PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
March 2007

Viewpoint: Creative patch management workarounds

Creative Patch Testing Workarounds Regarding "Patch Testing Past Its Time?" (January 2007), I am a systems analyst and the network administrator for a small company (about 100 users). I don't have a separate test environment for thorough testing of patches released by Microsoft. What I do have is a patch manager application by Numara Software, which has an agreement with Shavlik Technologies, so my patches actually come from the Shavlik database and Web site. My second layer of defense against problem patches is staged scheduling. I have a schedule set up where a small group of servers and XP workstations is patched and rebooted in the middle of the night starting on Patch Tuesday. Each night through the next weekend, a small group of servers is patched and rebooted. The only problems I've run into so far is the occasional "end program" error Windows displays while trying to shut down, or the occasional hanging of a server during the shutdown process. The above scenario is a pretty decent workaround for not having the same ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Product review: Six removable device control security products

    Six removable device control security products that provide centrally managed granular control over ports, interfaces and storage devices are reviewed. This review evaluates: DeviceLock 6.0 from SmartLine, Sanctuary Device Con-trol 4.0 from SecureWave, Endpoint Access Manager 3.0 from ControlGuard, Device-Wall 4.5 from Centennial Software, Safend Protector 3.1 from Safend and Protect Mobile from Workshare.

  • Prioritizing compliance and information security

    Have compliance demands refocused and weakened information security efforts?

Columns in this issue