You might want to ensure SUS is really working. >From my experience it is a lack lustre performer at best.
This tool is not bad for some *basic* monitoring: http://www.pdxconsulting.com/sus/ /paranoia mode off Grab your SUS log files and parse them through that web site... /paranoia mode returned to normal Cheers Zach > -----Original Message----- > From: Joshua Levitsky [mailto:[EMAIL PROTECTED] > Sent: Thursday, 16 October 2003 10:12 AM > To: Jerry Heidtke > Cc: full-disclosure > Subject: Re: [Full-Disclosure] New Microsoft security bulletins today > > Ah what's to worry about. Exploits against Exchange / OWA / Messenger > Service / Authenticode / Active X can't harm anyone. :) Bring em on. > > Luckily I deployed my SUS boxes at work and all I had to do to deploy > the patches was check a few little boxes on my SUS servers. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
