Same here.  Oh wait, I'm the desktop, server and infosec team.

Nevermind.

On Thu, Apr 1, 2010 at 11:06 AM, Steven M. Caesare <[email protected]> wrote:
> Our desktop, server, and infosec teams here all get them.
>
>
>
> -sc
>
>
>
> From: David Lum [mailto:[email protected]]
> Sent: Thursday, April 01, 2010 11:03 AM
>
> To: NT System Admin Issues
> Subject: FW: Microsoft Security Bulletin Advance Notification for March 2010
>
>
>
> How do you guys handle these kinds of notices? As in, do you guys have a
> department that gets these, or one person, or ??? Currently I'm the only one
> who gets them and I need to figure out the best way to handle it.
>
>
>
> Dave
>
>
>
> -----Original Message-----
> From: Microsoft [mailto:[email protected]]
> Sent: Monday, March 29, 2010 12:54 PM
> To: David Lum
> Subject: Microsoft Security Bulletin Advance Notification for March 2010
>
>
>
> -----BEGIN PGP SIGNED MESSAGE-----
>
> Hash: SHA256
>
>
>
> ********************************************************************
>
> Microsoft Security Bulletin Advance Notification for March 2010
>
> Issued: March 29, 2010
>
> ********************************************************************
>
>
>
> This is an advance notification of one out-of-band security bulletin
>
> that Microsoft is intending to release on March 30, 2010.
>
>
>
> The full version of the Microsoft Security Bulletin Advance
>
> Notification for March 2010 can be found at
>
> http://www.microsoft.com/technet/security/bulletin/ms10-mar.mspx.
>
>
>
> This bulletin advance notification will be replaced with the revised
>
> March bulletin summary on March 30, 2010. The revised
>
> bulletin summary will include the out-of-band security bulletin, as
>
> well as the security bulletins already released on March 9, 2010.
>
>
>
> For more information about the bulletin advance notification
>
> service, see
>
> http://www.microsoft.com/technet/security/Bulletin/advance.mspx.
>
>
>
> To receive automatic notifications whenever Microsoft Security
>
> Bulletins are issued, subscribe to Microsoft Technical Security
>
> Notifications on
>
> http://www.microsoft.com/technet/security/bulletin/notify.mspx.
>
>
>
> Microsoft will host a webcast to address customer questions on
>
> the out-of-band bulletin on March 30, 2010,
>
> at 1:00 PM Pacific Time (US & Canada). Register for the
>
> Security Bulletin Webcast at
>
> http://www.microsoft.com/technet/security/bulletin/summary.mspx.
>
>
>
> Microsoft also provides information to help customers prioritize
>
> monthly security updates with any non-security, high-priority
>
> updates that are being released on the same day as the monthly
>
> security updates. Please see the section, Other Information.
>
>
>
> This advance notification provides a descriptive name as the
>
> bulletin identifier, because the official Microsoft Security
>
> Bulletin numbers are not issued until release. The bulletin summary
>
> that replaces this advance notification will have the proper
>
> Microsoft Security Bulletin numbers (in the MSyy-xxx format) as the
>
> bulletin identifier. The security bulletins for this month are as
>
> follows, in order of severity:
>
>
>
>
>
> Critical Security Bulletins
>
> ===========================
>
>
>
> Internet Explorer Bulletin
>
>
>
>   - Affected Software:
>
>     - Internet Explorer 5.01 Service Pack 4 when installed on
>
>       Microsoft Windows 2000 Service Pack 4
>
>     - Internet Explorer 6 Service Pack 1 when installed on
>
>       Microsoft Windows 2000 Service Pack 4
>
>     - Internet Explorer 6 for
>
>       Windows XP Service Pack 2 and
>
>       Windows XP Service Pack 3
>
>     - Internet Explorer 6 for
>
>       Windows XP Professional x64 Edition Service Pack 2
>
>     - Internet Explorer 6 for
>
>       Windows Server 2003 Service Pack 2
>
>     - Internet Explorer 6 for
>
>       Windows Server 2003 x64 Edition Service Pack 2
>
>     - Internet Explorer 6 for
>
>       Windows Server 2003 with SP2 for Itanium-based Systems
>
>     - Internet Explorer 7 for
>
>       Windows XP Service Pack 2 and
>
>       Windows XP Service Pack 3
>
>     - Internet Explorer 7 for
>
>       Windows XP Professional x64 Edition Service Pack 2
>
>     - Internet Explorer 7 for
>
>       Windows Server 2003 Service Pack 2
>
>     - Internet Explorer 7 for
>
>       Windows Server 2003 x64 Edition Service Pack 2
>
>     - Internet Explorer 7 for
>
>       Windows Server 2003 with SP2 for Itanium-based Systems
>
>     - Internet Explorer 7 in
>
>       Windows Vista,
>
>       Windows Vista Service Pack 1, and
>
>       Windows Vista Service Pack 2
>
>     - Internet Explorer 7 in
>
>       Windows Vista x64 Edition,
>
>       Windows Vista x64 Edition Service Pack 1, and
>
>       Windows Vista x64 Edition Service Pack 2
>
>     - Internet Explorer 7 in
>
>       Windows Server 2008 for 32-bit Systems and
>
>       Windows Server 2008 for 32-bit Systems Service Pack 2
>
>       (Windows Server 2008 Server Core installation not affected)
>
>     - Internet Explorer 7 in
>
>       Windows Server 2008 for x64-based Systems and
>
>       Windows Server 2008 for x64-based Systems Service Pack 2
>
>       (Windows Server 2008 Server Core installation not affected)
>
>     - Internet Explorer 7 in
>
>       Windows Server 2008 for Itanium-based Systems and
>
>       Windows Server 2008 for Itanium-based Systems Service Pack 2
>
>     - Internet Explorer 8 for
>
>       Windows XP Service Pack 2 and
>
>       Windows XP Service Pack 3
>
>     - Internet Explorer 8 for
>
>       Windows XP Professional x64 Edition Service Pack 2
>
>     - Internet Explorer 8 for
>
>       Windows Server 2003 Service Pack 2
>
>     - Internet Explorer 8 for
>
>       Windows Server 2003 x64 Edition Service Pack 2
>
>     - Internet Explorer 8 in
>
>       Windows Vista,
>
>       Windows Vista Service Pack 1, and
>
>       Windows Vista Service Pack 2
>
>     - Internet Explorer 8 in
>
>       Windows Vista x64 Edition,
>
>       Windows Vista x64 Edition Service Pack 1, and
>
>       Windows Vista x64 Edition Service Pack 2
>
>     - Internet Explorer 8 in
>
>       Windows Server 2008 for 32-bit Systems and
>
>       Windows Server 2008 for 32-bit Systems Service Pack 2
>
>       (Windows Server 2008 Server Core installation not affected)
>
>     - Internet Explorer 8 in
>
>       Windows Server 2008 for x64-based Systems and
>
>       Windows Server 2008 for x64-based Systems Service Pack 2
>
>       (Windows Server 2008 Server Core installation not affected)
>
>     - Internet Explorer 8 in
>
>       Windows 7 for 32-bit Systems
>
>     - Internet Explorer 8 in
>
>       Windows 7 for x64-based Systems
>
>     - Internet Explorer 8 in
>
>       Windows Server 2008 R2 for x64-based Systems
>
>       (Windows Server 2008 Server Core installation not affected)
>
>     - Internet Explorer 8 in
>
>       Windows Server 2008 R2 for Itanium-based Systems
>
>
>
>     - Impact: Remote Code Execution
>
>     - Version Number: 1.0
>
>
>
>
>
> Other Information
>
> =================
>
>
>
> Non-Security, High-Priority Updates on MU, WU, and WSUS:
>
> ========================================================
>
> For information about non-security releases on Windows Update and Microsoft
>
> update, please see:
>
> * http://support.microsoft.com/kb/894199: Microsoft Knowledge Base
>
>   Article 894199, Description of Software Update Services and
>
>   Windows Server Update Services changes in content.
>
>   Includes all Windows content.
>
> * http://technet.microsoft.com/en-us/wsus/bb456965.aspx: Updates
>
>   from Past Months for Windows Server Update Services. Displays all
>
>   new, revised, and rereleased updates for Microsoft products other
>
>   than Microsoft Windows.
>
>
>
> Microsoft Active Protections Program (MAPP)
>
> ===========================================
>
> To improve security protections for customers, Microsoft provides
>
> vulnerability information to major security software providers in
>
> advance of each monthly security update release. Security software
>
> providers can then use this vulnerability information to provide
>
> updated protections to customers via their security software or
>
> devices, such as antivirus, network-based intrusion detection
>
> systems, or host-based intrusion prevention systems. To determine
>
> whether active protections are available from security software
>
> providers, please visit the active protections Web sites provided by
>
> program partners, listed at
>
> http://www.microsoft.com/security/msrc/mapp/partners.mspx.
>
>
>
> Recognize and avoid fraudulent e-mail to Microsoft customers:
>
> =============================================================
>
> If you receive an e-mail message that claims to be distributing
>
> a Microsoft security update, it is a hoax that may contain
>
> malware or pointers to malicious Web sites. Microsoft does
>
> not distribute security updates via e-mail.
>
>
>
> The Microsoft Security Response Center (MSRC) uses PGP to digitally
>
> sign all security notifications. However, PGP is not required for
>
> reading security notifications, reading security bulletins, or
>
> installing security updates. You can obtain the MSRC public PGP key
>
> at
>
> https://www.microsoft.com/technet/security/bulletin/pgp.mspx.
>
>
>
> To receive automatic notifications whenever
>
> Microsoft Security Bulletins are issued, subscribe to Microsoft
>
> Technical Security Notifications on
>
> http://www.microsoft.com/technet/security/bulletin/notify.mspx.
>
>
>
> ********************************************************************
>
> THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
>
> PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
>
> DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
>
> THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
>
> PURPOSE.
>
> IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
>
> LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
>
> INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
>
> DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
>
> ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
>
> SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
>
> FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
>
> LIMITATION MAY NOT APPLY.
>
> ********************************************************************
>
>
>
> -----BEGIN PGP SIGNATURE-----
>
> Version: PGP Desktop 9.9.0 (Build 397)
>
> Charset: utf-8
>
>
>
> wsFVAwUBS7DxDPSWSWlRYp1gAQiD0hAA3dLMgb/km6wm73wb1vNJ6Spvtw9H8zk7
>
> zR1ra2W5dp6rq0Ciws5gXZdP6gHNFp2YqiOugFe/7JtGkR636f+uAI8p0ha8UksU
>
> D+AsyrT1aJAegpTHyqoQbK/tk0Wnu0nUbp8g028spR9pXVclsk70jAvgKews0WI+
>
> UE9/SvOljh/X5ofhvQZOeGWpWkr3993BpXYp7HgsHm8q8zgXdb04QveyXoQlCPqd
>
> 56xLm08pZsP58j04V6FtWVGOtwLYVEv1d4DfolYC6TdIQC5LsEGq8YEosGW7Wqrs
>
> SF39OQoTGGlFiKeYcVHXFzeZqHRIcSWDx2utmGajsgxBNgX6xE6bvNF6P5JC/U6H
>
> Sjm+2q04H/wqTDH9X+wNBAMGqymQxALuBYalvEZ4tVpwf1DzozfWO/2Yr/KH16B6
>
> RKT5x8BzXypPV0GCZhb92Y5rV48+Ig2xz4m8iCCroJ7bKBB/w/hMTZkWhlC0zPSa
>
> ztDnYLGtdLncBV49USLCLuhGG2+lUBLlFR95mH3F7CPLvJD7Kmd5e+DSizgjVpFh
>
> GJX3X91O2vbd5dJrF8a77jGZUu0nmsJpunsjoGD5tYW5YqJVL451Qk2BOxVpof/i
>
> rCf0wsyxdzZVCOoZ5lyqgXZYC1gymNB9WFHWSsWr241u5jz/29FWU/F2CJGlmDnp
>
> N78HQ6kNQYg=
>
> =sXSC
>
> -----END PGP SIGNATURE-----
>
>
>
>
>
> To cancel your subscription to this newsletter, reply to this message with
> the word UNSUBSCRIBE in the Subject line. You can also unsubscribe at the
> Microsoft.com web site <http://www.microsoft.com/misc/unsubscribe.htm>. You
> can manage all your Microsoft.com communication preferences at this site.
>
>
>
> Legal Information <http://www.microsoft.com/info/legalinfo/default.mspx>.
>
>
>
> This newsletter was sent by the Microsoft Corporation
>
> 1 Microsoft Way
>
> Redmond, Washington, USA
>
> 98052
>
>
>
>
>
>
>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to