Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
2Activity

Table Of Contents

Welcome
How to Use the Microsoft Security Update Guide
Introduction
Managing Vulnerabilities
Purpose of this Guide
Vulnerability Management at Microsoft
Managing Security Updates by Using Microsoft Solutions
Three Approaches to Security Updates
The Microsoft Security Update Release Process
How Microsoft Tests Security Updates
Application Compatibility Testing
Rootkit Detection
Security Test Pass
Security Update Validation Program
Microsoft Security Release Communications
Security Bulletin Advance Notification
Security Bulletin Summary
Security Bulletin
Security Update
Knowledge Base (KB) Articles
Security Advisory
Predictable Security Update Release Process
Fraudulent Notifications That Target Microsoft Security Updates
Customer Risk Management Framework
Receiving Microsoft Security Release Communications
Stage 2: Evaluate Risk
Determinations in the Risk Management Framework
Identify Whether the Vulnerability Applies
Does Your Organization Lack an Existing Risk Management Process?
Gathering Security Vulnerability Intelligence
Determining the Vulnerability Risk
The Microsoft Severity Rating System
Risk Evaluation Resources
Example: Applying Microsoft Guidance to Evaluate Risk
Example: Applying Intelligence to Determine Risk Rating
Security Update Deployment Considerations
Stage 3: Evaluate Mitigation
A Viable Short-Term Security Control
Stage 4: Deploy Updates
The Deploying Microsoft Windows Server Update Services Guide
Standard and Urgent Deployments
Standard Package Application Process
Planning the Deployment
Example: Planning Security Update Deployment
Is a Security Update Available for Download?
Obtaining the Required Security Update Files from a Trusted Source
Creating Update Packages
Testing Update Packages
Test Environment
Pilot Deployment
Test Process Steps
Deploying Update Packages
Submitting a Change Request
Communicating the Rollout Schedule to the Organization
Installing the Update
Accelerating Security Update Deployment
Testing Packages
Deploying Packages
Stage 5: Monitor Systems
Successful Update Deployment
Confirming Update Installation
Uninstalling Security Updates
Post-Implementation Review
Short-Term Mitigation Removal
Stage 6: Use Microsoft Resources to Track Security Developments
Major and Minor Security Bulletin and Advisory Revisions
The Constant Threat from Malicious Software
Other Security Resources
Summary
Feedback
Appendix
The Microsoft Security Update Release and Deployment Process Diagram
Microsoft Security Update Terminology
Security Update Policy for Non-Genuine Software
Glossary and Commonly Used Terms
0 of .
Results for:
No results containing your search query
P. 1
Microsoft Security Update Guide Second Edition

Microsoft Security Update Guide Second Edition

Ratings: (0)|Views: 11|Likes:
Published by chrisnita20014231

More info:

Published by: chrisnita20014231 on Aug 26, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

09/14/2011

pdf

text

original

You're Reading a Free Preview
Pages 4 to 20 are not shown in this preview.
You're Reading a Free Preview
Pages 24 to 31 are not shown in this preview.
You're Reading a Free Preview
Pages 35 to 81 are not shown in this preview.
You're Reading a Free Preview
Pages 85 to 124 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->