• United States
by Mandy Andress

Security Profiling how we did it

Jan 26, 20041 min

How we tested SecurityProfiling’s SysUpdate patch management product.

We installed SysUpdate Server on Windows 2000 Server (256M bytes of RAM, 1GHz), staying with the default Microsoft Data Engine database. We installed the console on two systems running Windows XP Professional and two systems running Win 2000 Professional. We installed agents on one XP Professional system, two Win 2000 Servers and one Red Hat 7.3 system. The network infrastructure is a 100M-byte switched network, running through a Cisco Catalyst switch.

After agent installation, we created groups for each operating system and attempted to create patch and configuration policies for each group. We then deployed some of the queued patches for each group (Windows and Linux). For some patches, we went through the Multiple Path Remediation options and opted to disable the Remote Procedure Call service. After deploying several patches, we attempted to generate reports.

Back to review: SecurityProfiling’s SysUpdate