Security Basics mailing list archives
RE: Definitions
From: Mark Teicher <mht3 () earthlink net>
Date: Sun, 19 Sep 2004 00:38:14 -0600
So based on the replies, patch management technology like HFNetCheckPro applies mostly to Microsoft Windows operating systems?? What about other platforms or network devices ?? The next question to ask is can current patch management technology differentiate between a standard operating system and a customized image that some organizations lockdown before distribution? The other question is how does patch management affect applications that may not be compatible with the current available patches? Universal Enforcement is still bewildering to me?? How does an organization plan to incorporate universal enforcement or patch management into their network architecture without affecting the user base ??
At 11:01 AM 9/16/2004, Britton, Jeff B. wrote:
Automated patch management is the ability to manage the deployment of patches through an automated tool. HFNetCheckPro is big. It scans a machine (usually Windows) and compares the patches it has to what it should have. It then asks if the person wants to apply it to a given machine or a group of machines. It can also be used to deploy recent patches to your environment. With the time and resources it takes to apply one or multiple patches to a machine, patch management is becoming a bigger issue in security. Good question. Jeff Britton -----Original Message----- From: Mark Teicher [mailto:mht3 () earthlink net] Sent: Monday, September 13, 2004 9:24 PM To: security-basics () securityfocus com Subject: Definitions Since I am fairly new to some of the new definition in Security. I figure this would be the place to ask. What does automated patch management mean or universal enforcement mean? thanks /mht --------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ---------------------------------------------------------------------------- IMPORTANT: The security of electronic mail sent through the Internet is not guaranteed. Legg Mason therefore recommends that you do not send confidential information to us via electronic mail, including social security numbers, account numbers, and personal identification numbers. Delivery, and timely delivery, of electronic mail is also notguaranteed. Legg Mason therefore recommends that you do not send time-sensitiveor action-oriented messages to us via electronic mail, including authorization to "buy" or "sell" a security or instructions to conduct any other financial transaction. Such requests, orders or instructions will not be processed until Legg Mason can confirm your instructions or obtain appropriate written documentation where necessary. --------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ----------------------------------------------------------------------------
--------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ----------------------------------------------------------------------------
Current thread:
- RE: Definitions Dan Denton (Sep 18)
- RE: Definitions easternerd (Sep 23)
- <Possible follow-ups>
- RE: Definitions Britton, Jeff B. (Sep 18)
- Message not available
- RE: Definitions Mark Teicher (Sep 20)
- Message not available