---
title: '05 Planning & Deploying Patch Management'
disqus: hackmd
---
:::info
ST2612 Securing Microsoft Windows
:::
Lecture 05 Planning & Deploying Patch Management
===
<style>
img{
/* border: 2px solid red; */
margin-left: auto;
margin-right: auto;
width: 80%;
display: block;
}
</style>
## Table of Contents
[TOC]
Planning the Deployment of Service Packs & Hotfixes
---
- need to keep tech env secure & reliable
- need identifying security vulns & responding quickly
- patch management
- method for keeping comps up to date with new software releases
- security patch management
- patch management with concentration on reducing security vulns
- essential for secure IT management & operations
- vital for system security
- NOTE
- security patch management shld be continuous and well-established process
- though costly
- well-planed strategy required for every org to keep security patch management process cost-effective
Managing Updates
---
- microsoft update and automatic updates
- auto downloads & install latest updates from microsoft windows updates services
- windows server update services (WSUS)
- setup centralised & local update service at enterprise level
- microsoft endpoint manager
- comprise many config tools
- microsoft system centre config manager (SCCM)
- including software deployment management
- goes beyond software update/patch management to include software marketplace solution with centralised services at enterprise lvl
#### Get updates from Microsoft Website Only
- microsoft may send email notifs abt security updates
- shld download from website
- dont distribute using email
- fake
### Microsoft Update and Automatic Updates
- for consumers & small businesses (< 50 comps)
- updates can be installed with minimal/no user interaction
- uses internet connection to search for downloads from microsoft updates website
- dont need understand technical details of security update
- though users shld ensure they dont have apps affected by update
- service is free for licensed users
- NOTE
- simplest approach
- applicable to client systems that dont run mission crit services
- if let microsoft update auto update to servers, many services will be disrupted during update
- hence, enterprise dont adopt this approach for servers
### Windows Server Update Services (WSUS)
- for medium/large businesses
- admins can manage update settings & control distribution of updates
- can also test updates on selected comps before deploying to rest of network
- updates downloaded once from microsoft update website & stored on local server
- frees up internet bandwidth
- limitations
- dont support deployment of non-microsoft updates
- free for licensed users
- NOTE
- approach is to install local windows update server at enterprise network
- source of patches from standard windows update services
- unlike 1st approach, admins can hold back deployment of patches and defer actual updates to clients based on schedule
- essential to servers running mission crit services
### Microsoft Endpoint Manager
- supports mnanagement & distribution of microsoft & non-microsoft software updates & apps
- supports various types of endpts
- windows/non-windows platform
- WSUS part of it
- advanced admin control features
- charges apply
- NOTE
- includes services & tools used to manage & monitor mobile devices, desktop pcs, VMs, embedded devices & servers
- from their official product overview
#### Similar Alternatives

### Additional Resources
- security update guide
- AKA security bulletin
- contains detailed guidance & info abt security update & vuln
- supportng search/filter feature to locate specific entries
- NOTE
- is authoritative src of info on microsoft security updates
- managed by __microsoft security resp center (MSRC)__

- microsoft technical security notifications
- few free of charge notification services for sign-up users
- security update email alerts
- provide new/major revision microsoft product security content
- covers same content published in security update
- security advisories alerts
- helps admins plan for coming security updates
- provides advance notif of upcoming security bulletins & timely notif of any minor changes to prev released microsoft security bulletins
- also notifs of new/revised security advisories
- these notifs written for IT profs
- contains in-depth tehcnical info
- NOTE
- microsoft technical security notifs offer few emailers for free subscriptions
WSUS
---
- needs following

### Advantages
- system admin can control updates applied
- clients can be configed to get updates from local WSUS server instead of downloading from microsoft's site
- reduces network traffic
- provide updates to comps w/o internet access

- WSUS server gets update files from common microsoft update services from internet
- local wsus server acts as agent to maintain curated update repo to provide enterprise lvl control to distribute these updates accordingly
### Features
- admins must approve updates before wsus clients can install them
- wsus clients can be controlled by grp policy to connect to wsus server to check for updates
- after updating, wsus clients notify wsus server
- wsus server can maintain update status of all clients
### Operations
- configuring wsus server
- need internet access to microsoft update server to get info abt security updates
- AKA synchronisation
- initial sync might take awhile depending on selection choices
### Common Administration Tasks/Logging
- wsus has 2 logs for tracking events
- synchronisation log, keeps these info
- time of last & next scheduled sync
- success & failure notif
- update packages that have been downloaded/updated since last sync
- or failed sync
- whether sync is manual/automatic
- approval log
- keeps track of content that's approved/not approved
### Content Synchronisation
- during sync, new security updates can be handled in 2 ways
- auto approve new vers of prev approved updates
- dont auto approve new versions
- in testing env, 2nd option better
- else testers may overlook & skip testing of new updates
### WSUS Policy Options for Clients

- common windows update options for clients
- in enterprise network, domain admins can set effective options for all domain machines through GPOs
- domain users w/o rights cannot override grp policy based settings
### WSUS Computer Groups
- wsus clients can be placed into comp grps

- NOTE
- wsus comp grps independent to security grping & OU assignment of comps
- these grps only relevant in wsus context
- this feature helps admins plan for their patch management strategy
- Eg. comps in diff grps can receive diff sets of patches at diff schedules
- testing grps can be setup to do pre-deployment test for new updates
### Patch Management Process - 8 step

- typical 8 step patch management process
- inventory process most impt
- admins must maintain up-to-date inventory of all system & app software
- helps admins to identify relevancy & priority of patching needs
- but we learn 5 stage approach lol
Managing Updates through 5 Stages
---
- 5 stage approach
- stage 1
- receive microsoft security
- release communications
- stage 2
- evaluate risk
- stage 3
- evaluate mitigation
- stage 4
- deploy updates
- 6 steps
- stage 5
- monitor systems
### Stage 1 - Receive Microsoft Security Release Communications
- microsoft sends out notif if there's issue affecting comp's security
- if security changes required, security updates released
- patch tuesday
- security updates on corresponding security bulletin normally released on 2nd tues (sometimes 4th of month)
- exploit wednesday
- named this as many exploitation events seen shortly after release of patch
- since 2015, security updates released to home pc, tablets and phones asap
- enterprise users stay on monthly update cycle
- urgent updates released immediately
- microsoft provides several ways or receiving info abt updates
- email - security notif service comprehension edition
- update installers nvr attached to email
- RFS - comprehensive alerts
- https://msrc-blog.microsoft.com/feed/
- Twitter
- https://twitter.com/msftsecresponse
- website
- https://portal.msrc.microsoft.com/en-us/security-guidance
- NOTE
- admins can subscribe to advisories alert email notifs to get info in advance
- admins shld be familiar with microsoft update release pattern to avoid being pattern to fake patches
### Stage 2 - Evaluate Risk
- admins shld ask
- does vuln apply to org?
- system admin shld keep update to date inven list of all IT assets of org
- does vuln represent risk high to org?
- deployment of security update has cost
- cost of testing the updates
- costs of deploying updates
- support costs in case of negative result after update
- Eg. impt app doesn't work properly after update
- NOTE
- outcome if evaluation might include
- not apply the patch
- since update not relevant to inven or risk ver low which cost to deploy is very high
- defer deploy until next scheduled system maintenance down time
- for time being, choices bare risk
- apply some interim mitigation procedures
- Eg. shutting down non mission critical services or configure ad hoc firewall rules to protect affected servers
- in an unusual case, emergency patch operation needed asap & will disrupt normal operations

#### Severity Ratings
- microsoft has 4 severity ratings
- critical
- vuln whos exploitation could enable propagation of internet worm with little/no user action
- highest severe risk
- important
- vuln whos exploitation could result in compromise of confidentiality, integrity or availability of user's data, or integrity/avail of processing res
- moderate
- vuln whos exploitation mitigated to significant degree by factors like default config, auditing or difficulty of exploitation
- low
- vuln whose exploitation is extremely difficult or impact minimal
- NOTE
- rating based on how easy of related exploitation could propagate to other internet systems

### Stage 3 - Evaluate Mitigation
- short term security control can be applied when admins evaluating security updates
- Eg. adjust firewall policies, restrict port to only specific subnet of whole network
- microsoft may provide suggested mitigation/workarounds in security advisories if security update cant be applied immediately
- such measures meant for short-term, cant replace security updates
- NOTE
- stage 3 & 4 usually go in parallel
- goal of stage 3 is to identify & apply short-term work-around to manage vuln of relevant systems
- safeguard systems until patch eventually applied
#### Examples of Mitigation Factors from Microsoft Security Bulletin

### Stage 4 - Deploy Updates
- 6 steps
- plan deployment
- determine which updates to roll out quickly and which to subject to more thorough testing process
- __deployment schedule__
- do some comp grps need updates more urgently?
- by which date/time must comps be updated
- determine whether security update avail for download
- if no security update avail, microsoft will advise appropriate actions to protect comp systems
- obtain required update files
- obtained from src like
- microsoft security guide
- microsoft deployment tools
- Eg. microsoft update, windows update, WSUS, endpt manager
- microsoft download center
- microsoft update catalog service
- create update package
- if security updates need customisation
- test package
- goals
- ensure business-crit systems continue to run after update deployed
- ensure package can be uninstalled/rolled back
- ensure system can be restarted properly
- ensure update effective
- update tested in 2 ways
- test env
- test lab with comps mirroring actual env
- extra overhead incurred
- pilot env
- test on selected production comps
- authentic
- can test deployment plan too
- extra risk incurred
- rolling out deployment
- which to use depends on case by case basis
- carry out deployment of update to comps that need it
- compliant to standard patch deployment timeline
- NOTE
- stage 4 is process that deal with actual patching deployment
- step 1 is to complete deployment of update
- includes confirmation of roll out schedule & target systems
- also need obtain approval to roll out from appropriate parties (Eg. business owners)
- step 2 to identify reliable src of update files for patch
- step 3 to obtain files from reliable source
- step 4 may be required to customise update for roll out
- step 5 - proper and thorough test required to identify potential issues & effectiveness of updates
- out of all tests, uninstallation/roll back capability test is most impt
- negative effects of patch may only be encountered over period of time after actual deployment
- step 6 - actual roll out
- may need to uninstall patch to rectify probs
- if any of 1st 5 steps encounter unforeseen issues, deployment plan might be postponed
- Eg. time taken to complete deployment exceeds allocated maintenance window
### Step 5 - Monitor Systems
- determine which systems successfully deployed update & which didnt
- wsus, endpoint manager features
- monitor system to detect anomaly
- anomaly may include unsuccessful deployment cases, system malfunction cases & system/network performance issues
- possible reasons why update not successfully deployed
- comp offline
- comp being rebuilt/reimaged
- comp insiffucient disk space
- comp not communicating with update server
- required update client software not running on comp
- comp missing dependent software
- need resolve prob to get update applied
### Post-Deployment Review
- conducted after deployment
- steps in review
- review org's performance during incident
- discuss changes to service windows
- assess total incident dmg & cost if any
- update existing baseline for env
- NOTE
- shld be conducted right after stage 5
- also can be considered part of stage 5
- goal to ensure operatinal standard & quality of org
Common Approaches to Fix Windows Update Errors
---
- check disk storage
- system might not have sufficient disk storage to support download & installation requirement
- windows update catalog
- download specific update package from windows update catalog website
- to install update locally
- windows update troubleshooter
- free tools from microsoft which can fix most of common windows updates errors
###### tags: `SMW` `DISM` `School` `Notes`