SlideShare a Scribd company logo
1 of 30
Developing Patch
Management
Best Practices
An In-Depth Technical Webcast
Today’s Agenda




             Introduction



             Curing Your Patch Management Headache
             with Lessons Learned from the Field
             • Laying the Groundwork
             • Before Patch Tuesday
             • On Patch Tuesday
             • After Patch Tuesday


             Q&A
Today’s Panelists




    Russ Ernst              Jim Czyzewski
    Group Product Manager   Supervisor – Clinical Desktop Support
    Lumension               MidMichigan Medical Center




3
Why Is Patch Management Important
                                      Sources of Endpoint Risk

                                                 5%
                                              Zero-Days

                                                30%
                                          Missing Patches

                                                65%
                                          Misconfigurations

    Today’s Endpoint Security Stack

                 AV
                Device
                Control
              Application
               Control
        Patch & Configuration
            Management

4
Benefits of a Solid Patching Process
Malware Costs Money    Patching Reduces Target Size




5
Patch Management Best Practices

                    Laying the
                   Groundwork




                     Patch
     After Patch                 Before Patch
                   Management
      Tuesday                      Tuesday
                    Process




                    On Patch
                    Tuesday


6
Laying the Groundwork
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Discover Assets




8
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Agent Maintenance
Lumension Reporting Services (LRS)




9
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Classify Value and Risk




10
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Establish Workflow and Groups
Users                 Roles




Groups




11
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Identify Test Groups




12
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Staff Training
Learning Portals




13
Before Patch Tuesday
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Prepare Resources
• Schedule Resources
     » Allocate IT resources for Patch Tuesday while also integrating additional patch
       release schedules from third-party applications, such as Adobe, Apple (ad
       hoc), Java and so forth
     » Review the patching needs of any internally-developed applications and/or
       custom patches and consider deploying these patches as part of the monthly
       patch cycle


• Reserve Down-Time for Servers
     » Reserve time slots to be able to deploy patch updates to any mission-critical
       servers within 72 hours of the Patch Tuesday release




15
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Watch for Pre-Announcements




16
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Confirm Reporting Up-to-Date




17
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Deploy Missing Updates and Pre-Requisites




18
On Patch Tuesday
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Study Information and Security Briefings




• Important information to consider when understanding the impact of Patch
  Tuesday on your environment includes:
     •   Bulletin Severity
     •   Whether or not the vulnerability is known/publicly disclosed at the time of release
     •   Does the vendor know of any active exploits at the time of release
     •   Value of the asset being patched


20
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Prioritize Potential Patches




21
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Test and Install Patches
• Follow Internal Change Control Planning and Approval Process
• Staged Testing
     • Deploy applicable bulletins to test groups
     • Ensure successful deployment before rollout to additional groups in the environment
     • Pay special attention to impact to custom-developed, internal applications
• Staged Deployments




22
After Patch Tuesday
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Deployment History




24
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Calculate Time to Deploy




25
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Monitor for Compliance
Mandatory Baseline




26
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Continuous Improvement
• Checks and Balances
     » Review the Effectiveness of Patch Tuesday Remediations


• Metrics Improvement
     » Modify system settings, distribution parameters and so forth to further optimize
       the system for next month’s updates
     » WAN optimization, polling frequency and minimizing the patches being
       detected can all help further optimize performance
     » Look for computers that did not receive updates at all or those that took
       unusually long to receive updates




27
Q&A
More Information
• Free Vulnerability Scanner Tool                    • Get a Quote (and more)
 » Discover all OS and application vulnerabilities    http://www.lumension.com/
   on your network                                    vulnerability-management/
   http://www.lumension.com/Resources/                patch-management-software/buy-now.aspx#6
   Security-Tools/Vulnerability-Scanner.aspx


• Lumension® Patch and Remediation
 » Online Demo Video:
   http://www.lumension.com/
   vulnerability-management/
   patch-management-software/demo.aspx
 » Free Trial (virtual or download):
   http://www.lumension.com/
   vulnerability-management/
   patch-management-software/free-trial.aspx




29
Global Headquarters
8660 East Hartford Drive
Suite 300
Scottsdale, AZ 85255

1.888.725.7828
info@lumension.com
http://blog.lumension.com

More Related Content

More from Lumension

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsLumension
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers GuideLumension
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationLumension
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary ResultsLumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Lumension
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Lumension
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftLumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and AnalysisLumension
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskLumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateLumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskLumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security SolutionsLumension
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesLumension
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksLumension
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT RiskLumension
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...Lumension
 

More from Lumension (20)

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Best practices for Patch Management: An In-Depth Technical Presentation

  • 2. Today’s Agenda Introduction Curing Your Patch Management Headache with Lessons Learned from the Field • Laying the Groundwork • Before Patch Tuesday • On Patch Tuesday • After Patch Tuesday Q&A
  • 3. Today’s Panelists Russ Ernst Jim Czyzewski Group Product Manager Supervisor – Clinical Desktop Support Lumension MidMichigan Medical Center 3
  • 4. Why Is Patch Management Important Sources of Endpoint Risk 5% Zero-Days 30% Missing Patches 65% Misconfigurations Today’s Endpoint Security Stack AV Device Control Application Control Patch & Configuration Management 4
  • 5. Benefits of a Solid Patching Process Malware Costs Money Patching Reduces Target Size 5
  • 6. Patch Management Best Practices Laying the Groundwork Patch After Patch Before Patch Management Tuesday Tuesday Process On Patch Tuesday 6
  • 8. Laying the Groundwork | Week Before | Patch Tuesday | Week After Discover Assets 8
  • 9. Laying the Groundwork | Week Before | Patch Tuesday | Week After Agent Maintenance Lumension Reporting Services (LRS) 9
  • 10. Laying the Groundwork | Week Before | Patch Tuesday | Week After Classify Value and Risk 10
  • 11. Laying the Groundwork | Week Before | Patch Tuesday | Week After Establish Workflow and Groups Users Roles Groups 11
  • 12. Laying the Groundwork | Week Before | Patch Tuesday | Week After Identify Test Groups 12
  • 13. Laying the Groundwork | Week Before | Patch Tuesday | Week After Staff Training Learning Portals 13
  • 15. Laying the Groundwork | Week Before | Patch Tuesday | Week After Prepare Resources • Schedule Resources » Allocate IT resources for Patch Tuesday while also integrating additional patch release schedules from third-party applications, such as Adobe, Apple (ad hoc), Java and so forth » Review the patching needs of any internally-developed applications and/or custom patches and consider deploying these patches as part of the monthly patch cycle • Reserve Down-Time for Servers » Reserve time slots to be able to deploy patch updates to any mission-critical servers within 72 hours of the Patch Tuesday release 15
  • 16. Laying the Groundwork | Week Before | Patch Tuesday | Week After Watch for Pre-Announcements 16
  • 17. Laying the Groundwork | Week Before | Patch Tuesday | Week After Confirm Reporting Up-to-Date 17
  • 18. Laying the Groundwork | Week Before | Patch Tuesday | Week After Deploy Missing Updates and Pre-Requisites 18
  • 20. Laying the Groundwork | Week Before | Patch Tuesday | Week After Study Information and Security Briefings • Important information to consider when understanding the impact of Patch Tuesday on your environment includes: • Bulletin Severity • Whether or not the vulnerability is known/publicly disclosed at the time of release • Does the vendor know of any active exploits at the time of release • Value of the asset being patched 20
  • 21. Laying the Groundwork | Week Before | Patch Tuesday | Week After Prioritize Potential Patches 21
  • 22. Laying the Groundwork | Week Before | Patch Tuesday | Week After Test and Install Patches • Follow Internal Change Control Planning and Approval Process • Staged Testing • Deploy applicable bulletins to test groups • Ensure successful deployment before rollout to additional groups in the environment • Pay special attention to impact to custom-developed, internal applications • Staged Deployments 22
  • 24. Laying the Groundwork | Week Before | Patch Tuesday | Week After Deployment History 24
  • 25. Laying the Groundwork | Week Before | Patch Tuesday | Week After Calculate Time to Deploy 25
  • 26. Laying the Groundwork | Week Before | Patch Tuesday | Week After Monitor for Compliance Mandatory Baseline 26
  • 27. Laying the Groundwork | Week Before | Patch Tuesday | Week After Continuous Improvement • Checks and Balances » Review the Effectiveness of Patch Tuesday Remediations • Metrics Improvement » Modify system settings, distribution parameters and so forth to further optimize the system for next month’s updates » WAN optimization, polling frequency and minimizing the patches being detected can all help further optimize performance » Look for computers that did not receive updates at all or those that took unusually long to receive updates 27
  • 28. Q&A
  • 29. More Information • Free Vulnerability Scanner Tool • Get a Quote (and more) » Discover all OS and application vulnerabilities http://www.lumension.com/ on your network vulnerability-management/ http://www.lumension.com/Resources/ patch-management-software/buy-now.aspx#6 Security-Tools/Vulnerability-Scanner.aspx • Lumension® Patch and Remediation » Online Demo Video: http://www.lumension.com/ vulnerability-management/ patch-management-software/demo.aspx » Free Trial (virtual or download): http://www.lumension.com/ vulnerability-management/ patch-management-software/free-trial.aspx 29
  • 30. Global Headquarters 8660 East Hartford Drive Suite 300 Scottsdale, AZ 85255 1.888.725.7828 info@lumension.com http://blog.lumension.com