Search

Updates

Microservices with ITG and Red Hat
Modernizing Enterprise Application 
Manila, Philippines – July 2017
The IT Group, Inc. (ITG), in partnership with Red Hat, Inc., recently concluded a learning session entitled “Microservices: Modernizing Enterprise Application.” Held at the Holiday Inn in Makati City, the event was well attended by various IT Project Managers, Senior Developers, Technology Officers, R&D Officers and Solution Architects.  The seminar emphasized on the need for organizations to deliver their applications in the most efficient manner by leveraging on current technology to meet customer demands.
The first speaker, Mr. Ryan Ching, Product Manager for Red Hat at ITG, discussed the path from legacy to Microservices.  He discussed the importance of digital transformation in organizations today and its role to meet customer requirements to stay ahead of competitors. The first session was followed by a short talk from Mr. Reginald Mendoza, Senior Manager under the Systems and Development and Support Division of Philippine National Bank. He discussed the readiness of Enterprise Open Source Solutions for enterprise use as he cited their journey on using these solutions in one of their major electronic banking channels. Finally, Mr. Bobby Corpus, Solution Architect at Red Hat Inc., discussed the platform used in delivering digital transformation through the microservices platform.  He showcased one of Red Hat Inc.’s product solutions, the Red Hat OpenShift Platform through use cases and demos which sparked the interest of the attendees.
Participants also asked several questions in the Q&A sessions wherein both the speakers and the participants were able to share their insights on the aforementioned topic.  The event was concluded by a challenge from Mr. Nelson Talag, Product Manager for JBoss at ITG:  “How are we modernizing our Enterprise Applications to stay relevant and deliver excellent service to our customers?” Overall, ITG envisioned the session to not just be a learning platform, but to also be a venue for exchanging valuable insights between ITG, principals, and partners, as we take on the journey of digital transformation.
Copyright © 2017 IT Group Inc.All rights reserved.

Our mailing address is:
This email address is being protected from spambots. You need JavaScript enabled to view it. 

Visit our Website:
www.itgroupinc.asia 

ManageEngine
ManageEngine
IT Management Seminar, Philippines

ManageEngine Desktop Central helps you to protect your computers from WannaCrypt ransomware. After detecting the computers that are vulnerable, Desktop Central lets you identify the computers that are missing critical patches and then deploy those patches immediately. You can also use Desktop Central's firewall configuration to block the vulnerable ports so that you can prevent WannaCrypt from spreading across your network. WannaCrypt ransomware targets computers that are out of date, so you will have to verify that all the critical security patches are deployed on all the computers. Desktop Central has already released the security patches below. You can now be assured that your network is secure from WannaCrypt ransomeware attack.

Which computers are targeted?

WannaCrypt ransomware is a worm that targets computers running Windows operating systems that are not up-to-date. Refer this article for more details on the ransomware and its effects. Desktop Central has already released the following security patches.

For computers running Windows XP, Windows Vista, Windows Server 2003, Windows
Server 2008 and Windows 8

    
Patch ID 22058 Security Update for Windows Vista for x64-based Systems (KB4012598)
Patch ID 22059 Security Update for Windows Vista (KB4012598)
Patch ID 22060 Security Update for Windows Server 2008 (KB4012598)
Patch ID 22061 Security Update for Windows Server 2008 for x64-based Systems (KB4012598)
Patch ID 22513 Security Update for Windows XP SP3 (KB4012598)
Patch ID 22516 Security Update for Windows XP SP2 for x64-based Systems (KB4012598)
Patch ID 22514 Security Update for Windows Server 2003 (KB4012598)
Patch ID 22517 Security Update for Windows Server 2003 for x64-based Systems (KB4012598)
Patch ID 22515 Security Update for Windows 8 (KB4012598)
Patch ID 22518 Security Update for Windows 8 for x64-based Systems (KB4012598)
Patch ID 22062 March, 2017 Security Only Quality Update for Windows 7 (KB4012212)
Patch ID 22063 March, 2017 Security Only Quality Update for Windows 7 for x64-based Systems (KB4012212)
Patch ID 22064 March, 2017 Security Only Quality Update for Windows Server 2008 R2 for x64-based Systems (KB4012212)
Patch ID 22044 March, 2017 Security Monthly Quality Rollup for Windows 7 (KB4012215)
Patch ID 22045 March, 2017 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4012215)
Patch ID 22046 March, 2017 Security Monthly Quality Rollup for Windows Server 2008 R2 for x64-based Systems (KB4012215)
Patch ID 22070 March, 2017 Security Only Quality Update for Windows Server 2012 (KB4012214)
Patch ID 22070 March, 2017 Security Only Quality Update for Windows Server 2012 (KB4012214)
Patch ID 22150 March, 2017 Security Monthly Quality Rollup for Windows Server 2012 (KB4012217)
Patch ID 22065 March, 2017 Security Only Quality Update for Windows 8.1 (KB4012213)
Patch ID 22066 March, 2017 Security Only Quality Update for Windows 8.1 for x64-based Systems (KB4012213)
Patch ID 22067 March, 2017 Security Only Quality Update for Windows Server 2012 R2 (KB4012213)
Patch ID 22047 March, 2017 Security Monthly Quality Rollup for Windows 8.1 (KB4012216)
Patch ID 22148 March, 2017 Security Monthly Quality Rollup for Windows 8.1 for x64-based Systems (KB4012216)
Patch ID 22149 March, 2017 Security Monthly Quality Rollup for Windows Server 2012 R2 (KB4012216)

For computers running Windows 10:

Patch ID 22509  Security Update for Windows Vista for x64-based Systems (KB4012598) KB401342>KB4015438>KB4016635>KB4015217>KB4019472
Patch ID 22507 2017-05 Cumulative Update for Windows 10 Version 1607 for x86-based Systems (KB4019472) KB4013429>KB4015438>KB4016635>KB4015217>KB4019472
Patch ID 22508 2017-05 Cumulative Update for Windows 10 Version 1607 for x64-based Systems (KB4019472) KB4013429>KB4015438>KB4016635>KB4015217>KB4019472
Patch ID 22345 Cumulative Update for Windows 10 Version 1511 (KB4019473) KB4013198>KB4016636>KB4015219>KB4019473
Patch ID 22346 Cumulative Update for Windows 10 Version 1511 for x64-based Systems (KB4019473) KB4013198 > KB4016636 > KB4015219 > KB4019473
Patch
ID 22340
Cumulative Update for Windows 10 (KB4015221) KB4012606>KB4016637>KB4015221
Patch ID 22341 Cumulative Update for Windows 10 for x64-based Systems (KB4015221) KB4012606>KB4016637>KB4015221

Download Now

 

How do you secure the network from WannaCrypt using Desktop Central?

You can secure your network from WannaCrypt by following the steps:

  1. 1. Deploy the critical patches to the respective computers
  2. 2. Disable SMBv1 protocol

Deploying the critical patches to respective computers 

  1. 1. Ensure that you Patch Vulnerability database is up to date. To update, click Patch Mgmt >> Update Now in the bottom left
  2. 2. After syncing the database, scan the managed computers. To scan click Patch Mgmt >> Scan Systems >> Scan All.
  3. 3. You can detect if these patches are missing by following these steps: Click Patch Mgmt >> Choose All Patches >> Choose Applicable Patches(Detailed View) >> Search 'WannaCrypt' in the Patch Description box >> You can identify the computers that are missing the critical patches or already have the patches installed on them.

Disable SMBv1 protocol

  • For computers running Windows Vista and later versions
  • For computers running Windows XP

For computers running Windows Vista and later versions

Disable SMBv1 protocol in machines with Windows vista and above using Desktop Central by following the steps:

1. Sync your Script Templates. To sync click Configurations >> Script Repository >> Templates >> Sync button

     2.     Add the script, "WannaCry_DisableSMBV1.bat", to the repository. From the repository, deploy this script as a computer configuration to the desired target machines.

3. Ensure that you exclude Windows XP OS in the target. 

For computers running Windows XP

Disable SMB vulnerable port using firewall configurations. You can create a firewall configuration and block the following vulnerable ports

  • TCP 139
  • TCP 445
  • UDP 137
  • UDP 138

These ports can be blocked using the firewall configuration, as explained below:

  1. 1. Open Firewall Configuration 

    2.    Under Windows XP, select ON under Action on Firewall and select Block under Action on Ports. Select the port137 which needed to be blocked. Block the other ports by clicking on Add More Ports.

    3.     Ensure that you have added all the vulnerable ports as given in the below screenshot and deploy this configuration to Windows XP machines.

You can now feel assured that your network is secure from WannaCrypt ransomer attack.
Don't have Desktop Central? Try our free edition and manage 25 computers and 25 mobile devices for free.

 

Philippines - Seminar 2017

ManageEngine
ManageEngine
IT Management Seminar, Philippines

Hi,

If you’re a Chief Technology Officer, IT Director, Head of Technology, IT Manager or alike, you should not miss the ManageEngine IT Management Best Practices
Seminar in Philippines.

ManageEngine IT Management Seminar in Philippines.

Here are 4 reasons why you must attend this free seminar:

  1. Listen to success stories of companies that used ITIL best practices to
    win business battles.
  2. Learn how to automate repetitive tasks such as user account creation, user account management and many more.
  3. Discover how integrated network, server and applications monitoring can help you make better decisions about your IT infrastructure.
  4. Learn how to combat internal and external security threats to protect confidential information.

Event Information:

Where: Makati Shangri-La,

Ayala Avenue, Makati City,
Metro Manila Philippines

When: May 04, 2017 (Thursday)
Cost: Free
Seminar Agenda: Click here
 
Register early - seating is limited.

Register now

If you have any questions, please email us at This email address is being protected from spambots. You need JavaScript enabled to view it. or
call us at +63-2-4373583 | +63-2-4395745 | +63-2-5705175 | +63-2-5712819

Regards,
Rommel Bernabe
ITSM/ManageEngine Product Manager

Email : This email address is being protected from spambots. You need JavaScript enabled to view it.
Landline : 024373583 | 024395745 | 025705175 | 025712819
Mobile No. : +639253040678 | +629177134250

IT GROUP INC. | PT IT GROUP INDONESIA
Philippines | Indonesia
Website: www.itgroupinc.asia

Facebook Twitter LinkedIn Google plus Youtube Pitstop

ManageEngine

© 2017. ManageEngine is a trademark of ZOHO Corp.
All other company and product names may be trademark of the respective companies with which they are associated.