Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
programming4us
Windows 7

Designing an Update Management Strategy : Configuring an Update Testing Infrastructure, Verifying Update Deployment

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
1/14/2013 11:50:23 AM

1. Configuring an Update Testing Infrastructure

Although Microsoft tests updates rigorously before releasing them publicly, no one can test every possible software and hardware configuration for adverse side effects that might result when an update is applied. For this reason, you should deploy updates to a small group of computers prior to deploying updates to all computers in your organization and test those computers to determine whether a newly released update conflicts with your organization’s specific software configuration.

You should ensure that the small group of computers on which you test updates match the software and hardware configuration of computers in your organization and that the computers used for testing are actually used by real people to perform their everyday job-related tasks. You need to do this because you will not be able to detect all possible problems by simply installing the update on a computer that no one actually uses. Only through testing the updates under real-world conditions do any conflicts or other problems become evident.

You should ensure that you deploy updates to the test computers long enough that you have confidence that the updates do not cause problems when deployed generally. You must balance this with not waiting so long that the computers in your organization become vulnerable to the issue that the update addresses. In many organizations, updates are deployed to test computers between 7 to 10 days before being deployed to all other computers in the organization. This period provides enough time to test that the updates do not cause obvious problems with the existing configuration before rolling the updates out more generally.

A basic update testing infrastructure would have a separate computer group containing the WSUS computer accounts for all test computers. A WSUS automatic approval rule for all new updates would apply to this WSUS computer group. The WSUS administrator would manually approve updates for the All Computers group after a seven-day period in which no issues had been reported by users of computers that are located in the test group.

2. Verifying Update Deployment

The final component in a successful update strategy is ensuring that updates deploy correctly to client computers. There are many reasons why updates might not deploy correctly to client computers, including but not limited to the computer being switched off for a lengthy period of time, synchronization problems, and lack of disk space on the client.

One of the simplest ways that you can verify the updates that are installed on local and remote computers running Windows 7 and which are members of the same domain is to manually use the Get-Hotfix Windows PowerShell command. You can use the –Computername option to specify the address of the remote computers that you want to check.

For example, the command

Get-HotFix -Computername wkstn1,wkstn2,wkstn3,wkstn4

provides a report on all of the updates installed on computers wkstn1, wkstn2, wkstn3, and wkstn4. Although this is a quick way to verify which updates are installed on a small number of computers, it is not an effective technique for determining the status of missing updates across a large number of computers. This is because the output will tell you only which updates are present on the target computers and will not tell you which updates are missing from the target computers.

WSUS Reports

One way you can determine which updates are missing from client computers in your organization is to use WSUS reports. WSUS servers generate reports based on information forwarded to the WSUS server from the server’s WSUS clients. When a WSUS client retrieves and successfully installs an update, it reports this success back to the WSUS server.

WSUS servers do not query clients to determine whether specifically approved updates are missing and they can use only information that active clients report back to them. This distinction is important because you cannot learn anything about the update status of client computers that have not reported to the WSUS server. To find out whether a client computer has suffered some unforeseen configuration problem it has not reported, you must use a tool such as the Microsoft Baseline Security Analyzer, covered later in this lesson, to query client computers to determine whether specific updates are missing.

You can access WSUS reports from the Reports node of the WSUS console, as shown in Figure 1. WSUS reports can be printed or exported to Microsoft Office Excel or PDF format. Because WSUS data can be forwarded to a SQL Server database, you can also perform a separate analysis using your own database queries. There are several basic categories of reports that allow you to view how successful the deployment of a specific update has been or the update status of specific WSUS server clients.

WSUS reports

Figure 1. WSUS reports

Microsoft Baseline Security Analyzer

As mentioned, you can use Microsoft Baseline Security Analyzer (MBSA) to scan client computers in an organization to determine whether they are missing software updates. You can configure the MBSA tool to check whether a computer is up to date with the updates published by Microsoft through the Microsoft Update servers. You can also configure the MBSA tool to check against the list of approved updates hosted on a local WSUS server. This practice allows you to determine whether a computer is up to date with the updates that have been approved for your specific environment. When used to scan against a WSUS server approval list, the MBSA tool scans using the WSUS server assigned to the scanning computer through policy.

The person performing the scan of remote computers must do so with a user account that is a member of the local administrators group on each remotely scanned computer. This requirement ensures that nefarious third parties cannot use the MBSA tool to determine what vulnerabilities computers might have. The MBSA tool can also be used to locate common administrative vulnerabilities incurred by problematic configuration practices.

You can use the MBSA tool to scan all computers that are members of a specific domain or all computers that are located in a particular IP address range, as shown by Figure 2. When scanning computers, ensure that the Check For Security Updates option is configured. Then you need to choose between configuring the scan to use Microsoft Update or the WSUS server that is configured for the computer performing the scan.

Scanning multiple computers with the MBSA tool

Figure 2. Scanning multiple computers with the MBSA tool

Keep in mind that only Microsoft Baseline Security Analyzer 2.11 and later are compatible with the Windows 7 operating system. You install and use the Microsoft Baseline Security Analyzer in the practice exercise at the end of this lesson.

Other -----------------
- Zero Touch Installations : Creating and Capturing a Reference Image (part 3) - Advertise the Reference Image Task Sequence, Run the Reference Image Task Sequence
- Zero Touch Installations : Creating and Capturing a Reference Image (part 2) - Install Packages on the Distribution Points, Create a Collection and a Computer Association
- Zero Touch Installations : Creating and Capturing a Reference Image (part 1)
- Preparing and Configuring Boot Images (part 2) - Adding Drivers to a Boot Image
- Preparing and Configuring Boot Images (part 1) - Creating Boot Images
- Microsoft Access 2010 : Using Reports to Print Information - Printing a Report
- Microsoft Access 2010 : Using Reports to Print Information - Opening and Viewing a Report
- Programming Drivers for the User Mode Driver Framework - Driver Dynamic-Link Library and Exports
- Creating a Home Network : Setting Up a Wireless Network
- Creating a Home Network : Setting Up a Wired Network with a Router
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server