0% found this document useful (0 votes)
0 views10 pages

Managed Vulnerability Management _Presentation (November 2024)_updated

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views10 pages

Managed Vulnerability Management _Presentation (November 2024)_updated

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Vulnerability Assessment & Patch

Management (November 2024)


The Next Level of IT Security

Prepared By:
Sheik Abdullah
Virus Rescuers Services

Al Nasr Plaza, Dubai | 0561517557 | [email protected] |


Executive Summary: Vulnerability Assessment & Patch Management

Overview
This executive summary provides a high-level overview of our organization's vulnerability assessment &
patch management program, outlining key processes, challenges, and strategies for maintaining a
secure environment.

Objectives

 Identify and prioritize security vulnerabilities across our systems and infrastructure.
 Implement effective mitigation strategies to reduce the risk of exploitation.
 Ensure compliance with regulatory requirements and industry standards.
 Continuously improve our vulnerability management practices to adapt to emerging threats.
Vulnerability Assessment & Patch Management Scope of
work
Scope Definition
• Vulnerability Identification ( Network /Windows )
Methods for identifying vulnerabilities:
 Daily Automated scanning
 Continuous monitoring
Reporting of how vulnerabilities are discovered and categorized

• Vulnerability Prioritization and Risk Assessment

Criteria for prioritizing vulnerabilities:


 Severity ratings
 Exploitability
 Potential impact on the business
Process for assigning risk scores and prioritizing remediation efforts

• Remediation Process for Windows & Network

Strategies for mitigating vulnerabilities:


 Patch management – Windows/ application
 Configuration changes
 Workarounds and compensating controls
 Overview of the mitigation process, including testing and implementation procedures

• Reporting and Monitoring ( Monthly Reporting – Windows & Network )

Importance of continuous monitoring for new vulnerabilities


Reporting mechanisms for tracking vulnerabilities on every month and remediation progress
The Vulnerability Assessment & Patch Management
Workflow
The vulnerability & patch management workflow allows businesses to identify vulnerabilities,
prioritize assets, assess, report, and remediate weaknesses, and verify the vulnerabilities that have
been eliminated.
Vulnerability Assessment &
Patch Management

Network Vulnerability Windows Vulnerability


Identification Identification

Possible to Possible to
Remediate Remediate
Accept Risk
/Mitigate /Mitigate

Apply Fix Apply Fix


(Infra & Network Team) Accept Exception (VRS Team)

Verify/validate
Reporting/Monitoring Verify/validate
Patch Management Summary Details

• Overview
Service Period: 01 November – 30 November 2024
Targeted Patches: Operating System Cumulative Updates, 3 rd Party Application
Objective: Ensure all critical systems are secure, up-to-date, and compliant by applying
patches for operating systems, and third-party software

• Patch Management Scope


Patching Cycle Frequency: Monthly
Last Patching Cycle Date: 30th November 2024
Next Scheduled Cycle: 1st Dec 2024

In October, we achieved an 90% success rate in our patch management and vulnerability assessment,
compared to last month. Out of 149 devices, 134 were fully patched, with 15 missed in the process.
These missed devices have been reviewed and will be included in the next patching cycle to ensure
full coverage.

We have significantly reduced software-related vulnerabilities, including those in operating systems


and third-party applications, resulting in a healthier overall system state.

This month showed improvement in patch compliance, with higher focus on critical vulnerabilities.
Continued focus on timely patching and reducing pending patches is recommended to maintain the
security posture
Patch Management Compliance
Status

100

448

960

793

Patch Compliance Status (workstation )– November


2024
Patch Status
149 Total Devices Fully Patched: A fully patched computer
Evaluated means that the system has all the latest
10% software updates, security patches, and
fixes applied
149 Total Devices
Have Scheduled Missing Approved Patches: Computers
90% within the network that have not yet
received or applied the necessary updates
or patches, even though these patches
Fully Patched have been approved for deployment
Devices Missing Approved Patches
134 Devices 15
Devices
Note:*
Patch Deployment: Patches will be deployed on a weekly basis and scheduled for every Wednesday between 3
PM to 6 PM
Missing Approved Patch Devices Information
In the last patch cycle, 15 devices were identified as missing approved patches. The
missed updates were due to factors like offline, maintenance windows. Each of these
devices has been reviewed, and they will be included in the next patching cycle to
ensure full compliance and system protection
Missing Approved Patch Devices
Patch Missing devices IP Address Status
CM-AE-LT-010119 172.31.208.1 Online
CM-AE-LT-010224 94.202.12.37 Offline since 104 days ago
CM-AE-LT-011021 5.195.65.98 Offline since 13 days ago
CM-AE-LT-050824 5.195.65.98 Online
CM-AE-LT-071022 5.195.65.98 Offline since 84 days ago
CM-LT-1018 5.195.65.98 Offline since 112 days ago
CM-LT-1024 5.195.65.98 Offline since 104 days ago
CM-LT-1026 192.168.1.20 Offline since 61 days ago
CM-LT-1039 5.195.65.98 Offline since 75 days ago
CM-LT-1059 5.195.65.98 Offline since 48 days ago
CM-LT-1080 5.195.65.98 Offline
CM-LT-1117 192.168.12.181 Offline
CM-LT-1163 37.39.39.223 Offline since 2 days ago
CM-LT-1164 37.39.55.211 Offline since 86 days ago
CM-LT-1165 37.39.55.211 Offline since 43 days ago
Trends Analysis – Monthly Vulnerability Trend Report (
Windows/Application )
This report details the trending information of vulnerabilities by severity over time, including trends
for newly discovered vulnerabilities, as well as vulnerabilities that were resolved over the selected
timeframe. Admin users can select the type of scan to be charted – Windows/Application – as well as
the time range to be displayed.
Kaseya March - November 2024 ( Microsoft & 3rd party
Apps)
Microsoft continuously discovers and addresses security vulnerabilities in its software through patches. The
increase in cybersecurity threats has necessitated more frequent and comprehensive patch releases

Apart from security patches, Microsoft releases patches to introduce new features, improve performance, and
enhance user experience, further adding to the patch count

Automation, streamlined patching processes, and more efficient deployment mechanisms can reduce the time
between patch identification and release, potentially decreasing the overall patch count.

Month over Month Vulnerabilities


500
450
400
350
300
250
200
150
100
50
0
March April May June July August September October November

Low Medium High Critical


Trends Analysis – Monthly Vulnerability Trend Report ( Network )

This report details the trending information of vulnerabilities by severity over time, including trends
for newly discovered vulnerabilities, as well as vulnerabilities that were resolved over the selected
timeframe. Admin users can select the type of scan to be charted – internal – as well as the time
range to be displayed.
Kaseya March– November 2024 Network
Vulnerability
Network vulnerability counts fluctuate due to a combination of factors, including technological advancements,
evolving threats, organizational practices, and user behaviors. Organizations must adopt a holistic approach to
cybersecurity, combining proactive patch management, robust security practices, employee training, and
technological solutions to effectively manage and reduce network vulnerabilities. Periodic assessments and analysis
of vulnerability trends are essential for adapting and strengthening cybersecurity postures

Month over Month Vulnerabilities


800
700
600
500
400
300
200
100
0
March April May June July August September October November

Low Medium High Critical


Thank you

You might also like