SlideShare a Scribd company logo
FoxGuard Solutions 1
Monta Elkins
Security Architect -- FoxGuard
Solutions
www.FoxGuardSolutions.com
What to do when you don’t know what to
do:
Control system patching problems and their
solutions
Installed Software
FoxGuard Solutions 2
Windows Control Panel
– Programs and Features
Installed Software
FoxGuard Solutions 3
This powershell command shows the installed software:
Get-WmiObject win32_product | Select-Object Name,Vendor,Version
Finding Patches
Patch Tuesday
FoxGuard Solutions 4
Identifying Patches
FoxGuard Solutions 5
Air-gapped
FoxGuard Solutions 6
update the wsusscn2.cab manually
it usually resides in
C:UsersusernameAppDataLocalMicrosoftMBSACachewsu
sscn2.cab
download the cab file from here and “carry it”
http://download.windowsupdate.com/microsoftupdate/v6/wsus
scan/wsusscn2.cab
Now use MBSA to identify patches
Identifying Patches
FoxGuard Solutions 7
CLI options:
From the mbsa program folder (c:Program FilesMicrosoft Baseline Security Analyzer)
Execute Mbsacli >results.txt
Which are Security Patches
FoxGuard Solutions 8
Security Patches
FoxGuard Solutions 9
A Patch List
FoxGuard Solutions 10
Manually download and carry patches from the final list and install them
Another Approach
FoxGuard Solutions 11
Discovering Patches and Downloading them
Virtual Environment Approach:
Setup virtual machines containing all software identified
on your systems, (but not configuration information)
Connect virtual machines to the Internet
Scan to identify and download appropriate patches
Hand carry the validated patches to air gapped
machines
Installed Updates
FoxGuard Solutions 12
Another Method to Verify Patch
Installation
FoxGuard Solutions 13
Powershell:
Get-WmiObject -Class "win32_quickfixengineering"
Windows Update History
FoxGuard Solutions 14
Verifying Patch Installation
FoxGuard Solutions 15
Watch for Disk Space Issues
Patches will not install if there is not
enough disk space.
Recommendation:
Have at minimum 1 Gigabyte free
storage space
Troubleshooting
FoxGuard Solutions 16
Patch Failure
FoxGuard Solutions 17
Microsoft Patch fails to install
System Update Readiness Tool
“The System Update Readiness Tool can
help fix problems that might prevent
Windows updates and service packs from
installing
If your computer is having problems
installing an update or a service pack,
download and install the tool, which runs
automatically. Then, try installing the
update or service pack again.”
Missing Patches
FoxGuard Solutions 18
Detection Issue:
Update KB2645410 for Windows 7 and
Windows Server 2008 R2 Historians.
Update for Microsoft Visual Studio 2010
Service Pack 1. This update may be
required but is not detected by Shavlik
(vCenter) Protect.
Corrective Action:
FoxGuard Solutions recommends that you
manually deploy update KB2645410 on all
Windows 7 and Windows Server 2008 R2
Historians
FoxGuard Solutions Technical Information Notice
Notice#:20140312-01
Notice Title: AVG Virus Warning
Reason for Notice:
After applying the AVG Anti-Virus 2013 updates from
the M1 2014 release the virus “VBS/Downloader.Agent”
was found on the system.
FoxGuard Solutions has confirmed the two files
referenced are automated manufacturing process
artifacts used during the HMI manufacturing process
that were not removed prior to the system being
shipped from the factory.
AV Signature Updates Can Cause Problems
FoxGuard Solutions 19
The script is used to temporarily turn off User Account Control (UAC) so
that manufacturing automation tools can run successfully on the system.
FoxGuard Solutions has determined that these scripts are not infected
files, but they do contain code that triggers AVG to flag them as a virus.
Specifically, the following code is flagged by AVG:
If WScript.Arguments.length = 0 Then
Set objShell = CreateObject("Shell.Application")
objShell.ShellExecute "wscript.exe", Chr(34) & _
WScript.ScriptFullName & Chr(34) & " uac", "", "runas", 1
Else
This is effectively equivalent to right-clicking an application and choosing
“Run as administrator”. This is a common practice with scripts that
require UAC elevation to execute properly, earlier releases did not flag
these files as malware.
AV Trigger Details
FoxGuard Solutions 20
Validation Checklists & Signoffs
FoxGuard Solutions 21
Have a set of validation checklists to
verify operations after patching.
Include testing signoff for record
keeping
AV & IDS Signatures
FoxGuard Solutions 22
CIP 007-3 R4.2. The Responsible Entity shall document
and implement a process for the update of
anti-virus and malware prevention “signatures.”
The process must address installing and testing the
signatures.
Use a “virus test file”
"EICAR Standard Anti-Virus Test File“ 68 bytes
And a “malicious network traffic” file
Ports and Services
FoxGuard Solutions 23
Logical Network Accessible Ports
– What are they?
– Listening ports
– Document need
• What is it?
• Why is it needed?
• On this particular device
– Or Shut it off
• Host based firewall mitigation
– RPC port changes
– MS DNS 2501 (MS improper docs)
– Every 35 days (and patching / updates 010-1)
Centralized Ports and Services Auditor (CPSA)
White Paper FoxGuardSolutions.com
Improper Documentation for DNS
FoxGuard Solutions 24
DNS documentation from Microsoft could cause you
to fail an audit
We received this acknowledgement of our findings
Test Lab and Rollout
FoxGuard Solutions 25
Validation lab equipment should closely mirror production
equipment
Where direct mirroring isn’t practical, be sure to include a superset
of all installed software.
Now do it “for real”
Use phased rollout approach:
•Test lab
•Less critical machines
•More critical machines
•Patch
•Verify
•Validate
•Backup
FoxGuard Patching and Validation
Services
FoxGuard Solutions 26
FoxGuard Solutions' DisPatch subscriptions provide validated
patches and updates plus documentation on a monthly basis.
To learn how FoxGuard Solutions can help you with patch and update
validation, contact us at requestinfo@foxguardsolutions.com,
or by calling 877-446-4732.

More Related Content

PPT
Open Platform for ICS Cybersecurity Research and Education
PPTX
Lessons Learned for a Behavior-Based IDS in the Energy Sector
PDF
Secure Systems Security and ISA99- IEC62443
PPSX
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
PPTX
Integrating the Alphabet Soup of Standards
PPT
DHS ICS Security Presentation
PPTX
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
PPTX
IEC and cyber security (June 2018)
Open Platform for ICS Cybersecurity Research and Education
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Secure Systems Security and ISA99- IEC62443
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
Integrating the Alphabet Soup of Standards
DHS ICS Security Presentation
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
IEC and cyber security (June 2018)

What's hot (20)

PPTX
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
PDF
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
PPTX
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
PDF
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
PPTX
Third Party Security Testing for Advanced Metering Infrastructure Program
PDF
SCADA Security: The Five Stages of Cyber Grief
PDF
Monitoring ICS Communications
PPTX
ISA/IEC 62443: Intro and How To
PPTX
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
PDF
S4xJapan Closing Keynote
PDF
Securing Critical Iot Infrastructure, IoT Israel 2014
PPTX
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
PDF
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
PDF
Nist 800 82 ICS Security Auditing Framework
PPTX
Scada security presentation by Stephen Miller
PDF
Securing SCADA
PDF
API Training 10 Nov 2014
PPTX
Practical Approaches to Securely Integrating Business and Production
PPTX
Using Assessment Tools on ICS (English)
PPTX
ICS Security 101 by Sandeep Singh
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Third Party Security Testing for Advanced Metering Infrastructure Program
SCADA Security: The Five Stages of Cyber Grief
Monitoring ICS Communications
ISA/IEC 62443: Intro and How To
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
S4xJapan Closing Keynote
Securing Critical Iot Infrastructure, IoT Israel 2014
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Nist 800 82 ICS Security Auditing Framework
Scada security presentation by Stephen Miller
Securing SCADA
API Training 10 Nov 2014
Practical Approaches to Securely Integrating Business and Production
Using Assessment Tools on ICS (English)
ICS Security 101 by Sandeep Singh
Ad

Viewers also liked (10)

PPT
1.Security Overview And Patching
PPTX
Bil Harmer - Myths of Cloud Security Debunked!
PPT
IT Security for the Physical Security Professional
PDF
Web Application Security Statistics Report 2016
PPTX
Matt carroll - "Security patching system packages is fun" said no-one ever
PPTX
Elizabeth Lawler - Devops, security, and compliance working in unison
PDF
7 cyber security questions for boards
PPTX
Cyber security presentation
PDF
10 Steps to Building an Effective Vulnerability Management Program
PPTX
Cyber crime and security ppt
1.Security Overview And Patching
Bil Harmer - Myths of Cloud Security Debunked!
IT Security for the Physical Security Professional
Web Application Security Statistics Report 2016
Matt carroll - "Security patching system packages is fun" said no-one ever
Elizabeth Lawler - Devops, security, and compliance working in unison
7 cyber security questions for boards
Cyber security presentation
10 Steps to Building an Effective Vulnerability Management Program
Cyber crime and security ppt
Ad

Similar to What to Do When You Don’t Know What to Do: Control System Patching Problems and Their Solutions (20)

PDF
1.3. (In)security Software
PDF
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
PPTX
Patch Tuesday Analysis - July 2015
PPTX
Transforming your Security Products at the Endpoint
PDF
AV-Comparatives’ 2017 business software review
PDF
Abelssoft Easy Firewall 2024 v2.0.49084 PC Software – WhizzNews.pdf
DOCX
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
PDF
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
PDF
Qradar IBM - WinCollect_OpenMic_Sept2018.pdf
PDF
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
PPTX
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
PDF
White Paper - Are antivirus solutions enough to protect industrial plants?
PDF
Veracode Integration Adapter - Datasheet
DOCX
Project Penetration Testing Report(20 Points)Scenario.docx
PPTX
November Patch Tuesday Analysis
PDF
Power edge carbonblack-security-0322Secure your workloads running on VMs and ...
DOC
Oracle Audit vault
PDF
VMworld 2013: Security Automation Workflows with NSX
PPTX
Best free tools for w d a
PPTX
Best free tools for win database admin
1.3. (In)security Software
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
Patch Tuesday Analysis - July 2015
Transforming your Security Products at the Endpoint
AV-Comparatives’ 2017 business software review
Abelssoft Easy Firewall 2024 v2.0.49084 PC Software – WhizzNews.pdf
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
Qradar IBM - WinCollect_OpenMic_Sept2018.pdf
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
White Paper - Are antivirus solutions enough to protect industrial plants?
Veracode Integration Adapter - Datasheet
Project Penetration Testing Report(20 Points)Scenario.docx
November Patch Tuesday Analysis
Power edge carbonblack-security-0322Secure your workloads running on VMs and ...
Oracle Audit vault
VMworld 2013: Security Automation Workflows with NSX
Best free tools for w d a
Best free tools for win database admin

More from EnergySec (20)

PDF
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
PDF
Slide Griffin - Practical Attacks and Mitigations
PDF
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
PPTX
Jack Whitsitt - Yours, Anecdotally
PPTX
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
PDF
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
PPTX
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
PPTX
Explore the Implicit Requirements of the NERC CIP RSAWs
PDF
Wireless Sensor Networks: Nothing is Out of Reach
PDF
Please, Come and Hack my SCADA System!
PDF
Unidirectional Network Architectures
PPTX
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
PDF
Industrial Technology Trajectory: Running With Scissors
PPT
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
PPTX
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
PDF
Where Cyber Security Meets Operational Value
PPTX
Where Are All The ICS Attacks?
PPT
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
PPT
Industry Reliability and Security Standards Working Together
PPT
What the Department of Defense and Energy Sector Can Learn from Each Other
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Slide Griffin - Practical Attacks and Mitigations
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Jack Whitsitt - Yours, Anecdotally
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Explore the Implicit Requirements of the NERC CIP RSAWs
Wireless Sensor Networks: Nothing is Out of Reach
Please, Come and Hack my SCADA System!
Unidirectional Network Architectures
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
Industrial Technology Trajectory: Running With Scissors
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
Where Cyber Security Meets Operational Value
Where Are All The ICS Attacks?
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
Industry Reliability and Security Standards Working Together
What the Department of Defense and Energy Sector Can Learn from Each Other

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Sensors and Actuators in IoT Systems using pdf
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
Transforming Manufacturing operations through Intelligent Integrations
PDF
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
madgavkar20181017ppt McKinsey Presentation.pdf
PPT
Teaching material agriculture food technology
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
Empathic Computing: Creating Shared Understanding
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Advanced IT Governance
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Electronic commerce courselecture one. Pdf
PPTX
Cloud computing and distributed systems.
20250228 LYD VKU AI Blended-Learning.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Sensors and Actuators in IoT Systems using pdf
GamePlan Trading System Review: Professional Trader's Honest Take
Chapter 3 Spatial Domain Image Processing.pdf
Modernizing your data center with Dell and AMD
Advanced Soft Computing BINUS July 2025.pdf
Transforming Manufacturing operations through Intelligent Integrations
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
CIFDAQ's Market Insight: SEC Turns Pro Crypto
madgavkar20181017ppt McKinsey Presentation.pdf
Teaching material agriculture food technology
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Empathic Computing: Creating Shared Understanding
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Advanced IT Governance
Advanced methodologies resolving dimensionality complications for autism neur...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Electronic commerce courselecture one. Pdf
Cloud computing and distributed systems.

What to Do When You Don’t Know What to Do: Control System Patching Problems and Their Solutions

  • 1. FoxGuard Solutions 1 Monta Elkins Security Architect -- FoxGuard Solutions www.FoxGuardSolutions.com What to do when you don’t know what to do: Control system patching problems and their solutions
  • 2. Installed Software FoxGuard Solutions 2 Windows Control Panel – Programs and Features
  • 3. Installed Software FoxGuard Solutions 3 This powershell command shows the installed software: Get-WmiObject win32_product | Select-Object Name,Vendor,Version
  • 6. Air-gapped FoxGuard Solutions 6 update the wsusscn2.cab manually it usually resides in C:UsersusernameAppDataLocalMicrosoftMBSACachewsu sscn2.cab download the cab file from here and “carry it” http://download.windowsupdate.com/microsoftupdate/v6/wsus scan/wsusscn2.cab Now use MBSA to identify patches
  • 7. Identifying Patches FoxGuard Solutions 7 CLI options: From the mbsa program folder (c:Program FilesMicrosoft Baseline Security Analyzer) Execute Mbsacli >results.txt
  • 8. Which are Security Patches FoxGuard Solutions 8
  • 10. A Patch List FoxGuard Solutions 10 Manually download and carry patches from the final list and install them
  • 11. Another Approach FoxGuard Solutions 11 Discovering Patches and Downloading them Virtual Environment Approach: Setup virtual machines containing all software identified on your systems, (but not configuration information) Connect virtual machines to the Internet Scan to identify and download appropriate patches Hand carry the validated patches to air gapped machines
  • 13. Another Method to Verify Patch Installation FoxGuard Solutions 13 Powershell: Get-WmiObject -Class "win32_quickfixengineering"
  • 16. Watch for Disk Space Issues Patches will not install if there is not enough disk space. Recommendation: Have at minimum 1 Gigabyte free storage space Troubleshooting FoxGuard Solutions 16
  • 17. Patch Failure FoxGuard Solutions 17 Microsoft Patch fails to install System Update Readiness Tool “The System Update Readiness Tool can help fix problems that might prevent Windows updates and service packs from installing If your computer is having problems installing an update or a service pack, download and install the tool, which runs automatically. Then, try installing the update or service pack again.”
  • 18. Missing Patches FoxGuard Solutions 18 Detection Issue: Update KB2645410 for Windows 7 and Windows Server 2008 R2 Historians. Update for Microsoft Visual Studio 2010 Service Pack 1. This update may be required but is not detected by Shavlik (vCenter) Protect. Corrective Action: FoxGuard Solutions recommends that you manually deploy update KB2645410 on all Windows 7 and Windows Server 2008 R2 Historians
  • 19. FoxGuard Solutions Technical Information Notice Notice#:20140312-01 Notice Title: AVG Virus Warning Reason for Notice: After applying the AVG Anti-Virus 2013 updates from the M1 2014 release the virus “VBS/Downloader.Agent” was found on the system. FoxGuard Solutions has confirmed the two files referenced are automated manufacturing process artifacts used during the HMI manufacturing process that were not removed prior to the system being shipped from the factory. AV Signature Updates Can Cause Problems FoxGuard Solutions 19
  • 20. The script is used to temporarily turn off User Account Control (UAC) so that manufacturing automation tools can run successfully on the system. FoxGuard Solutions has determined that these scripts are not infected files, but they do contain code that triggers AVG to flag them as a virus. Specifically, the following code is flagged by AVG: If WScript.Arguments.length = 0 Then Set objShell = CreateObject("Shell.Application") objShell.ShellExecute "wscript.exe", Chr(34) & _ WScript.ScriptFullName & Chr(34) & " uac", "", "runas", 1 Else This is effectively equivalent to right-clicking an application and choosing “Run as administrator”. This is a common practice with scripts that require UAC elevation to execute properly, earlier releases did not flag these files as malware. AV Trigger Details FoxGuard Solutions 20
  • 21. Validation Checklists & Signoffs FoxGuard Solutions 21 Have a set of validation checklists to verify operations after patching. Include testing signoff for record keeping
  • 22. AV & IDS Signatures FoxGuard Solutions 22 CIP 007-3 R4.2. The Responsible Entity shall document and implement a process for the update of anti-virus and malware prevention “signatures.” The process must address installing and testing the signatures. Use a “virus test file” "EICAR Standard Anti-Virus Test File“ 68 bytes And a “malicious network traffic” file
  • 23. Ports and Services FoxGuard Solutions 23 Logical Network Accessible Ports – What are they? – Listening ports – Document need • What is it? • Why is it needed? • On this particular device – Or Shut it off • Host based firewall mitigation – RPC port changes – MS DNS 2501 (MS improper docs) – Every 35 days (and patching / updates 010-1) Centralized Ports and Services Auditor (CPSA) White Paper FoxGuardSolutions.com
  • 24. Improper Documentation for DNS FoxGuard Solutions 24 DNS documentation from Microsoft could cause you to fail an audit We received this acknowledgement of our findings
  • 25. Test Lab and Rollout FoxGuard Solutions 25 Validation lab equipment should closely mirror production equipment Where direct mirroring isn’t practical, be sure to include a superset of all installed software. Now do it “for real” Use phased rollout approach: •Test lab •Less critical machines •More critical machines •Patch •Verify •Validate •Backup
  • 26. FoxGuard Patching and Validation Services FoxGuard Solutions 26 FoxGuard Solutions' DisPatch subscriptions provide validated patches and updates plus documentation on a monthly basis. To learn how FoxGuard Solutions can help you with patch and update validation, contact us at [email protected], or by calling 877-446-4732.