Thought this might address the worm issue. Myron -----Original Message----- From: Finegold, Myron [mailto:[EMAIL PROTECTED] Sent: Friday, August 15, 2003 8:55 AM To: '[EMAIL PROTECTED]' Subject: FW: Actions for the Blaster Worm - Special Edition, Inside Office
-----Original Message----- From: Microsoft To: Finegold, Myron Sent: 8/15/03 3:04 AM Subject: Actions for the Blaster Worm - Special Edition, Inside Office You are receiving this message because you are a Microsoft newsletter subscriber. Please print this page for your reference. It is very important that you check the Security site regularly for the most recent news: http://go.microsoft.com/?linkid=221043 In This Newsletter: --Who Is Vulnerable --4 Steps for Home Users At 11:34 A.M. Pacific Time on August 11, Microsoft began investigating a worm reported by Microsoft Product Support Services (PSS). A new worm commonly known as W32.Blaster.Worm has been identified that exploits the vulnerability that was addressed by Microsoft Security Bulletin MS03-026. Who Is Vulnerable? Users of the following products are vulnerable to infection by this worm: . MicrosoftR Windows NTR 4.0 . Microsoft WindowsR 2000 . Microsoft Windows XP . Microsoft Windows Server(TM) 2003 Your computer is not vulnerable to the Blaster worm if either of these conditions apply to you: . If you are using Microsoft Windows 95; Windows 98; Windows 98 Second Edition (SE); or Windows Millennium (Me). . If you downloaded and installed security update MS03-026 prior to August 11, the date the worm was discovered. 4 Steps for Home Users If you are using Windows NT 4.0, Windows 2000, Windows XP, or Windows Server 2003, you should follow the steps in this sequence to help protect your system and to recover if your system has been infected. 1. Enable a Firewall: Make sure you have a firewall activated to help protect your computer against infection before you take other steps. If your computer has been infected, activating firewall software will help limit the effects of the worm on your computer. The latest Windows operating systems have a firewall built in. Windows XP and Windows Server 2003 users should print or save the following instructions for how to enable their firewall. If your computer is rebooting repeatedly, disconnect from the Internet before you enable your firewall. To disconnect your computer from the Internet: . Broadband connection users: Locate the cable that runs from your external DSL or cable modem to the wall and unplug that cable either from the modem or from the telephone jack. . Dial-up connection users: Locate the telephone cable that runs from the modem inside your computer to your telephone jack and unplug that cable either from the telephone jack or from your computer. Follow the instructions provided for your operating system, and then reconnect to the Internet. . Windows XP Professional users: http://go.microsoft.com/?linkid=221044 . Windows XP Home Edition users: http://go.microsoft.com/?linkid=221045 . Windows Server 2003 users: http://go.microsoft.com/?linkid=221046 . Windows NT 4.0 and Windows 2000 users: You will need to install a third-party firewall. Most firewall software for home users is available in free or trial versions. If you are unable to download a firewall product, please check with your local computer retailer. Check the following resources for more information on personal firewalls: -- ZoneAlarm Pro (Zone Labs): http://go.microsoft.com/?linkid=221047 -- Tiny Personal Firewall (Tiny Software): http://go.microsoft.com/?linkid=221048 -- Outpost Firewall (Agnitum): http://go.microsoft.com/?linkid=221049 -- Kerio Personal Firewall (Kerio Technologies): http://go.microsoft.com/?linkid=221050 -- BlackICE PC Protection (Internet Security Systems): http://go.microsoft.com/?linkid=221051 Windows 2000 users: Alternatively, you can take steps to block the affected ports so that your computer can be patched. Here are some modified instructions from the TechNet article HOW TO: Configure TCP/IP Filtering in Windows 2000: http://go.microsoft.com/?linkid=221052. 2. Update Windows: If you are disconnected from the Internet, remember to reconnect before you take the next steps. Download and install the security update addressed in Security Bulletin MS03-026 for the version of Windows that you are using from the Microsoft Download Center. -- Windows NT Server 4.0 and Windows NT Workstation 4.0: http://go.microsoft.com/?linkid=221053 -- Windows NT Server 4.0, Terminal Server Edition: http://go.microsoft.com/?linkid=221054 -- Windows 2000: http://go.microsoft.com/?linkid=221055 -- Windows XP: The vast majority of Windows XP customers use this version. If you are unsure, it is likely that you are using this version. http://go.microsoft.com/?linkid=221056 -- Windows XP (64 bit): The 64-bit version of Windows XP requires special hardware to run. If you are unsure, it is likely that you are not running this version of Windows XP. http://go.microsoft.com/?linkid=221057 -- Windows Server 2003: http://go.microsoft.com/?linkid=221058 -- Windows Server 2003 (64 bit): http://go.microsoft.com/?linkid=221059 3. Use Antivirus Software: Make sure you have the latest updates installed. . If you already have antivirus software installed, go to your antivirus vendor's Web site to get the latest updates, also known as virus definitions. . If you do not have antivirus software installed, get it. If you are unable to download antivirus software, please check with your local computer retailer. The following vendors participating in the Microsoft Virus Information Alliance (VIA) offer antivirus products for home users: . Network Associates: http://go.microsoft.com/?linkid=221060 . Trend Micro: http://go.microsoft.com/?linkid=221061 . Symantec: http://go.microsoft.com/?linkid=221062 . Computer Associates : http://go.microsoft.com/?linkid=221063 Learn about Microsoft's Virus Information Alliance: http://go.microsoft.com/?linkid=221064. 4. Remove the Worm: If you think there is even the slightest possibility that your computer might be infected, use the worm removal tool available at your antivirus vendor's Web site. For additional details on this worm from antivirus software vendors participating in the Microsoft Virus Information Alliance (VIA) please visit the following links: -- Network Associates: http://go.microsoft.com/?linkid=221065 -- Trend Micro: http://go.microsoft.com/?linkid=221066 -- Symantec: http://go.microsoft.com/?linkid=221067 -- Computer Associates: http://go.microsoft.com/?linkid=221068 Microsoft Communities is your launching pad for communicating online with peers and experts about Microsoft products, technologies, and services: http://go.microsoft.com/?linkid=221041 ~~~~~~~~~~~~~~~~~~~~~~~~~ How to use this mailing list~~~~~~~~~~~~~~~~~~~~~~~~ To cancel your subscription to this newsletter, either click mailto:[EMAIL PROTECTED] soft.com?subject=UNSUBSCRIBE to send an unsubscribe e-mail or reply to this message with the word UNSUBSCRIBE in the Subject line. To stop all e-mail newsletters from microsoft.com, either click mailto:[EMAIL PROTECTED] soft.com?subject=STOPMAIL to send your request or reply to this message with the word STOPMAIL in the Subject Line. You can also unsubscribe at http://go.microsoft.com/?linkid=221042. You can manage all your Microsoft.com communication preferences from this site. THIS DOCUMENT AND OTHER DOCUMENTS PROVIDED PURSUANT TO THIS PROGRAM ARE FOR INFORMATIONAL PURPOSES ONLY. The information type should not be interpreted to be a commitment on the part of Microsoft and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED 'AS IS' WITHOUT WARRANTY OF ANY KIND. The user assumes the entire risk as to the accuracy and the use of this document. microsoft.com newsletter e-mail may be copied and distributed subject to the following conditions: 1. All text must be copied without modification and all pages must be included 2. All copies must contain Microsoft's copyright notice and any other notices provided therein 3. This document may not be distributed for profit

