We've seen a landslide of vulnerabilities announced in the last few months, from ShellShock to Poodle, and it looks like that trend will only continue. The discovery of a critical vulnerability in Windows SChannel–and the even worse problems introduced with a hasty patch–has added a heap of unplanned work for Windows IT pros.
UpGuard provides a really easy way to validate that the update has been successfully applied and the registry keys deleted. In addition to giving you validation that patches have been applied now, our Schannel check can be run automatically to protect against regressions.
Using the SChannel Policy
First, register your free UpGuard account and connect any nodes you want to protect.
Go to the "Policies" section and select "Public Policies." These are test suites we've created based on best practices that anyone can use to validate their configurations.
Click "Execute" and then select the node you want to run the policy against. If you have a lot (like I do) then the filter might come in handy.
The policy contains four checks: that the patch is installed and that the three registry keys have been deleted. After running the policy you'll get a report on which tests have passed.
You can click into any portion to learn more about what the test is checking, why it failed, and how to remediate.
Because the checks are assembled in natural language it's easy for you to understand what's going on without reading a bunch of documentation. It also makes it easier to hand these tests off to other administrators, or to clone and edit them for your particular needs. And if Microsoft changes their advisory notice you can easily modify your version of the policy to look for different keys or to succeed when those keys are found.
For more resources to keep your Windows environments safe, check out our IIS 8 Checklist to ensure that your IIS servers are CIS compliant.