Software Updating: Hitting the Mark

Size: px
Start display at page:

Download "Software Updating: Hitting the Mark"

Transcription

1 Software Updating: Hitting the Mark Ravi Sankar Technology Evangelist Microsoft Corporation

2 Agenda Update Management Overview Update Management Process Update Management Tools

3 The Business Case While determining the financial impact of poor update management consider the following Downtime Remediation time Data integrity Lost credibility with customers and partners Negative public relations Legal defenses Stolen Intellectual Property

4 Understanding the Vulnerability Timeline Most Attacks occur here Product Shipped Vulnerability Discovered Vulnerability Disclosed Update Made Available Update Deployed Malware Attack (Year) Nimda (2000) 336 SQLP (2002) 185 Days between update and exploit Days between update and exploit have decreased MSBLAST(2003) 26 SASSER(2004) 17 ZOTOB(2005) 5

5 Agenda Update Management Overview Update Management Process Update Management Tools

6 Requirements for Successful Update Management Project management, four-phase update management process Effective Processes People who understand their roles and responsibilities Tools and Technologies Effective Operations Products, tools, automation

7 Update Management Process Assess Assess Identify Evaluate Deploy and Plan Inventory computing assets Assess threats and vulnerabilities Inventory Discover Determine Prepare for computing new whether deployment updates the assets Assess Determine update Deploy threats is the actually whether update and required to updates vulnerabilities are Plan targeted relevant the release computers to your of the Determine environment update Review the the deployment best source 1 for Assess information Obtain Build the update, release about confirm new it is updates safe Perform acceptance testing Assess Determine your if software update is a distribution normal change infrastructure or an Deploy emergency 4 Assess operational effectiveness Determine the best source for information about new updates Assess your software distribution infrastructure Assess operational effectiveness Deploy Prepare for deployment Deploy the update to targeted computers Review the deployment Identify Discover new updates Determine whether updates are relevant to your environment Obtain update, confirm it is safe Determine if update is a normal change or an emergency 2 Identify Evaluate and Plan 1 Assess 3 4 Deploy Evaluate and Plan 2 Identify Determine whether the update is actually required Plan the release of the update Build the release Perform acceptance testing 3 Evaluate and Plan

8 Choosing an Update Management Solution Customer type Scenario Solution Consumer All scenarios Microsoft Update Small organization Medium-sized or large enterprise Has no Windows servers Has one to three Windows 2000 or newer servers and one IT administrator Wants an update management solution with basic control to update Windows 2000 and newer versions of Windows Wants a single flexible update management solution with extended level of control to update and distribute all software Microsoft Update MBSA and WSUS MBSA and WSUS System Center Configuration Manager

9 Update Management Solution for Consumers and Small Organizations Update management solution based on Protect Your PC: 1. Use an Internet firewall 2. Get computer updates from Microsoft Update 3. Use up-to-date antivirus software 4. Deploy Windows XP SP 2 5. See the Protect Your PC page on the Microsoft Security at Home Web site

10 MBSA Benefits Scans systems for: Missing security updates Potential configuration issues Works with a broad range of Microsoft software Allows an administrator to centrally scan multiple computers simultaneously MBSA is a free tool, and can be downloaded from the Microsoft Baseline Security Analyzer page on the Microsoft TechNet Web site

11 MBSA Considerations MBSA reports important security issues: Password weaknesses Guest account not disabled Auditing not configured Unnecessary services installed IIS security issues Internet Explorer zone settings Automatic Updates configuration Windows firewall configuration

12 MBSA How It Works Windows Download Center WSUSScan.cab MBSA Computer

13 MBSA Scan Options MBSA has two scan options: MBSA graphical user interface (GUI) MBSA standard command-line interface (mbsacli.exe) When scanning for security updates, you can configure MBSA to: Update the Microsoft Update Agent on all scanned computers Use a WSUS server as the update source Use Microsoft Update as the update source Now you can Integrate it with new MBSA Visio Connector

14 Windows Server Update Services (WSUS) Benefits Gives administrators control over update management Administrators can review, test, and approve updates before deployment Simplifies and automates key aspects of the update management process Can be used with Group Policy, but Group Policy is not required to use WSUS Easy to implement Free tool from Microsoft

15 WSUS How It Works Microsoft Update Firewall Pilot Computers Group WSUS Server Client Computers Group WSUS Administrator Windows Servers Group

16 WSUS Deployment Scenarios Microsoft Update Firewall Independent WSUS Server Regional Client Computers Main Office WSUS Server Disconnected WSUS Server Remote Office Client Computers Replica WSUS Server Main Office Client Computers

17 WSUS Client Component The client component of WSUS is Automatic Updates Can be configured to pull updates either from corporate WSUS server or from Microsoft Update Three ways to configure Automatic Updates: Centrally, by using Group Policy Manually configure clients Use scripts to configure clients

18 WSUS Server Component The server component of WSUS is Windows Server Update Services Can synchronize updates from Microsoft Update on a schedule Provides a Web-based administrative GUI Has several built-in default security features Provides synchronization and update reports Uses MSDE or SQL Server database to store update metadata, events, and settings Interface is localized in 17 languages

19 How to Use WSUS On the WSUS server: 1 Administer the WSUS server at name>/wsusadmin Configure the WSUS server synchronization schedule and settings Create client computer groups and assign computers Review, test, and approve updates On each WSUS client: Configure Automatic Updates on the client to use the WSUS server

20 Systems Management Server Benefits For a full software distribution update management solution, use: System Management Server 2003 or System Center Configuration Manager 2007 Benefits of using System Management Server: Gives administrators comprehensive control over update management Automates key aspects of update management Can update a broad range of Microsoft products Can be used to update third-party software and install other software updates or applications

21 Systems Management Server How It Works Microsoft Update Firewall System Management Server Distribution Point System Management Server Clients System Management Server Distribution Point System Management Server Site Server System Management Server Clients System Management Server Clients

22 Best Practices for Update Management Implement a good update management process Choose a update management solution that meets your organization s needs Subscribe to the Microsoft Security Notification Service Make use of Microsoft guidance and resources Keep your systems up to date

23 Session Summary Implementing security updates promptly is a critical component in a security management plan Update management needs to follow your standard network management processes For small and medium-sized business, MBSA and WSUS together provide an excellent update management solution

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER Course Code: 20703-1a Duration 5 days Introduction This five-day course describes how to use Configuration and its associated site systems to efficiently

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Administering System Center Configuration Manager Course 20703-1A 5 Days Instructor-led, Hands on Course Information This five-day course describes how to use Configuration Manager and its associated site

More information

Administering System Center 2012 Configuration Manager

Administering System Center 2012 Configuration Manager Course 10747: Administering System Center 2012 Configuration Manager Page 1 of 8 Administering System Center 2012 Configuration Manager Course 10747: 4 days; Instructor-Led Introduction This four-day instructor-led

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Administering System Center Configuration Manager 20703-1; 5 Days; Instructor-led Course Description This five-day course describes how to use Configuration Manager and its associated site systems to efficiently

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Course 20703-1A: Administering System Center Configuration Manager Course Outline Module 1: Managing computers and mobile devices in the enterprise This module describes the features of Configuration Manager

More information

A: Administering System Center Configuration Manager

A: Administering System Center Configuration Manager 20703-1A: Administering System Center Configuration Manager Duration: 5 days; Instructor-led WHAT YOU WILL LEARN This five-day course describes how to use Configuration Manager and its associated site

More information

Course A: Administering System Center Configuration Manager

Course A: Administering System Center Configuration Manager Course 20703-1A: Administering System Center Configuration Manager Overview: This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network

More information

Administering System Center 2012 Configuration Manager

Administering System Center 2012 Configuration Manager Administering System Center 2012 Configuration Manager Duration: 5 Days Course Code:10747D About this Course This course describes how to configure and manage a System Center 2012 R Configuration Manager

More information

"Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary

Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary MOC 20703-1A: Administering System Center Configuration Manager Course Summary Description This five-day course describes how to use Configuration Manager and its associated site systems to efficiently

More information

Duration Level Technology Delivery Method Training Credits. System Center Configuration Manager

Duration Level Technology Delivery Method Training Credits. System Center Configuration Manager NE-20703-1A Administering System Center Summary Duration Level Technology Delivery Method Training Credits 5 Days Advanced System Center Classroom ILT Virtual ILT On Demand SATV Introduction This 5-day

More information

Administering System Center Configuration Manager ( A)

Administering System Center Configuration Manager ( A) Administering System Center Configuration Manager (20703-1A) Duration: 5 Days Price: $895 Delivery Option: Attend via MOC On-Demand Students Will Learn Describing the features Configuration Manager and

More information

Microsoft Administering System Center Configuration Manager

Microsoft Administering System Center Configuration Manager 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20703-1 Administering System Center Configuration Manager Length 5 days Price $4290.00 (inc GST) Version A Overview This five-day course describes how to

More information

Administering System Center 2012 Configuration Manager (10747D)

Administering System Center 2012 Configuration Manager (10747D) Administering System Center 2012 Configuration Manager (10747D) Overview This course describes how to configure and manage a System Center 2012 R2 Configuration Manager site and its associated site systems.

More information

System Center Course Administering System Center Configuration Manager. Length. Audience. 5 days

System Center Course Administering System Center Configuration Manager. Length. Audience. 5 days System Center Course - 207031-1 Administering System Center Configuration Manager Length 5 days Audience This course is for experienced information technology (IT) professionals, typically described as

More information

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure

More information

ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER Course 10747D; Duration: 5 Days; Instructor-led WHAT YOU WILL LEARN This course describes how to configure

More information

External Supplier Control Obligations. Cyber Security

External Supplier Control Obligations. Cyber Security External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place

More information

Administering System Center Configuration Manager ( )

Administering System Center Configuration Manager ( ) Administering System Center Configuration Manager (20703-1) Formato do curso: Presencial Localidade: Lisboa Data: 30 Set. 2019 a 04 Out. 2019 Preço: 1670 Horário: Laboral - das 09h30 às 17h30 Nível: Avançado

More information

10747D: ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

10747D: ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER 10747D: ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER DURATION 5 days INTRODUCTION This course describes how to configure and manage a System Center 2012 R2 Configuration Manager site and its

More information

10747D: Administering System Center 2012 Configuration Manager

10747D: Administering System Center 2012 Configuration Manager 10747D: Administering System Center 2012 Course Details Course Code: 10747D Elements of this syllabus are subject to change. About this course Duration: Notes: 5 days This course syllabus should be used

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Administering System Center Configuration Manager Duration: 5 Days Course Code: M20703-1 Version: A Overview: This five-day course describes how to use Configuration Manager and its associated site systems

More information

A: Administering System Center Configuration Manager

A: Administering System Center Configuration Manager 20703-1A: Administering System Center Configuration Manager Course Details Course Code: 20703-1A Duration: Notes: 5 days This course syllabus should be used to determine whether the course is appropriate

More information

Administering System Center Configuration Manager and Intune

Administering System Center Configuration Manager and Intune Administering System Center Configuration Manager and Intune Course 20696C 5 Days Instructor-led, Hands-on Introduction Get expert instruction and hands-on practice configuring and managing clients and

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Administering System Center Configuration Manager Varighet: 5 Days Kurskode: M20703 Beskrivelse: This five-day course describes how to use Configuration Manager and its associated site systems to efficiently

More information

During security audits, over 15,000 vulnerability assessments are made, scanning the network IP by IP.

During security audits, over 15,000 vulnerability assessments are made, scanning the network IP by IP. Features LAN Guard Vulnerability scanning and Management Patch Management and Remediation Network and software Auditing Why Choose? 1. Powerful network, security and port scanner with network auditing

More information

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

The SANS Institute Top 20 Critical Security Controls. Compliance Guide The SANS Institute Top 20 Critical Security Controls Compliance Guide February 2014 The Need for a Risk-Based Approach A common factor across many recent security breaches is that the targeted enterprise

More information

: 20696C: Administering System Center Configuration Manager and Intune

: 20696C: Administering System Center Configuration Manager and Intune Module Title Duration : 20696C: Administering System Center Configuration Manager and Intune : 5 days About this course Get expert instruction and hands-on practice configuring and managing clients and

More information

PowerShell for System Center Configuration Manager Administrators

PowerShell for System Center Configuration Manager Administrators Course 55133A: PowerShell for System Center Configuration Manager Administrators - Course details Course Outline Module 1: Review of System Center Configuration Manager Concepts This module explains the

More information

"Charting the Course to Your Success!" MOC D Administering System Center 2012 Configuration Manager. Course Summary

Charting the Course to Your Success! MOC D Administering System Center 2012 Configuration Manager. Course Summary Description Course Summary This course describes how to configure and manage a site and its associated site systems. The course focuses on day-to-day management tasks for. Objectives At the end of this

More information

Nebraska CERT Conference

Nebraska CERT Conference Nebraska CERT Conference Security Methodology / Incident Response Patrick Hanrion Security Center of Excellence Sr. Security Consultant Agenda Security Methodology Security Enabled Business Framework methodology

More information

Administrering System Center 2012 Configuration Manager vd

Administrering System Center 2012 Configuration Manager vd Administrering System Center 2012 Configuration Manager vd Varighed: 5 Days Kursus Kode: M10747 Beskrivelse: Dette kursus er erstattet af M20696. Find kurset her M20696 This five-day instructor-led course

More information

CyberArk Privileged Threat Analytics

CyberArk Privileged Threat Analytics CyberArk Privileged Threat Analytics Table of Contents The New Security Battleground: Inside Your Network 3 Privileged account security 3 Collect the right data 4 Detect critical threats 5 Alert on critical

More information

Course 10747D: Administering System Center 2012 Configuration Manager Exam Code:

Course 10747D: Administering System Center 2012 Configuration Manager Exam Code: Course 10747D: Administering System Center 2012 Configuration Manager Exam Code: 70-243 Course Outline Module 1: Overview of System Center 2012 R2 Configuration Manager In this module, you will learn about

More information

Administering System Center Configuration Manager and Intune

Administering System Center Configuration Manager and Intune Course 20696C: Administering System Center Configuration Manager and Intune Page 1 of 9 Administering System Center Configuration Manager and Intune Course 20696C: 4 days; Instructor-Led Introduction Get

More information

Administering System Center Configuration Manager and Intune

Administering System Center Configuration Manager and Intune Course 20696: Administering System Center Configuration Manager and Intune Page 1 of 10 Administering System Center Configuration Manager and Intune Course 20696: 4 days; Instructor-Led Introduction Get

More information

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief RSA Solution Brief The RSA Solution for VMware View: Managing Securing the the Lifecycle Virtual of Desktop Encryption Environment Keys with RSA Key Manager RSA Solution Brief 1 According to the Open Security

More information

Vulnerability Management Policy

Vulnerability Management Policy Vulnerability Management Policy Document Type: Policy (PLCY) Endorsed By: Information Technology Policy Committee Date: 4/29/2011 Promulgated By: Chancellor Herzog Date: 6/16/2011 I. Introduction IT resources

More information

M20696 Administering System Center Configuration Manager and Intune

M20696 Administering System Center Configuration Manager and Intune M20696 Administering System Center Configuration Manager and Intune Course Number: M20696 Category: Technical Microsoft Duration: 5 days Certification: 70-696 Overview Get expert instruction and hands-on

More information

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government

More information

Course 20416B: Implementing Desktop Application Environments Page 1 of 7

Course 20416B: Implementing Desktop Application Environments Page 1 of 7 Course 20416B: Implementing Desktop Application Environments Page 1 of 7 Implementing Desktop Application Environments Course 20416B: 4 days; Instructor-Led Introduction In this four-day course, build

More information

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS NERC CIP VERSION 6 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements

More information

NE Administering System Center Configuration Manager and Intune

NE Administering System Center Configuration Manager and Intune NE-20696 Administering System Center Configuration Manager and Intune Summary Duration 5 Days Audience IT Professionals Level 300 Technology System Center Configuration Manager Delivery Method Instructor-led

More information

CS 356 Operating System Security. Fall 2013

CS 356 Operating System Security. Fall 2013 CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database

More information

Microsoft SDL 한국마이크로소프트보안프로그램매니저김홍석부장. Security Development Lifecycle and Building Secure Applications

Microsoft SDL 한국마이크로소프트보안프로그램매니저김홍석부장. Security Development Lifecycle and Building Secure Applications Release Conception Microsoft SDL Security Development Lifecycle and Building Secure Applications KRnet 2010 2010. 6. 22. 한국마이크로소프트보안프로그램매니저김홍석부장 Hongseok.Kim@microsoft.com Agenda Applications under Attack

More information

the SWIFT Customer Security

the SWIFT Customer Security TECH BRIEF Mapping BeyondTrust Solutions to the SWIFT Customer Security Controls Framework Privileged Access Management and Vulnerability Management Table of ContentsTable of Contents... 2 Purpose of This

More information

PCI DSS v3.2 Mapping 1.4. Kaspersky Endpoint Security. Kaspersky Enterprise Cybersecurity

PCI DSS v3.2 Mapping 1.4. Kaspersky Endpoint Security. Kaspersky Enterprise Cybersecurity Kaspersky Enterprise Cybersecurity Kaspersky Endpoint Security v3.2 Mapping 3.2 regulates many technical security requirements and settings for systems operating with credit card data. Sub-points 1.4,

More information

Implementing Desktop Application Environments

Implementing Desktop Application Environments Implementing Desktop Application Environments Course # Exam: Prerequisites Technology: Delivery Method: Length: 20416 70-416 20415 Windows Server Instructor-led (classroom) 5 Days Overview About this Course

More information

Security Assessment. Prepared For: Prospect Or Customer Prepared By: Your Company Name

Security Assessment. Prepared For: Prospect Or Customer Prepared By: Your Company Name Security Assessment Prepared For: Prospect Or Customer Prepared By: Your Company Name Agenda Security - External & Outbound - Policy Compliance Risk and Issue Score Issue Review Next Steps Security - External

More information

GFI product comparison: GFI LanGuard 12 vs Microsoft Windows Intune (February 2015 Release)

GFI product comparison: GFI LanGuard 12 vs Microsoft Windows Intune (February 2015 Release) GFI product comparison: GFI LanGuard 12 vs Microsoft Windows Intune (February 2015 Release) General features Scheduled scans Agent-less Agent-based Integration with Active Directory Asset tracking Installs

More information

MOC ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

MOC ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER ONE STEP AHEAD. MOC 10747 ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER Length: 5 Days Level: 300 Technology: Microsoft System Center 2012 Configuration Manager Delivery Method: Instructor-led

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Host Hardening Achieve or Avoid. Nilesh Kapoor Auckland 2016

Host Hardening Achieve or Avoid. Nilesh Kapoor Auckland 2016 Host Hardening Achieve or Avoid Nilesh Kapoor Auckland 2016 Introduction Nilesh Kapoor Senior Security Consultant @ Aura Information Security Core 8 years experience in Security Consulting Co- Author Security

More information

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Transforming Security from Defense in Depth to Comprehensive Security Assurance Transforming Security from Defense in Depth to Comprehensive Security Assurance February 28, 2016 Revision #3 Table of Contents Introduction... 3 The problem: defense in depth is not working... 3 The new

More information

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing

More information

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Cybersecurity: Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda Key Risks Incorporating Internal Audit Resources Questions 2 San Francisco

More information

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions Meeting PCI DSS 3.2 Compliance with Solutions Platform the industry s most comprehensive, intelligent platform for managing cyber risk. 2018, Inc. What s Changing with PCI DSS? Summary of PCI Business

More information

Defense in Depth Security in the Enterprise

Defense in Depth Security in the Enterprise Defense in Depth Security in the Enterprise Mike Mulville SAIC Cyber Chief Technology Officer MulvilleM@saic.com Agenda The enterprise challenge - threat; vectors; and risk Traditional data protection

More information

K12 Cybersecurity Roadmap

K12 Cybersecurity Roadmap K12 Cybersecurity Roadmap Introduction Jason Brown, CISSP Chief Information Security Officer Merit Network, Inc jbrown@merit.edu @jasonbrown17 https://linkedin.com/in/jasonbrown17 2 Agenda 3 Why Use the

More information

Security Challenges: Integrating Apple Computers into Windows Environments

Security Challenges: Integrating Apple Computers into Windows Environments Integrating Apple Computers into Windows Environments White Paper Parallels Mac Management for Microsoft SCCM 2018 Presented By: Table of Contents Environments... 3 Requirements for Managing Mac Natively

More information

Automating the Top 20 CIS Critical Security Controls

Automating the Top 20 CIS Critical Security Controls 20 Automating the Top 20 CIS Critical Security Controls SUMMARY It s not easy being today s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises

More information

20416B: Implementing Desktop Application Environments

20416B: Implementing Desktop Application Environments 20416B: Implementing Desktop Application Environments Course Details Course Code: Duration: Notes: 20416B 5 days This course syllabus should be used to determine whether the course is appropriate for the

More information

Changing face of endpoint security

Changing face of endpoint security Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Service Definition Table of Contents 1 INTRODUCTION... 2 2 SERVICE OFFERINGS VULNERABILITY MANAGEMENT... 2 3 SOLUTION PURPOSE... 3 4 HOW IT WORKS... 3 5 WHAT S INCLUDED... 4 6

More information

Administer System Center Configuration Manager for Desktop Support

Administer System Center Configuration Manager for Desktop Support Administer System Center Configuration Manager for Desktop Support Course ISI-1502 3 Days Instructor-led, Hands on Course Information This three-day course for desktop support professionals describes how

More information

Leading the Way. in Managed Services

Leading the Way. in Managed Services Leading the Way in Managed Services Managed Services Infrastructure Overview By combining Desktop maintenance and Server IntelliMonitoring with automated scripting tools and leading technology Partners,

More information

Securing Today s Mobile Workforce

Securing Today s Mobile Workforce WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security Table of Contents Executive Summary..................................................................................

More information

MS-20696: Managing Enterprise Devices and Apps using System Center Configuration Manager

MS-20696: Managing Enterprise Devices and Apps using System Center Configuration Manager MS-20696: Managing Enterprise Devices and Apps using System Center Configuration Manager Description Get expert instruction and hands-on practice configuring and managing clients and devices using Microsoft

More information

Reviewer s guide. PureMessage for Windows/Exchange Product tour

Reviewer s guide. PureMessage for Windows/Exchange Product tour Reviewer s guide PureMessage for Windows/Exchange Product tour reviewer s guide: sophos nac advanced 2 welcome WELCOME Welcome to the reviewer s guide for NAC Advanced. The guide provides a review of the

More information

CipherCloud CASB+ Connector for ServiceNow

CipherCloud CASB+ Connector for ServiceNow ServiceNow CASB+ Connector CipherCloud CASB+ Connector for ServiceNow The CipherCloud CASB+ Connector for ServiceNow enables the full suite of CipherCloud CASB+ capabilities, in addition to field-level

More information

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002 ISO 27002 COMPLIANCE GUIDE How Rapid7 Can Help You Achieve Compliance with ISO 27002 A CONTENTS Introduction 2 Detailed Controls Mapping 3 About Rapid7 8 rapid7.com ISO 27002 Compliance Guide 1 INTRODUCTION

More information

10 FOCUS AREAS FOR BREACH PREVENTION

10 FOCUS AREAS FOR BREACH PREVENTION 10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual

More information

Mobility, Security Concerns, and Avoidance

Mobility, Security Concerns, and Avoidance By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to

More information

align security instill confidence

align security instill confidence align security instill confidence cyber security Securing data has become a top priority across all industries. High-profile data breaches and the proliferation of advanced persistent threats have changed

More information

Plant Security Services Protecting productivity in the digital era October

Plant Security Services Protecting productivity in the digital era October Plant Security Services Protecting productivity in the digital era October2017 Restricted www.siemens.com/plant-security-services Internet of (hacked) Things Page 2 Use case - No OT cybersecurity company

More information

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions Frequently Asked Questions Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions April 2005 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Internet Security Systems (ISS)

More information

Reinvent Your 2013 Security Management Strategy

Reinvent Your 2013 Security Management Strategy Reinvent Your 2013 Security Management Strategy Laurent Boutet 18 septembre 2013 Phone:+33 6 25 34 12 01 Email:laurent.boutet@skyboxsecurity.com www.skyboxsecurity.com What are Your Key Objectives for

More information

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect NOTHING IS WHAT IT SIEMs: COVER PAGE Simpler Way to Effective Threat Management TEMPLATE Dan Pitman Principal Security Architect Cybersecurity is harder than it should be 2 SIEM can be harder than it should

More information

Protect your apps and your customers against application layer attacks

Protect your apps and your customers against application layer attacks Protect your apps and your customers against application layer attacks Development 1 IT Operations VULNERABILITY DETECTION Bots, hackers, and other bad actors will find and exploit vulnerabilities in web

More information

MOC 20416B: Implementing Desktop Application Environments

MOC 20416B: Implementing Desktop Application Environments MOC 20416B: Implementing Desktop Application Environments Course Overview This course provides students with the knowledge and skills to design, deploy, and manage a physical and virtual Windows Server

More information

Comodo Endpoint Security Manager Professional Edition Software Version 3.3

Comodo Endpoint Security Manager Professional Edition Software Version 3.3 Comodo Endpoint Security Manager Professional Edition Software Version 3.3 Quick Start Guide Guide Version 3.2.022615 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo Endpoint Security

More information

What are PCI DSS? PCI DSS = Payment Card Industry Data Security Standards

What are PCI DSS? PCI DSS = Payment Card Industry Data Security Standards PCI DSS What are PCI DSS? PCI DSS = Payment Card Industry Data Security Standards Definition: A multifaceted security standard that includes requirements for security management, policies, procedures,

More information

Managing and Maintaining a Microsoft Windows Server 2003 Environment

Managing and Maintaining a Microsoft Windows Server 2003 Environment COURSE OVERVIEW This course combines five days of instructor-led training with additional e-learning content to provide students with the knowledge and skills that are required to manage accounts and resources,

More information

T22 - Industrial Control System Security

T22 - Industrial Control System Security T22 - Industrial Control System Security PUBLIC Copyright 2017 Rockwell Automation, Inc. All Rights Reserved. 1 Holistic Approach A secure application depends on multiple layers of protection and industrial

More information

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

CA Security Management

CA Security Management CA Security CA Security CA Security In today s business environment, security remains one of the most pressing IT concerns. Most organizations are struggling to protect an increasing amount of disparate

More information

How NOT To Get Hacked

How NOT To Get Hacked How NOT To Get Hacked The right things to do so the bad guys can t do the wrong ones Mark Burnette Partner, LBMC -Risk Services October 25, 2016 Today s Agenda Protecting Against A Hack How should I start?

More information

A Practical Approach to Implement a Risk Based ISMS

A Practical Approach to Implement a Risk Based ISMS A Practical Approach to Implement a Risk Based ISMS Pascal Reiniger Chief Information Security Officer Kanton Basel-Stadt Zürich Security Interest Group Switzerland 07.11.2017 Agenda 1. Introduction 2.

More information

Mitigation Controls on. 13-Dec-16 1

Mitigation Controls on. 13-Dec-16 1 Mitigation Controls on 13-Dec-16 1 An organization s users are its greatest assets and its most challenging adversaries. one of the vulnerabilities posed by insiders is their knowledge of the quality of

More information

What is Penetration Testing?

What is Penetration Testing? What is Penetration Testing? March 2016 Table of Contents What is Penetration Testing?... 3 Why Perform Penetration Testing?... 4 How Often Should You Perform Penetration Testing?... 4 How Can You Benefit

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS

Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS Digital Forensics Readiness: PREPARE BEFORE AN INCIDENT HAPPENS 2 Digital Forensics Readiness The idea that all networks can be compromised

More information

Joint System Administrator Checklist Version December 2005

Joint System Administrator Checklist Version December 2005 Joint System Administrator Checklist Version 1.1 22 December 2005 Daily Review Audit logs Check application log for warning and error messages for service startup errors, application or database errors

More information

ClearPath OS 2200 System LAN Security Overview. White paper

ClearPath OS 2200 System LAN Security Overview. White paper ClearPath OS 2200 System LAN Security Overview White paper Table of Contents Introduction 3 Baseline Security 3 LAN Configurations 4 Security Protection Measures 4 Software and Security Updates 4 Security

More information

Exam Questions

Exam Questions Exam Questions 70-686 Pro: Windows https://www.2passeasy.com/dumps/70-686/ 1.u are designing a Windows 7 virtual desktop infrastructure. You have the following requirements:. Provide access to Remote Desktop

More information

Windows 7 Deployment Key Milestones

Windows 7 Deployment Key Milestones Windows 7 Deployment Key Milestones 2012 2013 2014 Client Deployment and Management Tool Windows 7 Deployment Select Tool (3-6 months) Deployment Tool Architecture (1-2 months) Assess Hardware (1-2 months)

More information

HIPAA RISK ADVISOR SAMPLE REPORT

HIPAA RISK ADVISOR SAMPLE REPORT HIPAA RISK ADVISOR SAMPLE REPORT HIPAA Security Analysis Report The most tangible part of any annual security risk assessment is the final report of findings and recommendations. It s important to have

More information

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1 Addressing the Evolving Cybersecurity Tom Tollerton, CISSP, CISA, PCI QSA Manager Cybersecurity Advisory Services DHG presenter Tom Tollerton, Manager DHG IT Advisory 704.367.7061 tom.tollerton@dhgllp.com

More information

Monthly Security Bulletin Briefing

Monthly Security Bulletin Briefing Monthly Security Bulletin Briefing (June 2013) Teresa Ghiorzoe Security PM LATAM Latamsrc@Microsoft.com 1 June 2013 Agenda Security Advisories New Rerelease 1 1 Other Security Resources Detection and Deployment

More information

This section of the release notes is reserved for notable changes and new features since the prior version.

This section of the release notes is reserved for notable changes and new features since the prior version. Release Notes Browsium Proton 4.1 Product Version: 4.1.0 Release Notes Updated: 15 October 2016 About this Release This document lists new features and known issues as of the release date. If you discover

More information