Deploy Immediately MS11-083 – Vulnerability in TCP/IP Could Allow Remote Code Execution (2588516) Recommendation: Install the patch immediately to prevent exploitation by attackers. Until the patch can be installed, any unused UDP ports should be blocked at the external firewall. Deploy As Soon As Possible MS11-085 – Vulnerability in Windows Mail and Windows Meeting Space Could Allow Remote Code Execution (2620704) Recommendation: Deploy patches as soon as possible. Until the patch can be installed, block ports 139 and 445 using a firewall, prevent the WebClient service from running, and prevent DLLs from being loaded from WebDAV and remote shares. MS11-086 – Vulnerability in Active Directory Could Allow Elevation of Privilege (2630837) Recommendation: Deploy patches as soon as possible. Until the patch can be installed, remove the user account that is associated with the revoked certificate. Also, use LDAPS along with IPsec-based connections that are in "Always check CRL" mode. Deploy At Earliest Convenience MS11-084 – Vulnerability in Windows Kernel-Mode Drivers Could Allow Denial of Service (2617657) Recommendation: Deploy patches at the earliest convenience. Until the patch can be installed, block ports 139 and 445 using a firewall, prevent the WebClient service from running, and disable both the Preview and Details Pane in Windows Explorer.
- Privileged Password Management
- Discover, manage, audit, and monitor privileged accounts
- Endpoint Privilege Management
- Manage privileges on Windows, Mac, Linux, and Unix endpoints
Universal Privilege Management
Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.