gsellis
Diamond Member
Hey guys, going through a moment of enterprise style management and have had them set aside deploying SP2. Now before some of you answer, know that our SP1 OS goes out patched to about one level of vulnerabilities back (July). It comes up safe. Too safe, as it almost promotes that we can wait longer.
The only compelling arguments I have is that DCOM and RPC are restructured to be less vulnerable that the patched versions in SP1 (Sasser used this vector). NX is a non-player as we do not have any hardware on the desktop level that can run in NX mode or the Intel equivalent. I can say that IE has a fairly good popup blocker (as opposed to a user trying to install a custom toolbar and potentially loading an adware version.) That will be something that sr mgmt can smell and touch. The firewall is a non-player as we have a better solution (CSA) rolling at the same time.
Have any of you other enterprise ATers come up with some better stuff?
Yes, I know all about the IE, OE, etc., updates. I had to write a white paper on it boiling the MS docs into manager speak.
Here are the arguments from that doc
? Improving the software firewall that is in the base XP to help reduce the network vulnerabilities.
? Adding better restrictions to what can be run without a user?s or administrator?s consent, disallowing control-less IE windows, and adding pop-up blocking to improve the user experience.
? Better defining memory segregation to prevent instructions running in data locations as would occur with a buffer over-run condition.
? Adding better protection for Outlook Express and Messenger, but we do not general use those applications at xxxxx.
? Internet Explorer Add-on Management ? provides control of plug-in components to help resolve crashes created by add-on controls.
? Internet Explorer Add-on Crash Detection ? helps isolate which component may be causing IE to crash.
The only compelling arguments I have is that DCOM and RPC are restructured to be less vulnerable that the patched versions in SP1 (Sasser used this vector). NX is a non-player as we do not have any hardware on the desktop level that can run in NX mode or the Intel equivalent. I can say that IE has a fairly good popup blocker (as opposed to a user trying to install a custom toolbar and potentially loading an adware version.) That will be something that sr mgmt can smell and touch. The firewall is a non-player as we have a better solution (CSA) rolling at the same time.
Have any of you other enterprise ATers come up with some better stuff?
Yes, I know all about the IE, OE, etc., updates. I had to write a white paper on it boiling the MS docs into manager speak.
Here are the arguments from that doc
? Improving the software firewall that is in the base XP to help reduce the network vulnerabilities.
? Adding better restrictions to what can be run without a user?s or administrator?s consent, disallowing control-less IE windows, and adding pop-up blocking to improve the user experience.
? Better defining memory segregation to prevent instructions running in data locations as would occur with a buffer over-run condition.
? Adding better protection for Outlook Express and Messenger, but we do not general use those applications at xxxxx.
? Internet Explorer Add-on Management ? provides control of plug-in components to help resolve crashes created by add-on controls.
? Internet Explorer Add-on Crash Detection ? helps isolate which component may be causing IE to crash.