At the company I work for we have defined 1-2 "power users" in each
deptartment that make use of most everyday applications. We push the updates
to their machines, then monitor them for 4 hours. If the user can report no
problems, and that they have used "key business" apps in that time frame we
deploy to the entire site. On Monday's before the updates I also make sure
that I have a good clean ghost image of the corporate standard in place just
in case I have to re-image those machines quickly.
~todd fencl
Murad Talukdar <[EMAIL PROTECTED]> wrote on 01-09-2006 11:06:22 PM:
Hi all,
I wanted to get a few ideas of what people do to test their systems once
they have applied a patch/hotfix.
Currently I pull one of the hotswap drives that has the OS mirrored on it
and then let it run with the patch applied for a few days/week before
letting it rebuild.
In that time I will check things like event logs/performance and do some
general 'listening' for any issues.
Does anyone have a more scientific method? What do you keep an eye on?
Also,
Do you actually ever check whether the vulnerability(for example) that the
patch was designed to thwart has actually been plugged?
In the last two years I've only had one instance of a patch causing an
OS to
fail--and then just removing and then reapplying the patch seemed to
work
just fine. However, I don't want to get complacent.
---------------------------------------------------------------------------
---------------------------------------------------------------------------