Patch Deployment Patch Creation Vulnerability Scanning Vulnerability Intelligence.

Slides:



Advertisements
Similar presentations
3/29/2017 1:10 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or.
Advertisements

Experiences with Service Manager and Orchestrator.
Contains: Monitoring configuration: MPs, rules, monitors, discoveries, etc. Configuration & inventory data Performance data State data Alerts.
UD-B302 Lighting, HVAC, … 75% IT 25% PCs, Laptops, Monitors $28b Network $18b Servers $14b Printers $13b $90b Telecom $10b Other $7b Commercial Energy.
Agenda Orchestrator - Components Orchestrator – For the ConfigMgr Admin.
DV-B306 One with Windows More Apps in More Places Modern Managemen t.
4/13/2017 7:44 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or.
The system requirements for System Center components are all not consistent I don’t know in what order I should upgrade System Center components.
-ConfigMgr Scripting history -Introduction to the ConfigMgr SP1 & PowerShell -Scenarios & Demos.
Appetizers Each MVP will present one tantalizing appetizer to whet your appetite for more. Please save all questions for the end. P.S. We’re here all.
4/15/ :16 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or.
DV-B307 Personal & flexible  App and OS personalization roam across Windows  Syncs are smart and logins are fast  Application or OS reconfiguration.
Agenda Overcome flat budgets Coping with relentless growth Meeting increasing business demands Managing escalating complexity Maintaining service levels.
3 5 Cisco UCS™ Manager (Read / Write Configuration Interfaces) UCS Manager GUI and CLI Cisco UCS Fabric Interconnects (Read Only / Cut Through Interfaces)
Service Manager Operations Manager Configuration Manager Data Protection Manager Virtual Machine Manager App Controller Orchestrator Active Directory.
About me About this session Agenda Computer User.
AI-B301 Topics A quick note: There is a lot of information in this session, too much in fact! Slides are heavy and designed for you to review. We’ll.
Something special about Benjamin Session Objectives and Takeaways.
Agenda Advanced Query Techniques Agenda Taming SQL Performance issues.
Not what you are looking for? Head to another session now!
Devices & Experiences Users Want Applications and data across devices, anywhere Controlled access to data with seamless authentication.
Windows Store apps Provisioning Installation.
Session Objectives and Takeaways Scenario End UserAdministrator Art needs to quickly install an application to edit a diagram that he needs to update.
Boot processCapable of USB boot Firmware USB boot enabled. (PCs certified for use with Windows 7 or Windows 8 can be configured to boot directly.
Customizing the Browser Browser Management Deployment MethodsApp Compat.

Increase the level of Service Pack to the supported level IMPACT.
LinuxUNIX Red HatSUSECentOSUbuntuDebianOracleAIXHP-UXSolaris Configuration Manager * * * * * * Endpoint Protection No Plans.
Not what you are looking for? Head to another session now!
Hats off to MS Research! Wake-on-LAN in ConfigMgr.
Global Foundation Services (GFS) Malware Protection Center Microsoft Security Response Center (MSRC)
What are add-ins Types of add-ins Creating add-ins Demos.
MANAGEMENT ANTIMALWARE PLATFORM Microsoft Malware Protection Center Dynamic Signature Svc Available only in Windows 8 Endpoint Protection Management.
“With System Center 2012, we have much more granular insight into and control over the services we’re delivering to the business. This is critical.
IM-B401 Dashboard Samples shown today can be found at
Your Application:.NET Application Performance Monitoring First mile: internal synthetic transactions Mid-mile: Global Service Monitor Last mile: client-side.
IM-B391 Agenda Getting Metrics Out From Database Servers.
Pre-Talk Q&A piecing it together fabric design and configuration.
REQUIREMENTS WORKING SOFTWARE Misunderstood requirements Conflicting priorities Unmet user expectations Can’t get actionable feedback Disparate management.
Co-facilitator Denver user group Blog at  Code examples from this presentation.
Microsoft NDA Confidential Enabling users to be productive, responsibly Finding the right balance Devices & Experiences Users Want Applications and.
Maps Serverquarium 2013 Four Steps to Conquering the Summit.
Online Snapshots Disk-Based Backup Active Directory Tape-Based Backup SC DPM Up to Every 15 minutes Disaster Recovery with offsite replication and.
SD-B309 Session Objectives And Takeaways Check us out on Visit our blog: Watch us:
DC-B312 BitLocker Improvements in Windows 8 MBAM 2.0 Investment Areas and Key New Features Deploying MBAM 2.0MBAM 2.0 End User Experience.
Five issues, commonly addressed on the forums and mailing lists Boundaries Client identity Business hours and maintenance windows Deployment type.
Enabling users to be productive, responsibly Finding the right balance Devices & Experiences Users Want Applications and data across devices, anywhere.
Amit Virmani Software Design Engineer Madhu Jujare Software Design Engineer.
Integrated Platform Virtual applications work like installed applications Virtual applications use Windows standards No dedicated drive letter.
Not what you are looking for? Head to another session now!
Software Update Groups Update Deployments Assign updates to clients Define when, where, how, who Update Packages.
ADK ComponentConfiguration Manager Site System Windows Deployment ToolsCentral Administration Site Server Primary Site Server All SMS Provider.
Agenda Data center challenges Main central themes facing every IT decision maker today Overcome flat budgets Cope with relentless growth Meet increased.
Lost Data and Files Recovery Planning Distributed Workforce System Failures Traditional approaches to machine recovery don’t meet the needs of a.
Session Objectives And Takeaways Our Service Why Use the Portal?
Complete your session evaluations today and enter to win prizes daily. Provide your feedback at a CommNet kiosk or log on at.

On Premises Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service) Storage Servers.
A way to develop software that emphasizes communication, collaboration, and integration between development and IT operations teams.
DC-B301 Agenda Can you afford not to Migrate? What is USMT 5.0?
ConfigMgr Environment 2007 Hierarchy 2007 Hierarchy (Simplified View)
Stop following incidents Register and analyze Describe your tasks step by step Make it part of your DNA If you know what you did the last month you.
High Density Virtualization Low Density or No Virtualization All features Unlimited virtual instances Processor-based license All features Two virtual.
Session Objectives And Takeaways Agenda Monitor and manage servers 30+ Azure Hosted Services 10 global data center facilities & 6 domains 110+
Data Application Operation Infrastructure Create Secure & Protect Replicate & Distribute Archive Files Databases Compliance Data Rich Content.
Agenda Is your company using Windows Azure? Dev vs Ops and the Modern Application.
Neural Networks for IT Professionals
1/17/2019 8:33 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or.
7/16/2019 3:29 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or.
10/30/ :28 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Presentation transcript:

Patch Deployment Patch Creation Vulnerability Scanning Vulnerability Intelligence

Microsoft Programs 14% Third Party Programs 86% Busine ss View Criminal s View What criminals attack Business critical programs Programs you know about Programs you don’t know about What do you patch today Vendors

7 Vulnerabilities in 2012 TOP 50 Apps in in 2007

Patching N of 200 programs 80% risk reduction achieved by either patching the 12 most critical programs, or by patching the 37 most prevalent programs 1237 Strategy 2: By Criticality Risk remediated by patching the N most critical programs Strategy 1: Static Risk remediated by patching the N most prevalent programs

Author custom SCUP catalog WSUS Server Catalogs downloaded from web ConfigMgr ServerSCUP Console Publish UpdatesSync Updates ConfigMgr Clients Scan Updates Deploy Updates Author Updates Import Updates

Adobe Flash JAVA Adobe Reader Apple Itunes Firefox Google Chrome

Complete your session evaluations today and enter to win prizes daily. Provide your feedback at a CommNet kiosk or log on at Upon submission you will receive instant notification if you have won a prize. Prize pickup is at the Information Desk located in Attendee Services in the Mandalay Bay Foyer. Entry details can be found on the MMS website.