<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/en-au/blog/authors/shane-wescott/rss" /><link>https://www.ivanti.com/en-au/blog/authors/shane-wescott</link><item><guid isPermaLink="false">419a6a1d-c6d1-4d64-8ee9-ccc84bf9d17f</guid><link>https://www.ivanti.com/en-au/blog/not-another-blog-about-solarwinds-3-ways-ivanti-can-help-protect-you-1</link><atom:author><atom:name>Shane Wescott</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/shane-wescott</atom:uri></atom:author><category>Security</category><title>Not Another Blog about SolarWinds – 3 Ways Ivanti can Help Protect You</title><description>&lt;p&gt;The SolarWinds exploits have been widely reported, fully covered, and basically as we would say in Aussie – Done to Death Mate.&lt;/p&gt;

&lt;p&gt;But some of the info got me thinking, especially &lt;a href="http://www.microsoft.com/security/blog/2021/01/20/deep-dive-into-the-solorigate-second-stage-activation-from-sunburst-to-teardrop-and-raindrop/" target="_blank" rel="noopener"&gt;this article&lt;/a&gt; from my buddies at Microsoft which gives some great background and flows for that how the attacks were actually working.&lt;/p&gt;

&lt;p&gt;I’ve been working with &lt;a href="https://www.ivanti.com/en-au/products/application-control?_ga=2.146746556.968077336.1615244389-2058187278.1612880410" target="_blank"&gt;Ivanti Application Control&lt;/a&gt; – formerly AppSense Application Manager for over 17 years. I luv it 😊&lt;/p&gt;

&lt;p&gt;I’ve installed it in hundreds and hundreds and hundreds of Customer sites and trained hundreds of people on its use.&lt;/p&gt;

&lt;p&gt;Even then, some new use cases come up, and some if its features lend themselves to protecting against new and old styles of attacks, as the world and our hackers evolve.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;How did the Attack work, What can we do?&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;So, let me give you my spin on what the attack style and steps mean to me, through the lens of someone who helps customers with Ivanti Application Control (AC).&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;strong&gt;Trusted Applications can still do bad stuff. &lt;/strong&gt;Yes, I know it may be hard to believe and hard to stomach, but trusted applications can be hacked. Exhibit A is of course the SolarWinds attack. We know that the process SolarWinds.BusinessLayerHost.exe downloaded a compromised dll, which then created a couple of files on the disk. After some jiggery, pokery in the registry, script files were then kicked off by dllhost.exe – a very valid system process. Rundll32.exe – another well trusted system process - was also roped in to go and run some of the dodgy files as part of the attack and cleanup.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Tracing and Hunting is great, but prevention is even better.&lt;/strong&gt; It’s great to have visibility, and capture traffic running around your network, and calls out to hacker sites, but my view has always been - I like to see security issues blocked at the source. Two philosophies in Security, fix it fast when it breaks, or stop it breaking in the first place. I am very firmly in the second camp there, let’s stop things first.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Know what your Apps should and shouldn’t be doing.&lt;/strong&gt; Do Trusted Applications really need to be executing batch files and VB or PowerShell scripts? Under what circumstances should that be allowed. A little testing and planning will give you visibility, and from there you can make some informed decisions, and take some protective steps.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;3 Ways Ivanti Application Control Can Help&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Given all that info above, here’s 3 areas of Ivanti Application Control configuration that can help you protect yourself against compromised TRUSTED applications – DISCLAIMER – PLEASE TEST ANY OF THESE RULES FIRST IN AUDIT ONLY MODE IN YOUR ENVIRONMENT BEFORE DEPLOYING:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Remove SYSTEM as a Trusted Owner. Out of the box, SYSTEM is added as a Trusted Owner. Now that might seem logical, and you might even think that is a 100% no brainer requirement – not so fast Mate. I remember back when I was doing my &lt;a href="https://www.giac.org/certifications/certified-incident-handler-gcih/" target="_blank" rel="noopener"&gt;GCIH certification training&lt;/a&gt;&amp;nbsp;with SANS, and we were using Metasploit to attack a Windows Spooler service and drop a copy of netcat.exe on a server, the context of the service we were attacking was SYSTEM. Which meant, when the file hit the disk, it was owned by SYSTEM. Removing SYSTEM from the AC config would block the execution of any file copied to the disk as part of a compromised service. The Instructor was very impressed!&lt;/li&gt;
	&lt;li&gt;Add Microsoft Recommended Blocks. Now his one is mandatory for level 2 and 3 Maturity levels for the ASCS Essential 8 “Application Control’. The listed applications are ones that have security implications or are just downright dangerous. The current list can be found &lt;a href="https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/design/applications-that-can-bypass-wdac" target="_blank" rel="noopener"&gt;here&lt;/a&gt;. One I wasn’t initially aware of was good old BGInfo.exe (prior to version 4.22), until a Customer asked me about it and I then realised it could be used to run VB scripts and bypass the built in Windows VB compiler. We found that by blocking the relevant dll’s you could stop the VBScript backdoor, but as it was on the Blocked App list, it’s safer to just block it. BGInfo version 4.22 fixed this issue so you could use that version if you really need to.&lt;/li&gt;
	&lt;li&gt;Process Rules are your Friend. Yes, one of my favourite functions in Ivanti Application Control is the ability to run Process Rules. So, with these, you would lock down the .exe with metadata, or even in some cases a signature, and then create a rule allowing that exe to either run or be blocked from calling additional components. So you could say – I trust the exe, so let it run .dll’s, BUT there is never any circumstance where it should run a .bat, .vbs, or .PS1 file so block those, and throw in blocking Powershell.exe while you’re at it. This could even be implemented across the platform as a blanket rule, and only allowed on a “Need to Run” basis.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Implementing the above rules will stop attacks like the SolarWinds one in its tracks.&lt;/p&gt;

&lt;p&gt;SYSTEM processes will not be able to create their own files and execute them, any dangerous system tools listed on the MS Recommended Blocks will be denied, and valuable system process like dllhost.exe and Rundll32.exe can be locked down to stop them kicking off batch files, VB or PowerShell scripts.&lt;/p&gt;

&lt;p&gt;I’m one of those Weird People who “Eat their own Dog Food” or “Drink their own Champagne” so I have all these rules on my laptop 😊&lt;/p&gt;

&lt;p&gt;It runs fully locked down Application Control and I only ever log on as a standard user. Our Privilege Management functionality elevates the things I need to do my job at Ivanti and protects me against any credentials compromise.&lt;/p&gt;

&lt;p&gt;I hope that helps give you a bit on an insight into where Ivanti Application Control might help, and if you have any questions please feel free to reach out to me.&lt;/p&gt;

&lt;p&gt;Thanks for tuning in and to be clear, Solarwinds is not affiliated with Ivanti and does not support or endorse Ivanti, Ivanti IAC, or any other Ivanti solutions.&lt;/p&gt;</description><pubDate>Mon, 08 Mar 2021 23:08:23 Z</pubDate></item><item><guid isPermaLink="false">57a0e669-8b52-40a3-a685-2e864590eca5</guid><link>https://www.ivanti.com/en-au/blog/raising-security-posture</link><atom:author><atom:name>Shane Wescott</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/shane-wescott</atom:uri></atom:author><category>Endpoint Management (UEM)</category><category>Security</category><title>Raising Your Security Posture: 3 Things You Should Look at Next</title><description>&lt;p&gt;It’s been a busy year in security so far for 2020. Apart from all the other challenges we deal with, we’ve now seen how quickly security threats can pivot when an opportunity presents itself.&lt;/p&gt;

&lt;p&gt;Widely reported in April 2020 was the &lt;a href="https://www.zscaler.com/blogs/security-research/30000-percent-increase-covid-19-themed-attacks" target="_blank" rel="noopener"&gt;30,000% increase in phishing and malware attacks against Remote Workers.&lt;/a&gt; A massive increase in work from home (WFH) initiatives signals a great opportunity for threat actors to exploit these new WFH users.&lt;/p&gt;

&lt;p&gt;So where is your next target to improve your security posture? Whether it’s based around remote workers or not, where should you be concentrating your efforts?&lt;/p&gt;

&lt;p&gt;Here are three areas we highlighted during our recent &lt;a href="https://www.ivanti.com/en-au/company/events" target="_blank" rel="noopener"&gt;Ivanti Interchange Virtual World Tour&lt;/a&gt;. I hope they give you some info and ideas on where to head next in your security journey:&lt;/p&gt;

&lt;h2&gt;1. App Hardening&lt;/h2&gt;

&lt;p&gt;Block those macros. We hear it all the time. Office macros are bad; just block them all. Great security idea, but not the most practical for all businesses. Some rely on spreadsheets and documents embedded with complex macros to make complicated work and calculations simple. Take them out of the business, and the business takes two steps backwards at a time when we all need to be taking steps forwards.&lt;/p&gt;

&lt;p&gt;So how do we tread that fine line between&amp;nbsp;block ‘em all, and only allowing those that are trusted?&lt;/p&gt;

&lt;p&gt;Obviously, there are some built in mechanisms in Windows, group policy settings, digital certs etc. and the settings in the Trust Center options of Office 365 to block and allow only some macros.&lt;/p&gt;

&lt;h3&gt;How&amp;nbsp;Ivanti Can Help&lt;/h3&gt;

&lt;p&gt;Often around this discussion with customers, we talk about use of our Ivanti &lt;a href="https://www.ivanti.com/en-au/products/environment-manager" target="_blank"&gt;Environment Manager&lt;/a&gt; (EM) and &lt;a href="https://www.ivanti.com/en-au/products/application-control" target="_blank"&gt;Application Control&lt;/a&gt; (AC) products as a highly flexible solution.&lt;/p&gt;

&lt;p&gt;EM allows for granular, contextual&amp;nbsp;policy control of all macro settings rather than a “one size fits all” approach from Group Policy.&lt;/p&gt;

&lt;p&gt;Our AC product allows us to control any external files or processes called from parent processes like Winword.exe or Excel.exe or even Chrome.exe.&lt;/p&gt;

&lt;p&gt;On my laptop, I have AC configured to block all PowerShell, java, and cmd executions from my standard Office apps like Office 365, Acrobat, and Chrome. I can’t see a reason why they need to call those mechanisms, so as a security measure they’re blocked.&lt;/p&gt;

&lt;h2&gt;2. Connected Devices and Removable Media&lt;/h2&gt;

&lt;p&gt;You’re probably familiar with the ACSC Essential 8 Strategies described &lt;a href="https://www.cyber.gov.au/acsc/view-all-content/publications/strategies-mitigate-cyber-security-incidents" target="_blank" rel="noopener"&gt;here&lt;/a&gt;, and hopefully you are all some distance along the way to measuring your maturity level against this &lt;a href="https://www.cyber.gov.au/acsc/view-all-content/publications/essential-eight-maturity-model" target="_blank" rel="noopener"&gt;model.&lt;/a&gt; But something that’s not obvious is the absolute number one priority when assessing your risk from malicious Insiders: “control removable storage media and connected devices” to mitigate data exfiltration.&lt;/p&gt;

&lt;h3&gt;What’s the best way to do that;&amp;nbsp;what’s the best solution?&lt;/h3&gt;

&lt;p&gt;Well, there are a lot of differing solutions and strategies around locking USB keys and controlling connecting devices. Your best solution revolves around your own use cases, and what you need to achieve to mitigate your organisation's specific risks. Simply blocking USB storage can even be covered by Group Policy so if that’s your only need, happy days.&lt;/p&gt;

&lt;h3&gt;How&amp;nbsp;Ivanti Can Help&lt;/h3&gt;

&lt;p&gt;We have regular conversations around Device Control and I’m always pushing for people to discuss their requirements first. Our Ivanti &lt;a href="https://www.ivanti.com/en-au/products/device-control"&gt;Device Control&lt;/a&gt; (DC) is used around the world by the most super secure organisations, all who have multiple, and sometimes complicated requirements.&lt;/p&gt;

&lt;p&gt;I call it the Rolls Royce of Device Control and make sure I let customers know that during discussions. After all, there’s no point buying a new Rolls Royce&amp;nbsp;when all you really need to do is buy milk at the shop. That Corolla in your garage will probably be good enough. 😊&lt;/p&gt;

&lt;p&gt;But, if granular control of ALL devices—not just USB Storage—is important, and&amp;nbsp;if you need to enforce encryption, restrict file copies by type of file (PDF,DOCX etc.), or even to look inside files for key words, and shadow copy every document printed, our DC solution has you covered.&lt;/p&gt;

&lt;p&gt;We can help you meet those extensive controls to ensure a high level of data loss prevention and compliance.&lt;/p&gt;

&lt;h2&gt;3. Automated Reporting&lt;/h2&gt;

&lt;p&gt;Part of the previously mentioned ACSC Maturity Model, and a requirement for Level 3 on patching operating systems or third-party applications is an “automated mechanism” being used to record patches and drivers that have been deployed and installed. Not only does this record compliance, but it also simplifies updating exec’s in the event of a specific threat they have questions around.&lt;/p&gt;

&lt;h3&gt;How should you do that; where should you start?&lt;/h3&gt;

&lt;p&gt;Many of my friends in security worked all weekend when WannaCry struck, not patching machines, but collecting data for reports for execs. If that was you, consolidating, and automating your compliance reporting will save you manpower and overtime.&lt;/p&gt;

&lt;p&gt;Every security product will have some level of reporting built in. Most will offer some form of scheduling reports, and potentially email them automatically to important people.&lt;/p&gt;

&lt;p&gt;We typically hear consolidated reporting is a big issue. Grabbing information from multiple sources, centralizing it and monitoring compliance can be a big challenge.&lt;/p&gt;

&lt;h3&gt;How&amp;nbsp;Ivanti Can Help&lt;/h3&gt;

&lt;p&gt;I’ve loved our Ivanti &lt;a href="https://www.ivanti.com/en-au/products/xtraction" target="_blank"&gt;Xtraction&lt;/a&gt; product since the first time I saw it back in April 2016. I’ve been blown away by the value it offers to customers, and the flexibility of its centralized business value dashboards reporting from multiple data sources.&lt;/p&gt;

&lt;p&gt;It not only talks to every Ivanti &lt;a href="https://www.ivanti.com/en-au/en-au/en-au/network-security" target="_blank"&gt;Security&lt;/a&gt; product with a bunch of out-of-the-box dashboards pre-configured, but can also connect to other databases with a suitable connector like Microsoft SCCM and Active Directory. These connectors also include a bunch of OOTB ready built dashboards.&lt;/p&gt;

&lt;p&gt;Scheduling reports or dashboards for execs is very simple and easy to configure. All your compliance reports centralized and managed in one place.&lt;/p&gt;

&lt;h3&gt;What next?&lt;/h3&gt;

&lt;p&gt;So that’s it. I hope you’ve found some value from the info across these three areas and how you can look to raise your security maturity level.&lt;/p&gt;

&lt;p&gt;For more info, and to see some Live Software, you can also watch our session “ACSC Essential 8 – Prioritizing Your Next Step” on demand by registering&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/company/events" target="_blank" rel="noopener"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Please stay safe, and if you have any further questions please feel free to reach out to &lt;a href="https://www.ivanti.com/en-au/company/contacts" target="_blank"&gt;Ivanti&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 15 Sep 2020 16:41:22 Z</pubDate></item><item><guid isPermaLink="false">0bc5dc37-2b09-4e84-b332-080c30fd1c9a</guid><link>https://www.ivanti.com/en-au/blog/together-citrix-and-ivanti-just-make-sense</link><atom:author><atom:name>Shane Wescott</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/shane-wescott</atom:uri></atom:author><category>Endpoint Management (UEM)</category><title>Together Citrix and Ivanti Just Make Sense</title><description>&lt;p&gt;&lt;a href="https://www.hassellstudio.com/studio/studio" target="_blank" rel="noopener"&gt;Hassell&lt;/a&gt;, a&amp;nbsp;multidisciplinary design practice with offices in Australia, China, Singapore, Thailand and the United Kingdom needed to solve a problem. How could&amp;nbsp;they improve the way they delivered&amp;nbsp;workspaces&amp;nbsp;to their designers, who require&amp;nbsp;powerful machines to handle the intense, 3D design tools they work with daily?&lt;/p&gt;

&lt;p&gt;With end users who were used to running powerful workstations under their desk with plenty of compute power, Hassell needed a virtualization&amp;nbsp;platform solution that could deliver a rich and responsive experience that exceeded their users’ expectations.&lt;/p&gt;

&lt;h2&gt;Ivanti Performance Manager&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/performance-manager" target="_blank" rel="noopener"&gt;Ivanti&amp;nbsp;Performance Manager, powered by AppSense&lt;/a&gt;, enabled Hassell to increase their user density without compromising the user experience.&amp;nbsp;“We’ve been able to control applications using too much CPU and memory resources so that it doesn’t impact other users,” said Johnny Chloride, Design Systems Manager at Hassell.&lt;/p&gt;

&lt;p&gt;In building an overall solution in 2014 Chloride believed Ivanti’s then AppSense DesktopNow Plus was critical to the success of their virtualization&amp;nbsp;project.&lt;/p&gt;

&lt;p&gt;&amp;nbsp;“DesktopNow Plus and AppSense were part of the overall virtualization&amp;nbsp;package. Without AppSense, Citrix didn’t really make sense”&lt;/p&gt;

&lt;p&gt;Hassell’s end users have been really excited by the benefits from the project, which includes&amp;nbsp;the ability to logon from home and access all the same applications just as they use them in the studio.&lt;/p&gt;

&lt;p&gt;“Before we’d have to use fairly elaborate file synchronization&amp;nbsp;mechanisms,” commented Chloride. “Without Ivanti we wouldn’t have been able to get the business case to do what we wanted to do. Ivanti has provided us with the ability to give our designers the high-end graphical capabilities they needed.”&lt;/p&gt;

&lt;p&gt;When analyzing the business case for the project, Hassell found the investment would pay for itself within 18 months. “We looked at a payback model when we went to the board and we looked at how quickly the investment would payback compared to the investment that they typically make on PC equipment. &amp;nbsp;The timeframe was around 18 months, so from a board point of view not only were they getting faster equipment they were getting the same user experience and it was cheaper.”&lt;/p&gt;

&lt;p&gt;If you have Citrix Virtual Apps | Desktops, VMware Horizon, Microsoft Windows Virtual Desktop or cloud delivered desktops in Azure or AWS, we are offering &lt;a href="https://www.ivanti.com/lp/uwm/demos/performance-manager?from=blog" target="_blank" rel="noopener"&gt;30 Day Free Performance Manager trial&lt;/a&gt; on your production system to show the cost savings.&lt;/p&gt;
</description><pubDate>Tue, 14 Apr 2020 17:02:43 Z</pubDate></item><item><guid isPermaLink="false">ae5c199c-37ea-4a0b-8530-016d3a2b2330</guid><link>https://www.ivanti.com/en-au/blog/asd-acsc-maturity-model</link><atom:author><atom:name>Shane Wescott</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/shane-wescott</atom:uri></atom:author><category>Security</category><title>ASD/ACSC Maturity Model 2019 – Three Things You Need to Check</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/" target="_blank" rel="noopener"&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/10/cta-thousands2.png"&gt;&lt;/a&gt;The Australian Signals Directorate (ASD)/Australia Cyber Security Centre (ACSC) Top 4/Essential 8 has been around for a few years now, and at Ivanti we’ve always promoted this framework to our customers—follow the experts, do the boring basics first, and then focus on the smart, pretty, next-gen stuff.&lt;/p&gt;

&lt;p&gt;If you choose the ‘follow the ASD/ACSC’ Guidelines, one of the first things you need to do is a self-assessment to find out where you are right now. How does your organization measure up against the Maturity Model—are you Level 1, 2, or 3 across the controls of the Essential 8.? And what steps do you need to take to go from where you are to where you want to be?&lt;/p&gt;

&lt;p&gt;Thankfully, the ASD/ACSC Maturity Model makes that easy.&lt;/p&gt;

&lt;p&gt;We are told that for most organizations, the goal should be Level 3 maturity across the board. If it takes a little while that’s fine. As long as you know where you’re heading, you can plan and make progress. Some organizations that are more secure will be required to achieve higher levels of security. In those cases, you really need to work with the ACSC directly for advice and guidance.&lt;/p&gt;

&lt;p&gt;For those of us who’ve been monitoring this maturity model, the year 2019, has been one of updates and changes. Some updates were made in February 2019, and then again in July 2019. It’s these latest changes I want to talk about, in order to give you three simple things you need to check for your self-assessment.&lt;/p&gt;

&lt;h2&gt;The Three Things to Look At for Level 3 Maturity&lt;/h2&gt;

&lt;h3&gt;1. Application Whitelisting&lt;/h3&gt;

&lt;p&gt;ALL desktops and ALL servers need to be whitelisted for executables, software libraries, scripts, and installers. Historically, this moved from being only “high-risk” workstations for Level 1 and 2, which allowed you to nominate a subset of endpoints and AD/Email/Authentication servers.&lt;/p&gt;

&lt;p&gt;Now it’s a simple blanket: ALL workstations and servers. So, if you’ve employed the previous measures to reach Level 2 or 3 for example, you need to go back and plan how you’re going to move that along in order to meet the new requirements. If you need help with this, reach out. We’ve helped all sizes of organizations tick that whitelisting box with minimal fuss—and most importantly—minimal ongoing maintenance.&lt;/p&gt;

&lt;h3&gt;2. Microsoft Recommended Blocks&lt;/h3&gt;

&lt;p&gt;Microsoft released a new Application Whitelisting recommendation earlier this year. Essentially this is a list of Microsoft applications a threat actor could use to bypass application whitelisting. For Level 3 maturity, you must include these in your whitelisting for all workstations and servers.&lt;/p&gt;

&lt;p&gt;Thankfully, this is easy for our Ivanti Application Control customers to add. We have a config snippet people can just import to block these recommended apps.&lt;/p&gt;

&lt;h3&gt;3. Patching&lt;/h3&gt;

&lt;p&gt;Organizations require an automated mechanism to confirm and record deployment of updates and patches. So, as a new requirement for organizations to be considered Level 3 mature, you MUST include automation in your patching solution. What would be ideal is an automated patching solution that records and reports on patch success/failures, and that gives you a live position on your organization’s patch status ideal.&lt;/p&gt;

&lt;p&gt;This is exactly what &lt;a href="https://www.ivanti.com/products/security-controls" target="_blank" rel="noopener"&gt;Ivanti Security Controls&lt;/a&gt; will give you.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;So, in summary, if you’re following the ASD/ACSC Maturity Model:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;It’s a good time to reassess where you are.&lt;/li&gt;
	&lt;li value="2"&gt;Plan out what your next move must be to stay compliant&lt;/li&gt;
	&lt;li value="3"&gt;Talk to Ivanti if you need assistance. We’ve been doing this successfully for a long time.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Hit me up at &lt;a href="mailto:shane.wescott@ivanti.com" target="_blank" rel="noopener"&gt;shane.wescott@ivanti.com&lt;/a&gt;&amp;nbsp;if there is anything else I can do to add value.&lt;/p&gt;</description><pubDate>Wed, 16 Oct 2019 09:32:04 Z</pubDate></item><item><guid isPermaLink="false">61e74ed2-d2c6-400e-8d09-e16e271a1cef</guid><link>https://www.ivanti.com/en-au/blog/would-you-like-fries-with-that-three-questions-to-ask-about-built-in-features</link><atom:author><atom:name>Shane Wescott</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/shane-wescott</atom:uri></atom:author><category>Endpoint Management (UEM)</category><title>Would You Like Fries With That? Three Questions to Ask About Built-In Features</title><description>&lt;p&gt;I’ve been around the IT world for a long time (over 32 years) and things are constantly changing.&lt;/p&gt;

&lt;p&gt;One question that never seems to change in our world of “Value Add” is, “How do you compare to the built-in feature X”.&lt;/p&gt;

&lt;p&gt;For nearly 15 years I’ve worked for &lt;a href="https://www.ivanti.com/en-gb/company/history/appsense" target="_blank" rel="noopener"&gt;AppSense&lt;/a&gt;, and now &lt;a href="https://www.ivanti.com/" target="_blank" rel="noopener"&gt;Ivanti&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Those businesses were, and still are, built on the principle of Adding Value, to improve the User Experience.&lt;/p&gt;

&lt;p&gt;It’s like that fast food restaurant that always asks, “Would you like fries with that?” Two possible responses here:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;No thank you. There is enough salt and fat in my triple decker burger I’ve already ordered to have the desired effect on my arteries, or&lt;/li&gt;
	&lt;li value="2"&gt;Yes, I would like fries with that. It makes it feel like a more balanced meal and I can then kid myself that I’ve had some Veggies today and feel better about my dietary choices.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;If you get the analogy, Option 2 is all about the User Experience, Option 1 is all about – I know what I’m doing, what I have is good enough.&lt;/p&gt;

&lt;p&gt;The built-in features in the Operating System (Think Windows, IOS, Android etc.) come with a range of feature and functions. Some are great, some are o.k.&lt;/p&gt;

&lt;p&gt;If the built in O/S for our Mobile devices was fantastic, there’d be no need for any apps.&lt;/p&gt;

&lt;p&gt;Just the same as if the off the showroom car was fantastic, it wouldn’t need options and there wouldn’t be any need for aftermarket players selling bull bars and 20-inch rims.&lt;/p&gt;

&lt;p&gt;But we are all DIFFERENT, and our use cases are all DIFFERENT.&lt;/p&gt;

&lt;p&gt;So, when customers say to me – “How does this compare to the FREE feature I already have?” I ask them if they’ve listed out and tested their use cases.&lt;/p&gt;

&lt;p&gt;The reason being, the built-in feature will work well for certain use cases, for certain customers.&lt;/p&gt;

&lt;p&gt;For Example, the Windows world has had NT Backup built into Windows from &lt;a href="https://www.techtarget.com/searchwindowsserver/tips" target="_blank" rel="noopener"&gt;day one&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Will it backup data – Yes – will it be an effective &lt;a href="https://www.ivanti.com/en-au/en-au/en-au/network-security" target="_blank"&gt;backup solution&lt;/a&gt; for an Enterprise – No. And that’s exactly why most customers purchase a specific, dedicated, backup solution for their organisation.&lt;/p&gt;

&lt;p&gt;Everyone understands that.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Three important questions to ask when assessing built-in features: &lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;strong&gt;What is the management overhead of using the built-in functionality?&lt;/strong&gt; Typically, this one gets missed. Yes, the built in may be FREE, and may do what you think you want, but if it takes one FTE (Full Time Employee) dedicated to managing it, there’s a cost involved. I’ve been to sites where Teams looked after built in security features – difficult to propose an alternative when it’s obviously going to put people out of work.&lt;/li&gt;
	&lt;li value="2"&gt;&lt;strong&gt;What User Experience are we after?&lt;/strong&gt; Do you want the users to be able to roam different platforms and have the same experience for all their app settings etc? Do you want them to have the ability to decide, give a reason, and temporarily bypass some security restrictions? Are you o.k. if one user running a big Excel calculation, impacts every other user connected to the same Terminal Server etc? All important questions, all of which must be balanced between the value of User Experience, and the cost of the solution.&lt;/li&gt;
	&lt;li value="3"&gt;&lt;strong&gt;What are others like us doing?&lt;/strong&gt; If you’re a 10,000-seat organisation, and everyone your size is using a value add solution, maybe there’s a reason for that. Are others just ticking a box to keep the auditors at bay, or are they using the auditor’s report as an opportunity to drive real change. Do your research. Ask around. Maybe the Vendor can point you at a similar customer who’s &lt;strong&gt;implemented &lt;/strong&gt;their solution and seen the value first hand.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;So, there’s some questions for you.&lt;/p&gt;

&lt;p&gt;I hope you find them useful when you sit down to assess the value of various built-in features and functions.&lt;/p&gt;

&lt;p&gt;And just remember, when it comes down to that age-old question – “Would you like fries with that?”, it’s all about the User Experience, it’s not about the calories 😊&lt;/p&gt;

&lt;p&gt;My name’s Shane Wescott, Tech Evangelist at Ivanti, and I’m here to help.&lt;/p&gt;

&lt;p&gt;Hit me up on &lt;a href="mailto:shane.wescott@ivanti.com" target="_blank" rel="noopener"&gt;shane.wescott@ivanti.com&lt;/a&gt; if there is anything else I can do to add value to you.&lt;/p&gt;</description><pubDate>Thu, 25 Oct 2018 19:31:47 Z</pubDate></item><item><guid isPermaLink="false">b03b7fcd-a7dc-4b3e-bf07-d8ab4b18ccfa</guid><link>https://www.ivanti.com/en-au/blog/spectre-and-meltdown-3-things-you-can-do-to-speed-back-up</link><atom:author><atom:name>Shane Wescott</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/shane-wescott</atom:uri></atom:author><category>Security</category><title>Spectre and Meltdown: 3 Things You Can Do to Speed Back Up</title><description>&lt;p&gt;I’m sure we’ve all seen the articles around &lt;a href="https://isc.sans.edu/diary/Meltdown+and+Spectre+clearing+up+the+confusion/23197" target="_blank" rel="noopener"&gt;Spectre and Meltdown&lt;/a&gt; this year: fixes aplenty, and in some cases side effects of slower performance and more resource usage. These slowdowns make sense of course, because the attacks take advantage of the speculative execution feature in processors that makes their fastest performance possible. There’s a ton written out there about this feature, but essentially it enables processors to try to predict what you’re going to have them to do next, instead of waiting for the instructions to arrive. There is no pipeline stall or delay in execution, so performance is faster. But take that away and the processor’s predictive ability and code is more secure (for reasons we’ve linked to above) but slower.&lt;/p&gt;

&lt;p&gt;What if there were ways to mitigate the after effects of fixing these vulnerabilities? Ways to help with the &lt;a href="https://www.pcworld.com/article/407951/how-to-test-how-much-spectre-and-meltdown-hurt-your-pcs-performance.html" target="_blank" rel="noopener"&gt;slowdowns&lt;/a&gt; customers tell me they are seeing after applying patches and microcode updates?&lt;/p&gt;

&lt;p&gt;There are.&lt;/p&gt;

&lt;p&gt;To give you some background on how I’ve come prepared to speed up your IT environment, for the last 14 years or so I’ve been working with Asia Pacific (APAC) clients in the end-user computing space to make sure they get the best user performance they can from their Windows technology. I’ve helped them manage CPU and memory resources with &lt;a href="https://www.ivanti.com/en-au/products/performance-manager" target="_blank"&gt;Ivanti Performance Manager powered by AppSense.&lt;/a&gt; Since 2002 this has been the leading solution for shared resource management on Citrix, Terminal Server, and virtual desktop infrastructure (VDI) platforms. I’m proud to say I love this product, and I’ve installed it at at least 500 customer sites with remarkable success.&lt;/p&gt;

&lt;p&gt;I’ve also specialised in security, helping organisations implement the &lt;a href="https://www.asd.gov.au/publications/protect/essential-eight-explained.htm" target="_blank" rel="noopener"&gt;ASD Essential 8 security framework&lt;/a&gt; using the most widely deployed whitelisting and privilege management solution, &lt;a href="https://www.ivanti.com/en-au/products/application-control" target="_blank"&gt;Ivanti Application Control powered by AppSense&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;So, now back to business. Let’s look at what we can do today to claw back some of that performance for our users. I recommend you take this approach:&lt;/p&gt;

&lt;h2&gt;1. Discover&lt;/h2&gt;

&lt;p&gt;Find out where things stand in your environment. Talk to your hardware vendors. See what they say about the servers and workstations you are running and how vulnerable they are. In addition, Microsoft offers guidance &lt;a href="https://support.microsoft.com/en-au/topic/kb4073119-windows-client-guidance-for-it-pros-to-protect-against-silicon-based-microarchitectural-and-speculative-execution-side-channel-vulnerabilities-35820a8a-ae13-1299-88cc-357f104f5b11" target="_blank" rel="noopener"&gt;here&lt;/a&gt; on how to use PowerShell to check your current state.&lt;/p&gt;

&lt;h2&gt;2. Gain Insight&lt;/h2&gt;

&lt;p&gt;Consolidate what you’ve found across your organisation. I’m not sure how you are collecting inventory or patch state information today, but it’s critical to dig into the data.&lt;/p&gt;

&lt;p&gt;If you just throw your arms up, come and talk to us. We can help with &lt;a href="https://www.ivanti.com/en-au/products/it-asset-management" target="_blank"&gt;IT asset management&lt;/a&gt;, &lt;a href="https://www.ivanti.com/en-au/products/security-controls" target="_blank"&gt;patching&lt;/a&gt;, and &lt;a href="https://www.ivanti.com/en-au/products/xtraction" target="_blank"&gt;dashboarding&lt;/a&gt; solutions&lt;/p&gt;

&lt;h2&gt;3. Take Action&lt;/h2&gt;

&lt;p&gt;Install &lt;a href="https://www.ivanti.com/en-au/products/performance-manager" target="_blank"&gt;Ivanti Performance Manager&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;This last might seem quite radical, but yes you can install a product made famous in the Citrix and Terminal Server world on a PC or server. Windows is Windows. The challenges you face when you are using multi-user shared Windows sessions are still there on a single-user version of Windows. Here’s why:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;The Windows Scheduler is the same.&lt;/strong&gt; Yes, there is no difference in the &lt;a href="https://www.tutorialspoint.com/operating_system/os_process_scheduling.htm" target="_blank" rel="noopener"&gt;Windows Scheduler&lt;/a&gt;, that piece of code that decides who is the next to get some CPU time. Scheduler issues on PCs slow response time and cause hangs when users switch between applications.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;CPU can still lock up at 100%.&lt;/strong&gt; You know that time when the AV agent goes rogue, just as your review scan of your 50-page work document kicks off—that spinning cursor that really just says, “Please hold, your call is important to me”? That’s a CPU lockup.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Memory leaks or hangs.&lt;/strong&gt; Sometimes, applications just grab memory, and sometimes they keep grabbing more. A bug called a &lt;a href="https://pc.net/glossary/definition/memoryleak" target="_blank" rel="noopener"&gt;“memory leak”&lt;/a&gt; can cause this, but in other cases it’s just the way the app works. The challenge is that the app, which now needs to manage all that memory, can get itself in a knot and hang.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/en-au/products/performance-manager" target="_blank"&gt;Performance Manager&lt;/a&gt; provides granular control over the Scheduler by actively managing the base priority of all threads and processes. Our patented &lt;a href="https://help.ivanti.com/ap/help/en_US/pm/EOL/default.htm" target="_blank" rel="noopener"&gt;Thread Throttling&lt;/a&gt; technology actively monitors CPU usage to make sure the CPU never hangs at 100%. If a rogue process does take the CPU to 100%, we can peg it back just a little, so Windows keeps running and all the processes get their fair share of resources. And for the physical memory issue, we can request a &lt;a href="https://learn.microsoft.com/en-us/windows/win32/psapi/working-set-information" target="_blank" rel="noopener"&gt;working set&lt;/a&gt; trim for applications, based on a range of triggers (Foreground, Background, Idle, Locked Desktop, etc.). This reduces physical memory usage and puts more free memory back in the pool for other applications.&lt;/p&gt;</description><pubDate>Tue, 05 Jun 2018 20:53:54 Z</pubDate></item></channel></rss>