Are there standalone installers for the Adobe patches that can be used for a silent install? How exactly would SCCM be used to determine what patches need to be applied, or is an assumption being made about the base patch state of the machines? I have software that can push installation to client machines if a good way can be found to automate it.
----
Jack Kramer
Computer Systems Specialist
University Relations, Michigan State University
w: 517-884-1231 / c: 248-635-4955




From: Jon Galbreath <[log in to unmask]">[log in to unmask]>
Reply-To: Jon Galbreath <[log in to unmask]">[log in to unmask]>
Date: Fri, 24 Sep 2010 12:31:07 -0400
To: "[log in to unmask]">[log in to unmask]" <[log in to unmask]">[log in to unmask]>
Subject: Re: [MSUNAG] Re-evaluating tools for patching workstations/servers and 3rd party apps

I’m working on implementing this.  SCCM is unbelievably complicated, even for a Microsoft product.  I’ve tackled the OS Deployment aspect of it, and that’s really quite wonderful, but I’m retroactively going back to configure the rest of the product, and ultimately to push whatever software I want to users, including Adobe patches.
 
Jon Galbreath
MCSE/Security+
Systems Administrator
International Studies and Programs
Ph: 517-884-2144
[log in to unmask]">[log in to unmask]
 
From: Troy Murray [mailto:[log in to unmask]]
Sent: Friday, September 24, 2010 12:11 PM
To: [log in to unmask]">[log in to unmask]
Subject: Re: [MSUNAG] Re-evaluating tools for patching workstations/servers and 3rd party apps


Anyone using Microsoft System Center Configuration Manager for handling this?



http://www.microsoft.com/systemcenter/en/us/configuration-manager.aspx
 

On Fri, Sep 24, 2010 at 10:45 AM, Kramer, Jack <[log in to unmask]">[log in to unmask]> wrote:

Nice, I didn’t know those existed until now. How about Acrobat anyone? Most breaches I’ve had in the past few months have been due to users who don’t update their Acrobat installations – despite my frequent urgings.
----
Jack Kramer
Computer Systems Specialist
University Relations, Michigan State University
w: 517-884-1231 / c: 248-635-4955


From: Jon Galbreath <[log in to unmask]">[log in to unmask] <[log in to unmask]">http:[log in to unmask]> >
Reply-To: Jon Galbreath <[log in to unmask]">[log in to unmask] <[log in to unmask]">http:[log in to unmask]> >
Date: Fri, 24 Sep 2010 11:31:09 -0400
To: "[log in to unmask]">[log in to unmask] <[log in to unmask]">http:[log in to unmask]> " <[log in to unmask]">[log in to unmask] <[log in to unmask]">http:[log in to unmask]> >


Subject: Re: [MSUNAG] Re-evaluating tools for patching workstations/servers and 3rd party apps

I push new versions of Flash via AD and GPOs.  Downloads for the corporate versions without the built-in updater and nag screens can be found here:
ActiveX MSI link <http://fpdownload.macromedia.com/get/flashplayer/current/licensing/win/install_flash_player_10_active_x.msi>
Plugin MSI Link <http://fpdownload.macromedia.com/get/flashplayer/current/licensing/win/install_flash_player_10_plugin.msi>
 

Jon Galbreath
MCSE/Security+
Systems Administrator
International Studies and Programs
Ph: 517-884-2144
[log in to unmask]">[log in to unmask] <[log in to unmask]">http:[log in to unmask]>
 

From: Peter J Murray [mailto:[log in to unmask]]
Sent: Friday, September 24, 2010 11:28 AM
To: [log in to unmask]">[log in to unmask] <[log in to unmask]">http:[log in to unmask]>
Subject: Re: [MSUNAG] Re-evaluating tools for patching workstations/servers and 3rd party apps

So how are people keeping Flash and all those other Adobe products updated on Windows machines?

Also somewhat related, how do various departments handle admin rights over the users PC for the user of that PC?




From: "Vasquez, Timo" <[log in to unmask]">[log in to unmask] <[log in to unmask]">http:[log in to unmask]> >

Date: Fri, 24 Sep 2010 11:24:56 -0400

To: <[log in to unmask]">[log in to unmask] <[log in to unmask]">http:[log in to unmask]> >

ReplyTo: "Vasquez, Timo" <[log in to unmask]">[log in to unmask] <[log in to unmask]">http:[log in to unmask]> >

Subject: Re: [MSUNAG] Re-evaluating tools for patching workstations/servers and 3rd party apps


Agreed sir.
 

Timoteo "Timo" Vasquez; MCTS, MCP
 
Client Services - Network Security Team
[log in to unmask]">[log in to unmask] <[log in to unmask]">http:[log in to unmask]>  - 517.884-3082
        Administrative Information Services
                2 Administration Bldg
              East Lansing, MI 48832
                    "...I agree with you!"


From: STeve Andre' [mailto:[log in to unmask]]
Sent: Thursday, September 23, 2010 2:50 PM
To: [log in to unmask]">[log in to unmask] <[log in to unmask]">http:[log in to unmask]>
Subject: Re: [MSUNAG] Re-evaluating tools for patching workstations/servers and 3rd party apps

If I get what you're saying Timo--and please correct me if I'm wrong--
you are saying that most of the risk now is people downloading things
they first see when Googling, and they get zapped by some extra treat
in the software they just got.

I don't believe that.  I think that Adobe's horrors (the three fates of
Windows!), Acrobat, Flash and Shockwave represent an amazing
amount of the exploits out there.  Flash especially is a great vehicle
for handing out exploits.

Yes, some people wander around the net and say "Ohh! Thats neat!"
and download some crawling horror, but I think that the more main-
stream exploit is to take advantage of something dealing with the
web.

--STeve Andre'
 
On 09/23/10 14:18, Vasquez, Timo wrote:
You know Firmin,
Most of the risk has been shifted to the source people are downloading from.  So many people rather Google a product, and grab from the first page of results. So that is a majority of the issue is repackaged products with additional *ware in it.  This is very hard to find cause most actions that are being executed are not going to set off a lot of the antivirus products with medium to low heuristics.  
 
You know I am curious as to a good antivirus that can run on Linux without having to be installed whenever there is a new kernel update.  So good luck to you and your quest old friend.
 

Timoteo "Timo" Vasquez; MCTS, MCP
 
Client Services - Network Security Team
[log in to unmask]">[log in to unmask] <[log in to unmask]">http:[log in to unmask]>  - 517.884-3082
        Administrative Information Services
                2 Administration Bldg
              East Lansing, MI 48832
                    "...I agree with you!"


From: Charlot, Firmin [mailto:[log in to unmask]]
Sent: Wednesday, September 22, 2010 3:15 PM
To: [log in to unmask]">[log in to unmask] <[log in to unmask]">http:[log in to unmask]>
Subject: [MSUNAG] Re-evaluating tools for patching workstations/servers and 3rd party apps

As you know the vectors of attacks have been shifting for some time now towards 3rd party apps like Adobe, Flash and others.
Do you know of any tools that can centrally scan for vulnerabilities and centrally remediate 3rd party apps, Windows & Linux Operating Systems?  
If you have a favorite that you would like to share that would be great.
Thanks.
 
Firmin Charlot, ITIL, MCSE, A+, Information Systems Manager
Michigan State University - Student Services
Educational and Support Services   162 Student Services Building   East Lansing, MI 48824
[log in to unmask]">[log in to unmask] <[log in to unmask]">http:[log in to unmask]> <blocked::mailto:[log in to unmask]> (517) 432-7541
Submit technical requests at
https://help.ess.msu.edu/ <blocked::http://help.ess.msu.edu/>
 





--
Troy Murray