Logo
CAR REVIEW
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
PREGNANCY
 
 
Windows 7

Designing an Update Management Strategy : Configuring an Update Testing Infrastructure, Verifying Update Deployment

1/14/2013 11:50:23 AM

1. Configuring an Update Testing Infrastructure

Although Microsoft tests updates rigorously before releasing them publicly, no one can test every possible software and hardware configuration for adverse side effects that might result when an update is applied. For this reason, you should deploy updates to a small group of computers prior to deploying updates to all computers in your organization and test those computers to determine whether a newly released update conflicts with your organization’s specific software configuration.

You should ensure that the small group of computers on which you test updates match the software and hardware configuration of computers in your organization and that the computers used for testing are actually used by real people to perform their everyday job-related tasks. You need to do this because you will not be able to detect all possible problems by simply installing the update on a computer that no one actually uses. Only through testing the updates under real-world conditions do any conflicts or other problems become evident.

You should ensure that you deploy updates to the test computers long enough that you have confidence that the updates do not cause problems when deployed generally. You must balance this with not waiting so long that the computers in your organization become vulnerable to the issue that the update addresses. In many organizations, updates are deployed to test computers between 7 to 10 days before being deployed to all other computers in the organization. This period provides enough time to test that the updates do not cause obvious problems with the existing configuration before rolling the updates out more generally.

A basic update testing infrastructure would have a separate computer group containing the WSUS computer accounts for all test computers. A WSUS automatic approval rule for all new updates would apply to this WSUS computer group. The WSUS administrator would manually approve updates for the All Computers group after a seven-day period in which no issues had been reported by users of computers that are located in the test group.

2. Verifying Update Deployment

The final component in a successful update strategy is ensuring that updates deploy correctly to client computers. There are many reasons why updates might not deploy correctly to client computers, including but not limited to the computer being switched off for a lengthy period of time, synchronization problems, and lack of disk space on the client.

One of the simplest ways that you can verify the updates that are installed on local and remote computers running Windows 7 and which are members of the same domain is to manually use the Get-Hotfix Windows PowerShell command. You can use the –Computername option to specify the address of the remote computers that you want to check.

For example, the command

Get-HotFix -Computername wkstn1,wkstn2,wkstn3,wkstn4

provides a report on all of the updates installed on computers wkstn1, wkstn2, wkstn3, and wkstn4. Although this is a quick way to verify which updates are installed on a small number of computers, it is not an effective technique for determining the status of missing updates across a large number of computers. This is because the output will tell you only which updates are present on the target computers and will not tell you which updates are missing from the target computers.

WSUS Reports

One way you can determine which updates are missing from client computers in your organization is to use WSUS reports. WSUS servers generate reports based on information forwarded to the WSUS server from the server’s WSUS clients. When a WSUS client retrieves and successfully installs an update, it reports this success back to the WSUS server.

WSUS servers do not query clients to determine whether specifically approved updates are missing and they can use only information that active clients report back to them. This distinction is important because you cannot learn anything about the update status of client computers that have not reported to the WSUS server. To find out whether a client computer has suffered some unforeseen configuration problem it has not reported, you must use a tool such as the Microsoft Baseline Security Analyzer, covered later in this lesson, to query client computers to determine whether specific updates are missing.

You can access WSUS reports from the Reports node of the WSUS console, as shown in Figure 1. WSUS reports can be printed or exported to Microsoft Office Excel or PDF format. Because WSUS data can be forwarded to a SQL Server database, you can also perform a separate analysis using your own database queries. There are several basic categories of reports that allow you to view how successful the deployment of a specific update has been or the update status of specific WSUS server clients.

WSUS reports

Figure 1. WSUS reports

Microsoft Baseline Security Analyzer

As mentioned, you can use Microsoft Baseline Security Analyzer (MBSA) to scan client computers in an organization to determine whether they are missing software updates. You can configure the MBSA tool to check whether a computer is up to date with the updates published by Microsoft through the Microsoft Update servers. You can also configure the MBSA tool to check against the list of approved updates hosted on a local WSUS server. This practice allows you to determine whether a computer is up to date with the updates that have been approved for your specific environment. When used to scan against a WSUS server approval list, the MBSA tool scans using the WSUS server assigned to the scanning computer through policy.

The person performing the scan of remote computers must do so with a user account that is a member of the local administrators group on each remotely scanned computer. This requirement ensures that nefarious third parties cannot use the MBSA tool to determine what vulnerabilities computers might have. The MBSA tool can also be used to locate common administrative vulnerabilities incurred by problematic configuration practices.

You can use the MBSA tool to scan all computers that are members of a specific domain or all computers that are located in a particular IP address range, as shown by Figure 2. When scanning computers, ensure that the Check For Security Updates option is configured. Then you need to choose between configuring the scan to use Microsoft Update or the WSUS server that is configured for the computer performing the scan.

Scanning multiple computers with the MBSA tool

Figure 2. Scanning multiple computers with the MBSA tool

Keep in mind that only Microsoft Baseline Security Analyzer 2.11 and later are compatible with the Windows 7 operating system. You install and use the Microsoft Baseline Security Analyzer in the practice exercise at the end of this lesson.

Other -----------------
- Zero Touch Installations : Creating and Capturing a Reference Image (part 3) - Advertise the Reference Image Task Sequence, Run the Reference Image Task Sequence
- Zero Touch Installations : Creating and Capturing a Reference Image (part 2) - Install Packages on the Distribution Points, Create a Collection and a Computer Association
- Zero Touch Installations : Creating and Capturing a Reference Image (part 1)
- Preparing and Configuring Boot Images (part 2) - Adding Drivers to a Boot Image
- Preparing and Configuring Boot Images (part 1) - Creating Boot Images
- Microsoft Access 2010 : Using Reports to Print Information - Printing a Report
- Microsoft Access 2010 : Using Reports to Print Information - Opening and Viewing a Report
- Programming Drivers for the User Mode Driver Framework - Driver Dynamic-Link Library and Exports
- Creating a Home Network : Setting Up a Wireless Network
- Creating a Home Network : Setting Up a Wired Network with a Router
- Creating a Home Network : Setting Up a Wired Network with an ICS Host
- Creating a Home Network : Creating a Wired LAN, Creating a Wireless LAN
- Microsoft Project 2010 : Setting Up a Project Budget - Assigning Accounting Codes
- Microsoft Project 2010 : Setting Up a Project Budget - Setting the Project Fiscal Year
- Microsoft Project 2010 : Setting Up a Project Budget - Reducing Project Costs
- Microsoft PowerPoint 2010 : Incorporating Motion Video - Placing a Video on a Slide
- Microsoft PowerPoint 2010 : Incorporating Motion Video - Understanding Video Types
- Microsoft Excel 2010 : Using Formulas - Using Names To Simplify References, Inserting Formulas into Tables
- Microsoft Excel 2010 : Using Formulas - Copying a Formula, Formula Operators
- Microsoft Word 2010 : Proofing a Document - Finding and Replacing Text
 
 
Most view of day
- SharePoint 2010 : Packaging and Deployment Model - Features (part 2) - Feature Receivers
- Windows Server 2008 R2 high-availability and recovery features : Installing and Administering Failover Clustering (part 7) - Create shared folder on cluster, Testing Failover of Cluster
- Windows Live Services That Make Windows 7 Better (part 5) - Windows Live Essentials
- SQL Server 2008 R2 : Performance Monitoring Tools (part 2) - Installing and Configuring the Data Collector
- System Center Configuration Manager 2007 : Creating and Modifying Configurations (part 1)
- Microsoft Excel 2010 : Calculating the Mean (part 2) - Minimizing the Spread - About Solver, Finding and Installing Solver
- Microsoft Exchange Server 2010 : Managing Message Pickup, Replay, Throttling, and Back Pressure (part 2) - Configuring Message Throttling
- Microsoft Exchange Server 2007 : Consolidating a Windows 2000 Domain to a Windows Server 2003 Domain Using ADMT (part 2) - Installing a Password Migration DLL on the Source Domain
- Windows Server 2012 : Managing Users with Local Security and Group Policies (part 2) - Configuring and Optimizing Group Policy
- BizTalk Server 2009 : Use The Business Rule Engine (part 2) - What Are the Artifacts That Constitute a Business Rule?
Top 10
- Microsoft Lync Server 2013 : Director Troubleshooting (part 3) - Synthetic Transactions,Telnet
- Microsoft Lync Server 2013 : Director Troubleshooting (part 2) - DNS Records, Logs
- Microsoft Lync Server 2013 : Director Troubleshooting (part 1) - Redirects, Certificates
- Microsoft Lync Server 2013 : Administration of the Director Role (part 4) - Services Management, Client Version Filter
- Microsoft Lync Server 2013 : Administration of the Director Role (part 3) - Topology Status
- Microsoft Lync Server 2013 : Administration of the Director Role (part 2) - Ports,Firewall Rules
- Microsoft Lync Server 2013 : Administration of the Director Role (part 1) - Services
- Microsoft Lync Server 2013 : Configuring the Director (part 2) - Web Services Ports,Reverse Proxy
- Microsoft Lync Server 2013 : Configuring the Director (part 1) - SRV Records, Web Services FQDN Overrides
- Sharepoint 2013 : SharePoint Designer 2013 (part 2) - Locking Down SharePoint Designer
 
 
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
2015 Camaro