Yes.

Matthew Topper
CAPSTONE Information Technologies Incorporated
252 Plymouth Ave. S. | Rochester, NY 14608
Office:  585-546-4120 x107 | Mobile:  585-704-2299

From: [email protected] [mailto:[email protected]] On 
Behalf Of Richard Stovall
Sent: Wednesday, November 12, 2014 3:16 PM
To: [email protected]
Subject: Re: [NTSysADM] MS14-066 - secure channel vulnerability

Was a reboot required when you did it?

On Wed, Nov 12, 2014 at 3:11 PM, Matthew Topper 
<[email protected]<mailto:[email protected]>> wrote:
I’ve applied the patch to servers that are Internet facing outside of normal 
maintenance and am letting servers that are not Internet facing apply it during 
their regularly scheduled maintenance windows.


Matthew Topper

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]<mailto:[email protected]>] 
On Behalf Of geoff taylor
Sent: Wednesday, November 12, 2014 3:06 PM
To: [email protected]<mailto:[email protected]>
Subject: [NTSysADM] MS14-066 - secure channel vulnerability

Looking for opinions on how urgent this is, and your plan of attack.
No shortage of people crying Wolf.  As usual SANs is balanced and sane 
recognizing the possible severe implications and yet acknowledging that a well 
thought out patching approach (expedited perhaps) is the best defense.

http://preview.tinyurl.com/phz3my4

gt

Reply via email to