Yes.
Matthew Topper CAPSTONE Information Technologies Incorporated 252 Plymouth Ave. S. | Rochester, NY 14608 Office: 585-546-4120 x107 | Mobile: 585-704-2299 From: [email protected] [mailto:[email protected]] On Behalf Of Richard Stovall Sent: Wednesday, November 12, 2014 3:16 PM To: [email protected] Subject: Re: [NTSysADM] MS14-066 - secure channel vulnerability Was a reboot required when you did it? On Wed, Nov 12, 2014 at 3:11 PM, Matthew Topper <[email protected]<mailto:[email protected]>> wrote: I’ve applied the patch to servers that are Internet facing outside of normal maintenance and am letting servers that are not Internet facing apply it during their regularly scheduled maintenance windows. Matthew Topper From: [email protected]<mailto:[email protected]> [mailto:[email protected]<mailto:[email protected]>] On Behalf Of geoff taylor Sent: Wednesday, November 12, 2014 3:06 PM To: [email protected]<mailto:[email protected]> Subject: [NTSysADM] MS14-066 - secure channel vulnerability Looking for opinions on how urgent this is, and your plan of attack. No shortage of people crying Wolf. As usual SANs is balanced and sane recognizing the possible severe implications and yet acknowledging that a well thought out patching approach (expedited perhaps) is the best defense. http://preview.tinyurl.com/phz3my4 gt

