WSUS Server - Microsoft Center

advertisement

Patch Management drill down

Steven Hope

Lead Technical Security Specialist steven@microsoft.com

Welcome to this TechNet Event

We would like to bring your attention to the key elements of the

TechNet programme; the central information and community resource for IT professionals in the UK:

FREE bi-weekly technical newsletter

FREE regular technical events hosted across the UK

FREE weekly UK & US led technical webcasts

FREE comprehensive technical web site

Monthly CD / DVD subscription with the latest technical tools & resources

FREE quarterly technical magazine

To subscribe to the newsletter or just to find out more, please visit www.microsoft.com/uk/technet or speak to a Microsoft representative during the break

This is true for you right?

We live in a world of plenty…

High bandwidth links everywhere

Low cost & reliable connectivity

Who said “I WISH” ???

But isn’t this want you really

We all have an efficient patch process…

Testing is quick

want and need?

The process is clear and repeatable

Deployment is easy

Patch Management – The Rude Awakening

Humans write software, therefore software will

ALWAYS have bugs!

Utopia = not having to deploy a patch , not that patches no longer exist.

Patching should be the LAST line of defence, not the first! And should be avoid wherever possible.

Patching is NOT all about tools and scripts.

Cleaver system / network designs can significantly reduce the requirement to patch, e.g.:

Use IPSEC to reduce access to services

Use Layer 7 firewalls like ISA Server 2004 to protect core assets.

Reduce the attack surface on machines

Monthly controlled releases and responsible disclosure are GOOD things!

Organization for Internet Safety

Mission: To develop and promote processes for effectively handling security vulnerabilities.

Industry-leading vendors, security research firms www.oisafety.org

Successful Patch Management

Ingredients

Skilled People

Tools &

Technologies

Consistent & repeatable

Processes

Patch Management

Best Practices Process

1. Assess Environment to be Patched

Periodic Tasks

A. Create/maintain baseline of systems

B. Assess patch management architecture (is it fit for purpose)

C. Review Infrastructure/ configuration

1. Assess

Ongoing Tasks

A. Discover Assets

B. Inventory Clients

2. Identify

2. Identify New Patches

Tasks

A. Identify new patches

B. Determine patch relevance

(includes threat assessment)

C. Verify patch authenticity & integrity

(no virus: install on isolated system

4. Deploy the Patch

Tasks

A. Distribute and install patch

B. Report on progress

C. Handle exceptions

D. Review deployment

4. Deploy

3. Evaluate

& Plan

3. Evaluate & Plan

Patch Deployment

Tasks

A. Obtain approval to deploy patch

B. Perform risk assessment

C. Plan patch release process

D. Complete patch acceptance testing http://www.microsoft.com/msm

Updating: Roadmap “Microsoft Update”

(Windows Update)

Windows

Update

Download

Center VS Update

AutoUpdate

Windows only

Exchange, Office…

Windows only

Exchange, Office…

Windows

SUS

Services

SMS

Windows, SQL,

Exchange, Office…

Security Update Management Today

Disparate sources, limited product support

Windows Update/Office Update

Consumer focused web based solutions

Software Update Services (SUS) 1.0

Intermediary between Windows Update and Automatic Updates (globally control updates)

Microsoft Baseline Security Analyzer (MBSA) 1.2.1

Detects security updates for 16 products

Detects configuration vulnerabilities for 7 products

Systems Management Server 2003

SUS Feature Pack (Windows Updates only)

MBSA 1.2.1 for other security update detection

Enterprise Update Scan Tool (EST)

Detects critical and important security updates that MBSA does not

Compatible with SMS

Security Update Management Tomorrow

Consistent results, extending product support

Microsoft Update (MU)

– “Hosted” version of Windows Server Update Services

Consumer focused web based solution

Windows Server Update Services (WSUS)

Infrastructure for all other updating products and tools

Update management solution with targeting for Microsoft platform

Microsoft Baseline Security Analyzer (MBSA) 2.0

Security focused scanning without the need for a server

Systems Management Server 2003

Inventory Tool for Microsoft Update

Integrated MBSA 2.0 security configuration checks

Microsoft Baseline Security Analyser

Now and next

MBSA – Analysis and reporting tool

Scans missing security updates and security configuration settings

Born of HFnetchk, now at 1.2.1

Requires up to date reference file (mssecure.xml)

GUI and command line versions

“Read only” tool - user context requires local admin rights on each target machine

Scans:

Windows 2000, Windows XP, Windows Server 2003

IIS, SQL Server, Internet Explorer, Office, Exchange Server, Windows

Media Player,

Microsoft Data Access Components (MDAC), MSXML

Microsoft Virtual Machine, Commerce Server, Content Management

Server, BizTalk Server, Host Integration Server

MBSA 1.2.1 / MBSA 2.0 Delta

MBSA 2.0 shares with MBSA 1.2.1

Security configuration and update scanning

Command Line scripting

Simple, easy to use interface

Integration with SMS and MOM

MBSA 2.0 introduces:

WSUS scan parity

WSUS compliance

Expanding security update product support

Security update install history

CAN/CVE ID when they become available

MBSA 2.0 RTW = End of Q2 2005

MBSA 2.0 : How It Works*

1. Run MBSA on Admin system, specify targets

2. Downloads CAB file from MU

& verifies digital signature

3. Scans target systems for

OS, OS components, & applications using WUA

Microsoft

Update

All content is shared with MU

4.

Generates time stamped report of missing updates

MBSA

Computer

WSUS Server

*Only covers security patch scanning capabilities, not security configuration detection issues

Windows Server Update Services

WSUS The software formally knows as SUS and WUS…

Windows Server Update Services

Successor to SUS (Software Update Services)

Automates centralized download, distribution and installation of updates

Gets its content from Microsoft Update (MU)

Free download

Free to Windows Server (2000 and above) licensees

Requires Windows Server / Core CAL for target systems

Does not change currently available offerings

SUS 1.0 continues to get content from WU

Core component of Microsoft’s Update Management solutions & roadmap

WSUS RTW = Q2 2005

WSUS - Supported Products And Content

Critical Updates for

All Microsoft products over time

At RTM

Windows 2000 SP3 and later versions of Windows

Office XP SP2 and Office 2003

SQL 2000 and MSDE 2000

Exchange 2003

Critical drivers

Platform support/requirements for

Windows 2000 SP3 (SP4 for WSUS Server) and later

Windows XP RTM and later

Windows Server 2003 RTM and above

All localized versions (including MUI)

WSUS - Solution Overview

Microsoft Update

WSUS Server

WSUS Administrator

Desktop Clients

Target Group 1

Server Clients

Target Group 2

WSUS Scalability

Microsoft Update

Replica

Child

WSUS Server

Desktop Clients Desktop Clients

Parent

WSUS Server

Autonomous

Child

WSUS Server

WSUS & disconnected Networks

Microsoft Update WSUS Server

WSUS Server

Desktop Clients

WSUS – Client Deployment & Configuration

Client Deployment

Only required for Windows XP Gold (without SP)

Windows XP SP2 and Windows Server 2003 SP1 include the WSUS client binaries

– All other WSUS supported OS’s include AUv2.2

Automatically self-updates to WSUS client version

Client Configuration

Active Directory = via GPO

NT4.0 = Wuau.adm in System Policy

Registry keys via script

WSUS Features

Administrator control of deployment

Initiate scan of machines for patch applicability

Approve for install and uninstall

(requires update support)

Date-based deadlines for approved updates

Deploy different updates to target groups

WSUS GUI based reports

Per machine/per update/per target group

Needed, Pending Reboot, Install success and failures with error information

WSUS Features (continued)…

Target Groups

Client-side targeting using AD GPO

Server-side targeting on WSUS server

Client Configurations

Polling frequency

Notification and Install behaviors

Reboot behaviors

Port configurability

Non-administrators can install updates (like administrators)

Install at Shutdown (XP SP2 only)

Network Use Optimization Features

Resilient and transparent

BITS* for client-server and server-server downloads

Downloads are in the background

Minimized data downloads

Update subscriptions (per product/classification)

– Support for “delta compression” technologies for client-server communications

Option to only download approved updates

*Background Intelligent Transfer Service

Customer Feature Requests

Top Features Requested

Support for service packs

Install on SBS and domain controller

Support for Office and other MS products

Support additional update content types

Update uninstall

Update targeting

Improve support for low bandwidth networks

Reduce amount of data that needs to be downloaded

Set polling frequency for downloading new updates

Minimize need for end user interruption

Emergency patch deployment (‘big red button’)

Deploy update for ISV and custom apps

NT4 support

*Partially addressed through polling frequency control and scripts

SUS 1.0 SP1

*

WSUS

Systems Management Server 2003

Patching the Enterprise

Systems Management Server 2003

Premium Change and Configuration Management Offering

Scalable, global enterprise solution for client and server management

Software Distribution

OS Deployment

Mobile Device Management

Hardware Inventory

Software Inventory

Application Usage Tracking

Remote Help Desk Functionality

Visit http://www.microsoft.com/sms for more infomation

SMS 2003 & Patch Management

Supports critical updates for Windows and Office

Vulnerability Assessment

Leverages existing tools like MBSA

Collects MBSA results for storage in a central repository

Rich reporting provides detailed vulnerability analysis and enables mitigation planning

Status and Compliance Reporting

Deployment status as patches are delivered using built-in reports and client status messaging

Determine actual baselines in the environment before changing the environment

Report on clients not compliant to baseline

Automatically deploy updates to get compliant

SMS 2003 Patch Management: How It Works

1. Setup: Download Security Update

Inventory and Office Inventory

Tools; run inventory tool installer

2. Scan components replicate to SMS clients

3. Clients scanned; scan results merged into SMS hardware inventory data

SMS

Site Server

4. Administrator uses Distribute

Software Updates Wizard to authorize updates

5. Update files downloaded; packages, programs & advertisements created/updated; packages replicated

& programs advertised to SMS clients

6. Software Update Installation

Agent on clients deploy updates

7. Periodically: Sync component checks for new updates; scans clients; and deploys necessary updates

Microsoft

Download Center

SMS Distribution

Point

SMS Distribution

Point

SMS Clients

SMS Clients

SMS Clients

SMS 2003 - SP1

Ability to authorize critical updates immediately without waiting for inventory scans. Allows deployment of a critical update as soon as it is released.

Prior to sp1 = needed to wait for the scans to happen and the data to be returned to the SMS site server and the update would then be available to deploy through the Distribute

Software Update wizard .

SMS Inventory Tool for Microsoft Updates

SMS Inventory Tool for Microsoft Updates (ITMU)

Uses Windows Update Agent for scanning and installation of updates

WUA included with Windows XP SP2 & Windows Server 2003 SP1

Distributed as a stand-alone install by SMS for older operating systems

Provides consistency with content provided on Microsoft

Update

Non-critical updates are not included in v1.0 of the scan tool

Can be used side-by-side with legacy scan tools for additional product coverage

Expected Release Date = July 2005

Patch Management Client Experience

Background Intelligent Transfer Service - BITS

Downloads file using Hypertext Transfer Protocol (HTTP)

Checkpoint mechanism

Allows for network connectivity interruptions

Automatic network throttling

Only uses idle bandwidth

NEW!

BITS v2.0

Included in Windows XP SP2 & Windows Server 2003 SP1

Downloadable for Windows 2000, XP and Server 2003

How does Microsoft manage patches?

Patching by MSIT

How MS does it: Patch process flow

Corporate Security

(CorpSecIT) monitors vulnerability information

CorpSecIT finds & analyzes vulnerability

Wait for service pack

Critical

Vulnerability?

yes

CorpSecIT determines enforcement schedule no

Global Client

Software (GCS) tests patch

GCS creates SMS package

14 Days

GCS distributes package

GCS enforces patch

7 days

(or immediate if critical)

How MS does it: The technology

Low

Client Impact

Method

Patch timeline

Vulnerable Clients 30%

High

Client Impact

Windows Update; Email & ITWeb Notification (Optional)

SMS Patch Management (Voluntary > Forced)

Internal Scanning & Scripts (Forced)

Port Shutdowns

12% 6% 5% 3%

http://www.microsoft.com/uk/technet

Download