Patch Management Tools - Microsoft Center

Patch Management Tools
Solution Components
Analysis
Tools
• Microsoft Baseline Security Analyzer (MBSA)
• Office Inventory Tool
Online Update • Windows Update
Services
• Office Update
• Windows Update Catalog
Content
Repositories
• Office Download Catalog
• Microsoft Download Center
• Automatic Updates (AU) feature in Windows
Management
Tools
• Software Update Services (SUS)
• Systems Management Server (SMS)
• Microsoft Guide to Security Patch Management
Prescriptive
Guidance
• Patch Management Using SUS
• Patch Management Using SMS
Client Patch Management Options
Consumer and Small Business: Windows Update
User Initiated Deployment or Automated Updates
Access to all available updates
Deployment from Microsoft.com
Medium Business: Software Update Services
User Initiated Deployment or Automated Updates
Administrator approved updates only
Deployment from servers behind firewalls
Enterprises: SMS and SMS Software Update Services Feature Pack
User or Administrator Initiated Deployments
Administrator approved updates
Deployment from servers behind firewalls
Reporting
Scheduling
MBSA: What It Does
Helps identify vulnerable Windows systems
Scans for missing security patches and
common security mis-configurations
Scans various versions of Windows and other
Microsoft applications
New
Update
Assess
Identify
Evaluate
& Plan
Deploy
Scans local or multiple remote systems via
GUI or command line invocation
Generates XML scan reports on each scanned
system
Runs on Windows Server 2003, Windows
2000 and Windows XP
Integrates with SUS & SMS
MBSA: How It Works*
1. Run MBSA on Admin
system, specify targets
2. Downloads CAB file with
MSSecure.xml & verifies
digital signature
Microsoft
Download Center
MSSecure.xml
MSSecure.xml contains
• Security Bulletin names
• Product specific updates
• Version and checksum info
• Registry keys changed
• KB article numbers
• Etc.
3. Scans target systems for
OS, OS components, &
applications
4. Parses MSSecure
to see if updates
available
5. Checks if
required updates
are missing
6. Generates time
stamped report of
missing updates
MBSA
Computer
SUS Server
*Only covers security patch scanning capabilities, not security configuration detection issues
MBSA 1.1.1
Windows Update: How It Works
Scenario 1: User Initiated Access
1. User goes to Windows
Update (WU) & selects
‘Scan for updates’
Windows Update Service
2. Client side code (CC) in
browser validates WU server
& gets download catalog
metadata
3. CC uses metadata to
identify missing updates
4. User selects updates to
install
5. CC downloads, validates, &
installs updates
6. CC updates history &
statistics information*
*Note: No personally identifiable information is collected.
See http://v4.windowsupdate.microsoft.com/en/about.asp#privacypolicy
Windows Update: How It Works
Scenario 2: Automatic Updates Initiated Access
1. AU check WU service for
new updates (every 17-22
hours)
2. AU validates WU server &
gets download catalog
metadata
Windows Update Service
3. AU uses metadata to
identify missing updates
4. AU either notifies user or
auto-downloads using BITS
& validates new updates
5. AU either notifies user or
auto-installs updates
6. AU updates history &
statistics information*
*Note: No personally identifiable information is collected.
See http://v4.windowsupdate.microsoft.com/en/about.asp#privacypolicy
SUS 1.0: What it Does
Deploys Windows security patches, security rollups,
critical updates*, and service packs only
Deploys above content for Windows 2000,
Windows Server 2003 and Windows XP only
Provides patch download, deployment, and installation
configuration options
New
Update
Bandwidth optimized content deployment
Assess
Provides central administrative control over which patches
can be installed from Windows Update
Identify
Provides basic patch installation status logging
Evaluate
& Plan
Deploy
*Including critical driver updates
SUS Benefits
Gives administrators control over patch & update
management
Works with Group Policy* to prevent installs of non-approved
updates from Windows Update
Allows staging & testing of updates before installation
Simplifies & automates key aspects of the patch
management process
Ease of use alleviates difficulty of keeping supported
systems up-to-date, reducing security risks
*Note: Use of SUS does not require implementation of Active Directory or Group Policy
SUS 1.0: How It Works
Windows
Update Service
Windows
Update Service
1. SUS Server check for
updates every 17-22 hours
2. Administrator reviews,
evaluates, and
approves updates
3. Approvals &
updates synced
with child SUS
servers*
Parent
SUS Server
Child
SUS Server
4. AU gets approved
updates list from SUS server
5. AU downloads approved
updates from SUS server or
Windows Update
6. AU either notifies user or
auto-installs updates
7. AU records install history
*SUS maintains approval logs & download, sync, & install statistics
Child
SUS Server
Client Component: Automatic
Updates
Centrally configurable to get updates either from corporate
SUS server or Windows Update service
Can auto-download and install patches under admin control
Consolidates multiple reboots to a single reboot when
installing multiple patches
Included in Windows 2000 SP3, Windows XP SP1, and
Windows Server 2003
Localized in 24 languages
Server Component: SUS Server
Downloads updates from Windows Update
Web based administration GUI
Specify server & update process configuration options
View downloaded updates
Approve updates & view approved updates
Security by design and default
Requires NTFS; Installs IIS Lockdown and URL scanner*
Supports secure administration over SSL
Digital signatures on downloaded content validate authenticity
Uses HTTP for content synchronization – only port 80 needs to be open
Server side XML based logging on Web server
Patch deployment & installation statistics
Supports geographically distributed or scale-out deployments with
centralized management for content synchronization & approvals
Localized** in English & Japanese
*If not already installed
**Note: Delivers updates for all 24 supported client languages
SUS 1.0
SMS 2003: What it Does
Identifies & deploys missing Windows and Office security
patches on target systems
Can deploy any patch, update, or application in Windows
environments
Inventory management & inventory based targeting of
software installs
New
Update
Assess
Install verification and detailed reporting
Flexible scheduling of content sync & installs
Central, full administrative control over installs
Bandwidth optimized content distribution
Identify
Evaluate
& Plan
Deploy
Software metering and remote control capabilities
SMS 2003 Patch Management:
Benefits
Gives administrators control over patch management
Allows staging & testing of updates before installation
Fine-grained control of patch management options
Automates key aspects of the patch management process
Can update a broad range of Microsoft products
(not limited to Windows and Office)
Can also be used to update third party software and deploy
& install any software update or application
High level of flexibility via use of scripting
SMS 2003 Patch Management:
How It Works
Microsoft
Download Center
1. Setup: Download Security Update
Inventory and Office Inventory
Tools; run inventory tool installer
2. Scan components
replicate to SMS clients
3. Clients scanned; scan
results merged into SMS
hardware inventory data
SMS Distribution
Point
SMS
4. Administrator uses Distribute Site Server
SMS Clients
Software Updates Wizard to
authorize updates
5. Update files downloaded; packages,
programs & advertisements
created/updated; packages replicated
& programs advertised to SMS clients
SMS Distribution
Point
SMS Clients
6. Software Update Installation
Agent on clients deploy updates
7. Periodically: Sync component checks
for new updates; scans clients; and
deploys necessary updates
SMS Clients
SMS 2003 Patch Management:
Functionality
System scanning & patch content download
Content from Microsoft Download Center
MBSA & Office Inventory plug-ins scan for missing patches
Supports updating of remote & mobile devices
Updates various versions of Windows, Office, SQL, Exchange, and Windows Media
Player without need for update packaging / scripting
Administrator control
Update targeting based on AD, non-AD groups, WMI properties; additional options
via scripting
Patches content is downloaded from a central SMS repository only when the
deployment process is initiated by the SMS administrator
Specific start and end times (change windows); multiple change windows
Easily move patches from testing into production
Reference system patch configurations can be used as a template to verify or
enforce compliance of systems that must mimic reference system configuration
SMS 2003 Patch Management:
Functionality (2)
Patch download & installation
Delta replication (site-site, server-server) of patches
Uses BITS* for mobile / remote client-server
Uses SMB* for LAN / priority situations
Reminders and rescheduling of install / reboot & enforcement dates
Optimized graceful reboots, but forced when enforcement date arrives
Per-patch reboot-needed detection to reduce reboots
Status & Compliance Reporting
Deployment status as patches are attempted
Standard and customized reports through read-only SQL queries
Determine actual baselines in the environment before changing the environment
SLA measurement and rate-of-spread
*Requires SMS Advanced Client
SMS 2003
Choosing a Patch Management Solution
Functionality versus IT Resources Based Selection
Choose the solution that provides the best balance of functionality versus IT
resource constraints for your specific needs
Breadth of Functionality
High
SMS
SUS
Windows
Update
Low
IT Resources & Administration Skill Level
High
Patch Management Tools
Futures
MBSA Update Scanning Functionality
Overall direction
MBSA update scanning functionality integrated into
Windows patch management functionality
MBSA becomes Windows vulnerability assessment &
mitigation engine
Near- and Intermediate-term plans
MBSA 1.2 (Q4 2003)
Improves report consistency, product coverage, and locale support
Integrates Office Update Inventory Tool
MBSA 2.0 (Q2 2004)
Update scanning functionality migrates to SUS 2.0 / Microsoft
Update
MBSA leverages SUS 2.0 for update scanning
MBSA 1.2
Better international support
Japanese, French, German locale support
Expanded product support
MDAC, MSXML, JVM, Content Mgt Server, Commerce Server,
BizTalk, Host Integration Server and Office
Improved consistency of reports
Support for alternate file versions in mssecure.xml
(“OR” logic to consider multiple sets of file details)
Handle case of non-security updates overwriting pervious security updates
Handle multiple patches for a product targeted at different OS versions
Handle uniproc/multiproc patches, QFE/GDR branch patches, etc.
Office Update Inventory Tool integration (local scans only)
Enhanced IE security zone checks
MBSA 2.0
Integration with SUS 2.0 / Microsoft Update
Centralized report storage (SQL, net share)
Configurable/pluggable engine checks
(engine framework, SDK)
Integrates tools like IISLockdown & SQLScan
Infrastructure to support future mitigation
(via MOM, SMS, etc.)
Windows Update And Office
Update  Microsoft Update
Today
H2 2004
Microsoft Update
Online service and update repository
for updating all Microsoft software
Built on SUS infrastructure
Includes automated scanning, update
install, and reporting capabilities
available in Windows Update
Microsoft Update
Office
Windows
Update
Update
SUS
SMS
SUS 2.0
Support for additional Microsoft products
Office 2003, SQL Server 2000, Exchange 2000, + additional
products over time*
Enhanced infrastructure for patch management
Data Model - supercedence, update dependency & bundle relationships
Server APIs (.NET) and remoteable Client APIs (COM) for flexibility
Administrative control
Pre-deployment checks; Initiate install & uninstall
Set polling frequencies & install deadlines
Target updates to groups of machines; Policy (AD) or list based
group definitions
Rules for auto-handing of updates
Deployment & targeting
Download subset of WU content (e.g., WinXP but not Win2K)
Automatically deploys / updates SUS clients
*Support for product versions listed here will be available when SUS 2.0 is released; support for additional versions and products
will be delivered over time without the need to upgrade or redeploy SUS 2.0
SUS 2.0 (2)
Bandwidth efficiency
Uses BITS for client-server and server-server communication
(download throttling & checkpoint restart, limit max bandwidth usage, etc.)
Support for ‘delta compression’ technologies
Configurable update subscriptions
Configurable to only download updates at deployment time
Scale out
Hierarchical & replica topology
Summary event roll-up
Status reporting
Deployment status aggregation per machine/per update/per
group
Download / install success, failure, and error info
Custom reports using read-only SQL queries
Patch Management Functionality
Future Direction
Longer-term (Longhorn time frame)
SUS functionality integrated into Windows
SUS supports updating of all Microsoft software
SUS infrastructure can be used to build patch management
solutions for 3rd party and in-house built software
SMS patch management built on SUS infrastructure and delivers
advanced patch management functionality
Near-term
SUS 2.0 (Spring 2004)
Single infrastructure for patch management
Support for additional Microsoft products
Significant improvements in patch management functionality
SMS 2003 Update Management Feature Pack (H2 2004)
Leverages SUS for update scanning & download
Leverages SUS client (Automatic Updates) for installs
Choosing A Patch Management Solution
Needs-Based Selection
Adopt the solution that best meets the needs of your organization
Core Patch Management Capabilities
Capability
Windows Update
SUS 1.0
SMS 2003
Supported Platforms
for Content
NT 4.0, Win2K, WS2003,
Win2K, WS2003, WinXP
WinXP, WinME, Win98
NT 4.0, Win2K, WS2003, WinXP,
Win98
Supported Content Types
All patches, updates &
service packs (SPs) for
the above
Only security & security rollup All patches, SPs & updates for the
patches, critical updates, &
above; supports patch, update, &
SPs for the above
app installs for MS & other apps
Targeting Content
to Systems
No
No
Yes
Network Bandwidth
Optimization
No
Yes
Yes
Patch Distribution Control No
Basic
Advanced
Patch Installation &
Scheduling Flexibility
Manual, end user
controlled
Admin (auto) or user (manual) Administrator control with
controlled
granular scheduling capabilities
Patch Installation Status
Reporting
No
Granularity of Control
(for patch deployment)
(for patch deployment & server sync)
Limited
Comprehensive
(client install history & server
based install logs)
(install status, result, and compliance
details)
Additional Software Distribution Capabilities
Deployment Planning
N/A
N/A
Yes
Inventory Management
N/A
N/A
Yes
Compliance Checking
N/A
N/A
Yes
Security Roadmap
Today
0–9
months
Guidance
Tools &
Patching
Monthly
patch releases
Guidance
& training
How Microsoft
runs Microsoft
Support for
W2K SP2 &
NT4 SP6at
2 patch
installers;
rollback
Patching
enhancements
SUS 2.0
SMS 2003
More guidance
and training
9 – 12
months
Shields
Shield
technologies
for client
and server
“MS Update”
More
guidance and
training
Future
Next-Generation
Security
Integrated
host security
technologies
NGSCB
Windows
hardening
More
guidance
and training
Adopt a Patch Management Solution
At Microsoft, our #1 concern is the security and availability of
your IT environment
If none of the Microsoft patch management solutions meet your needs
consider implementing a solution from another vendor
Partial list of available products:
Company Name
Product Name
Company URL
Altiris, Inc.
Altiris Patch Management
http://www.altiris.com
BigFix, Inc.
BigFix Patch Manager
http://www.bigfix.com
Configuresoft, Inc.
Security Update Manager
http://www.configuresoft.com
Ecora, Inc.
Ecora Patch Manager
http://www.ecora.com
GFI Software, Ltd.
GFI LANguard Network Security
Scanner
http://www.gfi.com
Gravity Storm Software, LLC Service Pack Manager 2000
http://www.securitybastion.com
LANDesk Software, Ltd
LANDesk Patch Manager
http://www.landesk.com
Novadigm, Inc.
Radia Patch Manager
http://www.novadigm.com
PatchLink Corp.
PatchLink Update
http://www.patchlink.com
Shavlik Technologies
HFNetChk Pro
http://www.shavlik.com
St. Bernard Software
UpdateExpert
http://www.stbernard.com
*Microsoft does not endorse or recommend a specific patch management product or company
Note: Enterprise Systems Management products such as IBM Tivoli, CA Unicenter, BMC Patrol, and HP OpenView
may also provide patch management functionality
Summary
Addressing the patch management issue is a top priority
Taking a comprehensive, tactical & strategic approach
Made progress, but much more work to be done
Microsoft focused on:
Reducing the number of vulnerabilities & associated patches
Improving customer preparedness, training & communication
Simplifying & standardizing the patching experience
Improving patch quality
Unifying and strengthening patch management offerings
Key Recommendations:
Implement a good patch management process – it’s the key to
success
Adopt a patch management solution that best fits your needs
Make use of the resources detailed in these slides
© 2003 Microsoft Corporation. All rights reserved.
This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.