Educause Security Discussion mailing list archives

Re: Automated Patching and Updates?


From: Joanne Murray <JMurray () CLARKU EDU>
Date: Thu, 25 Sep 2003 10:58:00 -0400

I ran across this article recently which states: "Late last week, with no
advance notice, Redmond added to SUS the ability to push entire service
packs to customers"
http://www.microsoft-watch.com/article2/0,0,1275879,00.asp?kc=MWRSS02129TX1K
0000535

Joanne Murray
Computer Systems Group Manager
Clark University
950 Main Street
Worcester, MA  01610
508-793-7178
jmurray () clarku edu

-----Original Message-----
From: Bradford B. Saul [mailto:saulbb () JMU EDU]
Sent: Thursday, September 25, 2003 10:16 AM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: Re: [SECURITY] Automated Patching and Updates?


Just a side note on the SUS Server.  How are schools that are using the SUS
server handling Service Packs?  From what I understand SUS does not support
the distribution of Service Packs, and if the user has altered their
registry to point to SUS.college.edu they will not be notified of Service
Pack availability.

Brad
-----------------------------------
Bradford B. Saul
Lead Network Engineer
IT - Network Engineering
Hoffman Hall Room 10, MSC 1401
James Madison University
Harrisonburg, VA 22807
V: (540) 568-2379
F: (540) 568-1696
M: (540) 435-3079
saulbb () jmu edu

-----Original Message-----
From: Sadler, Connie [mailto:Connie_Sadler () BROWN EDU]
Sent: Thursday, September 25, 2003 8:20 AM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: [SECURITY] Automated Patching and Updates?


Given all of the recent worm activity, etc., it seems timely to gather
some information from you folks regarding what you are already doing -
or planning to do - in terms of pushing updates and patches out to
your user communities in a way that is not too "intrusive". We all
work in diverse environments where many of our users are also
sensitive to having someone else "touch" their machines. Yet it seems
a losing battle to continue to manually update workstations in some
areas when they are being automatically attacked in very sophisticated
ways.

Can you folks please share with us:

1)  What you are already doing now - in terms of pushing or automating
patching or updates?

2)  What you are evaluating or looking at for doing this kind of thing
- and in what areas of your environment?

3)  What technologies you are familiar with and what platforms the
solutions support?

Thanks much! I am willing to summarize the input I receive if I get
enough good feedback...

Connie J. Sadler, CM, CISSP, CISM
Director, IT Security, Brown University
Box 1885, Providence, RI 02912
Connie_Sadler () Brown edu
PGP Fingerprint: 452A C178 1450 9CE1 3AC1  CC12 956F 2C55 DB94 A9C7
Office: 401-863-7266

**********
Participation and subscription information for this EDUCAUSE
Discussion Group discussion list can be found at
http://www.educause.edu/cg/.

**********
Participation and subscription information for this EDUCAUSE
Discussion Group discussion list can be found at
http://www.educause.edu/cg/.


-----------------------------------
Bradford B. Saul
Lead Network Engineer
IT - Network Engineering
Hoffman Hall Room 10, MSC 1401
James Madison University
Harrisonburg, VA 22807
V: (540) 568-2379
F: (540) 568-1696
M: (540) 435-3079
saulbb () jmu edu

**********
Participation and subscription information for this EDUCAUSE Discussion
Group discussion list can be found at http://www.educause.edu/cg/.

**********
Participation and subscription information for this EDUCAUSE Discussion Group discussion list can be found at 
http://www.educause.edu/cg/.

Current thread: