19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

328<br />

Part VI: Ethical Hacking Aftermath<br />

Be sure to check out these patch-automation solutions:<br />

✓ IBM Tivoli Endpoint Manager (www.bigfix.com)<br />

✓ VMware vCenter Protect (www.vmware.com/products/datacentervirtualization/vcenter-protect/overview.html)<br />

✓ Ecora Patch Manager (www.ecora.com/ecora/products/patch<br />

manager.asp)<br />

✓ Quest Patch Manager (formerly ScriptLogic Patch Authority Ultimate)<br />

(www.quest.com/patch-manager/)<br />

✓ Windows Server Update Services from Microsoft (http://technet.<br />

microsoft.com/en-us/windowsserver/bb332157.aspx)<br />

The GFI LanGuard (www.gfi.com/network-security-vulnerabilityscanner)<br />

product that I use in this book can check for patches to apply and<br />

deploy.<br />

Free tools<br />

Use one of these free tools to help with automated patching:<br />

✓ Windows Server Update Services (WSUS), found at http://technet.<br />

microsoft.com/en-us/windowsserver/bb332157.aspx<br />

✓ Windows Update, which is built in to Microsoft Windows operating systems<br />

✓ Microsoft Baseline Security Analyzer (MBSA), found at www.microsoft.<br />

com/technet/security/tools/mbsahome.mspx<br />

✓ The built-in patching tools for Linux-based systems<br />

Hardening Your Systems<br />

After you patch your systems, you have to make sure your systems are<br />

hardened (locked down) from the other security vulnerabilities that patches<br />

can’t fix. I’ve found that many people stop with patching, thinking their<br />

systems are secure, but that’s just not possible. Throughout the years, I’ve<br />

seen network administrators ignore recommended hardening practices from<br />

such organizations as the National Institute of Standards and Technology<br />

(NIST) (http://csrc.nist.gov/publications/PubsSPs.html) and the<br />

Center for Internet Security (www.cisecurity.org), leaving many security<br />

holes wide open. However, I’m a true believer that hardening systems from<br />

malicious attack is not foolproof, either. Because every system and every<br />

organization’s needs are different, there is no one-size-fits-all solution, so you<br />

have to strike a balance and not rely on any single option too much.<br />

Chey Cobb’s Network Security For Dummies contains many great resources for<br />

hardening various systems on your network.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!