Easily enough done, I ended doing pretty much that.

Dave

-----Original Message-----
From: Brian Desmond [mailto:[email protected]] 
Sent: Monday, April 05, 2010 1:06 PM
To: NT System Admin Issues
Subject: RE: Microsoft Security Bulletin Advance Notification for March 2010

Why not just subscribe an alias? 

Thanks,
Brian Desmond
[email protected]

c - 312.731.3132


-----Original Message-----
From: John Cook [mailto:[email protected]] 
Sent: Thursday, April 01, 2010 5:16 PM
To: NT System Admin Issues
Subject: Re: Microsoft Security Bulletin Advance Notification for March 2010

+1 although transport rules are a great way to share them with the rest of the 
groups that might feel they need to know.

----- Original Message -----
From: Richard Stovall <[email protected]>
To: NT System Admin Issues <[email protected]>
Sent: Thu Apr 01 11:09:46 2010
Subject: Re: Microsoft Security Bulletin Advance Notification for March 2010

Same here.  Oh wait, I'm the desktop, server and infosec team.

Nevermind.

On Thu, Apr 1, 2010 at 11:06 AM, Steven M. Caesare <[email protected]> wrote:
> Our desktop, server, and infosec teams here all get them.
>
>
>
> -sc
>
>
>
> From: David Lum [mailto:[email protected]]
> Sent: Thursday, April 01, 2010 11:03 AM
>
> To: NT System Admin Issues
> Subject: FW: Microsoft Security Bulletin Advance Notification for March 2010
>
>
>
> How do you guys handle these kinds of notices? As in, do you guys have a
> department that gets these, or one person, or ??? Currently I'm the only one
> who gets them and I need to figure out the best way to handle it.
>
>
>
> Dave
>
>
>
> -----Original Message-----
> From: Microsoft [mailto:[email protected]]
> Sent: Monday, March 29, 2010 12:54 PM
> To: David Lum
> Subject: Microsoft Security Bulletin Advance Notification for March 2010
>
>
>
> -----BEGIN PGP SIGNED MESSAGE-----
>
> Hash: SHA256
>
>
>
> ********************************************************************
>
> Microsoft Security Bulletin Advance Notification for March 2010
>
> Issued: March 29, 2010
>
> ********************************************************************
>
>
>
> This is an advance notification of one out-of-band security bulletin
>
> that Microsoft is intending to release on March 30, 2010.
>
>
>
> The full version of the Microsoft Security Bulletin Advance
>
> Notification for March 2010 can be found at
>
> http://www.microsoft.com/technet/security/bulletin/ms10-mar.mspx.
>
>
>
> This bulletin advance notification will be replaced with the revised
>
> March bulletin summary on March 30, 2010. The revised
>
> bulletin summary will include the out-of-band security bulletin, as
>
> well as the security bulletins already released on March 9, 2010.
>
>
>
> For more information about the bulletin advance notification
>
> service, see
>
> http://www.microsoft.com/technet/security/Bulletin/advance.mspx.
>
>
>
> To receive automatic notifications whenever Microsoft Security
>
> Bulletins are issued, subscribe to Microsoft Technical Security
>
> Notifications on
>
> http://www.microsoft.com/technet/security/bulletin/notify.mspx.
>
>
>
> Microsoft will host a webcast to address customer questions on
>
> the out-of-band bulletin on March 30, 2010,
>
> at 1:00 PM Pacific Time (US & Canada). Register for the
>
> Security Bulletin Webcast at
>
> http://www.microsoft.com/technet/security/bulletin/summary.mspx.
>
>
>
> Microsoft also provides information to help customers prioritize
>
> monthly security updates with any non-security, high-priority
>
> updates that are being released on the same day as the monthly
>
> security updates. Please see the section, Other Information.
>
>
>
> This advance notification provides a descriptive name as the
>
> bulletin identifier, because the official Microsoft Security
>
> Bulletin numbers are not issued until release. The bulletin summary
>
> that replaces this advance notification will have the proper
>
> Microsoft Security Bulletin numbers (in the MSyy-xxx format) as the
>
> bulletin identifier. The security bulletins for this month are as
>
> follows, in order of severity:
>
>
>
>
>
> Critical Security Bulletins
>
> ===========================
>
>
>
> Internet Explorer Bulletin
>
>
>
>   - Affected Software:
>
>     - Internet Explorer 5.01 Service Pack 4 when installed on
>
>       Microsoft Windows 2000 Service Pack 4
>
>     - Internet Explorer 6 Service Pack 1 when installed on
>
>       Microsoft Windows 2000 Service Pack 4
>
>     - Internet Explorer 6 for
>
>       Windows XP Service Pack 2 and
>
>       Windows XP Service Pack 3
>
>     - Internet Explorer 6 for
>
>       Windows XP Professional x64 Edition Service Pack 2
>
>     - Internet Explorer 6 for
>
>       Windows Server 2003 Service Pack 2
>
>     - Internet Explorer 6 for
>
>       Windows Server 2003 x64 Edition Service Pack 2
>
>     - Internet Explorer 6 for
>
>       Windows Server 2003 with SP2 for Itanium-based Systems
>
>     - Internet Explorer 7 for
>
>       Windows XP Service Pack 2 and
>
>       Windows XP Service Pack 3
>
>     - Internet Explorer 7 for
>
>       Windows XP Professional x64 Edition Service Pack 2
>
>     - Internet Explorer 7 for
>
>       Windows Server 2003 Service Pack 2
>
>     - Internet Explorer 7 for
>
>       Windows Server 2003 x64 Edition Service Pack 2
>
>     - Internet Explorer 7 for
>
>       Windows Server 2003 with SP2 for Itanium-based Systems
>
>     - Internet Explorer 7 in
>
>       Windows Vista,
>
>       Windows Vista Service Pack 1, and
>
>       Windows Vista Service Pack 2
>
>     - Internet Explorer 7 in
>
>       Windows Vista x64 Edition,
>
>       Windows Vista x64 Edition Service Pack 1, and
>
>       Windows Vista x64 Edition Service Pack 2
>
>     - Internet Explorer 7 in
>
>       Windows Server 2008 for 32-bit Systems and
>
>       Windows Server 2008 for 32-bit Systems Service Pack 2
>
>       (Windows Server 2008 Server Core installation not affected)
>
>     - Internet Explorer 7 in
>
>       Windows Server 2008 for x64-based Systems and
>
>       Windows Server 2008 for x64-based Systems Service Pack 2
>
>       (Windows Server 2008 Server Core installation not affected)
>
>     - Internet Explorer 7 in
>
>       Windows Server 2008 for Itanium-based Systems and
>
>       Windows Server 2008 for Itanium-based Systems Service Pack 2
>
>     - Internet Explorer 8 for
>
>       Windows XP Service Pack 2 and
>
>       Windows XP Service Pack 3
>
>     - Internet Explorer 8 for
>
>       Windows XP Professional x64 Edition Service Pack 2
>
>     - Internet Explorer 8 for
>
>       Windows Server 2003 Service Pack 2
>
>     - Internet Explorer 8 for
>
>       Windows Server 2003 x64 Edition Service Pack 2
>
>     - Internet Explorer 8 in
>
>       Windows Vista,
>
>       Windows Vista Service Pack 1, and
>
>       Windows Vista Service Pack 2
>
>     - Internet Explorer 8 in
>
>       Windows Vista x64 Edition,
>
>       Windows Vista x64 Edition Service Pack 1, and
>
>       Windows Vista x64 Edition Service Pack 2
>
>     - Internet Explorer 8 in
>
>       Windows Server 2008 for 32-bit Systems and
>
>       Windows Server 2008 for 32-bit Systems Service Pack 2
>
>       (Windows Server 2008 Server Core installation not affected)
>
>     - Internet Explorer 8 in
>
>       Windows Server 2008 for x64-based Systems and
>
>       Windows Server 2008 for x64-based Systems Service Pack 2
>
>       (Windows Server 2008 Server Core installation not affected)
>
>     - Internet Explorer 8 in
>
>       Windows 7 for 32-bit Systems
>
>     - Internet Explorer 8 in
>
>       Windows 7 for x64-based Systems
>
>     - Internet Explorer 8 in
>
>       Windows Server 2008 R2 for x64-based Systems
>
>       (Windows Server 2008 Server Core installation not affected)
>
>     - Internet Explorer 8 in
>
>       Windows Server 2008 R2 for Itanium-based Systems
>
>
>
>     - Impact: Remote Code Execution
>
>     - Version Number: 1.0
>
>
>
>
>
> Other Information
>
> =================
>
>
>
> Non-Security, High-Priority Updates on MU, WU, and WSUS:
>
> ========================================================
>
> For information about non-security releases on Windows Update and Microsoft
>
> update, please see:
>
> * http://support.microsoft.com/kb/894199: Microsoft Knowledge Base
>
>   Article 894199, Description of Software Update Services and
>
>   Windows Server Update Services changes in content.
>
>   Includes all Windows content.
>
> * http://technet.microsoft.com/en-us/wsus/bb456965.aspx: Updates
>
>   from Past Months for Windows Server Update Services. Displays all
>
>   new, revised, and rereleased updates for Microsoft products other
>
>   than Microsoft Windows.
>
>
>
> Microsoft Active Protections Program (MAPP)
>
> ===========================================
>
> To improve security protections for customers, Microsoft provides
>
> vulnerability information to major security software providers in
>
> advance of each monthly security update release. Security software
>
> providers can then use this vulnerability information to provide
>
> updated protections to customers via their security software or
>
> devices, such as antivirus, network-based intrusion detection
>
> systems, or host-based intrusion prevention systems. To determine
>
> whether active protections are available from security software
>
> providers, please visit the active protections Web sites provided by
>
> program partners, listed at
>
> http://www.microsoft.com/security/msrc/mapp/partners.mspx.
>
>
>
> Recognize and avoid fraudulent e-mail to Microsoft customers:
>
> =============================================================
>
> If you receive an e-mail message that claims to be distributing
>
> a Microsoft security update, it is a hoax that may contain
>
> malware or pointers to malicious Web sites. Microsoft does
>
> not distribute security updates via e-mail.
>
>
>
> The Microsoft Security Response Center (MSRC) uses PGP to digitally
>
> sign all security notifications. However, PGP is not required for
>
> reading security notifications, reading security bulletins, or
>
> installing security updates. You can obtain the MSRC public PGP key
>
> at
>
> https://www.microsoft.com/technet/security/bulletin/pgp.mspx.
>
>
>
> To receive automatic notifications whenever
>
> Microsoft Security Bulletins are issued, subscribe to Microsoft
>
> Technical Security Notifications on
>
> http://www.microsoft.com/technet/security/bulletin/notify.mspx.
>
>
>
> ********************************************************************
>
> THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
>
> PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
>
> DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
>
> THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
>
> PURPOSE.
>
> IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
>
> LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
>
> INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
>
> DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
>
> ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
>
> SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
>
> FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
>
> LIMITATION MAY NOT APPLY.
>
> ********************************************************************
>
>
>
> -----BEGIN PGP SIGNATURE-----
>
> Version: PGP Desktop 9.9.0 (Build 397)
>
> Charset: utf-8
>
>
>
> wsFVAwUBS7DxDPSWSWlRYp1gAQiD0hAA3dLMgb/km6wm73wb1vNJ6Spvtw9H8zk7
>
> zR1ra2W5dp6rq0Ciws5gXZdP6gHNFp2YqiOugFe/7JtGkR636f+uAI8p0ha8UksU
>
> D+AsyrT1aJAegpTHyqoQbK/tk0Wnu0nUbp8g028spR9pXVclsk70jAvgKews0WI+
>
> UE9/SvOljh/X5ofhvQZOeGWpWkr3993BpXYp7HgsHm8q8zgXdb04QveyXoQlCPqd
>
> 56xLm08pZsP58j04V6FtWVGOtwLYVEv1d4DfolYC6TdIQC5LsEGq8YEosGW7Wqrs
>
> SF39OQoTGGlFiKeYcVHXFzeZqHRIcSWDx2utmGajsgxBNgX6xE6bvNF6P5JC/U6H
>
> Sjm+2q04H/wqTDH9X+wNBAMGqymQxALuBYalvEZ4tVpwf1DzozfWO/2Yr/KH16B6
>
> RKT5x8BzXypPV0GCZhb92Y5rV48+Ig2xz4m8iCCroJ7bKBB/w/hMTZkWhlC0zPSa
>
> ztDnYLGtdLncBV49USLCLuhGG2+lUBLlFR95mH3F7CPLvJD7Kmd5e+DSizgjVpFh
>
> GJX3X91O2vbd5dJrF8a77jGZUu0nmsJpunsjoGD5tYW5YqJVL451Qk2BOxVpof/i
>
> rCf0wsyxdzZVCOoZ5lyqgXZYC1gymNB9WFHWSsWr241u5jz/29FWU/F2CJGlmDnp
>
> N78HQ6kNQYg=
>
> =sXSC
>
> -----END PGP SIGNATURE-----
>
>
>
>
>
> To cancel your subscription to this newsletter, reply to this message with
> the word UNSUBSCRIBE in the Subject line. You can also unsubscribe at the
> Microsoft.com web site <http://www.microsoft.com/misc/unsubscribe.htm>. You
> can manage all your Microsoft.com communication preferences at this site.
>
>
>
> Legal Information <http://www.microsoft.com/info/legalinfo/default.mspx>.
>
>
>
> This newsletter was sent by the Microsoft Corporation
>
> 1 Microsoft Way
>
> Redmond, Washington, USA
>
> 98052
>
>
>
>
>
>
>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


CONFIDENTIALITY STATEMENT: The information transmitted, or contained or 
attached to or with this Notice is intended only for the person or entity to 
which it is addressed and may contain Protected Health Information (PHI), 
confidential and/or privileged material. Any review, transmission, 
dissemination, or other use of, and taking any action in reliance upon this 
information by persons or entities other than the intended recipient without 
the express written consent of the sender are prohibited. This information may 
be protected by the Health Insurance Portability and Accountability Act of 1996 
(HIPAA), and other Federal and Florida laws. Improper or unauthorized use or 
disclosure of this information could result in civil and/or criminal penalties.
 Consider the environment. Please don't print this e-mail unless you really 
need to.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to