Thought this might address the worm issue.
Myron

-----Original Message-----
From: Finegold, Myron [mailto:[EMAIL PROTECTED] 
Sent: Friday, August 15, 2003 8:55 AM
To: '[EMAIL PROTECTED]'
Subject: FW: Actions for the Blaster Worm - Special Edition, Inside
Office


 

-----Original Message-----
From: Microsoft
To: Finegold, Myron
Sent: 8/15/03 3:04 AM
Subject: Actions for the Blaster Worm - Special Edition, Inside Office

You are receiving this message because you are a Microsoft newsletter
subscriber. Please print this page for your reference. 

It is very important that you check the Security site regularly for the
most recent news: http://go.microsoft.com/?linkid=221043  

In This Newsletter:
        --Who Is Vulnerable
        --4 Steps for Home Users

At 11:34 A.M. Pacific Time on August 11, Microsoft began investigating a
worm reported by Microsoft Product Support Services (PSS). A new worm
commonly known as W32.Blaster.Worm has been identified that exploits the
vulnerability that was addressed by Microsoft Security Bulletin
MS03-026. Who Is Vulnerable? Users of the following products are
vulnerable to infection by this
worm:
        . MicrosoftR Windows NTR 4.0 
        . Microsoft WindowsR 2000 
        . Microsoft Windows XP 
        . Microsoft Windows Server(TM) 2003 

Your computer is not vulnerable to the Blaster worm if either of these
conditions apply to you:
        . If you are using Microsoft Windows 95; Windows 98; Windows 98
Second Edition (SE); or Windows Millennium (Me). 
        . If you downloaded and installed security update MS03-026 prior
to August 11, the date the worm was discovered. 

4 Steps for Home Users
If you are using Windows NT 4.0, Windows 2000, Windows XP, or Windows
Server 2003, you should follow the steps in this sequence to help
protect your system and to recover if your system has been infected. 

1. Enable a Firewall: Make sure you have a firewall activated to help
protect your computer against infection before you take other steps. If
your computer has been infected, activating firewall software will help
limit the effects of the worm on your computer.

The latest Windows operating systems have a firewall built in. Windows
XP and Windows Server 2003 users should print or save the following
instructions for how to enable their firewall. 

If your computer is rebooting repeatedly, disconnect from the Internet
before you enable your firewall.  To disconnect your computer from the
Internet:

        . Broadband connection users: Locate the cable that runs from
your external DSL or cable modem to the wall and unplug that cable
either from the modem or from the telephone jack.
        . Dial-up connection users: Locate the telephone cable that runs
from the modem inside your computer to your telephone jack and unplug
that cable either from the telephone jack or from your computer.

Follow the instructions provided for your operating system, and then
reconnect to the Internet.
        . Windows XP Professional users:
http://go.microsoft.com/?linkid=221044  
        . Windows XP Home Edition users:
http://go.microsoft.com/?linkid=221045  
        . Windows Server 2003 users:
http://go.microsoft.com/?linkid=221046  
        . Windows NT 4.0 and Windows 2000 users: You will need to
install a third-party firewall. Most firewall software for home users is
available in free or trial versions. If you are unable to download a
firewall product, please check with your local computer retailer. Check
the following resources for more information on personal firewalls: 
        -- ZoneAlarm Pro (Zone Labs):
http://go.microsoft.com/?linkid=221047  
        -- Tiny Personal Firewall (Tiny Software):
http://go.microsoft.com/?linkid=221048  
        -- Outpost Firewall (Agnitum):
http://go.microsoft.com/?linkid=221049  
        -- Kerio Personal Firewall (Kerio Technologies):
http://go.microsoft.com/?linkid=221050  
        -- BlackICE PC Protection (Internet Security Systems):
http://go.microsoft.com/?linkid=221051  

Windows 2000 users: Alternatively, you can take steps to block the
affected ports so that your computer can be patched. Here are some
modified instructions from the TechNet article HOW TO: Configure TCP/IP
Filtering in Windows 2000: http://go.microsoft.com/?linkid=221052. 

2. Update Windows: If you are disconnected from the Internet, remember
to reconnect before you take the next steps. Download and install the
security update addressed in Security Bulletin MS03-026 for the version
of Windows that you are using from the Microsoft Download Center. 
        -- Windows NT Server 4.0 and Windows NT Workstation 4.0:
http://go.microsoft.com/?linkid=221053  
 
        -- Windows NT Server 4.0, Terminal Server Edition:
http://go.microsoft.com/?linkid=221054 
  
        -- Windows 2000:
http://go.microsoft.com/?linkid=221055   

        -- Windows XP: The vast majority of Windows XP customers use
this version.  If you are unsure, it is likely that you are using this
version. http://go.microsoft.com/?linkid=221056 
   
        -- Windows XP (64 bit): The 64-bit version of Windows XP
requires special hardware to run.  If you are unsure, it is likely that
you are not running this version of Windows XP.
http://go.microsoft.com/?linkid=221057   

        -- Windows Server 2003:
http://go.microsoft.com/?linkid=221058   

        -- Windows Server 2003 (64 bit):
http://go.microsoft.com/?linkid=221059  

3. Use Antivirus Software: Make sure you have the latest updates
installed.
        . If you already have antivirus software installed, go to your
antivirus vendor's Web site to get the latest updates, also known as
virus definitions. 
        . If you do not have antivirus software installed, get it. If
you are unable to download antivirus software, please check with your
local computer retailer. The following vendors participating in the
Microsoft Virus Information Alliance (VIA) offer antivirus products for
home users: 
        . Network Associates: http://go.microsoft.com/?linkid=221060  
        . Trend Micro: http://go.microsoft.com/?linkid=221061  
        . Symantec: http://go.microsoft.com/?linkid=221062  
        . Computer Associates : http://go.microsoft.com/?linkid=221063 

Learn about Microsoft's Virus Information Alliance:
http://go.microsoft.com/?linkid=221064. 

4. Remove the Worm: If you think there is even the slightest possibility
that your computer might be infected, use the worm removal tool
available at your antivirus vendor's Web site. For additional details on
this worm from antivirus software vendors participating in the Microsoft
Virus Information Alliance (VIA) please visit the following links: 
        -- Network Associates: http://go.microsoft.com/?linkid=221065  
        -- Trend Micro: http://go.microsoft.com/?linkid=221066  
        -- Symantec: http://go.microsoft.com/?linkid=221067  
        -- Computer Associates: http://go.microsoft.com/?linkid=221068


Microsoft Communities is your launching pad for communicating online
with peers and experts about Microsoft products, technologies, and
services:
http://go.microsoft.com/?linkid=221041

~~~~~~~~~~~~~~~~~~~~~~~~~ How to use this mailing
list~~~~~~~~~~~~~~~~~~~~~~~~

To cancel your subscription to this newsletter, either click
mailto:[EMAIL PROTECTED]
soft.com?subject=UNSUBSCRIBE to send an unsubscribe e-mail or reply to
this message with the word UNSUBSCRIBE in the Subject line. To stop all
e-mail newsletters from microsoft.com, either click
mailto:[EMAIL PROTECTED]
soft.com?subject=STOPMAIL to send your request or reply to this message
with the word STOPMAIL in the Subject Line. You can also unsubscribe at
http://go.microsoft.com/?linkid=221042. You can manage all your
Microsoft.com communication preferences from this site. 

THIS DOCUMENT AND OTHER DOCUMENTS PROVIDED PURSUANT TO THIS PROGRAM ARE
FOR INFORMATIONAL PURPOSES ONLY. The information type should not be
interpreted to be a commitment on the part of Microsoft and Microsoft
cannot guarantee the accuracy of any information presented after the
date of publication. INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED
'AS IS' WITHOUT WARRANTY OF ANY KIND. The user assumes the entire risk
as to the accuracy and the use of this document. 
microsoft.com newsletter e-mail may be copied and distributed subject to
the following conditions: 1. All text must be copied without
modification and all pages must be included 2. All copies must contain
Microsoft's copyright notice and any other notices provided therein 3.
This document may not be distributed for profit

Reply via email to