Security Basics mailing list archives

RE: Definitions


From: Mark Teicher <mht3 () earthlink net>
Date: Sun, 19 Sep 2004 00:38:14 -0600

So based on the replies, patch management technology like HFNetCheckPro applies mostly to Microsoft Windows operating systems?? What about other platforms or network devices ?? The next question to ask is can current patch management technology differentiate between a standard operating system and a customized image that some organizations lockdown before distribution? The other question is how does patch management affect applications that may not be compatible with the current available patches? Universal Enforcement is still bewildering to me?? How does an organization plan to incorporate universal enforcement or patch management into their network architecture without affecting the user base ??



At 11:01 AM 9/16/2004, Britton, Jeff B. wrote:
Automated patch management is the ability to manage the deployment of
patches through an automated tool.  HFNetCheckPro is big.  It scans a
machine (usually Windows) and compares the patches it has to what it should
have.  It then asks if the person wants to apply it to a given machine or a
group of machines.  It can also be used to deploy recent patches to your
environment.  With the time and resources it takes to apply one or multiple
patches to a machine, patch management is becoming a bigger issue in
security.  Good question.

Jeff Britton

-----Original Message-----
From: Mark Teicher [mailto:mht3 () earthlink net]
Sent: Monday, September 13, 2004 9:24 PM
To: security-basics () securityfocus com
Subject: Definitions


Since I am fairly new to some of the new definition in Security.  I figure
this would be the place to ask.  What does automated patch management mean
or universal enforcement mean?

thanks

/mht


---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------


IMPORTANT:  The security of electronic mail  sent through the Internet
is not guaranteed.  Legg Mason therefore recommends that you do not
send confidential information to us via electronic mail, including social
security numbers, account numbers, and personal identification numbers.

Delivery, and timely delivery, of electronic mail is also not
guaranteed. Legg Mason therefore recommends that you do not send time-sensitive
or action-oriented messages to us via electronic mail, including
authorization to  "buy" or "sell" a security or instructions to conduct any
other financial transaction.  Such requests, orders or instructions will
not be processed until Legg Mason can confirm your instructions or
obtain appropriate written documentation where necessary.


---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------


---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------


Current thread: