"If" you have the resources.. if you don't and are not bound by regulations, SOX, Hipaa and what not... that "test" can be merely a "canary" of a user on your network before you roll that patch out to the rest of the network.

As you well know... as the firm size gets smaller... "segregation of duties" sometimes have to have alternative options to get the same job done.

Even though I do the best I can testing on a test network..there are times that I don't find stuff out until it hits the real network because unless I have cloned the server, the workstations, the applications, the data, and especially the users... I cannot duplicate exactly my network.. Thus ..even as good as you test... realize that there will be gotchas that you have to deal with.


BTW three patches today... one on Exchange and iCals looks fun... affects Blackberry devices as well in the permission settings that it changes.. read those bulletins... read those "caveat" sections.

Chris Dalton wrote:

Some key items to remember is that testing of the patch must be done in a 
separate environment from production.

The test system must be at the same level as production.

Production data must not be used in testing

There must be a proper segregation of duites between those who test and those 
who move into production.

Chris G. Dalton C.P.A.
Corporate Audit Services
Capital One Financial
1-504-533-6419 phone
1-504-533-2355 fax

"Susan Bradley, CPA aka Ebitz - SBS Rocks [MVP]" <[EMAIL PROTECTED]> 05/08/06 4:44 PM 
>>>
I'm a fan of Shavlik.... not only from the standpoint of their product..but their 'community help' posture as well. They run the patchmanagement.org listserve that discusses patch management platforms and patching issues. (Check out www.patchmanagement.org)

Honestly.. it's the process of change management that is the hard part, I think..the testing and the approval process. No matter what patch tool you chose will have it's nuances that you get used to.

Why do I like Shavlik? Because it just shows me the patches I need in a nice format unlike WSUS which has a confusing UI.
Because it works.
Because it has additional features like 'reboot before patching', Office local install source, and will patch things beyond MS in my network.

Jim Stagg wrote:

On this topic, I'd love to hear from some of the non-WSUS Microsoft server
folks are doing. I've heard a lot about BigFix, Patchlink, St. Bernard, SMS,
GFI et al. Has anyone found a product that works reliably?


--
Jim Stagg, Systems Administrator




-----Original Message-----
From: Renee Peters [mailto:[EMAIL PROTECTED] Sent: Monday, May 08, 2006 10:41 AM To: [EMAIL PROTECTED]; [email protected] Subject: RE: Patch Management on Critical Servers (Healthcare)

Last year, our college campus was hit with an unclassified virus. After the hours it took to manually run around and patch 1000+ computers, our upper management finally approved a WSUS server. Knock on wood, it has run beautifully, and keeps our desktops and servers patched. As far as actually getting the updates applied and rebooting, we have standard times posted that the server may be unavailable due to routine maintenance. After last year's scare, everybody seems to be OK with this slight inconvience. We aren't regulated as much as the healthcare field, but do still have standards to meet for state and federal funding. As long as the president of the college supports our practices, we don't have much to worry about.

Renee
Network Manager


-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: Monday, May 08, 2006 8:02 AM To: [email protected] Subject: Patch Management on Critical Servers (Healthcare)

Hello





I'm just curious to hear how people in the field have been handling patch management with critical servers. Have you setup maintenance windows? If, so how did you manage the down time? What have people been doing if the device or server has an approved FDA configuration? Are you using thing like WSUS?





Thanks,


Matthew

Security Engineer


--------------------------------------------------------------
----------
---
--------------------------------------------------------------
----------
---


--------------------------------------------------------------
-------------
--------------------------------------------------------------
-------------



* Letting your vendors set your risk analysis these days? http://www.threatcode.com

---------------------------------------------------------------------------
---------------------------------------------------------------------------






--
Letting your vendors set your risk analysis these days? http://www.threatcode.com


---------------------------------------------------------------------------
---------------------------------------------------------------------------

Reply via email to