Regardless of what you think of patching and patch management, they are indeed a formidable issue to manage on Windows networks. Sure, you can enable Automatic Updates or deploy WSUS, but on any given network there's probably going to be at least a handful of systems that aren't patched, which means a handful of systems aren't secured the way they should be. This is a security gap your organization can't afford to bear.

The benefits of NAP

With Network Access Protection (NAP), which is Microsoft's version of network access control (NAC), native to Windows Server 2008, Vista and XP running Service Pack 3, you may finally be able to get a better handle on patching your enterprise desktops. But, it's not just about patch management: It's about looking at the overall security status of systems trying to connect to your environment. It also works across wired, wireless and remote access connections.

With Microsoft's NAP, you get:

  1. Proactive protection -- i.e., it prevents "unhealthy" systems with missing patches from ever connecting to your network.
  2. Proactive protection once computers are on -- i.e., it automatically patches non-compliant devices.
  3. Proactive disconnection from the network if anything changes -- i.e., it knocks off or quarantines systems that fall out of compliance for whatever intentional or accidental reasons, such as a patch being uninstalled.

Once you set up NAP (likely the biggest hurdle given its complexity), it will manage your Windows Vista and XP SP3-based systems automagically. Everything's seamless. I know there will be headaches and growing pains, but this is big. Time management experts say that one minute of work up front can save five minutes in execution down the road. I not only see NAP as a patch management enhancer -- among other things -- but I also see it as an excellent time management tool. In other words, less time commitment and (hopefully) fewer headaches for you later on.

Even if you deploy NAP on your network for the sole purpose of increased interoperability with third-party endpoint controls, it's probably worth it. After all, it's free.

Various third-party endpoint security vendors, such as Configuresoft, Lumension Security and St. Bernard Software, are now interacting with NAP. So if you already have one of their solutions deployed, you can better integrate their patch management and other functions directly into your Windows environment. With this I believe what we're seeing is the industry working toward operating with fewer clients.

Desktop management tips

Sign up for our additional editions of SearchEnterpriseDesktop.com's Desktop Management Advisor to learn more about desktop management, security and virtualization.

Security is never 100% perfect -- there's always room for improvement. Given the growing complexity of our information systems, just about anything that can increase control and visibility in your Windows environment is a welcome relief. I really do like the concept of NAC and NAP, but I'm not convinced it's ready for prime time quite yet. Whether or not NAP is ready remains to be seen over the next year, but given all the missing patches I still come across in my work, I'm certain prime time is ready for it.

With our current patch management tools built into Windows and available via third parties, there's just no reason to not have this patch management thing nailed down. I believe that NAP may be just the ticket to fill in the gaps and bring patch management full circle. Good for the enterprise; bad for penetration testers.

ABOUT THE AUTHOR:
Kevin Beaver
is an information security consultant, expert witness, and professional speaker at Atlanta-based Principle Logic LLC. With over 23 years of experience in the industry, Kevin specializes in performing independent security assessments revolving around information risk management. He has authored/co-authored 10 books on information security, including The Practical Guide to HIPAA Privacy and Security Compliance and Hacking For Dummies. In addition, he's the creator of the Security On Wheels information security audio books and blog providing security learning for IT professionals on the go.

This was first published in October 2008

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.