Bond
 
GrrCon 2014: Security On the Cheap
GrrCon 2014: Security On the CheapGrrCon 2014: Security On the Cheap
GrrCon 2014: Security On the CheapJoel Cardella
 
Should I Patch My ICS?
Should I Patch My ICS?Should I Patch My ICS?
Should I Patch My ICS?Digital Bond
 
Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...
Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...
Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...OWASP Delhi
 
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall AuditHow to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Auditkeyuradmin
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Digital Bond
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4CrispnCrunch
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network ArchitecturesEnergySec
 

Was ist angesagt? (20)

API Training 10 Nov 2014
API Training 10 Nov 2014API Training 10 Nov 2014
API Training 10 Nov 2014
 
Prioritized Approach Twenty Critical Controls 2008
Prioritized Approach Twenty Critical Controls 2008Prioritized Approach Twenty Critical Controls 2008
Prioritized Approach Twenty Critical Controls 2008
 
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
 
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar Asia
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
 
Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacion
 
Achieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security AutomationAchieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security Automation
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 
Critical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseCritical Controls Of Cyber Defense
Critical Controls Of Cyber Defense
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
 
GrrCon 2014: Security On the Cheap
GrrCon 2014: Security On the CheapGrrCon 2014: Security On the Cheap
GrrCon 2014: Security On the Cheap
 
Symantec Endpoint Suite
Symantec Endpoint SuiteSymantec Endpoint Suite
Symantec Endpoint Suite
 
Should I Patch My ICS?
Should I Patch My ICS?Should I Patch My ICS?
Should I Patch My ICS?
 
Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...
Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...
Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...
 
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall AuditHow to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Audit
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 

Andere mochten auch

Ce hv6 module 66 security convergence
Ce hv6 module 66 security convergenceCe hv6 module 66 security convergence
Ce hv6 module 66 security convergenceVi Tính Hoàng Nam
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezVi Tính Hoàng Nam
 
Ceh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesCeh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesVi Tính Hoàng Nam
 
Ceh v5 module 00 student introduction
Ceh v5 module 00  student introductionCeh v5 module 00  student introduction
Ceh v5 module 00 student introductionVi Tính Hoàng Nam
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsVi Tính Hoàng Nam
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingVi Tính Hoàng Nam
 
CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)Vi Tính Hoàng Nam
 
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?ITpreneurs
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowMercury Solutions Limited
 

Andere mochten auch (9)

Ce hv6 module 66 security convergence
Ce hv6 module 66 security convergenceCe hv6 module 66 security convergence
Ce hv6 module 66 security convergence
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warez
 
Ceh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesCeh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilities
 
Ceh v5 module 00 student introduction
Ceh v5 module 00  student introductionCeh v5 module 00  student introduction
Ceh v5 module 00 student introduction
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hacking
 
CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)
 
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should Follow
 

Ähnlich wie Ce hv6 module 65 patch management

SE2018_Lec 19_ Software Testing
SE2018_Lec 19_ Software TestingSE2018_Lec 19_ Software Testing
SE2018_Lec 19_ Software TestingAmr E. Mohamed
 
Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureOpen Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureWhiteSource
 
Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureOpen Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureDevOps.com
 
Object oriented sad 6
Object oriented sad 6Object oriented sad 6
Object oriented sad 6Bisrat Girma
 
2.-IT-266_APDET-Module-2-of-3.pptx
2.-IT-266_APDET-Module-2-of-3.pptx2.-IT-266_APDET-Module-2-of-3.pptx
2.-IT-266_APDET-Module-2-of-3.pptxKENNEDYDONATO1
 
Software Fault Tolerance
Software Fault ToleranceSoftware Fault Tolerance
Software Fault ToleranceAnkit Singh
 
MuleSoft Surat Virtual Meetup#4 - Anypoint Monitoring and MuleSoft dataloader.io
MuleSoft Surat Virtual Meetup#4 - Anypoint Monitoring and MuleSoft dataloader.ioMuleSoft Surat Virtual Meetup#4 - Anypoint Monitoring and MuleSoft dataloader.io
MuleSoft Surat Virtual Meetup#4 - Anypoint Monitoring and MuleSoft dataloader.ioJitendra Bafna
 
Ncerc rlmca202 adm m3 ssm
Ncerc rlmca202  adm m3 ssmNcerc rlmca202  adm m3 ssm
Ncerc rlmca202 adm m3 ssmssmarar
 
Understand release engineering
Understand release engineeringUnderstand release engineering
Understand release engineeringgaoliang641
 
There's more to third-party patching than SCCM 1806
There's more to third-party patching than SCCM 1806There's more to third-party patching than SCCM 1806
There's more to third-party patching than SCCM 1806Ivanti
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3Lisa Niles
 
How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks Ulf Mattsson
 
The road towards better automotive cybersecurity
The road towards better automotive cybersecurityThe road towards better automotive cybersecurity
The road towards better automotive cybersecurityRogue Wave Software
 
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITYCYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITYViscolKanady
 
Whats new in microsoft desktop optimization package
Whats new in microsoft desktop optimization packageWhats new in microsoft desktop optimization package
Whats new in microsoft desktop optimization packageOlav Tvedt
 
Q1 Southern California Session Slides
Q1 Southern California Session SlidesQ1 Southern California Session Slides
Q1 Southern California Session SlidesHarold Wong
 

Ähnlich wie Ce hv6 module 65 patch management (20)

SE2018_Lec 19_ Software Testing
SE2018_Lec 19_ Software TestingSE2018_Lec 19_ Software Testing
SE2018_Lec 19_ Software Testing
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
 
Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureOpen Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure Culture
 
Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureOpen Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure Culture
 
Object oriented sad 6
Object oriented sad 6Object oriented sad 6
Object oriented sad 6
 
2.-IT-266_APDET-Module-2-of-3.pptx
2.-IT-266_APDET-Module-2-of-3.pptx2.-IT-266_APDET-Module-2-of-3.pptx
2.-IT-266_APDET-Module-2-of-3.pptx
 
Configuration management
Configuration managementConfiguration management
Configuration management
 
Software Fault Tolerance
Software Fault ToleranceSoftware Fault Tolerance
Software Fault Tolerance
 
MuleSoft Surat Virtual Meetup#4 - Anypoint Monitoring and MuleSoft dataloader.io
MuleSoft Surat Virtual Meetup#4 - Anypoint Monitoring and MuleSoft dataloader.ioMuleSoft Surat Virtual Meetup#4 - Anypoint Monitoring and MuleSoft dataloader.io
MuleSoft Surat Virtual Meetup#4 - Anypoint Monitoring and MuleSoft dataloader.io
 
Ncerc rlmca202 adm m3 ssm
Ncerc rlmca202  adm m3 ssmNcerc rlmca202  adm m3 ssm
Ncerc rlmca202 adm m3 ssm
 
Understand release engineering
Understand release engineeringUnderstand release engineering
Understand release engineering
 
There's more to third-party patching than SCCM 1806
There's more to third-party patching than SCCM 1806There's more to third-party patching than SCCM 1806
There's more to third-party patching than SCCM 1806
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
 
Best free tools for w d a
Best free tools for w d aBest free tools for w d a
Best free tools for w d a
 
Best free tools for win database admin
Best free tools for win database adminBest free tools for win database admin
Best free tools for win database admin
 
How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks
 
The road towards better automotive cybersecurity
The road towards better automotive cybersecurityThe road towards better automotive cybersecurity
The road towards better automotive cybersecurity
 
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITYCYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
 
Whats new in microsoft desktop optimization package
Whats new in microsoft desktop optimization packageWhats new in microsoft desktop optimization package
Whats new in microsoft desktop optimization package
 
Q1 Southern California Session Slides
Q1 Southern California Session SlidesQ1 Southern California Session Slides
Q1 Southern California Session Slides
 

Mehr von Vi Tính Hoàng Nam

CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)Vi Tính Hoàng Nam
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnVi Tính Hoàng Nam
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108Vi Tính Hoàng Nam
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesVi Tính Hoàng Nam
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoVi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangVi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangVi Tính Hoàng Nam
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQVi Tính Hoàng Nam
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EVi Tính Hoàng Nam
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhVi Tính Hoàng Nam
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhVi Tính Hoàng Nam
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhVi Tính Hoàng Nam
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhVi Tính Hoàng Nam
 

Mehr von Vi Tính Hoàng Nam (20)

CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)
 
Catalogue 2015
Catalogue 2015Catalogue 2015
Catalogue 2015
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
 
CATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁTCATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁT
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
 
Các loại cáp mạng
Các loại cáp mạngCác loại cáp mạng
Các loại cáp mạng
 
Catalogue 10-2014-new
Catalogue 10-2014-newCatalogue 10-2014-new
Catalogue 10-2014-new
 
Qtx 6404
Qtx 6404Qtx 6404
Qtx 6404
 
Camera QTX-1210
Camera QTX-1210Camera QTX-1210
Camera QTX-1210
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 Series
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báo
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008E
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênh
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênh
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênh
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênh
 
I phone v1.2_e
I phone v1.2_eI phone v1.2_e
I phone v1.2_e
 

Kürzlich hochgeladen

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Kürzlich hochgeladen (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Ce hv6 module 65 patch management

  • 1. Ethical Hacking and Countermeasures Version 6 d lModule LXV Patch Management
  • 2. Module Objective This module will familiarize you with: • Hotfixes and Patches • Patch management • Patch Testing • Understanding Patch Monitoring and Management • Types of Patches Defined by Microsoft • Opsware Server Automation System (SAS) P h M Ch kli• Patch Management Checklist • Best Practices for Patch Management • Patch Management Tools EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 3. Module Flow Hotfi es and Patches Patch Management Patch TestingHotfixes and Patches Patch Management Patch Testing Opsware Server Automation System Types of Patches Defined by Microsoft Patch Monitoring and Management Automation SystemDefined by Microsoftand Management Best Practices for Patch Management Patch Management Tools Patch Management Checklist EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 4. Hotfixes and Patches A hotfix is a code that fixes a bug in a product. Theo s a code a es a bug a p oduc e users may be notified through emails or through the vendor’s website Hotfixes are sometimes packaged as a set of fixes known as combined hotfix or service pack A patch can be considered as a repair job in a piece f i bl A t h i th i di tof programming problem. A patch is the immediate solution provided to users EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 5. What is Patch Management “Patch management is a process to ensure that the appropriatePatch management is a process to ensure that the appropriate patches are installed on a system” It involves: • Choosing, verifying, testing, and applying patches • Updating previously applied patches with current patches Listing patches applied previously to the current• Listing patches applied previously to the current software • Recording repositories, or depots, of patches for easy selection A i i d d l i li d t h EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Assigning and deploying applied patches
  • 6. Patch Testing The first step in patch testing is the verification of patch source andp p g p integrity which helps you to ensure that update is valid and it is not altered The major components of patch • Digital signatures h k The major components of patch testing include: • Checksums • Integrity verification Patch testing process takes place in • Testing Patch Installation l h Patch testing process takes place in three different categories: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Testing Application Patches • Testing Service Patches
  • 7. Understanding Patch Monitoring and Managementand Management Steps in the Patch Management framework are as follows: 1 • Identify the patch location • Identify new patches and verify the patch’s authenticity by installing 2 y p y p y y g each patch on an isolated system, and determine the time frame • Ensure that both patch testing and risk assessment of patch deployment are processed at one place3 deployment are processed at one place 4 • Deploy the patch EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited 4
  • 8. Understanding Patch Monitoring and Management (cont’d)and Management (cont d) Create a Change Process: • Creating a change management process is like updating software that is required for a system g q y • Before starting the change management process, switch off the server, and start the process from a small log i f d f h h h i h f Monitor the Patch Process: • Microsoft suggested a four phase approach that monitors the software updates designed for the management control: • Assess • Identify E l t d Pl EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Evaluate and Plan • Deploy
  • 9. Types of Patches Defined by MicrosoftMicrosoft Microsoft releases patches to facilitate updates to the Windows OS and Microsoft applicationsMicrosoft applications • Such patches fix known problems, or bugs, in an OS or application and are shipped in three formats: • A code that fixes a bug in a product • Also referred as security fixes or Quick Fix Engineering (QFE) Fixes Hotfixes Also referred as security fixes or Quick Fix Engineering (QFE) Fixes • Merges updates of several Hotfixes into a single update file Roll-ups • Merges updates of several Hotfixes into a single update file An pdate to a soft are ersion that fi es a b g Service packs EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • An update to a software version that fixes a bug • Include fixes not previously released and introduces new functionality
  • 10. Opsware Server Automation System (SAS)(SAS) Opsware Server Automation System (SAS) is the data center automation d t f h i f h t IT i tproduct of choice for heterogeneous IT environments It gives administrators the ability to monitor systems and apply configuration h i if f hichanges across many servers in a uniform fashion Servers can be provisioned from the same pre defined baseline from the startServers can be provisioned from the same pre-defined baseline from the start Configuration tracking is used to detect changes that are made andg g g administrators are notified of the changes The administrator can then use Opsware to rollback the change or propagate EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited The administrator can then use Opsware to rollback the change or propagate the change throughout the server environment
  • 11. Opsware Server Automation System (SAS) (cont’d)(SAS) (cont d) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 12. Patch Management Toolsg EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 13. Tool: UpdateExpert UpdateExpert is a Windows administration h h lprogram that helps you to secure your systems by remotely managing service packs and hotfixes Microsoft constantly releases updates for the OS and mission critical applications, which fix security vulnerabilities and system stability problems UpdateExpert enhances security, keeps systems up-to-date, eliminates sneaker-net, improves system’s reliability and QoS EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited improves system s reliability and QoS
  • 14. UpdateExpert: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 15. Tool: Qfecheck Qfecheck allows customers to diagnose and eliminate the effects of anomalies in theeliminate the effects of anomalies in the packaging of hotfixes for Microsoft Windows Qfecheck.exe determines which hotfixes are installed by reading the information stored in the following registry key:stored in the following registry key: • HKEY_LOCAL_MACHINESOFTWAREMicr osoftUpdates EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 16. Tool: HFNetChk HFNetChk is a command-line tool that enables the administrator to check the patch status of all the machines in a network remotelyp y It does this function by referring to an XML database that Microsoft constantly updates EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 17. cacls.exe Utility Built-in Windows 2000 utility (cacls.exe) can set access control list (ACLs) permissions globallycontrol list (ACLs) permissions globally To change permissions on all executable files to System:Full Administrators:Full:System:Full, Administrators:Full: •C:>cacls.exe c:myfolder*.exe /T /G System:F Administrators:F EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 18. Tool: Shavlik NetChk Protect Shavlik NetChk protect is a tool that automates the management of critical security patches spyware malware and unwanted software applications fromsecurity patches, spyware, malware, and unwanted software applications from one console It offers a solution for detecting, removing, and managing critical threats and l biliti ith ti l bilit tvulnerabilities with active vulnerability management Maintain secure, policy-compliant networks through automatic and ti t di ti d tcontinuous assessment, remediation, and management Features: • Patch Scanning • Extensive Reporting • Patch development EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Spyware Management • Desktop Application Control
  • 19. Shavlik NetChk Protect: Screenshot 1Screenshot 1 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 20. Shavlik NetChk Protect: Screenshot 2Screenshot 2 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 21. Shavlik NetChk Protect: Screenshot 3Screenshot 3 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 22. Tool: Kaseya Patch Management Kaseya Patch Management is used to keep your servers, workstations, and remote computers up to date with the latest security patches andand remote computers up-to-date with the latest security patches and updates It provides the automatic discovery of all missing patches and updates • Complete automation for patch discovery and deployment patch Features: p p y p y p • Location, deployment method, and parameter control reliable and up to date patch data base • Complete rollback • Comprehensive history and reporting EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Comprehensive history and reporting • Rapid deployment
  • 23. Kaseya Patch Management: Screenshot 1Screenshot 1 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 24. Kaseya Patch Management: Screenshot 2Screenshot 2 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 25. Kaseya Patch Management: Screenshot 3Screenshot 3 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 26. Tool: IBM Tivoli Configuration ManagerManager IBM's configuration manager provides Microsoft client and server softwareg g p patch automation capabilities in distributed environments Obt i k di t ib t d i t ll Mi ft ft t h d dObtains, packages, distributes, and installs Microsoft software patches needed by client systems in distributed customer environments Features: • Gathers software patch signature files and distributes them to client machines • Scans clients • Determines missing patches • Packages patches EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Packages patches • Builds patch deployment plans • Distributes required patches to clients
  • 27. IBM Tivoli Configuration Manager: Screenshot 1Screenshot 1 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 28. IBM Tivoli Configuration Manager: Screenshot 2Screenshot 2 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 29. Tool: LANDesk Patch Manager LANDesk's Patch Manager includes a subscription service that collects and l h f hanalyzes patches for heterogeneous environments It scans managed devices to identify application and operating systemg y pp p g y vulnerabilities It monitors the status of each install and provides bandwidth throttling, staging, d d t il d li d li ti b d f tiand detailed policy and compliance reporting across a broad range of operating systems It i d ti it b l ti t ith ti l bilit iIt increases productivity by evaluating systems with active vulnerability scanning It is used to gain control with a single tool to research review and download EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited It is used to gain control with a single tool to research, review, and download available patches
  • 30. LANDesk Patch Manager: ScreenshotScreenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 31. Tool: ConfigureSoft Enterprise Configuration Manager (ECM)Configuration Manager (ECM) ECM centralizes and automates the monitoring, managing and auditing of hardware and software configurations across Windows UNIX and Linuxhardware and software configurations across Windows, UNIX, and Linux platforms It automatically discovers new systems and tracks configuration changes at h d l d i l h il bili f h l h i f i ischeduled intervals to ensure the availability of the latest patch information is available • Vulnerabilities assessment and remediation Features: • Regulatory & operational compliance • Configuration management & control • Change management • Risk prevention and security management EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Risk prevention and security management • System optimization
  • 32. ConfigureSoft Enterprise Configuration Manager (ECM): Screenshotg ( ) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 33. Tool: BladeLogic Configuration ManagerManager BladeLogic Configuration Manager is a component of the BladeLogic O ti M it f d t t t ti d tOperations Manager suite of data center automation products It features a cross-platform command line interface that supports a single-sign i f h i i lon using a range of authentication protocols It supports a policy-based approach whereby changes are applied to a policy,pp p y pp y g pp p y and then synchronized with the target servers All user communication is encrypted, and all user actions are logged and canyp , gg be authorized based on a user’s role It allows IT organizations to monitor patch configure and update servers EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited It allows IT organizations to monitor, patch, configure, and update servers across platforms and data centers
  • 34. BladeLogic Configuration Manager: ScreenshotManager: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 35. Tool: Microsoft Baseline Security Analyzer (MBSA)Analyzer (MBSA) Microsoft baseline security analyzer determines critical updates and the required updates on the target computer It scans for common security mis-configuration errors on target computers It supports two interface for scanning: • GUI Scan (Mbsa.exe) • Command Line Interface (Mbsacli.exe) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 36. MBSA: Scanning Updates in GUI ModeMode MBSA d fi i i d di l h l f hMBSA defines scanning options and displays the results of the security scan in the MBSA window It scans and reports on updates designated as critical security updates by the Windows Update site Procedure: • Open MBSA • Enable the check For security updates option • Scan completion display XML file for the respective computer EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Scan completion display XML file for the respective computer
  • 37. MBSA: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 38. MBSA: Scanning Updates in Command-line Version The MBSA command line interface supports two types of scan namely:The MBSA command line interface supports two types of scan namely: •mbsacli [/c|/i|/r|/d domainname|ipaddress|ipaddressrange] [/n option] [/sus SUS server|SUS filename] [/s level] MBSA-style scan [/n option] [/sus SUS server|SUS filename] [/s level] [/nosum] [/nvc] [/o filename] [/e] [/l] [/ls] [/lr report name] [/ld report name] [/v] [/?] [/qp] [/qe] [/qr] [/q] [/f] [/unicode] •mbsacli /hf [-h hostname] [-fh filename] [-i ipaddress] [- fip filename] [-r ipaddressrange] [-d domainname] [-n] [-sus SUS server|SUS filename] [-fq filename] [-s 1] [-s 2] [- HFNetChk- style scan | ] [ q ] [ ] [ ] [ nosum] [-sum] [-z] [-v] [-history level] [-nvc] [-o option] [-f filename] [-unicode] [-t] [-u username] [-p password] [- x] [-?] EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 39. Tool: QChain Qchain allows to install multiple security updatesQchain allows to install multiple security updates It evaluates the drivers DLLs and executable files updated by each security updateIt evaluates the drivers, DLLs, and executable files updated by each security update It creates a batch file for the security update installationIt creates a batch file for the security update installation Batch file installs each security update with: • -z switch to prevent reboots after each security update installation • -m switch to enable unattended installs EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited m switch to enable unattended installs
  • 40. Qchain: Screenshot 1 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 41. Qchain: Screenshot 2 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 42. Qchain: Screenshot 3 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 43. Tool: BigFix Enterprise Suite (BFS)(BFS) BigFix Enterprise Suite platform provides patch management solution for distributed and multiplatform networks Roll back feature helps in securing the system in case of patches that misfiremisfire It enables audit trial of every action and step taken on each computer during the patch management process EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 44. BigFix Enterprise Suite (BFS): Screenshot 1Screenshot 1 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 45. BigFix Enterprise Suite (BFS): Screenshot 2Screenshot 2 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 46. Tool: Shavlik NetChk Protect Shavlik NetChk protect is a patch management solution for larger networks d i ti l itand organizational units Features: • Drag-n-Drop patch management interface controlled by the user enables scanning of the required groups • Security configuration management mitigates organizational costs and provides the security associated with the expensive breachesprovides the security associated with the expensive breaches • It automates the platforms and products such as Windows NT, XP,2000, etc • Performs scheduled scans • Uses options such as Command line scanning and scanning and Benefits: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Uses options such as Command line scanning and scanning and deployment with SQL server database
  • 47. Shavlik NetChk Protect: ScreenshotScreenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 48. Tool: PatchLink Update PatchLink Update is a patch and vulnerability solution for large networksp p y g It scans networks for security holes using fingerprint technology It translates security policies into automated and continuous protection against network vulnerabilitiesnetwork vulnerabilities Features: • Customized subscription notifications to include the required platforms and languages • Improved transaction/query efficiency that increases performance and EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited scalability • Proxy server authentication that increases deployment security
  • 49. PatchLink Update: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 50. Tool: SecureCentral PatchQuest SecureCentral PatchQuest is a web-based patch management software that manages and distributes security patches across various platformsmanages and distributes security patches across various platforms Four stages in working: • System addition & discovery • Patch assessment or scanning • Patch download and deployment • Reporting• Reporting Features: • Flexible modes of operation • Web-based administration console for universal secure-access to data views and configurations • Cross platform product installation EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Cross-platform product installation • Array of reports to facilitate quick access to the data required
  • 51. SecureCentral PatchQuest: Screenshot 1Screenshot 1 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 52. SecureCentral PatchQuest: Screenshot 2Screenshot 2 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 53. Tool: Patch Authority Ultimate Patch authority ultimate is ScriptLogic’s comprehensive and enterprise- class patch management solutionclass patch management solution It prevents attacks and exploits through centralized control of updates on all Windows desktops and serverson all Windows desktops and servers Benefits: • Leading patch database and scan engine • Selection, distribution, deployment, and reporting are all part of this comprehensive solution • Management reports show overall patch status across the networkg p p • Centralized management of patch policy and status for all computers, local and remote, on the LAN and across the Internet • A baseline of patches can be created to establish a "secure" machine • Enhanced security with central management of service status configuration EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Enhanced security with central management of service status, configuration, logon accounts, and scheduled task configuration
  • 54. Patch Authority Ultimate: ScreenshotScreenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 55. Tool: ZENworks Patch Management ZENworks Patch Management is a piece of automated patch management software It can be used to protect your network from the viruses by automating the process of discovering security alerts retrieving the patches and deployingsecurity alerts, retrieving the patches, and deploying the right ones to the right machines at the right time to prevent problems It provides patches for more than 40 different operating systems, applications, and software EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 56. ZENworks Patch Management: ScreenshotScreenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 57. Tool: Ecora Patch Manager Eroca Patch Manager automates system discovery, patch assessment, d h ll k dand patch installation on workstations and servers Features: • Agent-less or optionally agent-based • Views missing patches by systems, applications, specific patches, or Features: according to your policy • Patches any Windows application Microsoft supports, other companies' Windows-based patches, or patches for home grown applicationsapplications • Has automated patch roll-back on one or more machines • Logically groups systems for ease of management • Scheduled patch deployment EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited p p y
  • 58. Ecora Patch Manager: Screenshot 1Screenshot 1 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 59. Ecora Patch Manager: Screenshot 2Screenshot 2 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 60. Tool: Service Pack Manager Service Pack Manager enables system administrators to fix security vulnerabilities and stability problems in Windows NT/2000/XP/2003 and additional Microsoft products It allows to remotely detect, track, monitor, and install Windows NT/2000/XP/2003 Service Packs and Hotfixes on the enterprise networks from a central console Remote inventory, research, and deployment of the security vulnerabilities patches and stability updates make Service Pack Manager a highly cost-effective tool when used on thestability updates make Service Pack Manager a highly cost effective tool when used on the enterprise LANs and WANs The installation status of hundreds of hotfixes can be detected quickly on any number of remote computers It makes the task of maintaining security of the large networks viable EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited It makes the task of maintaining security of the large networks viable
  • 61. Service Pack Manager: ScreenshotScreenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 62. Tool: Altiris Patch Management SolutionSolution Altiris Patch Management Solution software proactively manages patches and f d b i h ll i l i d d li f hsoftware updates by automating the collection, analysis, and delivery of patches across your enterprise It helps you to decrease the costs involved in delivering patches throughout your enterprise and integrates with Altiris Recovery Solution for stable-state rollback It provides improved functionality in the analysis, collection, and distribution of OS and application updates It improves business continuity and accelerates IT systems’ security by reducing EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited p y y y y g the need for extended patch test cycles
  • 63. Altiris Patch Management Solution: Screenshot 1Screenshot 1 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 64. Altiris Patch Management Solution: Screenshot 2Screenshot 2 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 65. Tool: BMC Patch Manager BMC Patch Manager enables you to manage and deploy security and functional patches on desktops laptops PDAs and serverspatches on desktops, laptops, PDAs, and servers By automating critical patch management functions (patch collection, preparation, testing, staging, deployment, auditing), it helps you to save time,preparation, testing, staging, deployment, auditing), it helps you to save time, improve response times, and reduce attack-related risks Features: • Provides patch-testing capabilities that allow administrators to group test patch installations within sample environments • Allows you to deploy patches based on security policies for ongoing operations or specific tasks for emergency deploymentsoperations or specific tasks for emergency deployments • Identifies vulnerabilities, automatically delivers critical patches, and fixes to thousands of endpoints, and verifies deployment success • Allows you to proactively manage the distribution of patches including functional, anti-virus, and security patches to lower patch management EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited functional, anti virus, and security patches to lower patch management costs
  • 66. BMC Patch Manager: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 67. Tool: Hotfix Reporter Hotfix Reporter is a tool that works in conjunction with the Microsoft Network Security Hotfix Checker (HfNetChk) tool to scan your network server for missing patchesHotfix Checker (HfNetChk) tool to scan your network server for missing patches HfNetChk scans your system for missing patches, but displays the results in a raw, plain- text, and unfriendly format Hotfix Reporter converts the HfNetChk’s raw output into an HTML page, complete with clickable links, making it easy to download the necessary patches from Microsoft Features: C t HfN tChk t t i t f i dl HTML• Converts HfNetChk output into user-friendly HTML • Tells you if the scan gave different results than the last time it was run, making it easy to quickly tell if any new patches have been released • Displays Microsoft security bulletin numbers and knowledgebase article numbers as EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited clickable links • Shows the most recent patches first
  • 68. Hotfix Reporter: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 69. Tool: Numara Patch Manager Numara Patch Manager is a tool used to update and download patches for i f ’ i d li i i kMicrosoft’s operating systems and applications across your entire network It allows you to assess the patch status of all Microsoft-based workstations asy p well as validate any existing patches that have been installed It create baseline patch groups and scan groups of workstations to determineIt create baseline patch groups and scan groups of workstations to determine which ones are compliant and which ones are not It can also be used to perform patch scans during non-business hours or off-peakIt can also be used to perform patch scans during non business hours or off peak bandwidth periods Administrators can reboot workstations immediately or at a specified date or EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Administrators can reboot workstations immediately or at a specified date or time
  • 70. Numara Patch Manager: ScreenshotScreenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 71. Tool: TrueUpdate TrueUpdate is a comprehensive solution for software developers wanting to i i d i bili i i h i f li iintegrate automatic updating capabilities into their software applications It gives you a robust client/server framework for determining required updates, and then retrieving and applying the necessary patches or installation filesand then retrieving and applying the necessary patches or installation files using standard Internet protocols Features: • The client can easily be integrated into existing software or installed as a standalone application • Compatible with any update/patching method, from full setups and eatu es: p y p /p g p self-contained binary patches to download and extract from zip files • The system is always up-to-date with the latest software and patches • Includes more than 250 high level actions with everything from registry editing and file copying to web server script interaction and h EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited much more
  • 72. TrueUpdate: Screenshot 1 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 73. TrueUpdate: Screenshot 2 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 74. TrueUpdate: Screenshot 3 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 75. Tool: FlashUpdate FlashUpdate is a software update solution for windows developersFlashUpdate is a software update solution for windows developers It allows you to create manage and distribute your software updates and patchesIt allows you to create, manage, and distribute your software updates and patches in a flash • Advanced Patch Engine provides up to 98% file compression Features: • Advanced Patch Engine provides up to 98% file compression • Adaptive patch creation for optimal patch size and speed efficiency • Support for all file types, including executable files, system files, data files, and documents • Native support for shared and locked files EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited pp • Helps to prevent software piracy
  • 76. FlashUpdate: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 77. Tool: Microsoft Software Update Services (SUS)Services (SUS) Software Update Services (SUS) supports updating for a broader set of MicrosoftSoftware Update Services (SUS) supports updating for a broader set of Microsoft products and provides robust management and reporting features It connects through your firewall to the windows update site and allows IT administrators to import critical updates, security updates, and service packs Administrators can receive e-mail notification when updates are added to their SUS pipeline It consists of both client-side and server-side components to provide a basic EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited p p solution to critical update management
  • 78. Microsoft Software Update Services (SUS): Screenshot 1(SUS): Screenshot 1 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 79. Microsoft Software Update Services (SUS): Screenshot 2(SUS): Screenshot 2 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 80. Tool: Prism Patch Manager Prism Patch Manager automatically secures windows systems from software vulnerabilities by managing the entire software patchingsoftware vulnerabilities by managing the entire software patching process It manages the software patching process such as discovering vulnerabilities, acquiring and testing patches, and deploying patches It delivers comprehensive reporting to demonstrate patch compliance to management and auditors It reduces organizational risk, improves IT productivity, and lowers the f IT i f i EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited cost of IT infrastructure maintenance
  • 81. Prism Patch Manager: Screenshot 1Screenshot 1 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 82. Prism Patch Manager: Screenshot 2Screenshot 2 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 83. Tool: Patch-Magic Patch-Magic updates all computer systems in your network It avoids viruses and worms, and minimizes security risks It can be used to scan each system individually, to discover necessary patches and updates, and to install them remotely • Intuitive view and description of missing patches A t t t h d l d d i di id l d l t Features: • Automates patch download and individual deployment • Identifies and removes remote malware in your LAN • Time scheduler for scans, deployment, and data base update • Supports virus scanning proxy servers / firewalls C t li d t f t h t th l ti f h i ( t h lib ) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Centralized storage of patches at the location of your choice (patch library) • Intelligent reboot handling
  • 84. Patch-Magic: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 85. Patch Management Checklist H ft d h d l t h ?How often and when do you apply patches? Who can deploy and/or authorize updates? How are patches tested prior to rollout? What problems will trigger a rollback? EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited What problems will trigger a rollback?
  • 86. Best Practices for Patch ManagementManagement Test the patch before rollout to ensure that the applied patch is compatible with other applicationsapplications You need to have a rollback version when the applied patch fails Do not deploy multiple patches simultaneously across the network as it will halt other applications and will be inconvenient for users D l th t h ft d ti h b t i i d f i t hDeploy the patches after production hours as reboot is required for maximum patches Always check for latest releases to minimize downtime as often a user calls or virus initiates a frantic search for a missing patch If you patch regularly, you need to keep track of what fixes were applied, when, for auditing and reporting EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Follow the defined patch process which specifies who may approve patches and procedures to deploy them
  • 87. Summary A hotfix is a code that fixes a bug in a productA hotfix is a code that fixes a bug in a product Patch Management is the process of correcting deficiencies andg p g updating software with the latest features Windows patch management involves: testing, deployment, andp g g, p y , validation i f S f d S i (S S) h i d dMicrosoft Software Update Services (SUS) hosts windows updates Designing a deployment plan to distribute patch on a timely basis is EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Designing a deployment plan to distribute patch on a timely basis is one of the best practices in the patch management