Tag: Microsoft

IPS Pattern Updates

The Microsoft Active Protections Program (MAPP) is a program for security software providers.  Members of MAPP receive security vulnerability information from the Microsoft Security Response Center (MSRC) in advance of Microsoft’s monthly security update. By sharing vulnerability information prior to the public release of a security update, Microsoft enables security software providers who operate at the application and network layer to offer protection to our mutual customers in a timely manner.  This means, Astaro as a MAPP partner receives vulnerability information earlier. We can provide updated patterns for our Intrusion Prevention Systems (IPS) at the same moment as Microsoft releases their patches. Before the launch of MAPP, security software providers had to wait until the public release of a security update before building protections.  December     Microsoft Advisory: Applicable Rules: MS10-090 3:18197 3:18198 3:18199 3:18216 3:18217 3:18218 3:18221 MS10-091 3:18219 3:18220 3:18233 MS10-092 Not Applicable MS10-093 3:18210 3:18211 MS10-094 3:18222 3:18223 3:18224 3:18225 3:18226 3:18227 MS10-095 3:18208 3:18209 MS10-096 3:18204 3:18205 3:18206 3:18207 MS10-097 3:18202 3:18203 MS10-098 Not Applicable MS10-099 Not Applicable MS10-100 Not Applicable MS10-101 3:18215 MS10-102 Not Applicable MS10-103 3:18212 3:18213 3:18214 3:18230 3:18231 MS10-104 3:18238 MS10-105 3:18200 3:18201 3:18229 3:18235 3:18236 3:18237 MS10-106 Not Applicable November     Microsoft Advisory: Applicable Rules: MS10-087 3:18063 3:18067 3:18068 3:18069 MS10-088 3:18065 3:18066 MS10-089 3:18070 3:18071 3:18072 3:18073 3:18074 3:18076 October     Microsoft Advisory: Applicable Rules: MS10-071 3:17766 3:17767 3:17768 3:17769 3:17770 3:17771 3:17772 3:17774 MS10-072 3:17766 3:17767 MS10-073 Not Applicable MS10-074 Not Applicable MS10-075 3:17753 MS10-076 3:17747 MS10-077 3:18064 MS10-078 3:17752 3:17765 MS10-079 3:17754 3:17755 3:17756 MS10-080 3:17757 3:17758 3:17759 3:17760 3:17761 3:17762 3:17763 3:17764 MS10-081 Not Applicable MS10-082 Not Applicable MS10-083 3:17773 MS10-084 Not Applicable MS10-085 3:17750 MS10-086   September     Microsoft Advisory: Applicable Rules: MS10-061 3:17252 3:17253 MS10-062 3:17242 MS10-063 3:17256 MS10-064 3:17251 MS10-065 1:17103 3:17254 3:17255 MS10-066 Not Applicable MS10-067 3:17250 MS10-068 3:17249 MS10-069 Not Applicable MS10-070 3:17428 3:17429 August     Microsoft Advisory: Applicable Rules: MS10-046 1:17042 1:17043 MS10-047 Not Applicable MS10-048 Not Applicable MS10-049 Not Applicable MS10-050 3:17135 MS10-051 3:17133 MS10-052 3:17117 MS10-053 3:17115 3:17129 3:17130 3:17131 3:17132 3:17136 MS10-054 3:16577 3:17125 3:17126 3:17127 MS10-055 3:17128 MS10-056 3:17119 3:17120 3:17121 3:17122 3:17123 3:17124 MS10-057 3:17134 MS10-058 Not Applicable MS10-059 Not Applicable MS10-060 3:17114 3:17118 July     Microsoft Advisory: Applicable Rules: MS10-042 Not Applicable MS10-043 3:16222 MS10-044 3:17037 3:17038 3:17039 MS10-045 3:17034 3:17035 3:17036 June     Microsoft Advisory: Applicable Rules: MS10-032 Not Applicable MS10-033 3:16661 3:16663 MS10-034 1:16635 MS10-035 3:16637 3:16658 3:16659 MS10-036 Not Applicable MS10-037 Not Applicable MS10-038 3:16638 3:16639 3:16640 3:16641 3:16643 3:16644 3:16645 3:16646 3:16647 3:16648 3:16649 3:16650 3:16651 3:16652 3:16653 3:16654 3:16655 3:16656 3:16657 3:16662 MS10-039 3:16560 3:16660 MS10-040 Not Applicable MS10-041 3:16636 May     Microsoft Advisory: Applicable Rules: MS10-030 3:16595 MS10-031 3:16593 April     Microsoft Advisory: Applicable Rules: MS10-019 3:16530 MS10-020 3:16531 3:16532 3:16539 3:16540 1:16287 1:16453 1:16454 MS10-021 Not Applicable MS10-022 Not Applicable MS10-023 3:16542 MS10-024 3:16534 MS10-025 3:16541 MS10-026 3:16543 MS10-027 3:16537 MS10-028 3:16535 3:16536 MS10-029 3:16533 March     Microsoft Advisory: Applicable Rules: MS10-016 3:16472 MS10-017 3:16461 3:16462 3:16463 3:16464 3:16465 3:16466 3:16467 3:16468 3:16469 3:16470 3:16471 MS10-018 3:16503 3:16504 3:16506 3:16507 3:16508 3:16509 3:16510 3:16511 3:16512 February     Microsoft Advisory: Applicable Rules: MS10-003 3:16416 MS10-004 3:16409 3:16410 3:16411 3:16412 3:16413 3:16421 MS10-005 3:16422 MS10-006 3:16417 3:16418 MS10-007 3:16414 MS10-008 3:16419 3:16420 MS10-009 3:16405 3:16408 MS10-010 Not Applicable MS10-011 Not Applicable MS10-012 3:15009 3:15124 3:15453 3:15847 3:16395 3:16396 3:16397 3:16398 3:16399 3:16400 3:16401 3:16402 3:16403 3:16404 MS10-013 3:16415 MS10-014 3:16394 MS10-015 Not Applicable January     Microsoft Advisory: Applicable Rules: MS10-001 3:16366 MS10-002 3:16367 3:16369     READ MORE

Astaro introduces three new products

This morning, Astaro announced three new products that will be available in 2010. Each product will allow organizations to connect their network while remaining confident in its security and ensuring access to information. Also in development is version 8 of the Astaro Security Gateway

Google Chrome OS and Some Words On Hype

THE HYPE With the announcement of the upcoming Google Chrome OS, Google is adding some hype to the mix. Google is boldly stating that they are “going back to the basics and completely redesigning the underlying security architecture of the OS so that users don't have to deal with viruses, malware and security updates.

Upcoming Up2Date 7.009

Tomorrow morning (CEST) we will release Up2Date 7.009 which will fix two remaining issues from 7.008: downloads via HTTP Proxy using MS Internet Explorer and HTTP domain whitelist entries. Downloads via HTTP Proxy using Internet Explorer (ID6859) When trying to download a file via HTTP Proxy with Microsoft Internet Explorer 6 or 7, the download manager page does not refresh automatically and the download is not shown as finished after scanning succeeds. Mozilla based browsers are not affected.

[Middle] Up2Date 4.002

Urgency: Middle (low, Middle, HIGH) Size: 0.7MB (700,491 bytes) md5sum: 305ce63ac34d28978f880eb1fde84e97 Remarks Required previous version is 4.001 Existing configuration will not be changed New/Changed/Improved the rare SMTP Proxy problem with email server from Microsoft or Lotus is solved: If you have trouble accepting email from Microsoft or Lotus based machines that have underscores in their HELO hostname, please disable and enable the SMTP proxy after the Up2Date process has finished. Bugfix (please refer to the known issue list on http://docs.astaro.org ) the issue in the Up2Date over HA process is fixed IPSec policies configure bug fixed Download Information All Up2Dates are GNUPG-signed! The Astaro Up2Date technology makes it easy to upgrade your installed Astaro Security Linux to the latest version. There are three ways to apply an Up2Date package to the system: Log on to WebAdmin, navigate to “System -> Up2Date Service” and start a “Update now” in “System Up2Date