I subscribe the all company DL to them. Or was it just my team.
I can't remember. On Thu, Apr 1, 2010 at 08:02, David Lum <[email protected]> wrote: > How do you guys handle these kinds of notices? As in, do you guys have a > department that gets these, or one person, or ??? Currently I'm the only one > who gets them and I need to figure out the best way to handle it. > > Dave > > -----Original Message----- > From: Microsoft [mailto:[email protected]] > Sent: Monday, March 29, 2010 12:54 PM > To: David Lum > Subject: Microsoft Security Bulletin Advance Notification for March 2010 > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA256 > > ******************************************************************** > Microsoft Security Bulletin Advance Notification for March 2010 > Issued: March 29, 2010 > ******************************************************************** > > This is an advance notification of one out-of-band security bulletin > that Microsoft is intending to release on March 30, 2010. > > The full version of the Microsoft Security Bulletin Advance > Notification for March 2010 can be found at > http://www.microsoft.com/technet/security/bulletin/ms10-mar.mspx. > > This bulletin advance notification will be replaced with the revised > March bulletin summary on March 30, 2010. The revised > bulletin summary will include the out-of-band security bulletin, as > well as the security bulletins already released on March 9, 2010. > > For more information about the bulletin advance notification > service, see > http://www.microsoft.com/technet/security/Bulletin/advance.mspx. > > To receive automatic notifications whenever Microsoft Security > Bulletins are issued, subscribe to Microsoft Technical Security > Notifications on > http://www.microsoft.com/technet/security/bulletin/notify.mspx. > > Microsoft will host a webcast to address customer questions on > the out-of-band bulletin on March 30, 2010, > at 1:00 PM Pacific Time (US & Canada). Register for the > Security Bulletin Webcast at > http://www.microsoft.com/technet/security/bulletin/summary.mspx. > > Microsoft also provides information to help customers prioritize > monthly security updates with any non-security, high-priority > updates that are being released on the same day as the monthly > security updates. Please see the section, Other Information. > > This advance notification provides a descriptive name as the > bulletin identifier, because the official Microsoft Security > Bulletin numbers are not issued until release. The bulletin summary > that replaces this advance notification will have the proper > Microsoft Security Bulletin numbers (in the MSyy-xxx format) as the > bulletin identifier. The security bulletins for this month are as > follows, in order of severity: > > > Critical Security Bulletins > =========================== > > Internet Explorer Bulletin > > - Affected Software: > - Internet Explorer 5.01 Service Pack 4 when installed on > Microsoft Windows 2000 Service Pack 4 > - Internet Explorer 6 Service Pack 1 when installed on > Microsoft Windows 2000 Service Pack 4 > - Internet Explorer 6 for > Windows XP Service Pack 2 and > Windows XP Service Pack 3 > - Internet Explorer 6 for > Windows XP Professional x64 Edition Service Pack 2 > - Internet Explorer 6 for > Windows Server 2003 Service Pack 2 > - Internet Explorer 6 for > Windows Server 2003 x64 Edition Service Pack 2 > - Internet Explorer 6 for > Windows Server 2003 with SP2 for Itanium-based Systems > - Internet Explorer 7 for > Windows XP Service Pack 2 and > Windows XP Service Pack 3 > - Internet Explorer 7 for > Windows XP Professional x64 Edition Service Pack 2 > - Internet Explorer 7 for > Windows Server 2003 Service Pack 2 > - Internet Explorer 7 for > Windows Server 2003 x64 Edition Service Pack 2 > - Internet Explorer 7 for > Windows Server 2003 with SP2 for Itanium-based Systems > - Internet Explorer 7 in > Windows Vista, > Windows Vista Service Pack 1, and > Windows Vista Service Pack 2 > - Internet Explorer 7 in > Windows Vista x64 Edition, > Windows Vista x64 Edition Service Pack 1, and > Windows Vista x64 Edition Service Pack 2 > - Internet Explorer 7 in > Windows Server 2008 for 32-bit Systems and > Windows Server 2008 for 32-bit Systems Service Pack 2 > (Windows Server 2008 Server Core installation not affected) > - Internet Explorer 7 in > Windows Server 2008 for x64-based Systems and > Windows Server 2008 for x64-based Systems Service Pack 2 > (Windows Server 2008 Server Core installation not affected) > - Internet Explorer 7 in > Windows Server 2008 for Itanium-based Systems and > Windows Server 2008 for Itanium-based Systems Service Pack 2 > - Internet Explorer 8 for > Windows XP Service Pack 2 and > Windows XP Service Pack 3 > - Internet Explorer 8 for > Windows XP Professional x64 Edition Service Pack 2 > - Internet Explorer 8 for > Windows Server 2003 Service Pack 2 > - Internet Explorer 8 for > Windows Server 2003 x64 Edition Service Pack 2 > - Internet Explorer 8 in > Windows Vista, > Windows Vista Service Pack 1, and > Windows Vista Service Pack 2 > - Internet Explorer 8 in > Windows Vista x64 Edition, > Windows Vista x64 Edition Service Pack 1, and > Windows Vista x64 Edition Service Pack 2 > - Internet Explorer 8 in > Windows Server 2008 for 32-bit Systems and > Windows Server 2008 for 32-bit Systems Service Pack 2 > (Windows Server 2008 Server Core installation not affected) > - Internet Explorer 8 in > Windows Server 2008 for x64-based Systems and > Windows Server 2008 for x64-based Systems Service Pack 2 > (Windows Server 2008 Server Core installation not affected) > - Internet Explorer 8 in > Windows 7 for 32-bit Systems > - Internet Explorer 8 in > Windows 7 for x64-based Systems > - Internet Explorer 8 in > Windows Server 2008 R2 for x64-based Systems > (Windows Server 2008 Server Core installation not affected) > - Internet Explorer 8 in > Windows Server 2008 R2 for Itanium-based Systems > > - Impact: Remote Code Execution > - Version Number: 1.0 > > > Other Information > ================= > > Non-Security, High-Priority Updates on MU, WU, and WSUS: > ======================================================== > For information about non-security releases on Windows Update and Microsoft > update, please see: > * http://support.microsoft.com/kb/894199: Microsoft Knowledge Base > Article 894199, Description of Software Update Services and > Windows Server Update Services changes in content. > Includes all Windows content. > * http://technet.microsoft.com/en-us/wsus/bb456965.aspx: Updates > from Past Months for Windows Server Update Services. Displays all > new, revised, and rereleased updates for Microsoft products other > than Microsoft Windows. > > Microsoft Active Protections Program (MAPP) > =========================================== > To improve security protections for customers, Microsoft provides > vulnerability information to major security software providers in > advance of each monthly security update release. Security software > providers can then use this vulnerability information to provide > updated protections to customers via their security software or > devices, such as antivirus, network-based intrusion detection > systems, or host-based intrusion prevention systems. To determine > whether active protections are available from security software > providers, please visit the active protections Web sites provided by > program partners, listed at > http://www.microsoft.com/security/msrc/mapp/partners.mspx. > > Recognize and avoid fraudulent e-mail to Microsoft customers: > ============================================================= > If you receive an e-mail message that claims to be distributing > a Microsoft security update, it is a hoax that may contain > malware or pointers to malicious Web sites. Microsoft does > not distribute security updates via e-mail. > > The Microsoft Security Response Center (MSRC) uses PGP to digitally > sign all security notifications. However, PGP is not required for > reading security notifications, reading security bulletins, or > installing security updates. You can obtain the MSRC public PGP key > at > https://www.microsoft.com/technet/security/bulletin/pgp.mspx. > > To receive automatic notifications whenever > Microsoft Security Bulletins are issued, subscribe to Microsoft > Technical Security Notifications on > http://www.microsoft.com/technet/security/bulletin/notify.mspx. > > ******************************************************************** > THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS > PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT > DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING > THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR > PURPOSE. > IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE > LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, > INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL > DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN > ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. > SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY > FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING > LIMITATION MAY NOT APPLY. > ******************************************************************** > > -----BEGIN PGP SIGNATURE----- > Version: PGP Desktop 9.9.0 (Build 397) > Charset: utf-8 > > wsFVAwUBS7DxDPSWSWlRYp1gAQiD0hAA3dLMgb/km6wm73wb1vNJ6Spvtw9H8zk7 > zR1ra2W5dp6rq0Ciws5gXZdP6gHNFp2YqiOugFe/7JtGkR636f+uAI8p0ha8UksU > D+AsyrT1aJAegpTHyqoQbK/tk0Wnu0nUbp8g028spR9pXVclsk70jAvgKews0WI+ > UE9/SvOljh/X5ofhvQZOeGWpWkr3993BpXYp7HgsHm8q8zgXdb04QveyXoQlCPqd > 56xLm08pZsP58j04V6FtWVGOtwLYVEv1d4DfolYC6TdIQC5LsEGq8YEosGW7Wqrs > SF39OQoTGGlFiKeYcVHXFzeZqHRIcSWDx2utmGajsgxBNgX6xE6bvNF6P5JC/U6H > Sjm+2q04H/wqTDH9X+wNBAMGqymQxALuBYalvEZ4tVpwf1DzozfWO/2Yr/KH16B6 > RKT5x8BzXypPV0GCZhb92Y5rV48+Ig2xz4m8iCCroJ7bKBB/w/hMTZkWhlC0zPSa > ztDnYLGtdLncBV49USLCLuhGG2+lUBLlFR95mH3F7CPLvJD7Kmd5e+DSizgjVpFh > GJX3X91O2vbd5dJrF8a77jGZUu0nmsJpunsjoGD5tYW5YqJVL451Qk2BOxVpof/i > rCf0wsyxdzZVCOoZ5lyqgXZYC1gymNB9WFHWSsWr241u5jz/29FWU/F2CJGlmDnp > N78HQ6kNQYg= > =sXSC > -----END PGP SIGNATURE----- > > > To cancel your subscription to this newsletter, reply to this message with > the word UNSUBSCRIBE in the Subject line. You can also unsubscribe at the > Microsoft.com web site <http://www.microsoft.com/misc/unsubscribe.htm>. You > can manage all your Microsoft.com communication preferences at this site. > > Legal Information <http://www.microsoft.com/info/legalinfo/default.mspx>. > > This newsletter was sent by the Microsoft Corporation > 1 Microsoft Way > Redmond, Washington, USA > 98052 > > > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
