I'm pushing it out via Group Policy Preferences. 2008 rocks 2009/7/7 Kurt Buff <[email protected]>
> I'm just pushing out the .reg file in the login script: > > regedit /s \\fileserver\public\patches\videokillbits.reg > > The file was easy to create, in a capable editor (not notepad or > wordpad) that allows metacharacter search and replace, such as '\n' > for CRLF and '\t' for tab. I used the ancient, no-longer-supported > PFE32. I really should switch to VIM, I suppose. > > On Tue, Jul 7, 2009 at 08:40, Eric > Wittersheim<[email protected]> wrote: > > I'm pushing out the .reg via GP. So far so good. > > > > On Tue, Jul 7, 2009 at 10:38 AM, David Lum <[email protected]> wrote: > >> > >> The “Microsoft fix-it” is an MSI that I am pushing via SMS and is > pushing > >> fine (so far just a few test cases have it, but no issues). Beats trying > to > >> push out a .REG or something… > >> > >> > >> > >> David Lum // SYSTEMS ENGINEER > >> NORTHWEST EVALUATION ASSOCIATION > >> (Desk) 971.222.1025 // (Cell) 503.267.9764 > >> > >> > >> > >> > >> > >> > >> > >> From: J Kyo [mailto:[email protected]] > >> Sent: Tuesday, July 07, 2009 8:18 AM > >> To: NT System Admin Issues > >> Subject: Re: New IE zero day exploit in the wild > >> > >> > >> > >> Curious if anyone has used the "Microsoft Fix It" from: > >> http://support.microsoft.com/kb/972890. > >> > >> On Mon, Jul 6, 2009 at 6:24 PM, Carl Houseman <[email protected]> > >> wrote: > >> > >> Recommendation from MS is to set the killbits everywhere. > >> > >> > >> > >> http://www.microsoft.com/technet/security/advisory/972890.mspx > >> > >> > >> > >> Carl > >> > >> > >> > >> From: Ken Schaefer [mailto:[email protected]] > >> Sent: Monday, July 06, 2009 9:06 PM > >> > >> To: NT System Admin Issues > >> > >> Subject: RE: New IE zero day exploit in the wild > >> > >> > >> > >> Seems to be XP / Windows Server 2003 only? > >> > >> Cheers > >> > >> Ken > >> > >> > >> > >> ________________________________ > >> > >> From: Alex Eckelberry [[email protected]] > >> Sent: Tuesday, 7 July 2009 5:56 AM > >> To: NT System Admin Issues > >> Subject: New IE zero day exploit in the wild > >> > >> Our labs have confirmed this and it is quite nasty. Best bet for now is > >> to set the killbits. Or don't use IE. > >> > >> > >> > >> Some references: > >> > >> > >> > >> Microsoft: > >> > >> > >> > >> http://www.microsoft.com/technet/security/advisory/972890.mspx > >> > >> > >> > >> SANS: > >> > >> > >> > >> http://isc.sans.org/diary.html?storyid=6733 > >> > >> > >> > >> I would take this one quite seriously. > >> > >> > >> > >> Alex > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > > > > > > > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > -- "On two occasions...I have been asked, 'Pray, Mr Babbage, if you put into the machine wrong figures, will the right answers come out?' I am not able rightly to apprehend the kind of confusion of ideas that could provoke such a question." http://raythestray.blogspot.com ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
