一月份資訊安全公告 Jan 15, 2007 Richard Chen 陳政鋒 (Net+, Sec+, MCSE2003+Security, CISSP) 資深技術支援工程師 台灣微軟技術支援處.

Slides:



Advertisements
Similar presentations
Patch Management Patch Management in a Windows based environment
Advertisements

Dial In Number Pin: 3959 Information About Microsoft September 21, 2012 Security Bulletin Jeremy Tinder Security Program Manager Microsoft.
Microsoft Windows XP SP2 Urs P. Küderli Strategic Security Advisor Microsoft Schweiz GmbH.
WSUS Presented by: Nada Abdullah Ahmed.
AVG Internet Security 7.5 Product presentation.
Installation and Deployment in Microsoft Dynamics CRM 4.0
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
Changes in Windows XP Service Pack 2
Information for Developers Windows XP Service Pack 2 Information for Developers.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Microsoft Baseline Security Analyzer INLS 187 Security Software Presentation by Hinár György Polczer
Module 6: Patches and Security Updates 1. Overview Installing Patches and Security Updates Recent patches and security updates for IIS Recent patches.
To receive our video stream in LiveMeeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW Understand the difference between service.
Review of February 2013 Bulletin Release Information - 12 New Security Bulletins - One Updated Security Advisory - Microsoft Windows Malicious Software.
To receive our video stream in LiveMeeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
Dial In Number Pin: 3879 Information About Microsoft May 2012 Security Bulletins Dustin Childs Sr. Security Program Manager Microsoft Corporation.
IT:Network:Microsoft Applications
Module 16: Software Maintenance Using Windows Server Update Services.
Dial In Number PIN: 1056 Information About Microsoft December 2011 Security Bulletins Jonathan Ness Security Development Manager Microsoft.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW  Understand the difference between service.
To receive our video stream in Live Meeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
2851A_C01. Microsoft Windows XP Service Pack 2 Security Technologies Bruce Cowper IT Pro Advisor Microsoft Canada.
Microsoft October 2004 Security Bulletins Briefing for Senior IT Managers updated October 20, 2004 Marcus H. Sachs, P.E. The SANS Institute October 12,
Microsoft ® Official Course Module 9 Configuring Applications.
Information About Microsoft Project and Project Server Cumulative December Update Adrian Jenkins Support Escalation Engineer Microsoft Corporation 1 Brian.
九月份資訊安全公告 Sep 14, 2006 Richard Chen 陳政鋒 (Net+, Sec+, MCSE2003+Security, CISSP) 資深技術支援工程師 台灣微軟技術支援處.
To receive our video stream in LiveMeeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
Managing CERN Desktops with Systems Management Server (SMS 2003) Michel Christaller Internet Services Group Department of Information Technology CERN May.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Module 1: Installing Windows XP Professional. Overview Manually Installing Windows XP Professional Automating a Windows XP Professional Installation Using.
Dial In Number Pin: 3959 Information About Microsoft December 2012 Security Bulletins Jonathan Ness Security Development Manager Microsoft.
To receive our video stream in LiveMeeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
© 2006 Global Knowledge Training LLC All rights reserved. Deploying Outlook 2003 Configuring Clients Outlook 2003 Security and Performance New Outlook.
2 New Security Bulletins and AdvisoriesNew Security Bulletins and Advisories –1 New Security Advisory –1 New Critical Bulletin –1 New Moderate Bulletin.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 12: Deploying and Managing Software with Group Policy.
Dial In Number Pin: 3959 Information About Microsoft August 2012 Security Bulletins Jonathan Ness Security Development Manager Microsoft.
To receive our video stream in LiveMeeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
Dial In Number Pin: 3959 Information About Microsoft’s January 2013 Out-of-Band Security Bulletin Jonathan Ness Security Development Manager.
Dial In Number Pin: 5639 Information About Microsoft January 2012 Security Bulletins Dustin Childs Sr. Security Program Manager, MSRC Microsoft.
Dial In Number Pin: 3959 Information About Microsoft November 2012 Security Bulletins Jeremy Tinder Security Program Manager Microsoft Corporation.
Dial In Number Pin: 5453 Information About Microsoft June 2012 Security Bulletins Jonathan Ness Security Development Manager Microsoft Corporation.
1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Using Internet Explorer 7.0 to Access Cisco Unity 5.0(1) Web Interfaces Unity 5.0(1)
SMS 2003 Deployment and Managing Windows Security Rafal Otto Internet Services Group Department of Information Technology CERN 26 May 2016.
Dial In Number Pin: 3959 Information About Microsoft January 2013 Security Bulletins Andrew Gross Senior Security Program Manager Microsoft.
C HAPTER 2 Introduction to Windows XP Professional.
二月份資訊安全公告 Feb 16, 2007 Richard Chen 陳政鋒 (Net+, Sec+, MCSE2003+Security, CISSP) 資深技術支援工程師 台灣微軟技術支援處.
Module 5: Configuring Internet Explorer and Supporting Applications.
Dial In Number Pin: 0336 Information About Microsoft February 2012 Security Bulletins Jonathan Ness Security Development Manager Microsoft.
To receive our video stream in LiveMeeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
十二月份資訊安全公告 Dec 14, 2006 Richard Chen 陳政鋒 (Net+, Sec+, MCSE2003+Security, CISSP) 資深技術支援工程師 台灣微軟技術支援處.
NetTech Solutions Protecting the Computer Lesson 10.
Richard Chen 陳政鋒 (Net+, Sec+, MCSE2003+Security, CISSP) 資深技術支援工程師 台灣微軟技術支援處 五月份資訊安全公告 May 10, 2007.
11 IMPLEMENTING AND MANAGING SOFTWARE UPDATE SERVICES Chapter 7.
Information About Microsoft Out-of-Band Security Bulletins.
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
Windows Server 2003 SP1 Technical Overview John Howard, IT Pro Evangelist, Microsoft UK
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
CACI Proprietary Information | Date 1 PD² SR13 Client Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead Date: December 8, 2011.
Maintaining and Updating Windows Server 2008 Lesson 8.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Information About Microsoft’s August 2004 Security Bulletins August 13, 2004 Feliciano Intini, CISSP, MCSE Security Advisor Premier Security Center Microsoft.
11 DEPLOYING AN UPDATE MANAGEMENT INFRASTRUCTURE Chapter 6.
十月份資訊安全公告 Oct 12, 2006 Richard Chen 陳政鋒 (Net+, Sec+, MCSE2003+Security, CISSP) 資深技術支援工程師 台灣微軟技術支援處.
WannaCrypt Ransomeware Customer Guidance
MICROSOFT OUTLOOK and Outlook service Provider
Microsoft’s Security Strategy
Microsoft Office Not in Textbook.
Severity and Exploitability Index
Using Software Restriction Policies
Presentation transcript:

一月份資訊安全公告 Jan 15, 2007 Richard Chen 陳政鋒 (Net+, Sec+, MCSE2003+Security, CISSP) 資深技術支援工程師 台灣微軟技術支援處

Questions and Answers Submit text questions using the “Ask a Question” buttonSubmit text questions using the “Ask a Question” button

What We Will Cover Other security resourcesOther security resources –Prepare for new WSUSSCAN.CAB architecture –Lifecycle Information –Windows Malicious Software Removal Tool ResourcesResources Questions and answersQuestions and answers

Recap Dec. security updates MS06-072MS Cumulative Security Update for Internet Explorer –MS and all previous Cumulative Security Updates for Internet Explorer. MS06-073MS Vulnerability Visual Studio 2005 Could Allow Remote Code Execution –This update resolves a public vulnerability for WMI Object Broker. MS06-070MS Vulnerability in Windows Media Format Could Allow Remote Code Execution

Jan Security Bulletins Summary On Jan 10:On Jan 10: –4 New Security Bulletins 1 Windows (critical)1 Windows (critical) 3 Office components3 Office components –2 High-priority non-security updates

Jan Security Bulletins Overview Bulletin Number Title Maximum Severity Rating Products Affected MS Vulnerability in Microsoft Office 2003 Brazilian Portuguese Grammar Checker That Could Allow Remote Code Execution (921585) Important Office 2003, Project 2003, Visio 2003 MS Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (927198) Critical Excel 2000, 2002, 2003, Excel for Mac MS Vulnerabilities in Microsoft Outlook Could Allow Remote Code Execution (925938) Critical Outlook 2000, 2002, 2003 MS Vulnerability in Vector Markup Language Could Allow Remote Code Execution (929969) Critical Windows 2000, XP, 2003

Jan Security Bulletins Severity Summary Bulletin Number Microsoft Office 2003 (Brazilian Version) Microsoft Office MUI 2003 Microsoft Project MUI 2003 and Microsoft Visio MUI 2003 MS ImportantImportantImportant Microsoft Office Excel 2000 Microsoft Office Excel 2002 Microsoft Office Excel 2003 Microsoft Excel Viewer 2003 Microsoft Office Excel 2004, X for Mac MS CriticalImportantImportantImportantImportant Microsoft Outlook 2000 Microsoft Outlook 2002 Microsoft Outlook 2003 MS ModerateImportantImportant Windows 2000 SP4 Windows XP SP2 Windows Server 2003 Windows Server 2003 SP1 Windows Vista MS CriticalCriticalCriticalModerate Not Affected

Title: Vulnerability in Microsoft Office 2003 Brazilian Grammar Checker Vulnerability Could Allow Remote Code Execution (921585) Affected Software: Microsoft Office 2003 Service Pack 2Microsoft Office 2003 Service Pack 2 Microsoft Office Multilingual User Interface 2003Microsoft Office Multilingual User Interface 2003 Microsoft Project Multilingual User Interface 2003Microsoft Project Multilingual User Interface 2003 Microsoft Visio Multilingual User Interface 2003Microsoft Visio Multilingual User Interface 2003 Vulnerabilities: CVE CVE Publicly Disclosed: YesYes Known Exploits: NoNo MS07-001: Office - Important

Issue Summary: An remote code execution vulnerability in the Office 2003 Brazilian Grammar Checker could allow an attacker to take complete control of the affected system. Attack Vectors: Maliciously Crafted Web PageMaliciously Crafted Web Page Maliciously Crafted AttachmentMaliciously Crafted Attachment Mitigations: Users would have to be persuaded to visit a malicious web siteUsers would have to be persuaded to visit a malicious web site Exploitation only gains the same user rights as the local userExploitation only gains the same user rights as the local user User must be convinced to open the attachmentUser must be convinced to open the attachment Workarounds: Do not save or open Office files from un-trusted sources or that are received unexpectedly from trusted sources.Do not save or open Office files from un-trusted sources or that are received unexpectedly from trusted sources. MS07-001: Office-Important

Replaced Updates: NoneNone Installation and Removal Caveats: Office 2003 SP2 must be applied prior to applying this update. (Office 2003 SP1 is no longer a supported platform.)Office 2003 SP2 must be applied prior to applying this update. (Office 2003 SP1 is no longer a supported platform.) Restart Required: NoNo More Information: For more Information, please review the FAQ at: mspxFor more Information, please review the FAQ at: mspx mspx mspx Known Issue None so far.None so far. MS07-001: Office-Important

Title: Vulnerability in Microsoft Excel Could Allow Remote Code Execution (927198) Affected Software: Microsoft Excel 2000, 2002, 2003Microsoft Excel 2000, 2002, 2003 Microsoft Excel Viewer 2003Microsoft Excel Viewer 2003 Microsoft Works Suite 2004, 2005, 2006Microsoft Works Suite 2004, 2005, 2006 Microsoft Office 2004 for MacMicrosoft Office 2004 for Mac Microsoft Office X for MacMicrosoft Office X for Mac Vulnerabilities: CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE Publicly Disclosed: NoNo Known Exploits: NoNo MS07-002: Excel - Critical

Issue Summary: An Remote Code Execution vulnerability in Excel could allow an attacker to take complete control of the affected system. Attack Vectors: Maliciously Crafted Web PageMaliciously Crafted Web Page Maliciously Crafted Maliciously Crafted Specially Crafted Network MessageSpecially Crafted Network Message Mitigations: Users would have to be persuaded to visit a malicious web siteUsers would have to be persuaded to visit a malicious web site Exploitation only gains the same user rights as the local userExploitation only gains the same user rights as the local user The vulnerability cannot be exploited automatically through e- mailThe vulnerability cannot be exploited automatically through e- mail Users who have installed and are using the Office Document Open Confirmation Tool for Office 2000 will be prompted with Open, Save, or Cancel before opening a document.Users who have installed and are using the Office Document Open Confirmation Tool for Office 2000 will be prompted with Open, Save, or Cancel before opening a document. Workarounds: Do not open or save Microsoft Excel files that you receive from untrusted sources or that you receive unexpectedly from trusted sources.Do not open or save Microsoft Excel files that you receive from untrusted sources or that you receive unexpectedly from trusted sources. MS07-002: Excel - Critical

Replaced Updates: MS06-059MS Installation and Removal Caveats: Excel 2000 update cannot be uninstalledExcel 2000 update cannot be uninstalled Office 2004 for Mac update cannot be uninstalledOffice 2004 for Mac update cannot be uninstalled Office X for Mac update cannot be uninstalledOffice X for Mac update cannot be uninstalled Restart Required: NoNo More Information: For more Information, please review the FAQ at: mspxFor more Information, please review the FAQ at: mspx mspx mspx Known Issue After you install the Microsoft Excel 2000 version of security update MS07-002, you can no longer open some files you created by using Excel 2000 with the Executable Mode set to Korean, Chinese, or Japanese.After you install the Microsoft Excel 2000 version of security update MS07-002, you can no longer open some files you created by using Excel 2000 with the Executable Mode set to Korean, Chinese, or Japanese. Reference: Excel 2000 does not open some files after you install security update that is documented in security bulletin MS Excel 2000 does not open some files after you install security update that is documented in security bulletin MS MS07-002: Excel - Critical

MS07-003: Outlook – Critical Title & KB Article: Vulnerabilities in Microsoft Outlook Could Allow Remote Code Execution (925938) Affected Software: Outlook 2000 SP3Outlook 2000 SP3 Outlook XP SP3Outlook XP SP3 Outlook 2003 SP2Outlook 2003 SP2 Vulnerabilities: CVE Microsoft Outlook VEVENT VulnerabilityCVE Microsoft Outlook VEVENT Vulnerability CVE Microsoft Outlook Denial of Service VulnerabilityCVE Microsoft Outlook Denial of Service Vulnerability CVE Microsoft Outlook Advanced Find VulnerabilityCVE Microsoft Outlook Advanced Find Vulnerability Publicly Disclosed: CVE and CVE NoCVE and CVE No CVE YesCVE Yes Known Exploits?: No No

MS07-003: Outlook - Critical Issue Summary: CVE Microsoft Outlook VEVENT Vulnerability - Remote code execution vulnerability that an attacker could exploit and gain the same rights as the local user. An attacker could try to exploit the vulnerability by creating a specially crafted.ICS (iCal) file or embed the contents of an iCal calendar request in the body of a specially crafted and send it to a user of Outlook who connects to a POP, IMAP or HTTP server to retrieve their .CVE Microsoft Outlook VEVENT Vulnerability - Remote code execution vulnerability that an attacker could exploit and gain the same rights as the local user. An attacker could try to exploit the vulnerability by creating a specially crafted.ICS (iCal) file or embed the contents of an iCal calendar request in the body of a specially crafted and send it to a user of Outlook who connects to a POP, IMAP or HTTP server to retrieve their . CVE Microsoft Outlook Denial of Service Vulnerability An attacker who exploited this denial of service vulnerability could cause the affected system to stop responding.CVE Microsoft Outlook Denial of Service Vulnerability An attacker who exploited this denial of service vulnerability could cause the affected system to stop responding. CVE Microsoft Outlook Advanced Find Vulnerability A remote code execution vulnerability that an attacker could exploit when Outlook parses a Office Saved Searches (.oss) file.CVE Microsoft Outlook Advanced Find Vulnerability A remote code execution vulnerability that an attacker could exploit when Outlook parses a Office Saved Searches (.oss) file. Attack Vectors: Malicious Malicious Malicious Web PageMalicious Web Page Mitigations: Exploitation only allows the same privileges as the logged on user.Exploitation only allows the same privileges as the logged on user. CVE : MAPI is not a valid attack vector due to Exchange's handling of iCal calendar data in messages or in.ICS attachments.CVE : MAPI is not a valid attack vector due to Exchange's handling of iCal calendar data in messages or in.ICS attachments. CVE : No way to force users to visit a malicious Web site and the vulnerability cannot be exploited automatically through .CVE : No way to force users to visit a malicious Web site and the vulnerability cannot be exploited automatically through . Workarounds: Modify registry and do not open/save Ofc Saved Searches (.oss) filesModify registry and do not open/save Ofc Saved Searches (.oss) files

MS07-003: Outlook - Critical Replaced Updates: MS Outlook 2003 MS Outlook 2003 MS Outlook 2000 and Outlook 2002 MS Outlook 2000 and Outlook 2002 Installation and Removal Caveats: Add/Remove Programs Add/Remove Programs Command line uninstall option Command line uninstall option Scriptable Deployment Scriptable Deployment Restart Requirement: This update may require a restart if the affected files are in use. This update may require a restart if the affected files are in use. More Information: For more Information, please review the FAQ at: mspx mspx Known Issue Outlook users can no longer open or save the search results as an Office Saved Searches (.oss) file. Additionally, you can no longer open an Office Saved Searches (.oss) file by using Outlook.Outlook users can no longer open or save the search results as an Office Saved Searches (.oss) file. Additionally, you can no longer open an Office Saved Searches (.oss) file by using Outlook. The feature was disabled by this patch for security reasons.The feature was disabled by this patch for security reasons. References: KB and KB925542References: KB and KB925542

Title: Vulnerability in Vector Markup Language Could Allow Remote Code Execution (929969) Affected Software: Microsoft Windows 2000 SP4Microsoft Windows 2000 SP4 Microsoft Windows XP SP2Microsoft Windows XP SP2 Microsoft Windows XP Professional x64 EditionMicrosoft Windows XP Professional x64 Edition Microsoft Windows Server 2003 and 2003 SP1Microsoft Windows Server 2003 and 2003 SP1 Microsoft Windows Server 2003 and 2003 SP1 for Itanium-based SystemsMicrosoft Windows Server 2003 and 2003 SP1 for Itanium-based Systems Microsoft Windows Server 2003 x64 EditionMicrosoft Windows Server 2003 x64 Edition Microsoft Windows Vista RC1Microsoft Windows Vista RC1 Vulnerabilities: CVE CVE Publicly Disclosed: This update resolves a public vulnerability as well as additional issues discovered through internal investigationsThis update resolves a public vulnerability as well as additional issues discovered through internal investigations Known Exploits: Yes. When the security bulletin was released, Microsoft had received information that this vulnerability was being exploited.Yes. When the security bulletin was released, Microsoft had received information that this vulnerability was being exploited. MS07-004: VML- Critical

Issue Summary: A remote code execution vulnerability exists in the Vector Markup Language (VML) implementation in Microsoft Windows. It could allow an attacker to take complete control of an affected system. Attack Vectors: Maliciously Crafted Web PageMaliciously Crafted Web Page Maliciously Crafted Maliciously Crafted Mitigations: Users would have to be persuaded to visit a malicious web siteUsers would have to be persuaded to visit a malicious web site Exploitation only gains the same user rights as the local userExploitation only gains the same user rights as the local user Reading in plain text mitigates against attack.Reading in plain text mitigates against attack. By default, IE on Windows Server 2003 runs in a restricted mode that is known as Enhanced Security Configuration.By default, IE on Windows Server 2003 runs in a restricted mode that is known as Enhanced Security Configuration. Outlook Express on XP sp2 and Windows server 2003 SP1 open mail in Restricted Sites zone by default.Outlook Express on XP sp2 and Windows server 2003 SP1 open mail in Restricted Sites zone by default. Workarounds: Un-register VGX.DLLUn-register VGX.DLL Modify the ACL on VGX.DLL to be more restrictiveModify the ACL on VGX.DLL to be more restrictive Configure IE 6 for XP SP2 to disable Binary and Script behaviors in Intranet zone.Configure IE 6 for XP SP2 to disable Binary and Script behaviors in Intranet zone. Read in plain text.Read in plain text. Block VML Vulnerability traffic with ISA ServerBlock VML Vulnerability traffic with ISA Server MS07-004: VML-Critical

Replaced Updates: MS06-055MS Installation and Removal Caveats: Some listed mitigations must be undone before the update is installed.Some listed mitigations must be undone before the update is installed. Remove through Add\Remove programsRemove through Add\Remove programs Restart Required: YesYes More Information: For more Information, please review the FAQ at: mspxFor more Information, please review the FAQ at: mspx mspx mspx Known Issue The update bulletin states that a reboot is always required. However, users are not always prompted to reboot after installation.The update bulletin states that a reboot is always required. However, users are not always prompted to reboot after installation. If vgx.dll is not loaded in process anywhere on the system, then the update will apply and not force a reboot. If you are not prompted to reboot after installation, no reboot is necessary.If vgx.dll is not loaded in process anywhere on the system, then the update will apply and not force a reboot. If you are not prompted to reboot after installation, no reboot is necessary. MS07-004: VML- Critical

Detection and Deployment WU/SUS/ AU Office Update & SMS Microsoft Office Inventory Tool for Updates MBSA 1.2 & SMS Security Update Inventory Tool Enterprise Scan Tool & SMS Security Update Scan Tools MU/WSUS/AU, SMS 2003 ITMU, & MBSA 2.0 MS NAYesLocalNA Yes (except 2000) MS NAYesLocalNA Yes (except 2000) MS NAYesLocalNA Yes (except 2000) MS YesNANoYesYes

Other Update Information BulletinRestartHotpatchingUninstallReplaces On products MS May be required NAYesNA MS NAYesMS06-059All MS NAYesMS06-003All MS RequiredNoYesMS06-055All

January 2007 Non-Security Updates NUMBERTITLEDistribution Update for Outlook Junk Filter 2003 MU Update for Outlook 2003 WU, MU

New WSUSSCAN.CAB architecture New architecture for wsusscan.cab begins since November 2006 Support for existing wsusscan.cab architecture ends on March 2007 SMS ITMU customers: download and deploy updated version of the SMS ITMU – – MBSA 2.0 offline scan customers: – –Download updated version of MBSA now – –Or download the new offline scan file, wsusscn2.cab, by clicking Save this file to C:\Documents and Settings\ \Local Settings\Application Data\Microsoft\MBSA\2.0\Cache\wsusscn2.cab. If you only run MBSA 2.0 in the online mode, do anything. See Microsoft KB Article for more information – –

Lifecycle Support Information Software Update Services (SUS) 1.0Software Update Services (SUS) 1.0 –Old deadline of 6 December 2006 has CHANGED to 10 July 2007 –Information on upgrading: –Information on upgrading: s/default.mspx s/default.mspx Public security support for Windows XP SP1 and Office 2003 SP1 HAS ENDED as of 10 October 2006Public security support for Windows XP SP1 and Office 2003 SP1 HAS ENDED as of 10 October 2006 –No Security Updates for Windows XP SP1 or Office 2003 SP1 starting in November 2006 –Remaining Windows XP SP1, Office 2003 SP1 customers should upgrade to Windows XP SP2, Office 2003 SP2 right away Public security support for Windows 98, 98 SE, and Millennium Edition HAS ENDED as of 11 July 2006Public security support for Windows 98, 98 SE, and Millennium Edition HAS ENDED as of 11 July 2006 –See for more information Microsoft Forefront Client Security Beta open to download.Microsoft Forefront Client Security Beta open to download. –

Windows Malicious Software Removal Tool – KB The Jan update adds the ability to remove:The Jan update adds the ability to remove: –Win32/Haxdoor Available as priority update through Windows Update or Microsoft Update for Windows XP usersAvailable as priority update through Windows Update or Microsoft Update for Windows XP users –Offered through WSUS; not offered through SUS 1.0 Also as an ActiveX control or download at as an ActiveX control or download at Deployment step-by-stsp: KB891716Deployment step-by-stsp: KB891716

Resources Jan Security Bulletin Webcast (US) US&EventID= Jan Security Bulletin Webcast (US) US&EventID= US&EventID= US&EventID= Security Bulletins Summary Bulletins Summary Security Bulletins Search Bulletins Search Security Advisories Advisories MSRC Blog Blog Notifications TechNet Radio Radio IT Pro Security Newsletter Pro Security Newsletter TechNet Security Center Security Center TechNet Forum ITPro Forum ITPro Detection and deployment guidance for the Jan 2007 security release and deployment guidance for the Jan 2007 security release

Questions and Answers Submit text questions using the “Ask a Question” buttonSubmit text questions using the “Ask a Question” button Don’t forget to fill out the surveyDon’t forget to fill out the survey For upcoming and previously recorded webcasts: upcoming and previously recorded webcasts: Webcast content suggestions: content suggestions: