I breathed a sigh of relief last Friday when I learned that Microsoft had patched a vulnerability in March that was recently exploited by the WannaCrypt0r ransomware. I opt to have Windows OS updates installed automatically on my workstation so I was protected before the ransomware poked through the crust from the bowels of its maker.
So what is the best practice for managing Windows patches on Oracle EPM (Hyperion) servers?
Explore key considerations, integrating the cloud with legacy applications and challenges of current cloud implementations.
“Manage patches, don’t inflict them.”
This is the same philosophy I have with change control. Manage in lieu of inflicting. Be proactive. So here are a couple pointers to help you manage Windows patches on your EPM servers:
- Get informed by subscribing to the Microsoft Technical Security Notification Services. Create a Microsoft Live account if don’t already have one then update your subscription preferences: https://profile.microsoft.com/RegSysProfileCenter/subscriptionwizard.aspx?wizid=5a2a311b-5189-4c9b-9f1a-d5e913a26c2e&lcid=1033
According to GI Joe, “Knowing is only half the battle.” Getting the security alerts is step one. The next step is to take action. I won’t insult your intelligence by describing how you should read the security notices and patch release notes, but, you must read them. Only then can you make an informed decision as to whether you need to apply patches or other updates based on your organization’s tolerance for risk.
I also recommend you take action for your home computers. The Guardian published a nice article1 last week about how to defend against the ransomware here: http://theguardian.com/technology/2017/may/15/windows-xp-patch-wannacry-ransomware-wecry-wanacrypt0r. I couldn’t write it better.
- Hern, Alex. “How to protect your computer against the ransomware attack”, theguardian, 15 May 2017, theguardian.com/technology/2017/may/15/windows-xp-patch-wannacry-ransomware-wecry-wanacrypt0r. Accessed 16 May 2017.