Anyone using Microsoft System Center Configuration Manager for handling this? http://www.microsoft.com/systemcenter/en/us/configuration-manager.aspx On Fri, Sep 24, 2010 at 10:45 AM, Kramer, Jack <[log in to unmask]>wrote: > Nice, I didn’t know those existed until now. How about Acrobat anyone? > Most breaches I’ve had in the past few months have been due to users who > don’t update their Acrobat installations – despite my frequent urgings. > ---- > Jack Kramer > Computer Systems Specialist > University Relations, Michigan State University > w: 517-884-1231 / c: 248-635-4955 > > > > ------------------------------ > *From: *Jon Galbreath <[log in to unmask]> > *Reply-To: *Jon Galbreath <[log in to unmask]> > *Date: *Fri, 24 Sep 2010 11:31:09 -0400 > *To: *"[log in to unmask]" <[log in to unmask]> > > *Subject: *Re: [MSUNAG] Re-evaluating tools for patching > workstations/servers and 3rd party apps > > I push new versions of Flash via AD and GPOs. Downloads for the corporate > versions without the built-in updater and nag screens can be found here: > ActiveX MSI link < > http://fpdownload.macromedia.com/get/flashplayer/current/licensing/win/install_flash_player_10_active_x.msi> > > Plugin MSI Link < > http://fpdownload.macromedia.com/get/flashplayer/current/licensing/win/install_flash_player_10_plugin.msi> > > > > *Jon Galbreath > *MCSE/Security+ > Systems Administrator > International Studies and Programs > Ph: 517-884-2144 > [log in to unmask] > > > *From:* Peter J Murray [mailto:[log in to unmask] <[log in to unmask]>] > *Sent:* Friday, September 24, 2010 11:28 AM > *To:* [log in to unmask] > *Subject:* Re: [MSUNAG] Re-evaluating tools for patching > workstations/servers and 3rd party apps > > So how are people keeping Flash and all those other Adobe products updated > on Windows machines? > > Also somewhat related, how do various departments handle admin rights over > the users PC for the user of that PC? > > ------------------------------ > > > *From: *"Vasquez, Timo" <[log in to unmask]> > > *Date: *Fri, 24 Sep 2010 11:24:56 -0400 > > *To: *<[log in to unmask]> > > *ReplyTo: *"Vasquez, Timo" <[log in to unmask]> > > *Subject: *Re: [MSUNAG] Re-evaluating tools for patching > workstations/servers and 3rd party apps > > > Agreed sir. > > > Timoteo "*Timo*" Vasquez; MCTS, MCP > *C**lient Services - N**etwork Security Team > *[log in to unmask] - 517.884-3082 > *Administrative Information Services > 2 Administration Bldg > East Lansing, MI 48832 > * "...I agree with you!" > > > *From:* STeve Andre' [mailto:[log in to unmask] <[log in to unmask]>] > *Sent:* Thursday, September 23, 2010 2:50 PM > *To:* [log in to unmask] > *Subject:* Re: [MSUNAG] Re-evaluating tools for patching > workstations/servers and 3rd party apps > > If I get what you're saying Timo--and please correct me if I'm wrong-- > you are saying that most of the risk now is people downloading things > they first see when Googling, and they get zapped by some extra treat > in the software they just got. > > I don't believe that. I think that Adobe's horrors (the three fates of > Windows!), Acrobat, Flash and Shockwave represent an amazing > amount of the exploits out there. Flash especially is a great vehicle > for handing out exploits. > > Yes, some people wander around the net and say "Ohh! Thats neat!" > and download some crawling horror, but I think that the more main- > stream exploit is to take advantage of something dealing with the > web. > > --STeve Andre' > > On 09/23/10 14:18, Vasquez, Timo wrote: > You know Firmin, > Most of the risk has been shifted to the source people are downloading > from. So many people rather Google a product, and grab from the first page > of results. So that is a majority of the issue is repackaged products with > additional *ware in it. This is very hard to find cause most actions that > are being executed are not going to set off a lot of the antivirus products > with medium to low heuristics. > > You know I am curious as to a good antivirus that can run on Linux without > having to be installed whenever there is a new kernel update. So good luck > to you and your quest old friend. > > > Timoteo "*Timo*" Vasquez; MCTS, MCP > *C**lient Services - N**etwork Security Team > *[log in to unmask] - 517.884-3082 > *Administrative Information Services > 2 Administration Bldg > East Lansing, MI 48832 > * "...I agree with you!" > > > *From:* Charlot, Firmin [mailto:[log in to unmask] <[log in to unmask]>] > *Sent:* Wednesday, September 22, 2010 3:15 PM > *To:* [log in to unmask] > *Subject:* [MSUNAG] Re-evaluating tools for patching workstations/servers > and 3rd party apps > > As you know the vectors of attacks have been shifting for some time now > towards 3rd party apps like Adobe, Flash and others. > Do you know of any tools that can centrally scan for vulnerabilities and > centrally remediate 3rd party apps, Windows & Linux Operating Systems? > If you have a favorite that you would like to share that would be great. > Thanks. > > *Firmin Charlot*, ITIL, MCSE, A+, *Information Systems Manager > Michigan State University - Student Services > Educational and Support Services 162 Student Services Building East > Lansing, MI 48824 > * > [log in to unmask] <blocked::mailto:[log in to unmask] <[log in to unmask]>> *(517) > 432-7541* > *Submit technical requests at** *https://help.ess.msu.edu/ <blocked:: > http://help.ess.msu.edu/> > > > > -- Troy Murray