Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.

Slides:



Advertisements
Similar presentations
The System Center Family Microsoft. Mobile Device Manager 2008.
Advertisements

Introduction to Systems Management Server 2003 Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
SAGE-AU Adelaide Windows Update Services Michael Kleef IT Pro Evangelist Microsoft Corporation Level 200.
Operational MS Tibor Kolejak Regional IT Site Manger Microsoft Czech Republic Tibor Kolejak Regional IT Site Manger Microsoft Czech Republic.
Managing a Windows Server 2003 Environment - SMS and MOM Michael Kleef IT Pro Evangelist Microsoft Pty Ltd
Chris Sfanos Program Manager Forefront Client Security Microsoft Session Code: SW17.
1 Secure Your Business PATCH MANAGEMENT STRATEGY.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Tech·Ed North America /19/2017 7:21 AM
Managing LOB Applications by Using System Center Operations Manager Published: March 2007.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Understanding Active Directory
TechNet Build’06 “The Secure Well Managed Infrastructure Tour”
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Wally Mead Senior Program Manager Microsoft Corporation.
Windows ® Powered NAS. Agenda Windows Powered NAS Windows Powered NAS Key Technologies in Windows Powered NAS Key Technologies in Windows Powered NAS.
Identity and Access Management Business Ready Security Solutions.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Windows Vista: Volume Activation 2.0
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
SOE and Application Delivery Gwenael Moreau, Abbotsleigh.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Training on ManageEngine Desktop Central
Tim Vander Kooi Systems
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Conditions and Terms of Use
A Day in the Life of a SharePoint Administrator Amit Puri Senior Development Lead Microsoft India.
NovaTech You Focus on Your Business & We Focus on Your IT Managed Services.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Module 14: Configuring Server Security Compliance
Chapter 6 of the Executive Guide manual Technology.
SMS 2003 Deployment and Managing Windows Security Rafal Otto Internet Services Group Department of Information Technology CERN 26 May 2016.
Migration from Software Update Services to Windows Server Update Services Jeff Alexander IT Pro Evangelist Microsoft Australia Scott Korman WSUS MVP SEC316.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
Future of the Server Room Tour. Ottawa Montreal Calgary Vancouver Toronto Future of Your Server Room Three Pillars of Windows Server 2008 Virtualization.
Paul Butterworth Management Technology Architect
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Microsoft Management Seminar Series SMS 2003 Change Management.
April-June 2006 Windows Hosting Seminar Series Technical Labs.
Virtual Machine Management Challenges What are Solution Accelerators? Offline Virtual Machine Servicing Tool Next Steps.
Managing and Monitoring the Microsoft Application Platform Damir Bersinic Ruth Morton IT Pro Advisor Microsoft Canada
Jorke Odolphi Product Technology Specialist WebCentral Using Microsoft Operations Manager To Monitor And Maintain Your Farm.
Managing your IT Environment. Microsoft Operations Manager 2005 Overview.
Service Pack 2 System Center Configuration Manager 2007.
Ellis Paul Technical Solution Specialist – System Center Microsoft UK Operations Manager Overview.
Steven Adler Enterprise Technology Strategist Microsoft EMEA.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
City-wide Active Directory Project Town Hall II
Overview – SOE PatchTT November 2015.
Overview – SOE PatchTT December 2013.
Threat Management Gateway
Migration Strategies – Business Desktop Deployment (BDD) Overview
Cybersecurity Strategy
Management of Virtual Environments
11/23/2018 3:03 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Building an Integrated Security System Microsoft Forefront code name “Stirling” Ravi Sankar Technology Evangelist | Microsoft
Microsoft Virtual Academy
Building and running HPC apps in Windows Azure
Delivering great hardware solutions for Windows
5/12/2019 2:57 PM © Microsoft Corporation. All rights reserved.
Microsoft Virtual Academy
SharePoint Server Assessment Results
Security in the Real World – Plenary Day One
IT Management, Simplified
Presentation transcript:

Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure

2 Agenda  Using Management Tools to Help with Security  SMS  Patch Management (Client, Server)  How partners can do to help customers  MOM  Monitoring your networks security  What partners can do to help  Summary / Q&A

3

4 Microsoft IT SMS 2003 Core Usage Scenarios  Asset management  Patch management  Software distribution  Software metering  Security Patches  File collection  Targeted Deployments

5 Patch Management Framework 1. Assess Environment to be Patched Periodic Tasks A. Create/maintain baseline of systems B. Access patch management architecture (is it fit for purpose) C. Review Infrastructure/ configuration Ongoing Tasks A. Discover Assets B. Inventory Clients 1. Assess 2. Identify 4. Deploy 3. Evaluate & Plan 2. Identify New Patches Tasks A. Identify new patches B. Determine patch relevance (includes threat assessment) C. Verify patch authenticity & integrity (no virus: installs on isolated system) 3. Evaluate & Plan Patch Deployment Tasks A. Complete patch acceptance testing B. Obtain approval to deploy patch C. Perform risk assessment D. Plan patch release process 4. Deploy the Patch Tasks A. Distribute and install patch B. Report on progress C. Handle exceptions D. Review deployment

Desktop Patch Management

7  Overview  Benefits of SMS 2003 patch management  Best practices

8 Benefits of Using SMS Patch Management  Proactive Monthly Patching and Compliance Process  Catch security issues before they affect productivity  Minimize the cost of alternate compliance processes  Packaging is Automated  No custom scripting and testing  Faster time to market  Centralized Patch and Compliance Method  Used across the company  Leverage Existing Resources  Uses SMS server infrastructure  Uses SMS administrators

9 Weds10:00AM Thurs 5:00 AM Fri2:00PM 5:00PM 5:00PM 5:00PM 5:00PM 12%30% Vulnerable Clients 6%5%3% Microsoft IT Multiple-Prong Approach Managed and Unmanaged Environment High Client Impact Method Low Client Impact Emergency client patch timeline Windows Update (Optional) & ITWeb Notification (Optional) SMS Patch Management (Voluntary >Forced) Logon Script (Forced) Internal Scanning Tool (Forced) Port Shutdowns

10 Best Practices to Enhance Patch Management  Great technology, great processes, great people  SMS Client Health Management Plan  Manage using a scorecard  Investigate by collecting client logs  Repair thru logon script logic  SMS Client Coverage Management Plan  Boundary Management  Client Count Trending  SMS Infrastructure Management Plan  MOM Management Pack for SMS

Server Patch Management

12 Servers…  Target Key Servers  Not all Servers need all patches  A server that will not run IIS may not need to have IIS patches applied…  Know when reboot is required (Plan it)  Backup / Recovery Plan (Ready)

13 Partner Opportunities  Security is the #1 priority  Executive support is critical  The process is just as critical as the implementation of the technology  Security Assessments  What if? Planning and Recovery?  HW and SW inventory frequency increased for patch compliance reporting  Scalable Solution (Start small and grow)  Assistance with MSUS – SMS choices

14

15 Polices, Procedures & Awareness MOM and Security Management Physical Security Internal Network Perimeter Host Application Data  MOM 2005 is a platform  Monitoring vs. Administration MOM Management Packs Operational Data

16 MOM 2005 Security Features  Secure by default  Role based security  Channel security  Support for more firewall scenarios  More…

17 More Security Features  MBSA Management Pack  Scans for common security misconfigurations  Needs admin level privileges  Task execution “auditing”  What task was run  When it was run  By which user  Against which computers  Whether or not it was successful

18 Partner Opportunities  Mom Install Configuration  Security Auditing, who, what, when  Analysis  Well Managed is Secure

19 Resources   

20 © 2004 Microsoft Corporation. All rights reserved. This whitepaper presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Microsoft, Active Directory, SharePoint, Windows, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.