Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Microsoft Systems Management Server 2003 : Patch Management - The Need for Effective Patch Management, Introduction to the Patch Management Process

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
7/22/2013 5:43:34 PM

1. The Need for Effective Patch Management

Today’s computer systems and networks are under an unprecedented level of threat, ranging from viruses and worms to malicious insiders. Patch management, when properly implemented as part of a defensive strategy, can help organizations adopt a security posture and mitigate vulnerability in their systems. Consequently, patch management is becoming an increasingly important topic for both management who are anxious to demonstrate corporate responsibility to shareholders and for the IT manager, whose job it is to maintain and keep running secure systems.

Trojan Horses, Viruses, and Worms

According to the joint 2003 Computer Security Institute/Federal Bureau of Investigation Computer Crime and Security Survey, 82 percent of respondents detected an attack related to a virus, which was defined as a virus, a Trojan horse, or a worm. The average reported loss due to virus activity was $199,871 per organization. The past 12 months have seen two fast-spreading and debilitating worms: SQL Slammer and MS Blaster. Before that there were Code Red and Nimda. Many organizations had to expend considerable resources defending against and cleaning up after these attacks against their infrastructure.

As alarming as this state of affairs is, what is perhaps more alarming is that in each case updates were available to remove the vulnerability exploited by each worm. Figure 1 shows the time from release of an update to discovery of an exploit in the wild for some of the more damaging of the recently discovered Trojan horses, viruses, and worms.

Figure 1. Time from release of update to discovery of exploit in the wild.


As the chart shows, the trend is moving towards zero-day exploits, where an exploit is discovered on the same day that Microsoft releases an update to remove the vulnerability. The diminishing window between update and exploit is perhaps one of the more compelling arguments for an organization to implement a patch management process, one that’s capable of deploying updates quickly, reliably, and efficiently.

2. Introduction to the Patch Management Process

This process, introduced in MSM 2.5, uses a four-phase approach of Identify, Evaluate & Plan, and Deploy and was based on several MOF functions. Also discussed is the implementation of an SMS 2003 infrastructure and its functions in patch management and deployment, along with instructions on responding to patch emergencies and accelerated timelines.

The Microsoft Operations Framework (MOF)

There are many approaches to planning and implementing patch management solutions. The preferred approach is to base a solution upon an existing operations framework, such as MOF. MOF was designed to provide prescriptive guidance to organizations about how to manage their IT operations. MOF consists of three models:

  • The process model

  • The team model

  • The risk model

Of specific interest to patch management, the MOF process model is a functional model of the processes performed by operations teams when managing and maintaining IT Services. It’s based upon the Office of Government Commerce’s IT Infrastructure Library (ITIL), a widely accepted body of practice for operations management. The team model and risk model might also be of interest, as they provide guidance on the formation of patch management teams, including duties and responsibilities, and a structured approach to managing risk, which is useful when evaluating alerts of vulnerability and software updates and determining the best course of action.

The MOF process model defines four quadrants of management, as shown in Figure 2. The quadrants are Changing, Operating, Supporting, and Optimizing. Each quadrant has a mission of service. In the Changing quadrant the mission is to introduce new service solutions, technologies, systems, applications, and processes. The mission of the Operating quadrant is to perform and manage the daily tasks associated with running IT Services. As the name suggests, the Supporting quadrant’s mission is to resolve incidents, problems, and inquiries as they arise. Lastly, the Optimizing quadrant’s mission is to examine the environment the IT Services run in and drive changes to optimize cost, performance, capacity, and availability.
Figure 2. The MOF process model.


Within each quadrant are major management review processes. These are necessary checkpoints used to guarantee success of the management processes. The reviews are split into two categories: time-based and release-based. The Release Readiness Review and Release Approved Review are release-based reviews and take place before and after a release into the computing environment. The Operations Review and SLA (Service Level Agreement) Review, both time-based reviews, should occur at regular intervals to assess the performance of the internal operations and the agreed-upon customer service levels.

Any comprehensive patch management solution will touch on all four quadrants of the MOF process model—for example, an organization is focused on auditing systems for patch compliance and monitoring alerts for vulnerability and software updates in the Operating quadrant, on assessing and planning response to alerts and downloading and evaluating any updates in the Supporting quadrant, packaging and testing updates in the Optimizing quadrant, and distributing and installing updates as well as auditing and rolling back the update if required in the Changing quadrant.

The Microsoft-Recommended Patch Management Process

Introduced in Microsoft Solutions for Management 2.5 and based on the MOF Change Management, Release Management, and Configuration Management service management functions, the Microsoft-recommended patch management process is a four-phase approach to managing updates to software. The four phases are Assess, Identify, Evaluate & Plan, and Deploy. The process and its four phases are shown in Figure 3.

Figure 3. The Microsoft-recommended four-phase patch management process.


Defined events trigger movement through the phases of the process. Beginning with the Assess phase, the triggering event that causes a move to the Identify phase is notification that a software update exists. The event that causes a move from the Identify phase to the Evaluate & Plan phase is the submission of a formal Request for Change (RFC). The triggering event for a move to the Deploy phase from the Evaluate & Plan phase is the receipt of approval to deploy the software update into the production environment. Finally, the move from the Deploy phase to the Assess phase and the beginning of the process cycle again is triggered by completion of the release of the software update.

Within each phase there are discreet steps that together implement the patch management process. These steps, and the phases they belong to, are described in Table 1.

Table 1. Steps in the four-phase patch management process
PhaseSteps
AssessInventory/discover existing computing assets.

Assess security threats and vulnerabilities.

Determine the best source for information about new software updates.
 Assess the existing software distribution infrastructure.Assess operational effectiveness.
IdentifyDiscover new software updates in a reliable way.

Determine whether software updates are relevant.

Obtain and verify software update source files.

Determine nature of software update and submit RFC.
Evaluate & PlanDetermine the appropriate response.

Plan the release of the software update.

Build the release.

Conduct acceptance testing of the release.
DeployDeployment preparation.

Deployment of the software update to targeted computers.

Post-implementation review.

Although no technology solution can automate the entire patch management process, they can help somewhat, and SMS 2003 integrates well into patch management processes.

Other -----------------
- Windows Server 2012 : Configuring post-installation settings
- Windows Server 2012 : Enabling and disabling the graphical interface in Hyper-V
- Windows Server 2012 : Managing a Server Core installation using sconfig
- SQL Server 2012 : Running SQL Server in A Virtual Environment - EXTENDED FEATURES OF VIRTUALIZATION
- SQL Server 2012 : Running SQL Server in A Virtual Environment - VIRTUALIZATION CONCEPTS
- SQL Server 2012 : Running SQL Server in A Virtual Environment - COMMON VIRTUALIZATION PRODUCTS
- What's new and improved in SharePoint 2013 : Creating an asset library
- What's new and improved in SharePoint 2013 : Using the Office Store
- What's new and improved in SharePoint 2013 : Customizing the interface
- What's new and improved in SharePoint 2013 : Creating a new site
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server