From besadmin-announcements at bigmail.bigfix.com Thu Oct 1 03:23:47 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 1 Oct 2015 18:23:47 +0800 Subject: [BESAdmin-Announcements] IBM BigFix Patch releases enhancements for Solaris Message-ID: IBM is pleased to announce that BigFix Patch for Solaris just released an enhancement to the Endpoint Upgrade List - Solaris 10 analysis. This analysis retrieves a list of the Solaris endpoints that require an operating system upgrade. It now checks for the updates against the recent published Solaris OS release, which is currently at U11, and the kernel patch update, which contains a set of different fixes that is published on the Oracle support website. Actions to Take: Gathering of the site will automatically show the updates made. Published Site Version: Patches for Solaris Site, version 1650 Application Engineering Team IBM BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Oct 1 05:43:47 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 1 Oct 2015 12:43:47 +0000 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows (English) Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Oct 1 13:29:27 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 1 Oct 2015 20:29:27 +0000 Subject: [BESAdmin-Announcements] SCM Content Update: DISA STIG Checklist for Windows 2012 DC + MS content updated to v2r2 ( With Remediation) Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Oct 1 21:09:02 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 2 Oct 2015 12:09:02 +0800 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Message-ID: Content in the Updates for Windows Applications Fixlet site has been modified. New/Updated Fixlets: * Skype 7.12.0.101 Available (ID: 5055201) * Skype 7.11.0.102 Available (Superseded) (ID: 5055199) Published Site Version: * Updates for Windows Applications, version 835. Reasons for Update: * Skype has released a new version (7.12.0.101) of their internet telephony software. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team IBM BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Oct 2 09:57:24 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 2 Oct 2015 09:57:24 -0700 Subject: [BESAdmin-Announcements] Application Update: IBM BigFix Inventory 9.2.1 now available! Message-ID: IBM is pleased to announce that BigFix Inventory 9.2.1 application update is now available. IBM BigFix Inventory is now the new rebranded name of IBM Endpoint Manager for Software Use Analysis (IEM SUA). BigFix Inventory 9.2.1 provides significant value as well as discovery and reporting capabilities on top of defects updates. Major features that are delivered with BigFix Inventory 9.2.1 include: - Support for Mac OS X. You can now report on computers, applications and processes for Mac OS X endpoints into BigFix Inventory server - Oracle Database report which provides value add insight on data gathered by Oracle LMS (License Management Services) scripts - Support for more IBM licensing metrics like, yet not limited to, Authorized Users and a new report for related licensing utilization for enabled IBM products - Support for two-factor authentication and single sign-on for BigFix Inventory - Possibility of having multiple instances of BigFix Inventory servers that share the same BigFix platform and of aggregating reporting accordingly to support multi-tenancy needs - Discovery and reporting of software that runs on public clouds such as IBM Softlayer, Microsoft Azure and Amazon Elastic Cloud - More flexibility to expand software catalog with custom signatures based on non-standard file types - Optimization of the ETL (Export Transfer and Load) process with scalability and performance improvements - Resolution for 22 official APARs as well as improvements found internally - Certification of new operating systems The full content of the BigFix Inventory update 9.2.1 and installation instructions can be found under the following link: https://ibm.biz/bfi_921 The list of all former SUA 9.x releases and patches can be found here: https://ibm.biz/sua_updates -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Oct 2 14:43:15 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 2 Oct 2015 14:43:15 -0700 Subject: [BESAdmin-Announcements] SUA 1.x, 2.x, and BFI 9.x Sep 2015 Catalog Update Message-ID: The BigFix Inventory team is pleased to announce the release of software catalog updates for SUA 1.x, 2.x, and BigFix Inventory 9.x. ?The major changes included in this update are provided in the attached PDF of the Release Notes. Please review the change list included in the BigFix fixlet description for all details on changes. ----- Bigfix.me now includes community contributed Catalog Signature content for customers with BFI 9.0.1.2 or higher. Additionally there are educational and forum links that can be useful for all SUA customers. Go to http://bigfix.me?for more details . -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: CatalogReleaseNotes-49.002.pdf Type: application/pdf Size: 44898 bytes Desc: not available URL: From besadmin-announcements at bigmail.bigfix.com Fri Oct 2 14:31:55 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 2 Oct 2015 14:31:55 -0700 Subject: [BESAdmin-Announcements] Application Update: IBM BigFix Compliance 1.7 now available! Message-ID: IBM BigFix is pleased to announce the release of IBM BigFix Compliance version 1.7.30, formerly called IBM Endpoint Manager for Security and Compliance Analytics (SCA). Highlights: Single Sign-On user authentication using SAML 2.0 Single Sign-On user authentication using LTPA Token Added REST API Token revocation Update to IBM Java 8.0.1.10 Update to IBM WebSphere Application Server 8.5.5.7 Liberty Profile Fixes and enhancements Published site version: SCM Reporting site, version 91. Actions to take: If you are using IBM BigFix Compliance 1.6.139 or earlier: 1. Gather the SCM Reporting site, version 91. 2. In the Security Configuration domain in the console, open the Configuration Management navigation tree. 3. Under the IBM BigFix Compliance Install/Upgrade menu tree item, select the IBM BigFix Compliance 1.7 Upgrade Fixlet, which automatically installs and upgrades to the new patch. Follow the Fixlet instructions and take the associated action to upgrade your IBM BigFix Compliance deployment. 4. Update the data schema. To do this, log in to the IBM BigFix Compliance web interface from the host server and proceed with configuration. Upgrading the data schema is expected and it will take sometime to complete. Note: BigFix Compliance version 1.5.78 is the minimum version required to upgrade to BigFix Compliance 1.7.30. If you have not yet installed IBM BigFix Compliance or SCA, refer to these steps for first time installations. 1. In the License Dashboard in the IBM BigFix console, enable the SCM Reporting site. 2. In the Security Configuration domain in the console, open the Configuration Management navigation tree. 3. Select the Fixlet named IBM BigFix Compliance 1.7 First-time Install Fixlet under the IBM BigFix Compliance Install/Upgrade menu tree node. 4. Follow the Fixlet instructions and take the associated action to install your BigFix Compliance deployment. Other links: To view the the Release Notes, see https://www.ibm.com/developerworks/community/wikis/home?lang=en#!/wiki/Tivoli%20Endpoint%20Manager/page/SCA%20Release%20Notes . BigFix Compliance Team IBM BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Oct 5 07:14:28 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 5 Oct 2015 16:14:28 +0200 Subject: [BESAdmin-Announcements] Content Modification in OS Deployment and Bare Metal Imaging 3.8 Message-ID: Content in the OS Deployment and Bare Metal Imaging site has been modified. Reasons for Update: * Support of latest version (6.3.8298) of Microsoft Deployment Toolkit (MDT) 2013 Update 1 * List of the APARs included in this refresh https://www.ibm.com/developerworks/community/wikis/home?lang=en#!/wiki/Tivoli%20Endpoint%20Manager/page/APARS%20Fixed%20in%20V3.8 Published site version: OS Deployment and Bare Metal Imaging, version 56. Actions to Take: Gathering of the site will automatically show the updates made. IBM Italia S.p.A. Sede Legale: Circonvallazione Idroscalo - 20090 Segrate (MI) Cap. Soc. euro 347.256.998,80 C. F. e Reg. Imprese MI 01442240030 - Partita IVA 10914660153 Societ? con unico azionista Societ? soggetta all?attivit? di direzione e coordinamento di International Business Machines Corporation (Salvo che sia diversamente indicato sopra / Unless stated otherwise above) -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Oct 5 07:45:20 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 5 Oct 2015 14:45:20 +0000 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows (English) Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Oct 7 02:12:02 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 7 Oct 2015 17:12:02 +0800 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows (English) Message-ID: Content in the Patches for Windows (English) has been modified: New Fixlets: [Major] 3093266: Cumulative Update for Windows 10 (KB3093266) - Windows 10 (x64) (ID: 309326603) [Major] 3093266: Cumulative Update for Windows 10 (KB3093266) - Windows 10 (ID: 309326601) Fully Superseded Fixlets: [Major] 3081448: Cumulative Update for Windows 10 (KB3081448) - Windows 10 (x64) (Superseded) (ID: 308144803) [Major] 3095020: Cumulative Update for Windows 10 (KB3095020) - Windows 10 (Superseded) (ID: 309502001) [Major] 3095020: Cumulative Update for Windows 10 (KB3095020) - Windows 10 (x64) (Superseded) (ID: 309502003) [Major] 3081448: Cumulative Update for Windows 10 (KB3081448) - Windows 10 (Superseded) (ID: 308144801) Reason for Update: Microsoft has released KB3093266. Actions to Take: None Published site version: Patches for Windows (English), version 2337. Additional links: None Application Engineering Team IBM BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Oct 8 02:41:40 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 8 Oct 2015 17:41:40 +0800 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows (English) Message-ID: Content in the Patches for Windows (English) has been modified: New Fixlets: [Major] 3061064: Cumulative Updates for Skype for Business Server 2015 - KB3061064 - Skype for Business Server 2015 (x64) (ID: 306106402) [Major] 2809243: Updates for Lync Server 2013 - KB2809243 - Lync Server 2013 (x64) (ID: 280924346) Modified Fixlets: [Major] MS15-104: Vulnerabilities in Skype for Business Server and Lync Server Could Allow Elevation of Privilege - Skype for Business Server 2015 - KB3061064 (x64) (ID: 1510403) [Major] MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 - KB3011780 (x64) (ID: 1406815) [Major] MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege - Windows 7 SP1 - KB3011780 (x64) (ID: 1406813) [Major] MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege - Windows 7 SP1 - KB3011780 (ID: 1406803) [Major] MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB2992611 (x64) (ID: 1406609) [Major] MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows 7 SP1 - KB2992611 (x64) (ID: 1406629) [Major] MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows 7 SP1 - KB2992611 (ID: 1406613) [Major] MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3010788 (x64) (ID: 1406455) [Major] MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 7 SP1 - KB3010788 (x64) (ID: 1406431) [Major] MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 7 SP1 - KB3010788 (ID: 1406417) Reason for Update: Microsoft has released KB3061064, KB2809243. Fixlet for MS15-104 was updated due to Microsoft updating the deployed binary. Fixlets for MS14-064, MS14-066, MS14-068 were updated due to relevance false positive. Actions to Take: None Published site version: Patches for Windows (English), version 2338. Additional links: None Application Engineering Team IBM BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Oct 8 05:50:54 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 8 Oct 2015 13:50:54 +0100 Subject: [BESAdmin-Announcements] Content Modification (Audit Only) in Patches for ESXi Message-ID: Audit Only Content in the Patches for ESXi site has been modified. Changes to Patches for ESXi site 5.0 Fixlets generated 50125 - VMware ESXi 5.0 - ESXi500-201510401-BG 50126 - VMware ESXi 5.0 - ESXi500-201510402-BG 5.0 Fixlets Superseded 50122 - VMware ESXi 5.0 - ESXi500-201502401-BG (Superseded) 50124 - VMware ESXi 5.0 - ESXi500-201502402-BG (Superseded) 50127 - VMware ESXi 5.0 - ESXi500-201510102-SG (Superseded) 50128 - VMware ESXi 5.0 - ESXi500-201510101-SG (Superseded) 5.1 Fixlets generated 51078 - VMware ESXi 5.1 - ESXi510-201510402-BG 51079 - VMware ESXi 5.1 - ESXi510-201510101-SG (NOTE - This will not become relevant until 51081 - VMware ESXi 5.1 - ESXi510-201510401-BG is applied) 51081 - VMware ESXi 5.1 - ESXi510-201510401-BG 5.1 Fixlets Superseded 51074 - VMware ESXi 5.1 - ESXi510-201503401-BG (Superseded) 51075 - VMware ESXi 5.1 - ESXi510-201503402-BG (Superseded) 51080 - VMware ESXi 5.1 - ESXi510-201510102-SG (Superseded) Published site version: * Patches for ESXi, version 69. Reasons for Update: *New patches released by VMware for ESXi 5.0 and 5.1 Actions to Take: * Gathering of the site will automatically show the updates made. Regards, Martin Feeney Software Development Manager, IBM Endpoint Manager for Server Automation IBM Security Phone: 353-91-570632 Ida Business Park E-mail: martin.feeney at ie.ibm.com Galway Ireland IBM Ireland Product Distribution Limited Registered in Ireland with no.: 92815 Registered Office: IBM House, Shelbourne Road, Ballsbridge, Dublin 4, Ireland From besadmin-announcements at bigmail.bigfix.com Fri Oct 9 09:34:45 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 9 Oct 2015 16:34:45 +0000 Subject: [BESAdmin-Announcements] Content Released in Patches for Windows (English) Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Oct 9 01:54:24 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 9 Oct 2015 08:54:24 +0000 Subject: [BESAdmin-Announcements] Content Modification: Patches for Mac OS X Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Oct 9 21:31:11 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Sat, 10 Oct 2015 12:31:11 +0800 Subject: [BESAdmin-Announcements] IBM BigFix Patch releases native tools site for CentOS 7 Message-ID: IBM BigFix Patch is pleased to announce the release of the native tools site for CentOS 7, called "Patches for CentOS 7". This site contains the content from the following supported channels for CentOS x86_64 systems: Base Updates Extras Fasttrack Actions to take: Subscribe to the new site "Patches for CentOS 7" from the License Overview dashboard. Install the bzip2 utility on the endpoints to use the patches from the new site. The bzip2 utility decompresses the metadata file that contains all the package information to the endpoints. Note: The bzip2 utility may not be included in the CentOS 7 base installation, therefore manual installation of this compression utility is required. Here are the steps to install the bzip2 utility: Use the audit Fixlet named Install bzip2 (ID # 1) to identify the endpoints that require bzip2 utility. Download the installation package from http://mirror.centos.org/centos/7/os/x86_64/Packages/bzip2-1.0.6-12.el7.x86_64.rpm . Use the RPM Deployment Wizard (available from the Linux RPM Patching site) to deploy the package to various endpoints. Execute the following actions related to the download plug-in: If the CentOS download plug-in has never been registered before, register it from the Manage Download Plug-ins dashboard. If the CentOS download plug-in is already registered, upgrade it to the latest version (2.3.5) from the Manage Download Plug-ins dashboard. Note: The Manage Download Plug-ins dashboard is available from the Patching Support site. Published sites: Patches for CentOS 7 site, version 3 Patching Support site, version 407 Documentation resources: For the latest IBM BigFix Patch for CenOS User's Guide, see https://www.ibm.com/developerworks/community/wikis/form/anonymous/api/wiki/90553c0b-42eb-4df0-9556-d3c2e0ac4c52/page/a242023f-ff02-43d9-be00-5c4fb10b2b0c/attachment/c6455919-c477-4e29-9405-17da60cbdf6d/media/BigFix_Patch_CentOS_User_Guide_2015Oct9.pdf For information about the RPM Deployment Wizard, see http://www-01.ibm.com/support/knowledgecenter/SS6MER_9.2.0/com.ibm.tem.patch.doc_9.2/Patch_Man/Patch_CentOS/c_use_the_rpm_deployment_wizard.html?lang=en . For information about download plug-ins, see http://www-01.ibm.com/support/knowledgecenter/SS6MER_9.2.0/com.ibm.tem.patch.doc_9.2/shared/c_manage_download_plug-ins_centos.html?lang=en . Application Engineering Team IBM BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Oct 12 17:38:20 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 13 Oct 2015 00:38:20 +0000 Subject: [BESAdmin-Announcements] SCM Content UPDATE: CIS Unix Checklists Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Oct 13 01:56:56 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 13 Oct 2015 08:56:56 +0000 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows (English) Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Oct 13 13:21:46 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 14 Oct 2015 04:21:46 +0800 Subject: [BESAdmin-Announcements] Content Modification in Patching Support Message-ID: Content in the Patching Support site has been modified: Modified Fixlets: Windows Security: Microsoft Windows Malicious Software Removal Tool - Deploy (ID: 527) Windows Security: Microsoft Windows Malicious Software Removal Tool - Upgrade (ID: 530) Reason for Update: Microsoft releases an updated version of Malicious Software Removal Tool. Actions to Take: None Published site version: Patching Support, version 411. Additional links: None Application Engineering Team IBM BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Oct 13 16:06:14 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 14 Oct 2015 07:06:14 +0800 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Message-ID: Content in the Updates for Windows Applications Fixlet site has been modified. New/Updated Fixlets: * Adobe AIR 19.0.0.190 Available (Superseded) (ID: 16010035) * Adobe AIR 19.0.0.213 Available (ID: 16010037) * Flash Player 18.0.0.241 Available - Plugin-based (Superseded) (ID: 1091246) * Flash Player 19.0.0.185 Available - Plugin-based (Superseded) (ID: 1091250) * Flash Player 18.0.0.252 Available - Plugin-based (ID: 1091252) * Flash Player 19.0.0.207 Available - Plugin-based (ID: 1091254) * Flash Player 18.0.0.241 Available - Internet Explorer (Superseded) (ID: 1091263) * Flash Player 19.0.0.185 Available - Internet Explorer (Superseded) (ID: 1091265) * Flash Player 18.0.0.252 Available - Internet Explorer (ID: 1091267) * Flash Player 19.0.0.207 Available - Internet Explorer (ID: 1091269) * Adobe Reader X (10.1.16) Available - Adobe Reader X (10.x) (ID: 8101094) * Adobe Reader X (10.1.16) Available (MUI Installer) - Adobe Reader X (10.x) (ID: 8200018) * Adobe Reader 11.0.13 Available - Adobe Reader 11.x (ID: 8101096) * Adobe Reader 11.0.13 Available (MUI Installer) - Adobe Reader 11.x (ID: 8200021) * Adobe Acrobat X (10.1.16) Available - Adobe Acrobat X (10.x) (ID: 9101084) * Adobe Acrobat 11.0.13 Available - Adobe Acrobat 11.x (ID: 9101086) * Google Chrome 45.0.2454.101 Available (Superseded) (ID: 14011089) * Google Chrome 46.0.2490.71 Available (ID: 14011091) Published Site Version: * Updates for Windows Applications, version 837. Reasons for Update: * Adobe has released a new version of Adobe AIR (19.0.0.213) to address security vulnerabilities. * Adobe has released new versions of Flash Player (18.0.0.252 and 19.0.0.207 ) to address security vulnerabilities. * Adobe has released new versions of Adobe Reader (10.1.16 and 11.0.13 ) to address security vulnerabilities. * Adobe has released new versions of Adobe Acrobat (10.1.16 and 11.0.13 ) to address security vulnerabilities. * Google has released a new version of the Chrome browser (46.0.2490.71) to address security vulnerabilities. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team IBM BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Oct 13 16:54:39 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 14 Oct 2015 07:54:39 +0800 Subject: [BESAdmin-Announcements] Content Released in Patches for Windows (English) - October 2015 Security Bulletins Message-ID: Content in the Patches for Windows (English) Fixlet Site has been released. New Fixlets: Fixlets for Microsoft Security Bulletins: MS15-106 MS15-107 MS15-108 MS15-109 MS15-110 MS15-111 [Major] 2960358: Update for Disabling RC4 in .NET TLS - .NET Framework 4.6 - Enable Workaround (ID: 296035801) [Major] 2960358: Update for Disabling RC4 in .NET TLS - .NET Framework 3.5 - Windows 10 - Enable Workaround (ID: 296035803) [Major] 2960358: Update for Disabling RC4 in .NET TLS - .NET Framework 4.6 - Disable Workaround (ID: 296035805) [Major] 2960358: Update for Disabling RC4 in .NET TLS - .NET Framework 3.5 - Windows 10 - Disable Workaround (ID: 296035807) [Major] 3097966: Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Windows Server 2012 Gold - KB3097966 (x64) (ID: 309796603) [Major] 3097966: Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Windows 8 Gold - KB3097966 (x64) (ID: 309796605) [Major] 3097966: Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Windows 8.1 Gold - KB3097966 (ID: 309796607) [Major] 3097966: Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Windows Server 2008 SP2 - KB3097966 (ID: 309796609) [Major] 3097966: Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Windows Server 2012 R2 Gold - KB3097966 (x64) (ID: 309796611) [Major] 3097966: Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Windows Vista SP2 - KB3097966 (x64) (ID: 309796613) [Major] 3097966: Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Windows 7 SP1 - KB3097966 (x64) (ID: 309796615) [Major] 3097966: Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Windows Server 2008 SP2 - KB3097966 (x64) (ID: 309796617) [Major] 3097966: Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Windows Vista SP2 - KB3097966 (ID: 309796619) [Major] 3097966: Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Windows Server 2008 R2 SP1 - KB3097966 (x64) (ID: 309796621) [Major] 3097966: Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Windows 8.1 Gold - KB3097966 (x64) (ID: 309796623) [Major] 3097966: Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Windows 8 Gold - KB3097966 (ID: 309796625) [Major] 3097966: Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Windows 7 SP1 - KB3097966 (ID: 309796627) [Major] 3099406: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows Server 2012 R2 Gold - KB3099406 (x64) (ID: 309940601) [Major] 3099406: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows Server 2012 Gold - KB3099406 (x64) (ID: 309940603) [Major] 3099406: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows 8.1 Gold - KB3099406 (x64) (ID: 309940607) [Major] 3099406: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows 8.1 Gold - KB3099406 (ID: 309940609) [Major] 3099406: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows 8 Gold - KB3099406 (ID: 309940611) [Major] 3099406: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows 8 Gold - KB3099406 (x64) (ID: 309940615) Fully Superseded Fixlets: [Major] 3087040: Security advisory: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows 8 Gold (Superseded) (ID: 308704013) [Major] 3087040: Security advisory: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows 8 Gold (x64) (Superseded) (ID: 308704007) [Major] 3087040: Security advisory: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows 8.1 Gold (Superseded) (ID: 308704011) [Major] 3087040: Security advisory: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows 8.1 Gold (x64) (Superseded) (ID: 308704005) [Major] 3087040: Security advisory: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows Server 2012 Gold (x64) (Superseded) (ID: 308704003) [Major] 3087040: Security advisory: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows Server 2012 R2 Gold (x64) (Superseded) (ID: 308704001) [Major] MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows 8 Gold - KB3039066 (Superseded) (ID: 1502039) [Major] MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows 8 Gold - KB3039066 (x64) (Superseded) (ID: 1502003) [Major] MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows 8.1 Gold - KB3039066 (Superseded) (ID: 1502055) [Major] MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows 8.1 Gold - KB3039066 (x64) (Superseded) (ID: 1502057) [Major] MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2012 Gold - KB3039066 (x64) (Superseded) (ID: 1502051) [Major] MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB3039066 (x64) (Superseded) (ID: 1502059) [Major] MS15-036: Vulnerabilities in Microsoft SharePoint Server Could Allow Elevation of Privilege - SharePoint Server 2013 SP1 - SharePoint Server 2013 SP1 / SharePoint Foundation 2013 SP1 - KB2965219 (x64) (Superseded) (ID: 1503601) [Major] MS15-046: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office Web Apps 2010 SP2 - Excel Web Apps 2010 SP2 - KB3054838 (x64) (Superseded) (ID: 1504679) [Major] MS15-066: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - VBScript 5.8 - KB3068364 (x64) (Superseded) (ID: 1506611) [Major] MS15-066: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2008 SP2 - VBScript 5.7 - KB3068368 (Superseded) (ID: 1506607) [Major] MS15-066: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2008 SP2 - VBScript 5.7 - KB3068368 (x64) (Superseded) (ID: 1506615) [Major] MS15-066: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Vista SP2 - VBScript 5.7 - KB3068368 (Superseded) (ID: 1506617) [Major] MS15-066: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Vista SP2 - VBScript 5.7 - KB3068368 (x64) (Superseded) (ID: 1506603) [Major] MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2007 SP3 - Excel Services - KB2837612 (Superseded) (ID: 1507015) [Major] MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2007 SP3 - Excel Services - KB2837612 (x64) (Superseded) (ID: 1507011) [Major] MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2010 SP2 - Excel Services - KB3054968 (x64) (Superseded) (ID: 1507007) [Major] MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Visio 2007 SP3 - KB2965280 (Superseded) (ID: 1508143) [Major] MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Visio 2010 SP2 - KB3054876 (Superseded) (ID: 1508187) [Major] MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Visio 2010 SP2 - KB3054876 (x64) (Superseded) (ID: 1508129) [Major] MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word Web Apps 2010 SP2 - KB3054974 (x64) (Superseded) (ID: 1508151) [Major] MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows 7 SP1 - KB3079757 (Superseded) (ID: 1508815) [Major] MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows 7 SP1 - KB3079757 (x64) (Superseded) (ID: 1508801) [Major] MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Server 2008 R2 SP1 - KB3079757 (x64) (Superseded) (ID: 1508811) [Major] MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Server 2008 SP2 - KB3079757 (Superseded) (ID: 1508837) [Major] MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Server 2008 SP2 - KB3079757 (x64) (Superseded) (ID: 1508803) [Major] MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Vista SP2 - KB3079757 (Superseded) (ID: 1508821) [Major] MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Vista SP2 - KB3079757 (x64) (Superseded) (ID: 1508835) [Major] MS15-094, MS15-095, MS15-097, MS15-098, MS15-101, MS15-102, MS15-105: Cumulative Update for Windows 10 (KB3081455) - Windows 10 (Superseded) (ID: 308145501) [Major] MS15-094, MS15-095, MS15-097, MS15-098, MS15-101, MS15-102, MS15-105: Cumulative Update for Windows 10 for x64-based Systems (KB3081455) - Windows 10 (x64) (Superseded) (ID: 308145503) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB3087038 (Superseded) (ID: 1509433) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB3087038 (x64) (Superseded) (ID: 1509413) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3087038 (Superseded) (ID: 1509401) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3087038 (x64) (Superseded) (ID: 1509445) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB3087038 (Superseded) (ID: 1509409) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB3087038 (x64) (Superseded) (ID: 1509419) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB3087038 (Superseded) (ID: 1509423) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB3087038 (x64) (Superseded) (ID: 1509447) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB3087038 (Superseded) (ID: 1509431) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB3087038 (x64) (Superseded) (ID: 1509427) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3087038 (Superseded) (ID: 1509443) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3087038 (x64) (Superseded) (ID: 1509411) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 10 - KB3087038 (x64) (Superseded) (ID: 1509407) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 11 - KB3087038 (x64) (Superseded) (ID: 1509449) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 8 - KB3087038 (x64) (Superseded) (ID: 1509405) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 9 - KB3087038 (x64) (Superseded) (ID: 1509437) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB3087038 (Superseded) (ID: 1509457) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB3087038 (x64) (Superseded) (ID: 1509439) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB3087038 (Superseded) (ID: 1509455) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB3087038 (x64) (Superseded) (ID: 1509429) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB3087038 (Superseded) (ID: 1509451) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB3087038 (x64) (Superseded) (ID: 1509403) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows Server 2012 Gold - IE 10 - KB3087038 (x64) (Superseded) (ID: 1509425) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows Server 2012 R2 Gold - IE 11 - KB3087038 (x64) (Superseded) (ID: 1509453) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB3087038 (Superseded) (ID: 1509435) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB3087038 (x64) (Superseded) (ID: 1509421) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB3087038 (Superseded) (ID: 1509415) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB3087038 (x64) (Superseded) (ID: 1509459) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB3087038 (Superseded) (ID: 1509417) [Major] MS15-094: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB3087038 (x64) (Superseded) (ID: 1509441) [Major] MS15-099: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Excel 2007 SP3 - KB3085543 (Superseded) (ID: 1509925) [Major] MS15-099: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Excel 2010 SP2 - KB3085526 (Superseded) (ID: 1509927) [Major] MS15-099: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Excel 2010 SP2 - KB3085526 (x64) (Superseded) (ID: 1509913) [Major] MS15-099: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Excel 2013 SP1 - KB3085502 (Superseded) (ID: 1509923) [Major] MS15-099: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Excel 2013 SP1 - KB3085502 (x64) (Superseded) (ID: 1509915) [Major] MS15-099: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Excel Viewer - KB3054995 (Superseded) (ID: 1509901) [Major] MS15-099: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office Compatibility Pack SP3 - KB3054993 (Superseded) (ID: 1509917) [Major] MS15-099: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office Web Apps Server 2013 SP1 - KB3085487 (x64) (Superseded) (ID: 1509933) [Major] MS15-099: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Foundation 2013 SP1 - KB3085501 (x64) (Superseded) (ID: 1509909) [Major] MS15-099: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2013 SP1 - KB3085483 (x64) (Superseded) (ID: 1509931) Reason for Update: Microsoft has released 6 Security Bulletins for October 2015. Actions to Take: None Published site version: Patches for Windows (English), version 2342 Additional links: Microsoft Security Bulletin Summary: https://technet.microsoft.com/library/security/ms15-oct Application Engineering Team IBM BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Oct 13 15:38:17 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 13 Oct 2015 22:38:17 +0000 Subject: [BESAdmin-Announcements] Content Modification: Updates for Mac Applications Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Oct 14 01:02:38 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 14 Oct 2015 16:02:38 +0800 Subject: [BESAdmin-Announcements] BigFix Patch for Windows to provide all language-independent content in the Patches for Windows site starting December 1, 2015 Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Oct 15 00:05:38 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 15 Oct 2015 15:05:38 +0800 Subject: [BESAdmin-Announcements] Content Released in Windows Point of Sale Message-ID: Content in the Windows Point of Sale site has been released: New Fixlets: [Major] MS15-108: Security Update for WEPOS and POSReady 2009 - KB3094996 (ID: 309499601) [Major] MS15-106: Cumulative Security Update for Internet Explorer 8 for WEPOS and POSReady 2009 - KB3093983 (ID: 309398303) [Major] MS15-106: Cumulative Security Update for Internet Explorer 7 for WEPOS and POSReady 2009 - KB3093983 (ID: 309398301) [Major] MS15-109: Security Update for WEPOS and POSReady 2009 - KB3080446 (ID: 308044601) [Major] MS15-106: Cumulative Security Update for Internet Explorer 6 for WEPOS and POSReady 2009 - KB3093983 (ID: 309398305) Fully Superseded Fixlets: [Major] MS15-094: Cumulative Security Update for Internet Explorer 6 for WEPOS and POSReady 2009 - KB3087038 (Superseded) (ID: 308703805) [Major] MS15-094: Cumulative Security Update for Internet Explorer 8 for WEPOS and POSReady 2009 - KB3087038 (Superseded) (ID: 308703803) [Major] MS15-094: Cumulative Security Update for Internet Explorer 7 for WEPOS and POSReady 2009 - KB3087038 (Superseded) (ID: 308703801) [Major] 3039066: Security Update for WEPOS and POSReady 2009 (Superseded) (ID: 303906601) [Major] 3050945: Security Update for WEPOS and POSReady 2009 (Superseded) (ID: 305094501) [Major] 3068368: Security Update for WEPOS and POSReady 2009 - VBScript 5.7 - KB3068368 (Superseded) (ID: 306836801) Reason for Update: Microsoft has released MS15-106, MS15-108, MS15-109. Actions to Take: None Published site version: Windows Point of Sale, version 117. Additional links: None Application Engineering Team IBM BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Oct 15 01:59:05 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 15 Oct 2015 16:59:05 +0800 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows (English) Message-ID: Content in the Patches for Windows (English) has been modified: New Fixlets: [Major] MS15-046: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2007 SP3 - KB3085544 (ID: 15046105) [Major] MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Visio 2016 Gold - KB2920708 (ID: 1508191) [Major] MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word 2016 Gold - KB2920691 (x64) (ID: 1508193) [Major] MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2016 Gold - KB3085538 (ID: 1508195) [Major] MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word 2016 Gold - KB2920691 (ID: 1508197) [Major] MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2016 Gold - KB3085538 (x64) (ID: 1508199) [Major] MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Visio 2016 Gold - KB2920708 (x64) (ID: 15081101) Modified Fixlets: [Minor] MS15-099, MS15-110: Security Updates for Microsoft Office to Address Remote Code Execution - Excel 2016 Gold - KB2920693 (x64) (ID: 1511007) [Minor] MS15-099, MS15-110: Security Updates for Microsoft Office to Address Remote Code Execution - Excel 2016 Gold - KB2920693 (ID: 1511017) [Major] MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows 7 SP1 - KB3067903 (ID: 1506911) [Major] MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows 7 SP1 - KB3067903 (x64) (ID: 1506929) [Major] MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3067903 (x64) (ID: 1506915) [Major] MS11-070: Vulnerability in WINS Could Allow Elevation of Privilege - Windows Server 2008 R2 Gold/SP1 (x64) (ID: 1107009) Partially Superseded Fixlets: [Major] MS12-056: Vulnerability in JScript and VBScript Engines Could Allow Remote Code Execution - JScript 5.8 and VBScript 5.8 - Windows Server 2008 R2 Gold (x64) (ID: 1205611) Fully Superseded Fixlets: [Major] 2899588: Update for SharePoint Server 2010 Excel Web App - KB2899588 - Office Web Apps 2010 (x64) (Superseded) (ID: 289958801) [Major] 2899589: Update for SharePoint Server 2010 - KB2899589 - Sharepoint Server 2010 (x64) (Superseded) (ID: 289958901) [Major] 2817561: Update for Visio 2007 - KB2817561 - Visio 2007 (Superseded) (ID: 281756101) [Major] 2965292: Update for Visio 2010 - KB2965292 - Visio 2010 SP2 (x64) (Superseded) (ID: 296529201) [Major] 2965292: Update for Visio 2010 - KB2965292 - Visio 2010 SP2 (Superseded) (ID: 296529203) [Major] 3039703: Update for SharePoint Server 2013 - KB3039703 - SharePoint Server 2013 SP1 (x64) (Superseded) (ID: 303970301) [Major] MS14-047: Vulnerability in LRPC Could Allow Security Feature Bypass - Windows Server 2008 R2 SP1 - KB2978668 (x64) (Superseded) (ID: 1404701) [Major] MS14-047: Vulnerability in LRPC Could Allow Security Feature Bypass - Windows 7 SP1 - KB2978668 (Superseded) (ID: 1404703) [Major] MS14-047: Vulnerability in LRPC Could Allow Security Feature Bypass - Windows 7 SP1 - KB2978668 (x64) (Superseded) (ID: 1404705) [Major] MS15-038: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows 7 SP1 - KB3045999 (x64) (Superseded) (ID: 1503833) [Major] MS15-038: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows 7 SP1 - KB3045999 (Superseded) (ID: 1503855) [Major] MS15-038: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 - KB3045999 (x64) (Superseded) (ID: 1503859) [Major] 3057154: Security advisory: Update to harden use of DES encryption - Windows 7 SP1 (x64) (Superseded) (ID: 305715411) [Major] 3057154: Security advisory: Update to harden use of DES encryption - Windows Server 2008 R2 SP1 (x64) (Superseded) (ID: 305715417) [Major] 3057154: Security advisory: Update to harden use of DES encryption - Windows 7 SP1 (Superseded) (ID: 305715409) [Major] MS15-053: Vulnerabilities in JScript and VBScript Scripting Engines Could Allow Security Feature Bypass - Windows Server 2008 R2 SP1 - JScript 5.8 / VBScript 5.8 - KB3050941 (x64) (Superseded) (ID: 1505301) [Major] MS15-053: Vulnerabilities in JScript and VBScript Scripting Engines Could Allow Security Feature Bypass - Windows Server 2008 SP2 - JScript 5.7 / VBScript 5.7 - KB3050945 (x64) (Superseded) (ID: 1505305) [Major] MS15-053: Vulnerabilities in JScript and VBScript Scripting Engines Could Allow Security Feature Bypass - Windows Server 2008 SP2 - JScript 5.7 / VBScript 5.7 - KB3050945 (Superseded) (ID: 1505307) [Major] MS15-053: Vulnerabilities in JScript and VBScript Scripting Engines Could Allow Security Feature Bypass - Windows Vista SP2 - JScript 5.7 / VBScript 5.7 - KB3050945 (Superseded) (ID: 1505309) [Major] MS15-053: Vulnerabilities in JScript and VBScript Scripting Engines Could Allow Security Feature Bypass - Windows Vista SP2 - JScript 5.7 / VBScript 5.7 - KB3050945 (x64) (Superseded) (ID: 1505311) Reason for Update: Microsoft has revised Security Bulletins MS15-046, MS15-081 and MS15-099 to release patches for Office 2007 and Office 2016. Fixlets were superseded by security patches released in October 2015. Fixlets for MS15-069, MS11-070 were updated due to relevance false positive. Actions to Take: None Published site version: Patches for Windows (English), version 2348. Additional links: None Application Engineering Team IBM BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Oct 16 00:55:46 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 16 Oct 2015 15:55:46 +0800 Subject: [BESAdmin-Announcements] *NEW* SCM Content: Payment Card Industry Data Security Standard (PCI DSS) Checklists Message-ID: IBM BigFix Compliance Security Configuration Management (SCM) IBM is pleased to announce the availability of the new security configuration management checklists for IBM BigFix Compliance (formerly known as IBM Endpoint Manager for Security and Compliance). The new checklists that are based on the guidance provided by the Payment Card Industry Data Security Standard (PCI DSS) are: Site Name Site Version PCI DSS Checklist for RHEL 5 1 PCI DSS Checklist for RHEL 6 1 PCI DSS Checklist for RHEL 7 1 PCI DSS Checklist for Windows Embedded POSReady 7 3 PCI DSS Checklist for Windows Embedded Standard 7 1 *Site versions are provided for air-gap customers. This content contains security configuration checks that evaluate the security settings of your endpoints according to the PCI DSS standard. As with most of the existing SCM content in the IBM BigFix Compliance library, most checks include a corresponding analysis property to report actual values, as well as steps for manual remediation in the check description. Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization requires the creation of a custom site. ACTIONS TO TAKE: If you were involved in the Early Access Program for PCI DSS Security and Compliance, unsubscribe from the beta sites to avoid any conflicting issues with the production sites. If you do not unsubscribe from the beta sites, the content in the production sites will fail. If you are entitled to the new content and you are using IBM BigFix version 9.0 and later, you can use the License Overview dashboard to enable and gather the sites. If you are currently licensed for the IBM BigFix Compliance, the BigFix SCMv3 solution module, the BigFix SCVM solution pack, or the BigFix SLM+SCVM solution bundle, contact your IBM sales representative on how to get access to the new content. We hope you find this latest release of SCM content useful. Thank you! -- The IBM BigFix Compliance team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Oct 16 11:00:39 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 16 Oct 2015 20:00:39 +0200 Subject: [BESAdmin-Announcements] SCM Content UPDATE: Payment Card Industry Data Security Standard (PCI DSS) Checklists Message-ID: IBM BigFix Compliance Security Configuration Management (SCM) The IBM BigFix Compliance team has updated the content for various Payment Card Industry Data Security Standard (PCI DSS) DSS checklists. See details below: Updated sites: Site Name | Site Version --------------------------------+--------------- PCI DSS Checklist for MS IIS | 3 --------------------------------+--------------- PCI DSS Checklist for MS SQL | 4 2008 | --------------------------------+--------------- PCI DSS Checklist for MS SQL | 5 2012 | --------------------------------+--------------- PCI DSS Checklist for Windows | 3 7 | --------------------------------+--------------- PCI DSS Checklist for Windows | 3 2008 | --------------------------------+--------------- PCI DSS Checklist for Windows | 4 2012 | *Site versions provided for air-gap customers. Changelist: ? Updated content to have a parameterized setting to enable customization for compliance evaluation. ? Updated content to include requirements from the PCI DSS Requirements and Security Assessment Procedures v3.1. ? Fixed Fixlets and analyses mismatched links. ? Updated Fixlets with sufficient descriptions. ? Updated source ID format for better tracking. Actions to take: ? If you have already subscribed to any of the sites above, no further action needs to be taken. The changes will be gathered automatically. ? If you have not subscribed to any of the sites above, you can use the License Overview dashboard to enable and gather the sites. Note that you must be entitled to the new content and you are using IBM BigFix version 9.0 and later. ? If you were involved in the Early Access Program for PCI DSS Security and Compliance, unsubscribe from the beta sites to avoid any conflicting issues with the production sites. If you do not unsubscribe from the beta sites, the content in the production sites will fail. ? If you are currently licensed for the IBM BigFix Compliance, the BigFix SCMv3 solution module, the BigFix SCVM solution pack, or the BigFix SLM+SCVM solution bundle, contact your IBM sales representative on how to get access to the PCI DSS content. Documentation resources: For information about using the PCI DSS Checklists, see the User's Guide located here: https://www.ibm.com/developerworks/community/wikis/home?lang=en#!/wiki/Tivoli%20Endpoint%20Manager/page/Using%20PCI%20DSS%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! -- The IBM BigFix Compliance team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Oct 15 23:37:28 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 16 Oct 2015 14:37:28 +0800 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Message-ID: Content in the Updates for Windows Applications Fixlet site has been modified. New Fixlet: * Mozilla Firefox 41.0.2 Available (ID: 6081298) Fully Supserseded Fixlet: * Mozilla Firefox 41.0.1 Available (Superseded) (ID: 6081296) Published Site Version: * Updates for Windows Applications, version 838. Reasons for Update: * Mozilla has released a new version of the Firefox browser (41.0.2). Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team IBM BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Sat Oct 17 00:19:07 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Sat, 17 Oct 2015 07:19:07 +0000 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Sun Oct 18 20:03:31 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 19 Oct 2015 11:03:31 +0800 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Message-ID: Content in the Updates for Windows Applications Fixlet site has been modified. New/Updated Fixlets: * Notepad++ 6.8.5 Available (ID: 4001033) * Notepad++ 6.8.3 Available (Superseded) (ID: 4001031) Published Site Version: * Updates for Windows Applications, version 840. Reasons for Update: * A new version (6.8.5) of Notepad++ is available. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team IBM BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Oct 19 02:09:34 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 19 Oct 2015 17:09:34 +0800 Subject: [BESAdmin-Announcements] BigFix Patch to deprecate RHEL and SLE non-Native Tools sites by January 31, 2016 Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Oct 19 04:47:13 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 19 Oct 2015 11:47:13 +0000 Subject: [BESAdmin-Announcements] SCM Content Update: CIS Checklist for Windows 7 content updated to v2.1.0 ( with remediation) Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Oct 19 06:37:44 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 19 Oct 2015 13:37:44 +0000 Subject: [BESAdmin-Announcements] Content Modification: Updates for Mac Applications Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Oct 19 15:43:22 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 19 Oct 2015 15:43:22 -0700 Subject: [BESAdmin-Announcements] SUSE Download Cacher updated Message-ID: The tool SUSE Download Cacher has been updated. Updated Tools Versions: SUSE Download Cacher, version 6.5 Reasons for update: Tool has been updated to support SLE 12. Actions to take: SUSE Download Cacher v6.5 is available here - http://software.bigfix.com/download/bes/util/SUSEDownloadCacher.exe. Additional links: SUSE Download Cacher Options - http://www-01.ibm.com/support/docview.wss?uid=swg21506059 Application Engineering Team IBM Endpoint Manager -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Oct 19 15:43:31 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 19 Oct 2015 15:43:31 -0700 Subject: [BESAdmin-Announcements] CentOS Download Cacher updated Message-ID: The tool CentOS Download Cacher have been updated. Updated Tool Versions: CentOS Download Cacher, version 6.1 Reasons for update: The tool have been updated to support CentOS 7. Actions to take: CentOS Download Cacher v6.1 is available here - http://software.bigfix.com/download/bes/util/CentOSDownloadCacher.exe Additional links: CentOS Download Cacher Options - http://www-01.ibm.com/support/docview.wss?uid=swg21671282 Application Engineering Team IBM Endpoint Manager -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Oct 20 02:51:06 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 20 Oct 2015 09:51:06 +0000 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows (English) Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Oct 20 08:31:07 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 20 Oct 2015 16:31:07 +0100 Subject: [BESAdmin-Announcements] Content Modification (Audit Only) in Patches for ESXi Message-ID: Audit Only?Content in the Patches for ESXi site has been modified. Changes to Patches for ESXi site 5.5 Fixlets generated 55098 - VMware ESXi 5.5 - ESXi550-201510401-BG.bes Published site version: * Patches for ESXi, version 70. Reasons for Update: *New patches released by VMware for ESXi 5.5 Actions to Take: * Gathering of the site will automatically show the updates made. Regards, Martin Feeney Software Development Manager, IBM Endpoint Manager for Server Automation IBM Security Phone: 353-91-570632 Ida Business Park E-mail: martin.feeney at ie.ibm.com Galway Ireland IBM Ireland Product Distribution Limited Registered in Ireland with no.: 92815 Registered Office: IBM House, Shelbourne Road, Ballsbridge, Dublin 4, Ireland From besadmin-announcements at bigmail.bigfix.com Tue Oct 20 22:48:59 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 21 Oct 2015 05:48:59 +0000 Subject: [BESAdmin-Announcements] Content Modification: Patches for Mac OS X Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Oct 20 22:49:27 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 21 Oct 2015 05:49:27 +0000 Subject: [BESAdmin-Announcements] Content Modification: Updates for Mac Applications Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Oct 20 23:53:43 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 21 Oct 2015 14:53:43 +0800 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Message-ID: Content in the Updates for Windows Applications Fixlet site has been modified. Updated Fixlets: * Java Runtime Environment 8 update 60 (32-bit) Available (JRE < 8 32-bit version Installed) (x64) (Superseded) (ID: 7056415) * Java Runtime Environment 8 update 60 (32-bit) Available (JRE 8 32-bit version Installed) (x64) (Superseded) (ID: 7056423) * Java Runtime Environment 8 update 60 (32-bit) Available (x64) - CORRUPT PATCH (Superseded) (ID: 7056419) * Java Runtime Environment 8 update 60 Available - CORRUPT PATCH (Superseded) (ID: 7051265) * Java Runtime Environment 8 update 60 Available (JRE < 8 Installed) (Superseded) (ID: 7051261) * Java Runtime Environment 8 update 60 Available (JRE 8 Installed) (Superseded) (ID: 7051263) * Java Runtime Environment 8 update 60 Available (x64) - CORRUPT PATCH (Superseded) (ID: 7056417) * Java Runtime Environment 8 update 60 Available (x64) (JRE < 8 Installed) (Superseded) (ID: 7056413) * Java Runtime Environment 8 update 60 Available (x64) (JRE 8 Installed) (Superseded) (ID: 7056411) * Java Runtime Environment 8 update 65 (32-bit) Available (JRE < 8 32-bit version Installed) (x64) (ID: 7056429) * Java Runtime Environment 8 update 65 (32-bit) Available (JRE 8 32-bit version Installed) (x64) (ID: 7056435) * Java Runtime Environment 8 update 65 (32-bit) Available (x64) - CORRUPT PATCH (ID: 7056433) * Java Runtime Environment 8 update 65 Available - CORRUPT PATCH (ID: 7051271) * Java Runtime Environment 8 update 65 Available (JRE < 8 Installed) (ID: 7051267) * Java Runtime Environment 8 update 65 Available (JRE 8 Installed) (ID: 7051269) * Java Runtime Environment 8 update 65 Available (x64) - CORRUPT PATCH (ID: 7056431) * Java Runtime Environment 8 update 65 Available (x64) (JRE < 8 Installed) (ID: 7056427) * Java Runtime Environment 8 update 65 Available (x64) (JRE 8 Installed) (ID: 7056425) * Java Runtime Environment 8 update 66 (32-bit) Available (JRE < 8 32-bit version Installed) (x64) (ID: 7056443) * Java Runtime Environment 8 update 66 (32-bit) Available (JRE 8 32-bit version Installed) (x64) (ID: 7056439) * Java Runtime Environment 8 update 66 (32-bit) Available (x64) - CORRUPT PATCH 1 (ID: 7056449) * Java Runtime Environment 8 update 66 Available - CORRUPT PATCH (ID: 7051277) * Java Runtime Environment 8 update 66 Available (JRE < 8 Installed) (ID: 7051273) * Java Runtime Environment 8 update 66 Available (JRE 8 Installed) (ID: 7051275) * Java Runtime Environment 8 update 66 Available (x64) - CORRUPT PATCH (ID: 7056445) * Java Runtime Environment 8 update 66 Available (x64) (JRE < 8 Installed) (ID: 7056441) * Java Runtime Environment 8 update 66 Available (x64) (JRE 8 Installed) (ID: 7056437) Published Site Version: * Updates for Windows Applications, version 841. Reasons for Update: * Oracle has released new versions of the Java SE Runtime Environment (JRE 8u65 and 8u66) to address security vulnerabilities. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team IBM BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Oct 21 10:10:03 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 21 Oct 2015 17:10:03 +0000 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows (English) Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Oct 21 22:33:39 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 22 Oct 2015 13:33:39 +0800 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Message-ID: Content in the Updates for Windows Applications Fixlet site has been modified. New/Updated Fixlets: * Apple iTunes 12.3.1 Available - Win7/Win8/Win8.1/Win10 (ID: 2061093) * Apple iTunes 12.3.0 Available - Win7/Win8/Win8.1/Win10 (Superseded) (ID: 2061091) Published Site Version: * Updates for Windows Applications, version 842. Reasons for Update: * Apple has released a new version of iTunes (12.3.1) to address security vulnerabilities. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team IBM BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Oct 22 01:34:44 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 22 Oct 2015 08:34:44 +0000 Subject: [BESAdmin-Announcements] Content Modification: Patches for Mac OS X Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Oct 23 03:17:35 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 23 Oct 2015 10:17:35 +0000 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Oct 27 09:30:16 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 27 Oct 2015 16:30:16 +0000 Subject: [BESAdmin-Announcements] SCM Content Update: DISA STIG Checklist for Internet Explorer 10 content is updated to v1r10 ( with remediation) Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Oct 27 21:00:17 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 28 Oct 2015 12:00:17 +0800 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Message-ID: Content in the Updates for Windows Applications Fixlet site has been modified. New/Updated Fixlets: * Adobe Shockwave Player 12.2.1.171 Available (ID: 12011060) * Adobe Shockwave Player 12.2.0.162 Available (Superseded) (ID: 12011058) * WinZip 20.0 Available (ID: 10060019) * WinZip 20.0 Available (x64) (ID: 10060016) Published Site Version: * Updates for Windows Applications, version 844. Reasons for Update: * Adobe has released a new version of Adobe Shockwave Player (12.2.1.171) to address security vulnerabilities. * WinZip Computing has released a new version of WinZip (20.0 Build 11659). Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team IBM BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Oct 27 18:57:18 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 28 Oct 2015 01:57:18 +0000 Subject: [BESAdmin-Announcements] SUA 2.x and BFI 9.x Oct 2015 Catalog Update Message-ID: An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: CatalogReleaseNotes-49.1.pdf Type: application/pdf Size: 45949 bytes Desc: not available URL: From besadmin-announcements at bigmail.bigfix.com Wed Oct 28 03:53:53 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 28 Oct 2015 18:53:53 +0800 Subject: [BESAdmin-Announcements] Content Modification: Updates for Mac Applications Message-ID: Content in Updates for Mac Applications has been modified. New/Updated Fixlet: * Adobe Shockwave Player 12.2.1.171 Available - Mac OS X (ID: 12011053) Published site version: Updates for Mac Applications, version 110 Reasons for Update: * Adobe released a newer version of Shockwave Player Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team IBM BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Oct 28 10:23:00 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 28 Oct 2015 17:23:00 +0000 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows (English) Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Oct 29 07:37:04 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 29 Oct 2015 14:37:04 +0000 Subject: [BESAdmin-Announcements] Content Modification in Windows Point of Sale Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Oct 29 08:19:41 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 29 Oct 2015 15:19:41 +0000 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows (English) Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Oct 29 22:55:33 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 30 Oct 2015 13:55:33 +0800 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Message-ID: Content in the Updates for Windows Applications Fixlet site has been modified. New/Updated Fixlets: * Notepad++ 6.8.6 Available (ID: 4001035) * Notepad++ 6.8.5 Available (Superseded) (ID: 4001033) Published Site Version: * Updates for Windows Applications, version 845. Reasons for Update: * A new version of Notepad++ is available (6.8.6). Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team IBM BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Oct 30 07:24:59 2015 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 30 Oct 2015 14:24:59 +0000 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows (English) Message-ID: An HTML attachment was scrubbed... URL: