Lovely. Thanks. On Nov 12, 2014 3:18 PM, "Matthew Topper" <[email protected]> wrote:
> Yes. > > > > > > Matthew Topper > > CAPSTONE Information Technologies Incorporated > > 252 Plymouth Ave. S. | Rochester, NY 14608 > > Office: 585-546-4120 x107 | Mobile: 585-704-2299 > > > > *From:* [email protected] [mailto: > [email protected]] *On Behalf Of *Richard Stovall > *Sent:* Wednesday, November 12, 2014 3:16 PM > *To:* [email protected] > *Subject:* Re: [NTSysADM] MS14-066 - secure channel vulnerability > > > > Was a reboot required when you did it? > > > > On Wed, Nov 12, 2014 at 3:11 PM, Matthew Topper <[email protected]> > wrote: > > I’ve applied the patch to servers that are Internet facing outside of > normal maintenance and am letting servers that are not Internet facing > apply it during their regularly scheduled maintenance windows. > > > > > > Matthew Topper > > > > *From:* [email protected] [mailto: > [email protected]] *On Behalf Of *geoff taylor > *Sent:* Wednesday, November 12, 2014 3:06 PM > *To:* [email protected] > *Subject:* [NTSysADM] MS14-066 - secure channel vulnerability > > > > Looking for opinions on how urgent this is, and your plan of attack. > No shortage of people crying Wolf. As usual SANs is balanced and sane > recognizing the possible severe implications and yet acknowledging that a > well thought out patching approach (expedited perhaps) is the best defense. > > > > *http://preview.tinyurl.com/phz3my4 <http://preview.tinyurl.com/phz3my4> * > gt > > >

