I subscribe the all company DL to them.

Or was it just my team.

I can't remember.

On Thu, Apr 1, 2010 at 08:02, David Lum <[email protected]> wrote:
> How do you guys handle these kinds of notices? As in, do you guys have a
> department that gets these, or one person, or ??? Currently I'm the only one
> who gets them and I need to figure out the best way to handle it.
>
> Dave
>
> -----Original Message-----
> From: Microsoft [mailto:[email protected]]
> Sent: Monday, March 29, 2010 12:54 PM
> To: David Lum
> Subject: Microsoft Security Bulletin Advance Notification for March 2010
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> ********************************************************************
> Microsoft Security Bulletin Advance Notification for March 2010
> Issued: March 29, 2010
> ********************************************************************
>
> This is an advance notification of one out-of-band security bulletin
> that Microsoft is intending to release on March 30, 2010.
>
> The full version of the Microsoft Security Bulletin Advance
> Notification for March 2010 can be found at
> http://www.microsoft.com/technet/security/bulletin/ms10-mar.mspx.
>
> This bulletin advance notification will be replaced with the revised
> March bulletin summary on March 30, 2010. The revised
> bulletin summary will include the out-of-band security bulletin, as
> well as the security bulletins already released on March 9, 2010.
>
> For more information about the bulletin advance notification
> service, see
> http://www.microsoft.com/technet/security/Bulletin/advance.mspx.
>
> To receive automatic notifications whenever Microsoft Security
> Bulletins are issued, subscribe to Microsoft Technical Security
> Notifications on
> http://www.microsoft.com/technet/security/bulletin/notify.mspx.
>
> Microsoft will host a webcast to address customer questions on
> the out-of-band bulletin on March 30, 2010,
> at 1:00 PM Pacific Time (US & Canada). Register for the
> Security Bulletin Webcast at
> http://www.microsoft.com/technet/security/bulletin/summary.mspx.
>
> Microsoft also provides information to help customers prioritize
> monthly security updates with any non-security, high-priority
> updates that are being released on the same day as the monthly
> security updates. Please see the section, Other Information.
>
> This advance notification provides a descriptive name as the
> bulletin identifier, because the official Microsoft Security
> Bulletin numbers are not issued until release. The bulletin summary
> that replaces this advance notification will have the proper
> Microsoft Security Bulletin numbers (in the MSyy-xxx format) as the
> bulletin identifier. The security bulletins for this month are as
> follows, in order of severity:
>
>
> Critical Security Bulletins
> ===========================
>
> Internet Explorer Bulletin
>
>   - Affected Software:
>     - Internet Explorer 5.01 Service Pack 4 when installed on
>       Microsoft Windows 2000 Service Pack 4
>     - Internet Explorer 6 Service Pack 1 when installed on
>       Microsoft Windows 2000 Service Pack 4
>     - Internet Explorer 6 for
>       Windows XP Service Pack 2 and
>       Windows XP Service Pack 3
>     - Internet Explorer 6 for
>       Windows XP Professional x64 Edition Service Pack 2
>     - Internet Explorer 6 for
>       Windows Server 2003 Service Pack 2
>     - Internet Explorer 6 for
>       Windows Server 2003 x64 Edition Service Pack 2
>     - Internet Explorer 6 for
>       Windows Server 2003 with SP2 for Itanium-based Systems
>     - Internet Explorer 7 for
>       Windows XP Service Pack 2 and
>       Windows XP Service Pack 3
>     - Internet Explorer 7 for
>       Windows XP Professional x64 Edition Service Pack 2
>     - Internet Explorer 7 for
>       Windows Server 2003 Service Pack 2
>     - Internet Explorer 7 for
>       Windows Server 2003 x64 Edition Service Pack 2
>     - Internet Explorer 7 for
>       Windows Server 2003 with SP2 for Itanium-based Systems
>     - Internet Explorer 7 in
>       Windows Vista,
>       Windows Vista Service Pack 1, and
>       Windows Vista Service Pack 2
>     - Internet Explorer 7 in
>       Windows Vista x64 Edition,
>       Windows Vista x64 Edition Service Pack 1, and
>       Windows Vista x64 Edition Service Pack 2
>     - Internet Explorer 7 in
>       Windows Server 2008 for 32-bit Systems and
>       Windows Server 2008 for 32-bit Systems Service Pack 2
>       (Windows Server 2008 Server Core installation not affected)
>     - Internet Explorer 7 in
>       Windows Server 2008 for x64-based Systems and
>       Windows Server 2008 for x64-based Systems Service Pack 2
>       (Windows Server 2008 Server Core installation not affected)
>     - Internet Explorer 7 in
>       Windows Server 2008 for Itanium-based Systems and
>       Windows Server 2008 for Itanium-based Systems Service Pack 2
>     - Internet Explorer 8 for
>       Windows XP Service Pack 2 and
>       Windows XP Service Pack 3
>     - Internet Explorer 8 for
>       Windows XP Professional x64 Edition Service Pack 2
>     - Internet Explorer 8 for
>       Windows Server 2003 Service Pack 2
>     - Internet Explorer 8 for
>       Windows Server 2003 x64 Edition Service Pack 2
>     - Internet Explorer 8 in
>       Windows Vista,
>       Windows Vista Service Pack 1, and
>       Windows Vista Service Pack 2
>     - Internet Explorer 8 in
>       Windows Vista x64 Edition,
>       Windows Vista x64 Edition Service Pack 1, and
>       Windows Vista x64 Edition Service Pack 2
>     - Internet Explorer 8 in
>       Windows Server 2008 for 32-bit Systems and
>       Windows Server 2008 for 32-bit Systems Service Pack 2
>       (Windows Server 2008 Server Core installation not affected)
>     - Internet Explorer 8 in
>       Windows Server 2008 for x64-based Systems and
>       Windows Server 2008 for x64-based Systems Service Pack 2
>       (Windows Server 2008 Server Core installation not affected)
>     - Internet Explorer 8 in
>       Windows 7 for 32-bit Systems
>     - Internet Explorer 8 in
>       Windows 7 for x64-based Systems
>     - Internet Explorer 8 in
>       Windows Server 2008 R2 for x64-based Systems
>       (Windows Server 2008 Server Core installation not affected)
>     - Internet Explorer 8 in
>       Windows Server 2008 R2 for Itanium-based Systems
>
>     - Impact: Remote Code Execution
>     - Version Number: 1.0
>
>
> Other Information
> =================
>
> Non-Security, High-Priority Updates on MU, WU, and WSUS:
> ========================================================
> For information about non-security releases on Windows Update and Microsoft
> update, please see:
> * http://support.microsoft.com/kb/894199: Microsoft Knowledge Base
>   Article 894199, Description of Software Update Services and
>   Windows Server Update Services changes in content.
>   Includes all Windows content.
> * http://technet.microsoft.com/en-us/wsus/bb456965.aspx: Updates
>   from Past Months for Windows Server Update Services. Displays all
>   new, revised, and rereleased updates for Microsoft products other
>   than Microsoft Windows.
>
> Microsoft Active Protections Program (MAPP)
> ===========================================
> To improve security protections for customers, Microsoft provides
> vulnerability information to major security software providers in
> advance of each monthly security update release. Security software
> providers can then use this vulnerability information to provide
> updated protections to customers via their security software or
> devices, such as antivirus, network-based intrusion detection
> systems, or host-based intrusion prevention systems. To determine
> whether active protections are available from security software
> providers, please visit the active protections Web sites provided by
> program partners, listed at
> http://www.microsoft.com/security/msrc/mapp/partners.mspx.
>
> Recognize and avoid fraudulent e-mail to Microsoft customers:
> =============================================================
> If you receive an e-mail message that claims to be distributing
> a Microsoft security update, it is a hoax that may contain
> malware or pointers to malicious Web sites. Microsoft does
> not distribute security updates via e-mail.
>
> The Microsoft Security Response Center (MSRC) uses PGP to digitally
> sign all security notifications. However, PGP is not required for
> reading security notifications, reading security bulletins, or
> installing security updates. You can obtain the MSRC public PGP key
> at
> https://www.microsoft.com/technet/security/bulletin/pgp.mspx.
>
> To receive automatic notifications whenever
> Microsoft Security Bulletins are issued, subscribe to Microsoft
> Technical Security Notifications on
> http://www.microsoft.com/technet/security/bulletin/notify.mspx.
>
> ********************************************************************
> THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
> PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
> DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
> THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
> PURPOSE.
> IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
> LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
> INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
> DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
> ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
> SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
> FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
> LIMITATION MAY NOT APPLY.
> ********************************************************************
>
> -----BEGIN PGP SIGNATURE-----
> Version: PGP Desktop 9.9.0 (Build 397)
> Charset: utf-8
>
> wsFVAwUBS7DxDPSWSWlRYp1gAQiD0hAA3dLMgb/km6wm73wb1vNJ6Spvtw9H8zk7
> zR1ra2W5dp6rq0Ciws5gXZdP6gHNFp2YqiOugFe/7JtGkR636f+uAI8p0ha8UksU
> D+AsyrT1aJAegpTHyqoQbK/tk0Wnu0nUbp8g028spR9pXVclsk70jAvgKews0WI+
> UE9/SvOljh/X5ofhvQZOeGWpWkr3993BpXYp7HgsHm8q8zgXdb04QveyXoQlCPqd
> 56xLm08pZsP58j04V6FtWVGOtwLYVEv1d4DfolYC6TdIQC5LsEGq8YEosGW7Wqrs
> SF39OQoTGGlFiKeYcVHXFzeZqHRIcSWDx2utmGajsgxBNgX6xE6bvNF6P5JC/U6H
> Sjm+2q04H/wqTDH9X+wNBAMGqymQxALuBYalvEZ4tVpwf1DzozfWO/2Yr/KH16B6
> RKT5x8BzXypPV0GCZhb92Y5rV48+Ig2xz4m8iCCroJ7bKBB/w/hMTZkWhlC0zPSa
> ztDnYLGtdLncBV49USLCLuhGG2+lUBLlFR95mH3F7CPLvJD7Kmd5e+DSizgjVpFh
> GJX3X91O2vbd5dJrF8a77jGZUu0nmsJpunsjoGD5tYW5YqJVL451Qk2BOxVpof/i
> rCf0wsyxdzZVCOoZ5lyqgXZYC1gymNB9WFHWSsWr241u5jz/29FWU/F2CJGlmDnp
> N78HQ6kNQYg=
> =sXSC
> -----END PGP SIGNATURE-----
>
>
> To cancel your subscription to this newsletter, reply to this message with
> the word UNSUBSCRIBE in the Subject line. You can also unsubscribe at the
> Microsoft.com web site <http://www.microsoft.com/misc/unsubscribe.htm>. You
> can manage all your Microsoft.com communication preferences at this site.
>
> Legal Information <http://www.microsoft.com/info/legalinfo/default.mspx>.
>
> This newsletter was sent by the Microsoft Corporation
> 1 Microsoft Way
> Redmond, Washington, USA
> 98052
>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to