ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Help me about Windows updates, patches as per current (ransomware) suggestions.

    IT Discussion
    7
    12
    1.3k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • openitO
      openit
      last edited by

      Hi all,

      As you are aware of NHS England, German Railway, etc. are affected by Ransomware virus (WannaCry - as of now highlighted).

      Lots of patches may be released by the Microsoft and one of them I know is https://technet.microsoft.com/en-us/library/security/ms17-010.aspx

      Following are my queries :

      1. Doing only Windows Updates is not enough to get all Patches ? or there are some patches like (MS17-010) which should be patched separately and not available in normal Windows Updates ?, if yes, what is the central location to get this information so that I can apply for our workstations.

      2. We are having all Windows 7-10. And from link https://technet.microsoft.com/en-us/library/security/ms17-010.aspx , I am not very clear what to install to get patched. Let me give example for my laptop :

      a) I have navigated to Windows 10 Version 1607 build which is my laptop build from above link MS17-010
      0_1494750360293_1607.JPG

      b) And opened 3213986 link from Update Replaced, which took to following page:
      0_1494750447067_catalog.JPG

      c) And then chosen Microsoft Update Catalog and following is the next screen and again not sure which executable (patch) to download ?
      0_1494750507520_which one.JPG

      1. Third step in this process is to disable SMB V1.0 on all which is very older one.

      2. Currently all workstations are left to update windows randomly, but seems end-users are skipping some times (by postponing) and you know Windows Updates can take 30-40 minutes sometimes and users are very annoyed when it happens on working hours. What's the best practice to set the Windows Updates Schedule ?

      Appreciate your suggestions !

      1 Reply Last reply Reply Quote 1
      • scottalanmillerS
        scottalanmiller
        last edited by

        My understanding is that if you automatically apply all patches, that everything will get patched. Nothing should be held back unless you are forcing some sort of manual process.

        1 Reply Last reply Reply Quote 1
        • ObsolesceO
          Obsolesce
          last edited by Obsolesce

          In your picture under a) it's the other number... Starts with 4. Look up that one and make sure its installed. If your Win10 pcs are updating automatically you are fine.

          1 Reply Last reply Reply Quote 2
          • hobbit666H
            hobbit666
            last edited by

            Was going to post something similar this morning. In light of what happened what else should we be checking to keep those bugs/virus out?

            Update and current AV solution? Dedicated Ransomeware solution like MalewareBytes?

            As just having a fully patched OS an't enough

            scottalanmillerS Deleted74295D 2 Replies Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller @hobbit666
              last edited by

              @hobbit666 said in Help me about Windows updates, patches as per current (ransomware) suggestions.:

              As just having a fully patched OS an't enough

              It's actually enough in most cases. Of course having things like AV is another layer of protection. But good user behaviour and proper patching are the big factors. Nothing protects you 100% and nothing ever will. But if there is one thing that matters most, it's patching.

              1 Reply Last reply Reply Quote 2
              • Deleted74295D
                Deleted74295 Banned
                last edited by

                Just recorded a video about this very topic.

                On a blunt note, This entire farce was preventable based on the things we've been saying for decades. Update, Backup, Don't click on junk.

                1 Reply Last reply Reply Quote 3
                • Deleted74295D
                  Deleted74295 Banned @hobbit666
                  last edited by

                  @hobbit666 said

                  As just having a fully patched OS an't enough

                  Why not? This recent exploit was patched by MS 2 months ago. Only one of my clients systems was affected by this and it was a Windows 7 unmanaged box.

                  scottalanmillerS 1 Reply Last reply Reply Quote 2
                  • scottalanmillerS
                    scottalanmiller @Deleted74295
                    last edited by

                    @Breffni-Potter said in Help me about Windows updates, patches as per current (ransomware) suggestions.:

                    @hobbit666 said

                    As just having a fully patched OS an't enough

                    Why not? This recent exploit was patched by MS 2 months ago. Only one of my clients systems was affected by this and it was a Windows 7 unmanaged box.

                    In this case, it was definitely enough. But as general good practice if running Windows, it's not enough. However, AV is included in Windows so it is only not okay to remove it.

                    1 Reply Last reply Reply Quote 1
                    • ObsolesceO
                      Obsolesce
                      last edited by

                      Just an FYI if anyone doesn't know:

                      Microsoft has already released updates for this vulnerability for Windows XP and Windows Server 2003. I don't have the link handy, but they did!

                      scottalanmillerS dbeatoD 2 Replies Last reply Reply Quote 3
                      • scottalanmillerS
                        scottalanmiller @Obsolesce
                        last edited by

                        @Tim_G said in Help me about Windows updates, patches as per current (ransomware) suggestions.:

                        Just an FYI if anyone doesn't know:

                        Microsoft has already released updates for this vulnerability for Windows XP and Windows Server 2003. I don't have the link handy, but they did!

                        Yup, there are zero excuses for anyone infected with this. Absolutely zero.

                        1 Reply Last reply Reply Quote 1
                        • dbeatoD
                          dbeato @Obsolesce
                          last edited by

                          @Tim_G Yes, https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/

                          1 Reply Last reply Reply Quote 1
                          • NDCN
                            NDC
                            last edited by

                            Link to the MS Update Catalog for this issue(KB4012598).

                            1 Reply Last reply Reply Quote 0
                            • 1 / 1
                            • First post
                              Last post