"Hundreds. All of the vulnerability scans coming in from security "...  If
your security team is similar to the people running reports here; we had to
do some push back to educate the report-creators and report-readers of
those reports to apply some logic.

here are some things which those people needed to understand.
1) Almost everything on their list which was "missing" (not everything, but
a significant portion) were for superseded updates.  Quite often those
updates may have been superseded by a Service Pack--and the "real fix" was
to require Service Packs be deployed... not just "things that have a
MSxx-xxx designation".  I.e., that there are pre-requisites beyond just the
MSxx-xxx updates in order to actually be fully patched.
2) The next biggest hit was the report creators and readers were often
creating and compiling their reports on say... January 11th.  so on January
12th, a ton of updates were released which superseded a bunch of articles
and msxx-xxx updates they just identified.  They had to understand that we
deploy fast--and their reports are dated.  How to "fix" that is still not
certain...
3) The next thing was we have multiple teams which "scan for
vulnerabilities".  Some of those teams simply look for "is this File called
"blah.dll" anywhere on the system, and that blah.dll is NOT this patched
version?  So a ton of boxes are flagged as vulnerable to the Blah.dll
update required... and then when you finally drill into where they find the
blah.dll file... it's in c:\BobsSavedWindowsFolderBecauseHeIsAWierdo
folder.  i.e., not in use at all by the system.  Sure, it "exists".  but
it's not being used.   For those situations, we indicated that a local
technician would need to reimage the system as the easiest fix.  <grin>
4)  This might be just local to the security team here, but it took a LOT
of meetings to get this concept through to the report-creators and
report-readers.  Those security teams were used to very simplistic rules.
"MS11-999 is missing".  That's what *they* wanted to read.  and as you
know, for us in ConfigMgr (or WSUS).  MS11-999 could be
multiple updates--it's not just 1 thing.  So we always need to know, ok
EXACTLY which article in MS11-999 are you claiming is missing?  And once
they "got" that concept, those missing updates were superseded; sometimes
20 times; and we're deploying MS16-001 for that vulnerability.
5) MAYBE it is your fault.  :).  Are all of the hundreds of updates
for Office 2010 and you never bothered to check the Office 2010 Product in
your Software update settings in CM?  Remember you do NOT want to check
everything... but nevertheless you do want to be sure you are pulling in
the products that you need to support.

As for importing updates into the WSUS console, I've done that perhaps... 4
times.  I think.  It's very rare that an update isn't automatically being
sync'd.  How To: in your WSUS console (which remember as a CM admin you are
told to never launch, lol) you go to Updates on the left.  Then pull down
"Action"  "Import Updates".  and you can search for a kb article there.  If
you find it, then "add it to your Cart" and go through the download
process.  HOWEVER.  that is not a panacea.  as mentioned, it's very, very
rare.  If you (for example) try to import an update for say... Windows 8,
but you don't have the Windows 8 product checked as something "to sync".
it's still not going to show up in CM.   What I usually do is I research
the kb article thoroughly.  I also have a home lab and look there.  I may
ask here on this email list to see if it's a missing update that other
people see, and it's just personal to my environment.

Last but not least--3rd party.  Lots of ways to address that from simply
deploying an application; to roll-your-own rules right in SCUP, to
evaluating and purchasing a 3rd party rule provider that you can inject
patch rules into your top-level SUP (WSUS).

On Mon, Apr 18, 2016 at 1:24 PM, Jason Sandys <ja...@sandys.us> wrote:

> I’ve never seen a security bulletin hotfix not be in the WSUS catalog. Can
> you give an example of one?
>
>
>
> J
>
>
>
> *From:* listsadmin@lists.myitforum.com [mailto:
> listsadmin@lists.myitforum.com] *On Behalf Of *Brian McDonald
> *Sent:* Monday, April 18, 2016 1:16 PM
> *To:* ms...@lists.myitforum.com
> *Subject:* [mssms] Bulletins and manual patching
>
>
>
> How are folks handling security vulnerabilities that do not sync up with
> WSUS/SCCM? I'm trying to grasp how to best approach patches that require
> manual package creation in SCCM, such as MS Security Bulletins. This seems
> to be a never ending battle and we have a very lean team.
>
>
>
> Thanks,
>
> Brian
>
>
>
>


-- 
Thank you,

Sherry Kissinger

My Parameters:  Standardize. Simplify. Automate
Blogs: http://www.mofmaster.com, http://mnscug.org/blogs/sherry-kissinger,
http://www.smguru.org



Reply via email to