yes

On Tue, Jul 7, 2009 at 12:49 PM, Ziots, Edward <[email protected]> wrote:

>  Are you doing it in a Startup script via the GP?
>
>
>
> Z
>
>
>
> Edward Ziots
>
> Network Engineer
>
> Lifespan Organization
>
> MCSE,MCSA,MCP+I, ME, CCA, Security +, Network +
>
> [email protected]
>
> Phone:401-639-3505
>   ------------------------------
>
> *From:* Eric Wittersheim [mailto:[email protected]]
> *Sent:* Tuesday, July 07, 2009 11:41 AM
>
> *To:* NT System Admin Issues
> *Subject:* Re: New IE zero day exploit in the wild
>
>
>
> I'm pushing out the .reg via GP.  So far so good.
>
> On Tue, Jul 7, 2009 at 10:38 AM, David Lum <[email protected]> wrote:
>
> The “Microsoft fix-it” is an MSI that I am pushing via SMS and is pushing
> fine (so far just a few test cases have it, but no issues). Beats trying to
> push out a .REG or something…
>
>
>
> *David Lum** **// *SYSTEMS ENGINEER
> NORTHWEST EVALUATION ASSOCIATION
> (Desk) 971.222.1025 *// *(Cell) 503.267.9764
>
>
>
>
>
>
>
> *From:* J Kyo [mailto:[email protected]]
> *Sent:* Tuesday, July 07, 2009 8:18 AM
>
>
> *To:* NT System Admin Issues
>
> *Subject:* Re: New IE zero day exploit in the wild
>
>
>
> Curious if anyone has used the "Microsoft Fix It" from:
> http://support.microsoft.com/kb/972890.
>
> On Mon, Jul 6, 2009 at 6:24 PM, Carl Houseman <[email protected]>
> wrote:
>
> Recommendation from MS is to set the killbits everywhere.
>
>
>
> http://www.microsoft.com/technet/security/advisory/972890.mspx
>
>
>
> Carl
>
>
>
> *From:* Ken Schaefer [mailto:[email protected]]
> *Sent:* Monday, July 06, 2009 9:06 PM
>
>
> *To:* NT System Admin Issues
>
> *Subject:* RE: New IE zero day exploit in the wild
>
>
>
> Seems to be XP / Windows Server 2003 only?
>
> Cheers
>
> Ken
>
>
>   ------------------------------
>
> *From:* Alex Eckelberry [[email protected]]
> *Sent:* Tuesday, 7 July 2009 5:56 AM
> *To:* NT System Admin Issues
> *Subject:* New IE zero day exploit in the wild
>
> Our labs have confirmed this and it is quite nasty.  Best bet for now is to
> set the killbits. Or don't use IE.
>
>
>
> Some references:
>
>
>
> Microsoft:
>
>
>
> http://www.microsoft.com/technet/security/advisory/972890.mspx
>
>
>
> SANS:
>
>
>
> http://isc.sans.org/diary.html?storyid=6733
>
>
>
> I would take this one quite seriously.
>
>
>
> Alex
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to