Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Microsoft Systems Management Server 2003 : The Four-Phase Patch Management Process (part 1) - The Assess Phase, The Identify Phase

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
7/22/2013 5:47:25 PM

As detailed earlier, the Microsoft-recommended patch management process is a four-phase process: Assess, Identify, Evaluate & Plan, and Deploy. The process is a continuous cycle, reflecting the reality of operations management. As the result of an alert of software update, the organization shifts from the Assess phase to the Identify phase and begins its journey through the process cycle. It’s important to realize that movement through the phases of the process is updatespecific. This means that if an organization is in the Evaluate & Plan phase in response to one update when an alert is received for another, the organization will move to the Identify phase for the second update and be in two phases of the process simultaneously. This can pose both logistical and technical challenges to the organization, especially if the alerts are somewhat related or dependencies exist in the updates, and care should be taken.

1. The Assess Phase

The Assess phase is the first phase in the patch management process. In the Assess phase the organization is concerned primarily with the ongoing assessment of its production environment covered by the patch management process and with monitoring for alerts of software updates. Although many of the steps and tasks in the Assess phase are similar to the tasks undertaken during preparation for the implementation of a patch management process, they’re instead focused on optimizing and improving the existing patch management process.

Inventorying and Discovering Existing Computing Assets

As part of the operations of any production environment, IT assets will be added, updated, or retired. This task in the Assess phase is concerned solely with ensuring that the record of IT assets is accurate. As assets are added to the production environment, they should be inventoried and evaluated for inclusion into the patch management process. Assets that are retired should be removed from the record and from the patch management process. Existing assets should continuously be inventoried to ensure that their configuration hasn’t changed without a formal change management process or the patch management process. You can automate these tasks somewhat by using SMS 2003’s Active Directory and network-based discovery techniques, which are especially useful for discovering unmanaged or rogue systems that were deployed outside a management process.

Assessing Security Threats and Vulnerabilities

Although the IT assets within an organization might have the latest software updates applied to them, there might still be risk from security threats and vulnerabilities introduced by the addition, configuration, or removal of hardware or software components. The organization needs to remain vigilant and check for vulnerability using tools such as the Microsoft Baseline Security Analyzer (MBSA), available from http://www.microsoft.com/mbsa and the Software Update Inventory Tools for SMS 2003, which are described later. When vulnerability is discovered, you need to undertake a risk analysis to determine the best course of action. 

Determining the Best Source for Information About Software Updates

The patch management team needs to remain informed about new software updates for IT assets under control of the patch management process. The team can remain informed by subscribing to e-mail notifications, visiting vendor Web sites, and through regular contact with representatives of software vendors.

Microsoft’s authoritative Web site for information about security bulletins is http://www.microsoft.com/security, where users can also sign up for e-mail notification of software updates and security bulletins issued by Microsoft.

Assessing the Existing Software Distribution Infrastructure

Although careful planning and implementation might yield a versatile patch management infrastructure that meets the needs of the organization at implementation time, it might not suffice as the organization changes. The patch management team needs to assess the patch management infrastructure continuously to ensure that it continues to meet the organization’s needs. SMS 2003 is an extremely flexible management solution and can be reconfigured as needed to support the addition, change in configuration, or removal of categories of IT assets or sites.

If the Assess phase was entered after the completion of the last phase in the patch management process, the Deploy phase, the organization should evaluate how successful the deployment of the software update was. If problems were encountered, the infrastructure should be examined for problems.

Assessing Operational Effectiveness

Lastly, in the Assess phase the patch management team needs to validate the entire patch management process. They need to ask questions such as the following: Does the patch management team have the necessary resources? Do key security stakeholders have the necessary training and understanding of the patch management process? Are formal processes in place for day-to-day operations that have an impact on security? You can find the Microsoft Operations Framework Self-Assessment Tool, designed to gauge an organization’s operational excellence, at http://www.microsoft.com/technet/itsolutions/tandp/opex/moftool.asp.

As with assessing the software distribution infrastructure for problems after a deployment, the patch management team should assess the operational effectiveness of the process, including their own performance. Lessons learned in this assessment should be applied in order to improve operational excellence for future software updates.

Leaving the Assess Phase and Moving to the Identify Phase

When the patch management team receives notification of a software update that affects the production environment, the patch management process moves into the Identify phase.

2. The Identify Phase

During the Identify phase of the four-phase patch management process, the organization is focused on gathering information about the software update that triggered entry into the Identify phase, whether or not the update is relevant to the production environment; obtaining the software update itself; and categorizing the update as either an emergency update or one that can be dealt with routinely within the time frame set by the organization for software updates.

Discovering New Software Updates Reliably

When an organization receives an e-mail alert from Microsoft about a software update, the alert contains links to Microsoft’s Security & Privacy Web site, found at http://www.microsoft.com/security, where more detailed information is made available. Organizations might choose to subscribe to other sources of information about software updates or receive e-mail messages from account representatives or other Microsoft employees. Regardless of where the alert came from, the patch management team needs to verify its authenticity. For alerts detailing software updates to Microsoft products, the authoritative source of information is the Microsoft Security & Privacy Web site, which the team should visit. Of special note, Microsoft never releases software updates as attachments to e-mail messages. If the team receives an e-mail message with an attachment purporting to come from Microsoft and containing a software update, the safest course of action is to delete the message. Similarly, rather than clicking on links contained in e-mail messages that appear to take the reader to a Microsoft Web site, the reader should copy and paste the URL into their browser, as the true Web site that the user will be taken to can be hidden in the formatting of the e-mail message.

SMS 2003 Software Updates, when configured, will automatically poll Microsoft’s Web sites, looking for information about software updates in the products that it’s aware of. Using the SMS Administrator Console, you can view just about every applicable software update for the production environment, along with the number of systems that are in compliance and those that are not. Figure 1 shows a screen shot of software updates listed in the SMS Administrator Console.

Figure 1. Software updates listed in the SMS Administrator Console.

Determining Whether Software Updates Are Relevant

Benjamin Franklin wrote, “In this world nothing is certain but death and taxes.” Although this was written long before software was invented, today he would no doubt feel compelled to add software updates to the list of certainties faced in life. The fact is that software releases are made on a continual basis and can come from a variety of sources, such as operating systems and application vendors, independent software vendors (ISVs), original equipment manufacturers (OEMs), and hardware manufacturers. Not every released software update will necessarily apply to an organization’s production environment, even when it touches a software product in use. The patch management team will need to evaluate and determine whether or not patches are relevant to the production environment covered by the patch management process. For example, a software update to a word-processing package that’s deployed within the organization might apply only to a feature that isn’t installed or used, or perhaps the risk from not installing the update is considered so low that it can be safely ignored. A good starting point for evaluating the relevance of a software update issued by Microsoft is the detailed bulletin found on Microsoft’s Security & Privacy Web site at http://www.microsoft.com/security. The bulletin will contain details of the vulnerability addressed by the update, any mitigating factors that might affect the requirement to update a system, and any workarounds if available.

Each software update should be assessed from a risk management perspective, with the organization making a determination about whether or not the update should be applied to its affected IT assets. When considering the risk from not installing an update, the organization must balance it against the risk from installing the update. Risk from installation includes incompatibilities with already-installed applications, system instability, and loss of functionality.

As described earlier, SMS 2003 Software Updates can be configured to poll Microsoft’s Web sites for details of available software updates and list them in the SMS Administrator Console. Only updates that are applicable to the production environment are listed. An update is deemed to be applicable when one or more SMS Clients scans itself and determines that the update should be applied and reports this information to an SMS site server.

Obtaining and Verifying Software Update Source Files

When assessing the relevance of a software update, it’s often desirable to have the source files for the update at hand. The patch management team should take care when obtaining software updates to ensure that they come from legitimate sources only. Every software update that Microsoft releases is digitally signed, and you can verify its authenticity by examining the signature. Although you can do this manually, you can also do it using SMS 2003. When a software update is identified as relevant to the production environment and listed under Software Updates in the SMS Administrator Console, it can be included in a package built by the Distribute Software Updates Wizard. You can instruct the wizard to download software updates automatically, and it will check the signature of each as it does so. If the wizard is unable to download a software update automatically, which might be the case if different updates exist for different platforms and configurations or if the patch management team prefers to download updates by hand, you can verify the software update’s digital signature through its properties using Microsoft Windows Explorer. Figure 2 shows the dialog box of a software update’s digital signature, accessible through Windows Explorer.

Figure 2. A digital signatures dialog box, accessible through Windows Explorer.


Until a software update identified in an alert has been successfully downloaded and verified, the patch management process can’t leave the Identify phase.

Determining the Nature of the Software Update and Submitting a Request for Change

Every software update released by Microsoft is assigned a severity rating. The purpose of the ratings is to provide guidance to administrators and patch management teams about the urgency with which the update should handled. These ratings, and their meanings, are listed in Table 1. You can find full details of the ratings used by Microsoft in TechNet at http://www.microsoft.com/technet/security/bulletin/rating.asp.

Table 1. Software update severity ratings
RatingDefinition
CriticalA vulnerability whose exploitation could allow the propagation of an Internet worm without user action.
ImportantA vulnerability whose exploitation could result in compromise of the confidentiality, integrity, or availability of users’ data or of the integrity or availability of processing resources.
ModerateExploitability is mitigated to a significant degree by factors such as default configuration, auditing, or difficulty of exploitation.
LowA vulnerability whose exploitation is extremely difficult or whose impact is minimal.

The patch management team should take an update’s severity rating into account when determining its nature. Software updates with a low rating might be safely ignored until a predefined refresh cycle is begun, whereas an update rated as critical might need to be deployed as soon as possible. Mitigating factors should also be taken into consideration when determining the nature of an update. For example, with sufficient perimeter defenses and a secure VPN in place, a patch management team might consider not rushing an update for a newly discovered vulnerability that a worm is exploiting if the port used by the worm to propagate itself is blocked at the firewall and not allowed over a VPN connection.

Other considerations that the patch management team should examine are the impact of the update on the production environment. For example, does the update require systems to be restarted after installation and can it be rolled back if it’s determined that the update has a negative effect on the production environment?

Once the patch management team has completed determining the nature of the software update, it should submit an RFC to the Change Management Board.

Leaving the Identify Phase and Moving to the Evaluate & Plan Phase

The events that trigger leaving the Identify phase and the handover to the Evaluate & Plan phase are the successful acquisition of the software update and the submission of the RFC.

Other -----------------
- Microsoft Systems Management Server 2003 : Patch Management - Preparing for Patch Management
- Microsoft Systems Management Server 2003 : Patch Management - The Need for Effective Patch Management, Introduction to the Patch Management Process
- Windows Server 2012 : Configuring post-installation settings
- Windows Server 2012 : Enabling and disabling the graphical interface in Hyper-V
- Windows Server 2012 : Managing a Server Core installation using sconfig
- SQL Server 2012 : Running SQL Server in A Virtual Environment - EXTENDED FEATURES OF VIRTUALIZATION
- SQL Server 2012 : Running SQL Server in A Virtual Environment - VIRTUALIZATION CONCEPTS
- SQL Server 2012 : Running SQL Server in A Virtual Environment - COMMON VIRTUALIZATION PRODUCTS
- What's new and improved in SharePoint 2013 : Creating an asset library
- What's new and improved in SharePoint 2013 : Using the Office Store
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server