Lovely.

Thanks.
On Nov 12, 2014 3:18 PM, "Matthew Topper" <[email protected]> wrote:

>  Yes.
>
>
>
>
>
> Matthew Topper
>
> CAPSTONE Information Technologies Incorporated
>
> 252 Plymouth Ave. S. | Rochester, NY 14608
>
> Office:  585-546-4120 x107 | Mobile:  585-704-2299
>
>
>
> *From:* [email protected] [mailto:
> [email protected]] *On Behalf Of *Richard Stovall
> *Sent:* Wednesday, November 12, 2014 3:16 PM
> *To:* [email protected]
> *Subject:* Re: [NTSysADM] MS14-066 - secure channel vulnerability
>
>
>
> Was a reboot required when you did it?
>
>
>
> On Wed, Nov 12, 2014 at 3:11 PM, Matthew Topper <[email protected]>
> wrote:
>
>  I’ve applied the patch to servers that are Internet facing outside of
> normal maintenance and am letting servers that are not Internet facing
> apply it during their regularly scheduled maintenance windows.
>
>
>
>
>
> Matthew Topper
>
>
>
> *From:* [email protected] [mailto:
> [email protected]] *On Behalf Of *geoff taylor
> *Sent:* Wednesday, November 12, 2014 3:06 PM
> *To:* [email protected]
> *Subject:* [NTSysADM] MS14-066 - secure channel vulnerability
>
>
>
> Looking for opinions on how urgent this is, and your plan of attack.
> No shortage of people crying Wolf.  As usual SANs is balanced and sane
> recognizing the possible severe implications and yet acknowledging that a
> well thought out patching approach (expedited perhaps) is the best defense.
>
>
>
> *http://preview.tinyurl.com/phz3my4 <http://preview.tinyurl.com/phz3my4> *
> gt
>
>
>

Reply via email to