I agree, 

 

With your situation that probably is a better situation of the "wait and
see" but what happens when the 0day that is being exploited and the
patch comes out of cycle, do you still subscribe to the "wait and see"
and allow the drive by attacks to continue? Hard question I am sure, but
it's a risk that has to be either accepted or rejected. 

 

Also if you are supporting multiple small clients any way to do testing
in the office on VM's before having clients updated accordingly? I like
VM's in undoable mode, for this especially, either that or do snap-shots
before patching and roll-back as needed. 

 

Z

 

Edward Ziots

CISSP,MCSA,MCP+I,Security +,Network +,CCA

Network Engineer

Lifespan Organization

401-639-3505

ezi...@lifespan.org

 

From: Angus Scott-Fleming [mailto:angu...@geoapps.com] 
Sent: Monday, April 26, 2010 10:02 AM
To: NT System Admin Issues
Subject: Re: OT what is the lesson for IT deparments and AV vendors
after MCAFEE issue " update"

 

On 26 Apr 2010 at 8:39, Ziots, Edward  wrote:

 

>     Basically new DAT is downloaded, it is deployed to a small subset
group

> of computers and those are verified to work accordingly, without issue
for a

> set number of hours etc etc, then it is deployed to the rest of the

> organization. Very similar to what everyone should do with their
patching

> cycles ( Ahem I HOPE you all are doing this, then just blindly having
faith

> in M$ to give us patches that wont cause problems) 

 

Might be cost-effective for you, if you have enough machines.  But if
you support multiple small-business clients, all of whom have different
AV products chosen before you started supporting them, this is NOT an
option for me.  I have to let the AV products update automatically.

 

Fortunately, the fact that my clients have multiple AV vendors also
means only one or two will be down at the same time due to a bad AV
update*, so I can clean them up and get them back only without having to
decide among them.  

 

Unfortunately, they are all running Windows.  This means if there is a
bad Windows Update event, all my clients would be down at the same time,
resulting in an impossible support situation.  As a result I disable
"Automatic Updates" and manually roll out updates a few days after MS
does so, allowing for the rest of the world to be my test-bed ;-).
Explaining why I do this sometimes is a little difficult to clients, but
every so often MS rolls out a blue-screen update (like they did a few
months ago :-) ) and I'm vindicated.

 

IMHO, YMMV.

 

Angus

 

 

* False positives happen to many AV vendors.  Last week VIPRE
quarantined (or deleted, depending on your settings) a bunch of PDFs --
check the Sunbelt "Enterprise" forums if you're curious.  It happened
for at least two different Def. versions according to my console.
Machines weren't shut down, but unquarantining the PDFs (or restoring
them from backup) had to be done on a machine-by-machine basis which had
a non-zero cost to my client.  It only happened on two machines of the
35 on my VIPRE client's network, so "testing" this on a test network
almost certainly would not have found the issue.  And the detection only
happened on a "Deep Scan" which takes hours.  Since VIPRE rolls up Def.
updates every few hours, testing is not really an option on a small
network.

 

 

 

--

Angus Scott-Fleming

GeoApps, Tucson, Arizona

1-520-895-3270

Security Blog: http://geoapps.com/

 

  

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to