Same here. Oh wait, I'm the desktop, server and infosec team. Nevermind.
On Thu, Apr 1, 2010 at 11:06 AM, Steven M. Caesare <[email protected]> wrote: > Our desktop, server, and infosec teams here all get them. > > > > -sc > > > > From: David Lum [mailto:[email protected]] > Sent: Thursday, April 01, 2010 11:03 AM > > To: NT System Admin Issues > Subject: FW: Microsoft Security Bulletin Advance Notification for March 2010 > > > > How do you guys handle these kinds of notices? As in, do you guys have a > department that gets these, or one person, or ??? Currently I'm the only one > who gets them and I need to figure out the best way to handle it. > > > > Dave > > > > -----Original Message----- > From: Microsoft [mailto:[email protected]] > Sent: Monday, March 29, 2010 12:54 PM > To: David Lum > Subject: Microsoft Security Bulletin Advance Notification for March 2010 > > > > -----BEGIN PGP SIGNED MESSAGE----- > > Hash: SHA256 > > > > ******************************************************************** > > Microsoft Security Bulletin Advance Notification for March 2010 > > Issued: March 29, 2010 > > ******************************************************************** > > > > This is an advance notification of one out-of-band security bulletin > > that Microsoft is intending to release on March 30, 2010. > > > > The full version of the Microsoft Security Bulletin Advance > > Notification for March 2010 can be found at > > http://www.microsoft.com/technet/security/bulletin/ms10-mar.mspx. > > > > This bulletin advance notification will be replaced with the revised > > March bulletin summary on March 30, 2010. The revised > > bulletin summary will include the out-of-band security bulletin, as > > well as the security bulletins already released on March 9, 2010. > > > > For more information about the bulletin advance notification > > service, see > > http://www.microsoft.com/technet/security/Bulletin/advance.mspx. > > > > To receive automatic notifications whenever Microsoft Security > > Bulletins are issued, subscribe to Microsoft Technical Security > > Notifications on > > http://www.microsoft.com/technet/security/bulletin/notify.mspx. > > > > Microsoft will host a webcast to address customer questions on > > the out-of-band bulletin on March 30, 2010, > > at 1:00 PM Pacific Time (US & Canada). Register for the > > Security Bulletin Webcast at > > http://www.microsoft.com/technet/security/bulletin/summary.mspx. > > > > Microsoft also provides information to help customers prioritize > > monthly security updates with any non-security, high-priority > > updates that are being released on the same day as the monthly > > security updates. Please see the section, Other Information. > > > > This advance notification provides a descriptive name as the > > bulletin identifier, because the official Microsoft Security > > Bulletin numbers are not issued until release. The bulletin summary > > that replaces this advance notification will have the proper > > Microsoft Security Bulletin numbers (in the MSyy-xxx format) as the > > bulletin identifier. The security bulletins for this month are as > > follows, in order of severity: > > > > > > Critical Security Bulletins > > =========================== > > > > Internet Explorer Bulletin > > > > - Affected Software: > > - Internet Explorer 5.01 Service Pack 4 when installed on > > Microsoft Windows 2000 Service Pack 4 > > - Internet Explorer 6 Service Pack 1 when installed on > > Microsoft Windows 2000 Service Pack 4 > > - Internet Explorer 6 for > > Windows XP Service Pack 2 and > > Windows XP Service Pack 3 > > - Internet Explorer 6 for > > Windows XP Professional x64 Edition Service Pack 2 > > - Internet Explorer 6 for > > Windows Server 2003 Service Pack 2 > > - Internet Explorer 6 for > > Windows Server 2003 x64 Edition Service Pack 2 > > - Internet Explorer 6 for > > Windows Server 2003 with SP2 for Itanium-based Systems > > - Internet Explorer 7 for > > Windows XP Service Pack 2 and > > Windows XP Service Pack 3 > > - Internet Explorer 7 for > > Windows XP Professional x64 Edition Service Pack 2 > > - Internet Explorer 7 for > > Windows Server 2003 Service Pack 2 > > - Internet Explorer 7 for > > Windows Server 2003 x64 Edition Service Pack 2 > > - Internet Explorer 7 for > > Windows Server 2003 with SP2 for Itanium-based Systems > > - Internet Explorer 7 in > > Windows Vista, > > Windows Vista Service Pack 1, and > > Windows Vista Service Pack 2 > > - Internet Explorer 7 in > > Windows Vista x64 Edition, > > Windows Vista x64 Edition Service Pack 1, and > > Windows Vista x64 Edition Service Pack 2 > > - Internet Explorer 7 in > > Windows Server 2008 for 32-bit Systems and > > Windows Server 2008 for 32-bit Systems Service Pack 2 > > (Windows Server 2008 Server Core installation not affected) > > - Internet Explorer 7 in > > Windows Server 2008 for x64-based Systems and > > Windows Server 2008 for x64-based Systems Service Pack 2 > > (Windows Server 2008 Server Core installation not affected) > > - Internet Explorer 7 in > > Windows Server 2008 for Itanium-based Systems and > > Windows Server 2008 for Itanium-based Systems Service Pack 2 > > - Internet Explorer 8 for > > Windows XP Service Pack 2 and > > Windows XP Service Pack 3 > > - Internet Explorer 8 for > > Windows XP Professional x64 Edition Service Pack 2 > > - Internet Explorer 8 for > > Windows Server 2003 Service Pack 2 > > - Internet Explorer 8 for > > Windows Server 2003 x64 Edition Service Pack 2 > > - Internet Explorer 8 in > > Windows Vista, > > Windows Vista Service Pack 1, and > > Windows Vista Service Pack 2 > > - Internet Explorer 8 in > > Windows Vista x64 Edition, > > Windows Vista x64 Edition Service Pack 1, and > > Windows Vista x64 Edition Service Pack 2 > > - Internet Explorer 8 in > > Windows Server 2008 for 32-bit Systems and > > Windows Server 2008 for 32-bit Systems Service Pack 2 > > (Windows Server 2008 Server Core installation not affected) > > - Internet Explorer 8 in > > Windows Server 2008 for x64-based Systems and > > Windows Server 2008 for x64-based Systems Service Pack 2 > > (Windows Server 2008 Server Core installation not affected) > > - Internet Explorer 8 in > > Windows 7 for 32-bit Systems > > - Internet Explorer 8 in > > Windows 7 for x64-based Systems > > - Internet Explorer 8 in > > Windows Server 2008 R2 for x64-based Systems > > (Windows Server 2008 Server Core installation not affected) > > - Internet Explorer 8 in > > Windows Server 2008 R2 for Itanium-based Systems > > > > - Impact: Remote Code Execution > > - Version Number: 1.0 > > > > > > Other Information > > ================= > > > > Non-Security, High-Priority Updates on MU, WU, and WSUS: > > ======================================================== > > For information about non-security releases on Windows Update and Microsoft > > update, please see: > > * http://support.microsoft.com/kb/894199: Microsoft Knowledge Base > > Article 894199, Description of Software Update Services and > > Windows Server Update Services changes in content. > > Includes all Windows content. > > * http://technet.microsoft.com/en-us/wsus/bb456965.aspx: Updates > > from Past Months for Windows Server Update Services. Displays all > > new, revised, and rereleased updates for Microsoft products other > > than Microsoft Windows. > > > > Microsoft Active Protections Program (MAPP) > > =========================================== > > To improve security protections for customers, Microsoft provides > > vulnerability information to major security software providers in > > advance of each monthly security update release. Security software > > providers can then use this vulnerability information to provide > > updated protections to customers via their security software or > > devices, such as antivirus, network-based intrusion detection > > systems, or host-based intrusion prevention systems. To determine > > whether active protections are available from security software > > providers, please visit the active protections Web sites provided by > > program partners, listed at > > http://www.microsoft.com/security/msrc/mapp/partners.mspx. > > > > Recognize and avoid fraudulent e-mail to Microsoft customers: > > ============================================================= > > If you receive an e-mail message that claims to be distributing > > a Microsoft security update, it is a hoax that may contain > > malware or pointers to malicious Web sites. Microsoft does > > not distribute security updates via e-mail. > > > > The Microsoft Security Response Center (MSRC) uses PGP to digitally > > sign all security notifications. However, PGP is not required for > > reading security notifications, reading security bulletins, or > > installing security updates. You can obtain the MSRC public PGP key > > at > > https://www.microsoft.com/technet/security/bulletin/pgp.mspx. > > > > To receive automatic notifications whenever > > Microsoft Security Bulletins are issued, subscribe to Microsoft > > Technical Security Notifications on > > http://www.microsoft.com/technet/security/bulletin/notify.mspx. > > > > ******************************************************************** > > THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS > > PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT > > DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING > > THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR > > PURPOSE. > > IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE > > LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, > > INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL > > DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN > > ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. > > SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY > > FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING > > LIMITATION MAY NOT APPLY. > > ******************************************************************** > > > > -----BEGIN PGP SIGNATURE----- > > Version: PGP Desktop 9.9.0 (Build 397) > > Charset: utf-8 > > > > wsFVAwUBS7DxDPSWSWlRYp1gAQiD0hAA3dLMgb/km6wm73wb1vNJ6Spvtw9H8zk7 > > zR1ra2W5dp6rq0Ciws5gXZdP6gHNFp2YqiOugFe/7JtGkR636f+uAI8p0ha8UksU > > D+AsyrT1aJAegpTHyqoQbK/tk0Wnu0nUbp8g028spR9pXVclsk70jAvgKews0WI+ > > UE9/SvOljh/X5ofhvQZOeGWpWkr3993BpXYp7HgsHm8q8zgXdb04QveyXoQlCPqd > > 56xLm08pZsP58j04V6FtWVGOtwLYVEv1d4DfolYC6TdIQC5LsEGq8YEosGW7Wqrs > > SF39OQoTGGlFiKeYcVHXFzeZqHRIcSWDx2utmGajsgxBNgX6xE6bvNF6P5JC/U6H > > Sjm+2q04H/wqTDH9X+wNBAMGqymQxALuBYalvEZ4tVpwf1DzozfWO/2Yr/KH16B6 > > RKT5x8BzXypPV0GCZhb92Y5rV48+Ig2xz4m8iCCroJ7bKBB/w/hMTZkWhlC0zPSa > > ztDnYLGtdLncBV49USLCLuhGG2+lUBLlFR95mH3F7CPLvJD7Kmd5e+DSizgjVpFh > > GJX3X91O2vbd5dJrF8a77jGZUu0nmsJpunsjoGD5tYW5YqJVL451Qk2BOxVpof/i > > rCf0wsyxdzZVCOoZ5lyqgXZYC1gymNB9WFHWSsWr241u5jz/29FWU/F2CJGlmDnp > > N78HQ6kNQYg= > > =sXSC > > -----END PGP SIGNATURE----- > > > > > > To cancel your subscription to this newsletter, reply to this message with > the word UNSUBSCRIBE in the Subject line. You can also unsubscribe at the > Microsoft.com web site <http://www.microsoft.com/misc/unsubscribe.htm>. You > can manage all your Microsoft.com communication preferences at this site. > > > > Legal Information <http://www.microsoft.com/info/legalinfo/default.mspx>. > > > > This newsletter was sent by the Microsoft Corporation > > 1 Microsoft Way > > Redmond, Washington, USA > > 98052 > > > > > > > > > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
