{"id":9657,"date":"2021-05-25T17:52:00","date_gmt":"2021-05-25T14:52:00","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=9657"},"modified":"2021-05-25T17:52:43","modified_gmt":"2021-05-25T14:52:43","slug":"patching-strategy","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/patching-strategy\/9657\/","title":{"rendered":"Kurumsal altyap\u0131da uygulanan yama stratejileri"},"content":{"rendered":"<p>Microsoft, yay\u0131nlad\u0131\u011f\u0131 yamalarda ortaya \u00e7\u0131kan hatalar\u0131 d\u00fczeltmek i\u00e7in s\u00fcrekli yeni yamalar yay\u0131nlamak zorunda kald\u0131 ve bu durum, g\u00fcncellemelere olan g\u00fcvensizli\u011fin (ki zaten \u00e7ok da y\u00fcksek olmayan) azalt\u0131lmas\u0131 konusunda pek de yard\u0131mc\u0131 olmad\u0131. Son yapt\u0131\u011f\u0131m\u0131z <a href=\"https:\/\/www.kaspersky.com\/blog\/device-updates-report\/\" target=\"_blank\" rel=\"noopener nofollow\">\u201cCihaz g\u00fcncellemeleri: \u0130nsanlar\u0131n de\u011fi\u015fiklik yapmas\u0131n\u0131 engelleyen nedir?\u201d<\/a> anketimizin sonucunda ula\u015ft\u0131\u011f\u0131m\u0131z bulgulardan birine g\u00f6re, ankete kat\u0131lan i\u015fletmelerin ve t\u00fcketicilerin %51\u2019i, ba\u015fkalar\u0131n\u0131n sorun ya\u015fay\u0131p ya\u015famad\u0131\u011f\u0131n\u0131 g\u00f6rmek i\u00e7in g\u00fcncellemeleri yapmay\u0131 erteliyordu.<\/p>\n<p>Bir yandan bu anla\u015f\u0131labilir bir durum \u00e7\u00fcnk\u00fc hi\u00e7 kimse kurumsal a\u011flar\u0131n\u0131n bir g\u00fcncelleme ile test edilmesini istemez ve bunun sonucunda ya\u015fanacak bir i\u015f kesintisi \u00f6nemli hasara neden olabilir. \u00d6te yandan, siber su\u00e7lular g\u00fcncelleme isteksizli\u011fine ili\u015fkin her \u015feyi bildikleri i\u00e7in sald\u0131r\u0131lar\u0131n, bir yaman\u0131n yay\u0131nlanmas\u0131n\u0131n hemen ard\u0131ndan ger\u00e7ekle\u015febilece\u011fini de unutmay\u0131n. Daha g\u00fcvenli olan yol ise ikisinin ortas\u0131ndad\u0131r: Yamalar\u0131 zaman\u0131nda y\u00fcklemeniz ancak ayn\u0131 zamanda y\u00fcklemeden \u00f6nce altyap\u0131n\u0131z ile uyumlu olup olmad\u0131\u011f\u0131n\u0131 da kontrol etmeniz gerekir.<\/p>\n<p>Windows g\u00fcncellemeleri sorunun yaln\u0131zca bir par\u00e7as\u0131d\u0131r; di\u011fer yaz\u0131l\u0131mlar\u0131n da yamalara ve di\u011fer g\u00fcncellemelere ihtiyac\u0131 vard\u0131r. Ancak di\u011fer yaz\u0131l\u0131m geli\u015ftiricileri, Microsoft\u2019un gibi d\u00fczenli ve aktif bir \u015fekilde g\u00fcncelleme ve d\u00fczeltmeler konusunda kullan\u0131c\u0131lar\u0131 bilgilendirmeyebilir. Y\u00f6neticiler g\u00fcncellemeler konusunda nas\u0131l bilgi sahibi olabilir ve bunlar\u0131 nas\u0131l \u00f6nceliklendirebilir?<\/p>\n<div id=\"attachment_40050\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.brighttalk.com\/webcast\/15591\/486153?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=gl_patching-2021_sl0099&amp;utm_content=link&amp;utm_term=gl_kdaily_organic_6a9aapuoox99phx\" target=\"_blank\" rel=\"noopener nofollow\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-40050\" class=\"wp-image-40050 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/05\/25050912\/device-updates-jacoby.png\" alt=\"Device updates webinar\" width=\"640\" height=\"360\"><\/a><p id=\"caption-attachment-40050\" class=\"wp-caption-text\">Device updates webinar<\/p><\/div>\n<h2>Yaz\u0131l\u0131m\u0131n bir test ortam\u0131nda g\u00fcncellenmesi<\/h2>\n<p>Maalesef g\u00fcncelleme s\u00fcrecini tamamen otomatikle\u015ftirmek kurumsal bir ortamda m\u00fcmk\u00fcn de\u011fildir. Her \u015firketin donan\u0131m ve yaz\u0131l\u0131m kombinasyonu kendine has oldu\u011fundan, yeni bir g\u00fcncellemenin sorunlara veya uyumsuzlu\u011fa neden olma tehlikesi her zaman mevcuttur. Her yama hakk\u0131nda yaln\u0131zca \u015firketi yak\u0131ndan tan\u0131yan bir sistem y\u00f6neticisi bilin\u00e7li bir karar verebilir. Bir test ortam\u0131n\u0131n kullan\u0131lmas\u0131, g\u00fcncellemelerin, \u015firketin di\u011fer sistemlerini riske atmadan y\u00fcklenebilece\u011fi g\u00fcvenli bir alan sa\u011flayabilir.<\/p>\n<h3>Test ortam\u0131<\/h3>\n<p>B\u00fcy\u00fck \u015firketlerde, \u00f6zellikle belli bir ama\u00e7 i\u00e7in \u00fcretilen yaz\u0131l\u0131mlar kullananlarda, bilgi g\u00fcvenli\u011fi departman\u0131 genellikle yeni g\u00fcncellemeleri \u015firket genelinde kullan\u0131ma sunmadan \u00f6nce test edebildikleri, ba\u011fl\u0131 bilgisayarlar\u0131n yer ald\u0131\u011f\u0131 (veya en az\u0131ndan birka\u00e7 sanal makinenin bulundu\u011fu) bir test alt a\u011f\u0131na sahiptir. Daha k\u00fc\u00e7\u00fck i\u015fletmeler testler i\u00e7in daha \u00e7ok tek bir bilgisayar kullan\u0131rlar. Y\u00f6neticiler, yeni yamalar\u0131 \u015firketin tipik \u00e7al\u0131\u015fma ortam\u0131n\u0131 sim\u00fcle eden test makinelerine y\u00fcklerler ve ard\u0131ndan bu makineleri takip ederler.<\/p>\n<p>Bu y\u00f6ntem ne \u00e7ok ucuz ne de tamamen g\u00fcvenilirdir. Ger\u00e7ek bir insan\u0131 ve ger\u00e7ek hayattaki \u00e7al\u0131\u015fma \u015feklini bir test makinesinde, \u00f6zellikle sanal bir makinede, canland\u0131rmak olduk\u00e7a zordur. \u00d6rne\u011fin sorunlar, kurulumdan hemen sonra de\u011fil, belirli ko\u015fullar\u0131n akabinde ortaya \u00e7\u0131kabilir.<\/p>\n<h3>Kademeli kurulum y\u00f6ntemi<\/h3>\n<p>Baz\u0131 BT departmanlar\u0131 alternatif bir y\u00f6ntem kullan\u0131r ve g\u00fcncellemelerin sorunsuz \u00e7al\u0131\u015ft\u0131\u011f\u0131ndan emin olmak i\u00e7in y\u00fcklemeleri gruplar halinde yapar.<\/p>\n<p>Elbette bu y\u00f6ntemin kullan\u0131lmas\u0131 sonucu altyap\u0131n\u0131n bir k\u0131sm\u0131n\u0131 korumas\u0131z b\u0131rakmak risk yarat\u0131r ancak yaman\u0131n bu \u015fekilde ger\u00e7ek d\u00fcnyada test edilmesinin sa\u011flad\u0131\u011f\u0131 faydalar riskle kar\u015f\u0131la\u015ft\u0131r\u0131ld\u0131\u011f\u0131nda daha a\u011f\u0131r basabilir.<\/p>\n<h2>Yama y\u00f6netimi sistemiyle g\u00fcncellemelerin \u00f6nceliklendirilmesi<\/h2>\n<p>Bir g\u00fcncelleme y\u00f6netim sistemi kullanmak, ilgili g\u00fcncellemeler konusunda y\u00f6neticileri uyar\u0131r ve ele ald\u0131klar\u0131 g\u00fcvenlik a\u00e7\u0131klar\u0131 konusunda ba\u011flamsal veri sa\u011flayarak ilgili g\u00fcncellemelerin bulunmas\u0131n\u0131 ve kurulumlar\u0131n\u0131 \u00f6nceliklendirmeyi \u00e7ok daha kolay hale getirir.<\/p>\n<p>Kaspersky Systems Management \u00e7\u00f6z\u00fcm\u00fc sistem y\u00f6netimini basitle\u015ftirerek, yaz\u0131l\u0131m ve donan\u0131m envanterini merkezile\u015ftirilmesi ve otomatikle\u015ftirilmesi, g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n de\u011ferlendirilmesi, yamalar\u0131n ve g\u00fcncellemelerin da\u011f\u0131t\u0131lmas\u0131 ile bu g\u00f6revi yerine getirir. Kaspersky Systems Management, <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Endpoint Security for Business<\/a>\u2018nun bir par\u00e7as\u0131d\u0131r.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>Yamalar herhangi bir kesintiye neden olmadan \u015firket bilgisayarlar\u0131nda nas\u0131l da\u011f\u0131t\u0131l\u0131r. <\/p>\n","protected":false},"author":2581,"featured_media":9658,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[1886,2419,506],"class_list":{"0":"post-9657","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-guncellemeler","10":"tag-sistem","11":"tag-yama"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/patching-strategy\/9657\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/patching-strategy\/22886\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/patching-strategy\/18371\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/patching-strategy\/9115\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/patching-strategy\/24805\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/patching-strategy\/22797\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/patching-strategy\/21938\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/patching-strategy\/25330\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/patching-strategy\/24713\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/patching-strategy\/30786\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/patching-strategy\/40011\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/patching-strategy\/16963\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/patching-strategy\/17515\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/patching-strategy\/14841\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/patching-strategy\/26802\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/patching-strategy\/30830\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/patching-strategy\/27070\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/patching-strategy\/23938\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/patching-strategy\/29263\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/patching-strategy\/29060\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/guncellemeler\/","name":"g\u00fcncellemeler"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9657","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=9657"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9657\/revisions"}],"predecessor-version":[{"id":9661,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9657\/revisions\/9661"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/9658"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=9657"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=9657"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=9657"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}