What you will learn from this tip: Three best practices you can do to to conserve bandwidth during patching.
There are a number of things you can do to conserve bandwidth during peer-to-peer or most any patch management...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
processes. Here are the three I recommend:
- Schedule your patch distribution and installations
- Buy tools with the bandwidth features you need
- Place patch distribution repository near nodes to be updated
This is probably the most common means of conserving bandwidth. Scheduling patches for distribution during off hours or non-peak times will ensure that critical business traffic is not adversely affected by patch installations.
Many patch management vendors build bandwidth conservation into their tools. For example, you may have the option to resume stalled installations or the ability to configure and limit bandwidth used. If you need to conserve bandwidth, investigate the options available with your patch management tool.
In general, you want to place the distribution servers close to the end nodes that are being updated. For example, if you have a number of remote offices, a common way of regulating bandwidth is to place a distribution server in each office. This way, the patch is only transferred to the remote office once, and the local distribution server then uses the local network to disseminate the patches. Careful configuration and design of the patch distribution servers is critical to bandwidth management.
- Discover what all the fuss is about
- Learn the key criteria you need to consider when purchasing a patch management solution to ensure it is effective.
- View this on-demand webcast and learn how to overcome the challenges inherent to patch management
About the author
Jason Chan serves as a co-moderator for the patchmanagement.org mailing list, and he has written articles for publications such as SysAdmin Magazine and Computer Fraud and Security. He is a consulting services technical lead for Symantec Professional Services, where he also serves as technical leader for the Secure Infrastructure Center of Excellence. He is also a site expert on SearchWindowsSecurity.com.
This tip orginally appeared on SearchWindowsSecurity.com