Security Update Server Registration, Active scanning and Windows patching.

Slides:



Advertisements
Similar presentations
Patch Management Patch Management in a Windows based environment
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
WSUS Presented by: Nada Abdullah Ahmed.
Paula Kiernan Senior Consultant Ward Solutions
System and Network Security Practices COEN 351 E-Commerce Security.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Payment Card Industry (PCI) Data Security Standard
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Installing and Configuring a Secure Web Server COEN 351 David Papay.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
VMware vCenter Server Module 4.
Module 16: Software Maintenance Using Windows Server Update Services.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Cyber Patriot Training

Securing Microsoft® Exchange Server 2010
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Talking points Attacks are more frequent, more aggressive, require more time to repair and prevent Machines get compromised in 2003 for the same reasons.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Module 14: Configuring Server Security Compliance
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Internet and Intranet Fundamentals Class 9 Session A.
Brent Mosher Senior Sales Consultant Applications Technology Oracle Corporation.
Module 7 Planning Server and Network Security. Module Overview Overview of Defense-in-Depth Planning for Windows Firewall with Advanced Security Planning.
Windows 2003 Installation/Upgrade and Update. Checking Compatibility Supported Upgrade paths Using the MS Windows Upgrade Advisor HCL (Hardware Compatibility.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Small Business Security Keith Slagle April 24, 2007.
Securing Your Enterprise with Enterprise Manager 10g Amir Najmi Principal Member of Technical Staff System Management Products Oracle Corporation Session.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Security fundamentals Topic 10 Securing the network perimeter.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, EU-FP6 Project ISS e G Integrated Site Security for.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Operating System Hardening. Vulnerabilities Unique vulnerabilities for: – Different operating systems – Different vendors – Client and server systems.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Computer Security Sample security policy Dr Alexei Vernitski.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Security fundamentals
Installing TMG & Choosing a Client Type
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
CompTIA Server+ Certification (Exam SK0-004)
Risks & Reality Cyber Security Risks & Reality
12 STEPS TO A GDPR AWARE NETWORK
Implementing Client Security on Windows 2000 and Windows XP Level 150
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
Using Software Restriction Policies
Presentation transcript:

Security Update Server Registration, Active scanning and Windows patching

Bastion Host Policy Ensure that critical servers are managed with appropriate levels of security Define the overheads: management, operation and security Identify all network servers and establish purpose, security requirements, user base and support staff Limit exposure of network servers to those apps that are critical for their primary purpose Establish network ACLs for specific IP applications. ACLs will restrict access to specific apps to those servers that have been registered to provide them

Bastion Host A network system that may be exposed to attack from other internal or external network systems Deployed, configured, operated and managed in a manner that mitigates this exposure Fulfills a specific role All unnecessary services, protocols, applications disabled or removed Avoids trust relationships with other systems to guard against 'key to the castle' attacks Apply bastion host principles to all University servers

Role Purpose - services and applications User community Sensitivity Legal / regulatory requirements Security Considerations Availability requirements

Location Physical security Environmental –Air conditioning –Emergency power source –Fire prevention Dedicated network ports Not in staff offices

Management, Support and Operation Identify personnel responsible –System administrators –System operators –Application support specialists –Maintenance contractors At least 2 individuals identified with at least one being the system administrator

Management, Support and Operation 2 Asset register detailing hardware and software components, including licensed software System configuration details inc security measures and details of admin/root accounts System change procedures –including reversion procedures Contractors callout procedures Disaster recovery plans

Sys Admin Guidelines

Protection via the Network Filtering policies –Default allow –Default deny Default deny –Inbound –Outbound ? Protect –Servers –Clients

Client Campus Internet Segment 2 Segment 3 sshsmbssh http rdp http https imap pop smtp FileWebMailstore Segment 1 Client

Server Registration Database Demo

Friendly Probing Identify remotely exploitable systems –new machines missing critical patches –old machines brought out of the cupboard Locate holes before the enemy do Automatic notification for IT staff Initially, testing the most critical Microsoft holes –Then including other OSes Scanner host: friendly-probe1.cent.gla.ac.uk( currently )

Windows Patching TRG working group investigated options for automated patching of Microsoft systems Recommended WSUS Evolution: –SUS –WUS –WSUS Available at:

Patch Classes Updates Installed –Security Updates –Critical Updates –Definition Updates (Windows Defender) –Service Packs –Update Roll Ups –Tools –Updates (non-critical fixes) Not Installed –Drivers –Feature packs

Does not help with: Weak passwords Lack of configuration hardening –Removing unneeded services better than patching Executing untrustworthy code Social Engineering

Thanks: Andrew Cooper Steve McIntosh - WSUS Service Derek Higgins - Server Registration System

Thats all folks! Questions…