Tag: gfi

January 2013 Patch Tuesday Bulletins are now Supported by Desktop Central

Microsoft January 2013 Patch Tuesday bulletins are now supported by Desktop Central. The patch assessment team at Desktop Central has tested the patches and have updated their online patch database on January 09, 2013 at 07:30 EST. Update your vulnerability database to install the patches pertaining to the Security Bulletins: MS13-001 – Vulnerability in Windows Print Spooler Components Could Allow Remote Code Execution (2769369) MS13-002 – Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution (2756145)  – [ Except KB2758696 ] MS13-004 – Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (2769324) MS13-005 – Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2778930) MS13-006 – Vulnerability in Microsoft Windows Could Allow Security Feature Bypass (2785220) MS13-007 – Vulnerability in Open Data Protocol Could Allow Denial of Service (2769327) Update your vulnerability database to install the patches pertaining to the Non Security Updates Windows Malicious Software Removal Tool – January 2013 (KB890830) Description of the Office 2013 update(2760624) Description of the Office 2013 update(2760621) Description of the Office 2013 update(2760358) Description of the Office 2013 update(2760311) Description of the Office 2013 update(2752100) Description of the Word 2013 update(2752073) Description of the Visio 2013 update(2751994) Description of the Word 2013 update(2738044) Description of the Office 2013 update(2726961) Description of the PowerPoint 2013 update(2726947) Description of the Outlook 2003 Junk E-mail Filter update: Jan 08, 2013 Description of the Outlook 2007 Junk E-mail Filter update: Jan 08, 2013 Description of the Outlook 2010 Junk E-mail Filter update: Jan 08, 2013 Below Third Party Will be supported in next 12 hours Adobe Reader 11.0.1 Adobe Flash Player (11.5.502.146) Adobe Acrobat 11.0.1 Mozilla Firefox 18 Mozilla Thunderbird 17.0.2 Below Non Security Updates will be supported in next 24 hours Update for Microsoft .NET Framework 4.5 on Windows 7, Windows Server 2008 R2, Windows Server 2008, and Windows Vista (KB2750147) Update for Windows 7, Windows Server 2008 R2, and Windows Server 2008 (KB2726535) Update for Windows 7 and Windows Server 2008 R2 (KB2786400) Update for Windows 7 and Windows Server 2008 R2 (KB2786081) Update for Windows 7 (KB2773072) Update for Windows 8, Windows RT, and Windows Server 2012 (KB2785094) Update for Windows 8, Windows RT, and Windows Server 2012 (KB2750149) Update for Windows Server 2008 and Windows Vista (KB2763674) Update for Internet Explorer Flash Player for Windows 8, Windows RT, and Windows Server 2012 (KB2796096) Deployment Priority (Courtesy: MSRC blog )   For any assistance on patching feel free to contact  desktopcentral-support@manageengine.com Happy Patching

ASG Up2Date 7.513 Released

Today we have released ASG 7.513 for those customers still using this old version. This Up2Date is designed to provide an announcement that only a few days is left before ASG 7 sunsets as part of the End-of-Life Announcement ( http://www.astaro.com/en-uk/blog/up2date/ASGV7EOL ). Package details are found by reading on

December 2012 Patch Tuesday Bulletins are now Supported by Desktop Central

Microsoft December 2012 Patch Tuesday bulletins are now supported by Desktop Central. The patch assessment team at Desktop Central has tested the patches and have updated their online patch database on December 12, 2012 at 00:30 EST. Update your vulnerability database to install the patches pertaining to the Security Bulletins: MS12-077 – Cumulative Security Update for Internet Explorer (2761465) MS12-078 – Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2783534) MS12-079 – Vulnerability in Microsoft Word Could Allow Remote Code Execution (2780642) MS12-081 – Vulnerability in Windows File Handling Component Could Allow Remote Code Execution (2758857) MS12-082 – Vulnerability in DirectPlay Could Allow Remote Code Execution (2770660) MS12-083 – Vulnerability in IP-HTTPS Component Could Allow Security Feature Bypass (2765809) Update your vulnerability database to install the patches pertaining to the Non Security Updates Windows Malicious Software Removal Tool – December 2012 (KB890830) Deployment Priority (Courtesy: MSRC blog ) For any assistance on patching feel free to contact  desktopcentral-support@manageengine.com Happy Patching.

ASG 8.308 Up2Date Released

We have started to spread ASG Up2Date 8.308, which finalizes the process for one-touch upgrading to UTM 9 for supported appliances by solving a few issues and polishing the operation across all remaining models. Note that HA/Clustering systems are not yet supported and will unlock at a later date in early 2013. As part of the adjustments, you now need to be at ASG 8.308 to perform the UTM 9 one-touch upgrade, so install this release before attempting, as version 8.306 and 8.307 will not be allowed to upgrade anymore

Email Is Down, and It’s Not Just Sandy’s Fault – Why Social Apps Are Better for Your Business

When Hurricane Sandy flooded the streets of lower Manhattan, millions of email users were cut off from their servers — and not just in Manhattan. A number of service providers whose services were knocked out support business customers all over the world

Reminder: Astaro Security Gateway V7 is End-of-Life December 31st, 2012

With just two months to go until the sun sets on Astaro Security Gateway V7, this will serve as one of the final reminders. Version 7 of Astaro Security Gateway will be end-of-life on December 31st 2012.  If you do not have an ASG V7 installation, you are unaffected by this announcement and can disregard it.

ASG 8.306 Up2Date Released & UTM 9 Appliance One-Touch Upgrade News

With this GA release of ASG 8.306, in addition to dozens of bugfixes we have also put in place the needed mechanics for valid hardware appliances to perform a one-touch upgrade from Astaro Security Gateway to Sophos UTM 9. However, upgrading will happen at staged intervals