Preview

Microsoft Environment Analysis

Good Essays
Open Document
Open Document
551 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Microsoft Environment Analysis
Five vulnerabilities for the workgroup LAN based on the Microsoft Security Advisories are 2755801, 2719662, 2854544, 2846338, and 2847140. 2846338 involves privilege elevation, vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority.
Three vulnerabilities and Solutions related to client configuration.
Advisory Number: 2719662. Microsoft is announcing the availability of an automated Microsoft Fix it solution that disables the Windows Sidebar and Gadgets on supported editions of Windows Vista and Windows 7. Disabling Windows Sidebar and Gadgets can help protect customers from potential attacks that leverage Gadgets to execute arbitrary code. Customers should consider the following ways that an attacker could leverage Gadgets to execute arbitrary code; un addition, Microsoft is aware that some legitimate Gadgets running in Windows Sidebar could contain vulnerabilities. An attacker who successfully exploited a gadget vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could also create a malicious Gadget and then trick a user into installing the malicious gadget. Once installed, the malicious gadget could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. Gadgets can access your computer's files, show you objectionable content, or change their behavior at any time. Gadgets could also potentially harm your computer.
Recommendation: Customers who are concerned about vulnerable or malicious gadgets should apply the automated Microsoft Fix it solution as soon as possible.
Advisory Number: 2854544
Microsoft is announcing the availability of an update as part of ongoing efforts to improve cryptography and digital

You May Also Find These Documents Helpful

  • Powerful Essays

    • This needs to be completed before the code freeze on December 20, so that any fixes to the software are completed and tested…

    • 1244 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    One common vulnerability is the lack of or outdated antivirus software. We get the popup alerts and click it away, because that alert is so annoying. But what must be realized is that annoying popup is a warning alert telling the user that the local workstation or network has a weakness that needs to be addressed.…

    • 167 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Without your knowledge, employees in your office have installed several new software programs on their computers. Everyone is complaining that their computers…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ISSC362 Week 2 Lab

    • 454 Words
    • 2 Pages

    Vulnerability MS08-067 is an exposure in Server Service that could allow remote code execution in an affected system. The operating systems affected are Microsoft Windows 2000, Windows XP, and Windows Server 2003.…

    • 454 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 2 Instructions

    • 389 Words
    • 2 Pages

    1. What vulnerabilities exist for the workgroup LAN listed above based on the advisories? List five of them. Explain what could happen to the LAN for each.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3110 Quiz 6 2015

    • 600 Words
    • 2 Pages

    These are related to malware and Viruses. Users can bring malware from home on Universal Serial Bus (USB) flash disks. They can accidentally download malware from Web sites. They can also install malware from malicious e-mails. The primary protection is to ensure that you install antivirus (AV) software. Additionally, you need to update AV signatures regularly. You can’t depend on the users to keep their signatures up to date. Instead, you must take control of the process. Many AV…

    • 600 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IS3445 Lab 7

    • 371 Words
    • 2 Pages

    3. What possible high risk vulnerabilities did the Rats tool find in the DVWA application source code?…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Marketing and Sales: Attracting the customers to buy the products including distribution channel selection and advertising.…

    • 458 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Sample Security Plan X

    • 2479 Words
    • 10 Pages

    This security plan is our first. We will take a broad view of the security risks facing the firm and take prompt action to reduce our exposure. Everyone remembers the virus attack we had earlier this year, and we hope to avoid another disaster like that! However, I hope that by taking a wider view, we may be able to plan for threats we don’t know about yet.…

    • 2479 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Lab testing was successful, so Microsoft IT rolled out the solution into a production environment in a limited-participant pilot. The initial pilot was successful, and soon 10,000 participants were using the product. The ability to quickly see reports on the security status of all participating clients quickly facilitated executive queries. Moreover, a centralized console simplified client management. If a report on the console alerted Microsoft IT security staff to a misconfiguration that exposed a vulnerability or a possible malware infection, the team could easily resolve the issue. The team could quickly move through console reports and remotely correct the misconfiguration. Or, the team could initiate an anti-malware scan on the client computer without involving the…

    • 470 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Penetration Testing

    • 3406 Words
    • 14 Pages

    As electronic commerce, online business-to-business operations, and global connectivity have become vital components of a successful business strategy, enterprises have adopted security processes and practices to protect information assets. But if you look at today's computing environments, system security is a horrible game of numbers: there are currently over 9,223 publicly released vulnerabilities covering known security holes in a massive range of applications from popular Operating Systems through to obscure and relatively unknown web applications. [01] Over 300 new vulnerabilities are being discovered and released each month. Most companies work diligently to maintain an efficient, effective security policy, implementing the latest products and services to prevent fraud, vandalism, sabotage, and denial of service attacks. But the fact is you have to patch every hole of your system, but an attacker need find only one to get into your environment. Whilst many organisations subscribe to major vendor's security alerts, these are just the tip of the security iceberg and even these are often ignored. For example, the patch for the Code Red worm was available some weeks before the worm was released. [02]…

    • 3406 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Computer Fraud and Crimes

    • 1013 Words
    • 5 Pages

    amounts of memory being used and the file usage if something is going on that…

    • 1013 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Site Analysis

    • 373 Words
    • 2 Pages

    Since 2005, MCT Consortium has been realising the dreams of those who dare to dream. The potent blend of our expertise in the property development industry and the continual passion in creating long-lasting structures with dynamic outlook enables us to be at the forefront of the booming scene.…

    • 373 Words
    • 2 Pages
    Satisfactory Essays

Related Topics