CHANGE MANAGEMENT FOR WINDOWS OS

Slides:



Advertisements
Similar presentations
System Center Configuration Manager Push Software By, Teresa Behm.
Advertisements

I NDULGENC E There is no need for oversight or management direction. All staff members are superstars and act in the best interest of the company.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Installing software on personal computer
A Feature-Based Analysis & Comparison of IT Automation Tools: Comparing Kaseya to Developed By: & Advisor : Dr. S. Masoud Sadjadi School of Computing and.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
Chapter 7 Database Auditing Models
SOE and Application Delivery Gwenael Moreau, Abbotsleigh.
Information Systems Security Computer System Life Cycle Security.
UNM IT Managed Workstations. Benefits of Managed Workstations  Standard software with uniform configuration ensures end users have the same set of applications.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
1 Process Engineering A Systems Approach to Process Improvement Jeffrey L. Dutton Jacobs Sverdrup Advanced Systems Group Engineering Performance Improvement.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
© British Telecommunications plc BT Managed Services Innovate
Patch Management Only part of the solution….. Bob Isaak Mar 04, 2004.
Pass SOX security audits and Improve XA security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
SMS 2003 Deployment and Managing Windows Security Rafal Otto Internet Services Group Department of Information Technology CERN 26 May 2016.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Gathering Network Requirements Designing and Supporting Computer Networks – Chapter.
PC MANAGER MEETING January 23, Agenda  Next Meeting  Training  Windows Policy  Main Topic: Windows AV Service Review.
U of Maryland, Baltimore County Risk Analysis of Critical Process –Financial Aid Adapted STAR model –Focus on process and information flow –Reduced analysis.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Change and Patch Management Controls
© Mahindra Satyam 2009 Configuration Management QMS Training.
11 WORKING WITH PRINTERS Chapter 10. Chapter 10: WORKING WITH PRINTERS2 THE WINDOWS SERVER 2003 PRINTER MODEL  Locally attached printers Printers that.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Your Cyber Security: The scope of your risk is broad and growing To understand the nature of the risk landscape look at the presentations here today-begin.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
- Company Confidential - Corporate Overview March 2015.
Chapter 4. CONCEPT OF THE OPERATING SYSTEM MANAGING ESSENTIAL FILE OPERATIONS.
3-1 © Prentice Hall, 2004 Chapter 3: Managing the Object-Oriented Information Systems Project Object-Oriented Systems Analysis and Design Joey F. George,
Security and resilience for Smart Hospitals Key findings
Managed Desktop Andrea Beesing April 5, 2016.
Presenter: Igna Visser Date: Wednesday, 18 March 2015
Managed IT Solutions More Reliable Networks Are Our Business
Chapter 2 The Origins of Software
Review of IT General Controls
Chapter 7. Identifying Assets and Activities to Be Protected
Configuration Management
INDULGENCE There is no need for oversight or management direction. All staff members are superstars and act in the best interest of the company.
CompTIA Server+ Certification (Exam SK0-004)
Chapter 18 Maintaining Information Systems
Leverage What’s Out There
Introduction to Operating Systems
EMEZEN WINDOWS OS SECURITY CONFIGURATIONS
CIS 349 Competitive Success/snaptutorial.com
CIS 349 Education for Service/snaptutorial.com
CIS 349 Teaching Effectively-- snaptutorial.com
Audit Plan Michelangelo Collura, Folake Stella Alabede, Felice Walden, Matthew Zimmerman.
SQL Database Audit Planning
Active Directory Audit
Technology Audit Plan ----BCSY University
UConn NIST Compliance Project
Chapter 2 The Origins of Software
11/23/2018 3:03 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Chapter 2 The Origins of Software
Chapter 2 The Origins of Software
Chapter 9 – Software Evolution and Maintenance
Statement of Auditing Standard No. 94
Chapter 8 Software Evolution.
PLANNING A SECURE BASELINE INSTALLATION
Chapter 2 The Origins of Software
Agenda The current Windows XP and Windows XP Desktop situation
Server Management and Automation Windows Server 2012 R2
{Project Name} Organizational Chart, Roles and Responsibilities
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

CHANGE MANAGEMENT FOR WINDOWS OS

Background Client Platform: Windows Operating System Operating System Version: Windows 8 Client Devices: desktop computers and laptops Security Software: Symantec Client Management Suite OS and software patches: installed per management policy Components: Configuration and maintenance, User interface, Applications, File systems, Core components, Services, Kernel, Security, Device drivers, Hardware devices, and APIs

Scope Version migration management from Windows 8 to Windows 10 Anti-malware software Patch management Device settings User settings Passwords – Complexity, Age, Uniqueness

Out of Scope Windows Server 2012 and Servers Mobile devices Customized application

IT Audit team members’ roles and responsibilities Name Roles Responsibilities Ugo Nwadike Project Leader The project Leader manages the process for all change management requests and reviews each request for completeness. The person in that role verifies that the stated objectives of the request can be met and are consistent with the company's best practices. He has the discretion to deny requests that are not consistent with company policy or best practices. Iyana Lester Auditor 1 The Auditor 1 - originates the request by submitting a written or online Request For Change (RFC) to the change management manager. Yijiang Li Auditor 2 Makes the necessary changes as requested in the RFC and notifies affected parties if corresponding changes need to be made. For example, changes made to Active Directory or Exchange are implemented into production by the change implementer. Hanqing Zhou Auditor 3 Monitors project execution and reports emergency IT changes to the Project Leader. Yuan Liu Auditor 4 Manages implementation notes and documents the reason for change.

Risk assessment low moderate high RISK LIKELIHOOD IMPACT Asset Management low moderate Access Management high System Downtime Over Budget of IT Projects Change Control Data loss Legacy Systems Software Threats & Vulnerabilities Unauthorized Access

Audit Hours and Phases Name Role Time allocated for each of the audit phases (Hrs) Total time (Hrs) Planning Fieldwork & Documentation Issue Discovery & Validation Reporting Drafting & Issuance Ugo Nwadike Lead Auditor 8 32 Iyana Lester Auditor 10 6 Yijiang Li Hangqing Zhou Yuan Liu 40 48 160

Key dates and deliverable Planning 26th Feb ~ 2nd Mar Fieldwork & Documentation 5th Mar ~ 9th Mar Issue Discovery & Validation 12th Mar ~ 16 Mar Report drafting & Issuance 19th Mar ~ 23th Mar

QUESTIONS

References Modern System Analysis & Design 8th Edition Joseph S. Valacich and Joey F. George http://searchwindowsserver.techtarget.com/tip/A-disciplined-approach-to-the-Windows-change-management-process http://searchwindowsserver.techtarget.com/tip/Implementing-change-management-in-the-Windows-server-environment http://www.windowstalk.org/windows8-challenges https://answers.microsoft.com/en-us/windows https://www.microsoft.com/en-us/windows/