From besadmin-announcements at bigmail.bigfix.com Wed Feb 1 02:01:36 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 1 Feb 2017 10:01:36 +0000 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows Message-ID: Content in the Patches for Windows site has been modified: New Fixlets: [Major] MS15-080: Description of the security update for the .NET Framework 3.5.1 on Windows 7 Service Pack 1 and Windows Server 2008 R2 Service Pack 1 - Windows 7 SP1 - KB3072305 (ID: 1508087) Modified Fixlets: [Minor] Office 365 Version 16.0.7571.2109 Available for Network Share for Office 365 - Office 2016 - Current Channel - Office 2016 (ID: 365067) [Minor] Office 365 Version 16.0.7369.2102 Available - First Release of Deferred Channel - Office 2016 (Update from Local Client Cache) (ID: 365265) [Minor] Office 2016 Version 16.0.7571.2109 Available for Network Share for Office 2016 - Current Channel - Office 2016 (ID: 365135) Reason for Update: Updated the Source Severity of Microsoft Office 2016 fixlets. Fixlets for KB3072305 was republished due to change in Supersedence information from Microsoft. Actions to Take: None Published site version: Patches for Windows, version 2679. Additional links: None Application Engineering Team IBM BigFix From besadmin-announcements at bigmail.bigfix.com Thu Feb 2 00:29:16 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 2 Feb 2017 08:29:16 +0000 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Feb 2 22:09:52 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 3 Feb 2017 14:09:52 +0800 Subject: [BESAdmin-Announcements] IBM BigFix Compliance PCI Add-on: Updated PCI DSS Checklists for MS SQL 2008 and MS SQL 2012 published 2017-02-02 Message-ID: Product: IBM BigFix Compliance PCI Add-on Title: Updated PCI DSS Checklists for MS SQL 2008 and MS SQL 2012 to support remediation and other enhancements Category: Updated PCI DSS checklist Published Benchmark: Payment Card Industry Data Security Standard v3.2 Details: The PCI DSS Checklist for MS SQL 2008 and PCI DSS Checklist for MS SQL 2012 sites are updated with remediation checks to allow BigFix operators to efficiently remediate a non-compliance issue with a single action. The measured values for some checks, which can be viewed in the BigFix console, analyses, and SCA reports, are formatted for enhanced readability. The results now clearly present the desired system configuration setting, as specified by a check, against the actual setting on the endpoint. Some titles and descriptions of the checks are updated with the standardized format and extensions. The following PCI DSS Policies are refreshed with the latest checklist content for sites listed under Published sites: o PCI DSS Checklists o PCI DSS Milestones View o PCI DSS Requirements View Published Site: PCI DSS Checklist for MS SQL 2008, version 8 PCI DSS Checklist for MS SQL 2012, version 9 PCI DSS Reporting, version 3 *The site version is provided for air-gap customers. Actions to Take: If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://ibm.biz/Bd4LBt. If you have not subscribed to the site above, you can use the License Overview dashboard to enable and gather the site. Note that you must be entitled to the new content and you are using IBM BigFix version 9.2 and later. If you were involved in the Beta / Early Access Program for IBM BigFix Compliance PCI Add-on, unsubscribe from the beta sites to avoid any conflicting issues with the production sites. If you do not unsubscribe from the beta sites, the content in the production sites will fail. More information: To know more information about the IBM BigFix Compliance PCI DSS checklists, see: IBM BigFix Compliance PCI Add-on User's Guide in Knowledge Center: https://ibm.biz/BdrWCq IBM BigFix Wiki: https://ibm.biz/BdrBtk Release Announcements in the IBM BigFix Forum: https://ibm.biz/Bdsspw We hope you find this latest release of PCI DSS content useful and effective. Thank you! -- The IBM BigFix Compliance PCI Add-on team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Feb 3 11:55:07 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 3 Feb 2017 19:55:07 +0000 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Message-ID: Content in the Updates for Windows Applications site has been modified. Modified Fixlets: * [Major] Adobe Digital Editions 4.5.4 Available (ID: 4000010) Published Site Version: * Updates for Windows Applications, version 1001. Reasons for Update: * A new version of Adobe Digital Editions was released. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team IBM BigFix From besadmin-announcements at bigmail.bigfix.com Fri Feb 3 12:00:56 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 3 Feb 2017 20:00:56 +0000 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows Message-ID: Content in the Patches for Windows site has been modified: Modified Fixlets: [Major] 2809243: Updates for Lync Server 2013 - Lync Server 2013 - KB2809243 (x64) (ID: 280924301) Reason for Update: Microsoft have updated the installer for KB2809243. Actions to Take: None Published site version: Patches for Windows, version 2680. Additional links: None Application Engineering Team IBM BigFix From besadmin-announcements at bigmail.bigfix.com Mon Feb 6 00:58:36 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 6 Feb 2017 08:58:36 +0000 Subject: [BESAdmin-Announcements] Solaris Download Plug-in updated Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Feb 6 01:05:15 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 6 Feb 2017 09:05:15 +0000 Subject: [BESAdmin-Announcements] Solaris Download Cacher updated Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Feb 7 03:09:15 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 7 Feb 2017 19:09:15 +0800 Subject: [BESAdmin-Announcements] 2016 Summary of IBM BigFix Compliance SCM and SCA Content Releases Message-ID: As part of our continued commitment to help you meet your endpoint security compliance objectives, we would like to highlight the contents and product enhancements that IBM has delivered in 2016 for IBM BigFix Compliance, which includes Security Configuration Management (SCM) and Security Compliance Analytics (SCA). For details, see https://ibm.biz/BdsQTm. -- The IBM BigFix Compliance team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Feb 7 07:06:36 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 7 Feb 2017 15:06:36 +0000 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows Message-ID: Content in the Patches for Windows site has been modified: New Fixlets: [Major] 3211320: Servicing stack update for Windows Server 2016 - Windows Server 2016 - KB3211320 (x64) (ID: 321132003) [Major] 3211320: Servicing stack update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB3211320 (ID: 321132005) [Major] 3211320: Servicing stack update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB3211320 (x64) (ID: 321132001) Modified Fixlets: [Major] MS16-099: Security Update for Microsoft Office - OneNote 2010 SP2 - KB3114885 (ID: 1609907) Fully Superseded Fixlets: [Major] 3199986: Servicing stack update for Windows Server 2016 - Windows Server 2016 - KB3199986 (x64) (Superseded) (ID: 319998605) [Major] 3199986: Servicing stack update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB3199986 (x64) (Superseded) (ID: 319998601) [Major] 3199986: Servicing stack update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB3199986 (Superseded) (ID: 319998603) Reason for Update: Microsoft has released KB3211320. KB3199986 has been superseded by KB3211320. Fixlets for MS16-099 were updated due to Relevance false positive. Actions to Take: None Published site version: Patches for Windows, version 2681. Additional links: None Application Engineering Team IBM BigFix From besadmin-announcements at bigmail.bigfix.com Tue Feb 7 15:31:16 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 8 Feb 2017 07:31:16 +0800 Subject: [BESAdmin-Announcements] IBM BigFix Compliance: Improved SCM Checklists wiki page is now available Message-ID: We are delighted to announce that the newly revamped SCM Checklists wiki page, which contains all the SCM checklists that are developed and released by IBM BigFix Compliance, is available at https://ibm.biz/BdFiGQ. Details of the updates are as follows. Improved Readability: The new page design and layout provides you a better view of all the checklists based on the operating system or application type for each of the supported security benchmark: * Center for Internet Security (CIS) * Defense Information System Agency Security Technical Implementation Guidelines (DISA STIG) * Federal Desktop Core Configuration (FDCC) * United States Governance Configuration Baseline (USGCB) * Payment Card Industry Data Security Standard (PCI DSS) Additional Navigation: A navigation table is provided to help you drill down to the related checklists of a specific platform or application type for each security benchmark. This allows you to quickly find the information that you need. Information Completeness: For each SCM checklist, you can find the specific operating system version or application version, checklist name, site version, most recent release date, supported security benchmark, benchmark publish date, and other related comments. We hope that you will find this new SCM Checklists wiki page more useful. Thank you! - The IBM BigFix Compliance team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Feb 7 19:09:16 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 8 Feb 2017 11:09:16 +0800 Subject: [BESAdmin-Announcements] =?iso-8859-1?q?IBM_BigFix_changes_and_up?= =?iso-8859-1?q?dates_in_line_with=A0the_RHEL_5_and_RHN_Classic=27s_end_of?= =?iso-8859-1?q?_life?= Message-ID: IBM BigFix Patch for Red Hat Enterprise Linux (RHEL) will be making updates to stay aligned with the?upcoming?changes from?Red Hat: Red Hat Enterprise Linux 5 (RHEL5) end of life (EOL) is on March 31, 2017. For more information, see https://access.redhat.com/support/policy/updates/errata Red Hat is shifting from?the?Red?Hat?Network?(RHN)?hosted?interface to the RHSM interface in July 2017. For more information, see https://access.redhat.com/products/red-hat-subscription-management BigFix?Patch for RHEL is implementing the following?updates: End of support for RHEL 5 BigFix Patch for RHEL?will no longer provide RHEL 5 Fixlet content and will end it's RHEL 5 support in July 2017. We suggest? updating to later versions of Red Hat. Users of the RHEL with Extended?Life Cycle?Support (ELS) may open an RFE for content support. End of support for non-RHSM versions of the download cacher and download plug-on The earlier, non-RHSM versions of?the download cacher and download plug-in are supported only until RHEL 5. The RHSM enhancements that BigFix?Patches for RHEL?released in December 2016 supports RHEL 6 and RHEL 7. Deprecation of the Patches for RHEL 5 - Native tools site The Patches for RHEL 5 - Native tools site will be deprecated in July 2017. The site will have?'Deprecated' appended to the site name in the License Overview dashboard. Additional References: - For information about the RHEL 5 EOL, see the following: -- Archived Red Hat notice: https://www.redhat.com/archives/epel-devel-list/2012-February/msg00000.html -- Under the Life-cycle Dates section: https://access.redhat.com/support/policy/updates/errata -- https://linuxlifecycle.com/ - For information about the RHN Classic sunset and migration to RHSM, see https://access.redhat.com/products/red-hat-subscription-management. - For information about IBM Request for Enhancements (RFE), see https://www.ibm.com/developerworks/rfe/execute?use_case=changeRequestLanding Application Engineering team IBM BigFix Patch -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Feb 7 20:15:26 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 8 Feb 2017 04:15:26 +0000 Subject: [BESAdmin-Announcements] IBM BigFix Compliance NEW SITE: CIS Checklist for Mac OS X 10.12 (site ver 1) published 2017-02-06 Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Feb 8 06:18:25 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 8 Feb 2017 22:18:25 +0800 Subject: [BESAdmin-Announcements] IBM BigFix Compliance PCI Add-on: Updated PCI DSS Checklists for Windows 2008, Windows 2012, and Windows 10 published 2017-02-08 Message-ID: Product: IBM BigFix Compliance PCI Add-on Title: Updated PCI DSS Checklists for Windows 2008, Windows 2012, and Windows 10 sites to resolve APAR IV91721 Category: Updated PCI DSS checklist Published Benchmark: Payment Card Industry Data Security Standard v3.2 Details: The IBM BigFix Compliance PCI Add-on team has updated the PCI DSS checklists for Windows 2008, Windows 2012, and Windows 10 to address APAR IV91721. The check Verify that "Enforce Password History" is set to 5 or more (pcidss-8.2.5.a) is updated to resolve the said APAR. The new check name, Verify that "Enforce Password History" is set to 4 or more, reflects the fix. The following PCI DSS Policies are refreshed with the latest checklist content for sites listed under Published sites: PCI DSS Checklists PCI DSS Milestones View PCI DSS Requirements View Published Sites: PCI DSS Checklist for Windows 2008, version 10 PCI DSS Checklist for Windows 2012, version 10 PCI DSS Checklist for Windows 10, version 3 PCI DSS Reporting, version 4 *The site version is provided for air-gap customers Actions to Take: Run an import in BigFix Compliance Analytics (formerly known as SCA) to see the latest results. If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://ibm.biz/Bd4LBt. More information: To know more information about the IBM BigFix Compliance PCI DSS checklists, see: IBM BigFix Compliance PCI Add-on User's Guide in Knowledge Center: https://ibm.biz/BdrWCq IBM BigFix Wiki: https://ibm.biz/BdrBtk Release Announcements in the IBM BigFix Forum: https://ibm.biz/Bdsspw SCM Checklists: https://ibm.biz/BdFiGQ We hope you find this latest release of PCI DSS content useful and effective. Thank you! -- The IBM BigFix Compliance PCI Add-on team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Feb 8 10:25:11 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 8 Feb 2017 18:25:11 +0000 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows Message-ID: Content in the Patches for Windows site has been modified: Modified Fixlets: [Major] MS13-074: Vulnerabilities in Microsoft Access Could Allow Remote Code Execution - Access 2007 SP3 (ID: 1307401) [Major] MS12-030: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2007 SP2/SP3 (ID: 1203011) [Major] MS12-028: Vulnerability in Microsoft Office Could Allow Remote Code Execution - Office 2007 SP2 (ID: 1202801) [Major] MS11-094: Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution - PowerPoint Viewer 2007 SP2 (ID: 1109421) Fully Superseded Fixlets: [Major] 3197356: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB3197356 (x64) (Superseded) (ID: 319735603) [Major] 3197356: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB3197356 (Superseded) (ID: 319735601) Reason for Update: Fixlets from KB3197356 were superseded by KB3194798. Actions to Take: None Published site version: Patches for Windows, version 2682. Additional links: None Application Engineering Team IBM BigFix From besadmin-announcements at bigmail.bigfix.com Thu Feb 9 00:53:14 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 9 Feb 2017 16:53:14 +0800 Subject: [BESAdmin-Announcements] IBM Patch: Pre-Announcement: IBM BigFix Patch to end CentOS Linux 5 support in July 31, 2017 Message-ID: CentOS Linux 5 is reaching its end of life (EOL) in March 31, 2017. At this time, CentOS Linux 5 will no longer receive any further updates from the community. Consequently, BigFix Patch for CentOS Linux will no longer provide Fixlet content for CentOS Linux 5 in the 'Patches for CentOS 5 Native Tools' site. This site will be deprecated by July 31, 2017. BigFix Patch will continue to support customers patching CentOS Linux 5 systems until July 31, 2017. Action to Take: Update to later versions of CentOS Linux. Additional References: For information about the CentO5 EOL, see the following: https://wiki.centos.org/About/Product https://blog.cpanel.com/end-of-life-for-centos5/ https://wiki.centos.org/FAQ/General Application Engineering team IBM BigFix Patch -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Feb 9 19:27:19 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 10 Feb 2017 11:27:19 +0800 Subject: [BESAdmin-Announcements] Availability of BigFix Compliance Analytics version 1.9.70 (Patch 1) Message-ID: IBM BigFix is pleased to announce the release of BigFix Compliance Analytics version 1.9.70 (Patch 1), formerly called IBM BigFix Security and Compliance Analytics (SCA). Product: IBM BigFix Compliance Published site: SCM Reporting, version 106. Details: This patch release covers the following fixes and updates: - Update of IBM JRE to version 8.0.3.22. No user action is required for this update. - Update of the navigation bar to align with the WebUI look and feel - Fixes and workarounds were provided for the following: -- APAR 44481/V92305: Provided a workaround for checkfixlet errors that cause table conflict. -- 43766: Resolved the sentinel duplication error that occurs even if duplicates are deleted. -- 43797: Resolved the datasource sequence reset issue that results to an increased ETL time after upgrading to version 1.9. -- 43909: Modified the check properties query to remediate instances when the metadata check properties are not collected correctly on DB2 BFE. -- 44343: Resolved instances where the ETL fails after the upgrade from 1.8 to 1.9 and an exception gets added to environment. -- 44457: Fixed Import failures in multiple datasource enviroments that are caused by checkFixlets from sites that have no subscriptions. For first time installations: 1. In the License Dashboard in the IBM BigFix console, enable the SCM Reporting site. 2. In the Security Configuration domain in the console, open the Configuration Management navigation tree. 3. Select the Fixlet named IBM BigFix Compliance 1.9 First-time Install Fixlet under the IBM BigFix Compliance Install/Upgrade menu tree node. 4. Follow the Fixlet instructions and take the associated action to install your BigFix Compliance deployment. For upgrade installations: Refer to the prescribed upgrade steps for the BigFix Compliance version that you are using. IMPORTANT: Before you start any upgrade process, ensure that you perform server and database backup. A. If you're using BigFix Compliance version 1.7, 1.8, or 1.9 follow these upgrade steps to upgrade to BigFix Compliance version 1.9 Patch 1: 1. Make sure that you performed server and database backup. 2. Make sure that known issues don't meet your environment. 3. In the Security Configuration domain in the console, open the Configuration Management navigation tree. 4. Under the IBM BigFix Compliance Install/Ugrade menu tree item, select the IBM BigFix Compliance 1.9 Upgrade Fixlet which automatically installs and upgrades to the new version. 5. Follow the Fixlet instructions and take the associated action to upgrade your IBM BigFix Compliance deployment. 6. Update the data schema. To do this, log in to the IBM BigFix Compliance web interface from the host server and proceed with configuration. Upgrading the data scheme is expected and it will take some time to complete. NOTE: Automatic upgrade installation only affects installations running under the LocalSystem account. Folow the Fixlet instructions to install the update manually if this fix cannot be applied. B. If you're using a version earlier then BigFix Compliance 1.5.78, follow these upgrade steps: 1. Manually upgrade to version 1.5.78. The 1.5.78 installer can be found here. 2. Manually upgrade to version 1.8.33. The 1.8.33 installer can be found here. 3. Use the IBM BigFIx Compliance 1.9 Upgrade Fixlet to upgrade to version 1.9. See steps A. C. If you're using a version earlier than BigFix Compliance 1.8.33, follow these upgrade steps: 1. Manually upgrade to version 1.8.33. The 1.8.33 installer can be found here. 2. Use the IBM BigFix Compliance 1.9 Upgrade Fixlet to upgrade to version 1.9. See steps A. BigFix Compliance team IBM BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Feb 9 10:48:53 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 9 Feb 2017 18:48:53 +0000 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows Message-ID: Content in the Patches for Windows site has been modified: Modified Fixlets: [Major] MS17-004: Security Only Quality Update - Security Only - Windows Server 2008 R2 SP1 - KB3212642 (x64) (ID: 1700401) [Major] MS17-004: Security Only Quality Update - Security Only - Windows 7 SP1 - KB3212642 (x64) (ID: 1700403) [Major] MS17-004: Security Only Quality Update - Security Only - Windows 7 SP1 - KB3212642 (ID: 1700405) [Major] MS16-120: Security Update for Microsoft Graphics Component - Office 2010 SP2 - KB3118317 (ID: 1612005) [Major] MS16-120: Security Update for Microsoft Graphics Component - Word Viewer - KB3118394 (ID: 1612047) [Major] MS16-120: Security Update for Microsoft Graphics Component - Lync 2013 SP1 (Skype for Business) / Lync Basic 2013 SP1 (Skype for Business Basic) - KB3118348 (ID: 1612013) [Major] 3115446: Update for Office Web Apps Server 2013 - Office Web Apps Server 2013 SP1 - KB3115446 (x64) (ID: 311544601) [Major] MS15-110: Security Updates for Microsoft Office to Address Remote Code Execution - SharePoint Server 2013 SP1 - KB3085567 (x64) (ID: 1511041) [Major] MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2013 / SharePoint Foundation 2013 - KB2956183 (x64) (ID: 1502213) [Major] MS11-039: Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 2.0 SP2 / Microsoft .NET Framework 3.5 SP1 - Windows Vista SP1 / Windows Server 2008 (ID: 1103915) [Major] MS10-070: Vulnerability in ASP.NET Could Allow Information Disclosure - Microsoft .NET Framework 2.0 SP2 / 3.5 SP1 - Windows Vista SP1 / Windows Server 2008 Gold (ID: 1007027) [Major] MS10-041: Vulnerability in Microsoft .NET Framework Could Allow Tampering - Microsoft .NET Framework 2.0 SP2 / 3.5 SP1 - Windows Vista SP1 / Windows Server 2008 Gold (ID: 1004113) Reason for Update: Fixlets for MS17-004, MS16-120, KB3115446, MS15-110, MS15-022, MS11-039, MS10-070, MS10-041 were updated due to Relevance false positive. Actions to Take: None Published site version: Patches for Windows, version 2684. Additional links: None Application Engineering Team IBM BigFix From besadmin-announcements at bigmail.bigfix.com Fri Feb 10 01:24:22 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 10 Feb 2017 17:24:22 +0800 Subject: [BESAdmin-Announcements] IBM BigFix Patch: Pre-Announcement: Supersedence Logic on CentOS Fixlets to be Updated on February 14, 2017 Message-ID: The BigFix Patch team continuously aims to provide enhancements to the patching content with improved usability, accuracy, and reliability of the available Fixlets. The supersedence logic used on Fixlets for the CentOS 5, CentOS 6 and CentOS 7, which is based on Red Hat's Errata information, is going to to be updated with a package-based supersedence logic implementation on February 14, 2017. Details: Why is the supersedence logic being changed? The main reason for the change is to improve Fixlet accuracy by ensuring supersedence only on Fixlets that contain superseded packages. Additionally, changes are made in line with Red Hat's interface shift from Red Hat Network (RHN) hosted to Red Hat Subscription Management (RHSM) that is happening in July 2017. What is being changed in the supersedence logic? The new supersedence logic works by inspecting the packages in a Fixlet. If the Fixlet conditions match the set criteria for supersedence, only then will it be marked as superseded. This enhancement reduces the occurrence of false positives whereby the Fixlet supersedence logic is incorrectly processed. After the update, previously superseded Fixlets may show as relevant and vice versa. How does the new supersedence logic impact you? If you are using Fixlet applicability as a means to measure patching compliance, your compliance level may be affected when the enhancements are released on February 14, 2017. However, the Fixlet supersedence and relevance results will be more accurate and would help reduce patching time by applying only the relevant fixes. Sites to be Published: Patches for CentOS 5 Native Tools site Patches for CentOS 6 Native Tools site Patches for CentOS 7 site Actions to Take After the Update: Sync your baselines and custom sites to ensure that they match with the Fixlets in the external sites. Review the CentOS content and apply the latest Fixlets that are relevant. Additional References: BigFix announcement on RHN Classic's EOL: https://ibm.biz/BdsTey Red Hat's Announcement on the RHN Classic to RHSM Transition: https://access.redhat.com/products/red-hat-subscription-management Application Engineering team IBM BigFix Patch -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Feb 13 08:58:03 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 13 Feb 2017 16:58:03 +0000 Subject: [BESAdmin-Announcements] Content Modification: Advanced Patching Message-ID: Content in the Advanced Patching site has been modified. New/Updated Fixlets: * IBM WebSphere Application Server Interim Fix 8.5.0.0-WS-WAS-IFPI73367 Available (ID: 855050066) * IBM WebSphere Application Server Interim Fix 8.5.5.0-WS-WAS-IFPI73367 Available (ID: 855050068) Published Site Version: * Advanced Patching, version 39. Reasons for Update: * IBM has released interim fix PI73367 to address security vulnerability in WebSphere Application Server. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team IBM BigFix From besadmin-announcements at bigmail.bigfix.com Mon Feb 13 09:29:53 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 13 Feb 2017 17:29:53 +0000 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows Message-ID: Content in the Patches for Windows site has been modified: New Fixlets: [Major] 3141514: Update for Project 2016 - Project 2016 - KB3141514 (x64) (ID: 314151401) [Major] 3141511: Update for Outlook 2016 - Outlook 2016 - KB3141511 (x64) (ID: 314151101) [Major] 3141513: Update for Office 2016 - Office 2016 - KB3141513 (x64) (ID: 314151301) [Major] 3141512: Update for OneNote 2016 - OneNote 2016 - KB3141512 (x64) (ID: 314151201) [Major] 3141510: Update for Office 2016 - Office 2016 - KB3141510 (x64) (ID: 314151001) [Major] 3141508: Update for Office 2016 - Office 2016 - KB3141508 (x64) (ID: 314150801) [Major] 3141509: Update for Office 2016 Language Interface Pack - Office 2016 - KB3141509 (x64) (ID: 314150901) [Major] 3141501: Update for Skype for Business 2016 - Skype for Business 2016 - KB3141501 (x64) (ID: 314150101) [Major] 3141505: Update for Office 2016 - Office 2016 - KB3141505 (x64) (ID: 314150501) [Major] 3141504: Update for Office 2016 - Office 2016 - KB3141504 (x64) (ID: 314150401) [Major] 3128052: Update for Office 2016 - Office 2016 - KB3128052 (x64) (ID: 312805201) [Major] 3128051: Update for PowerPoint 2016 - PowerPoint 2016 - KB3128051 (x64) (ID: 312805101) [Major] 3141500: Update for Visio 2016 - Visio 2016 - KB3141500 (x64) (ID: 314150001) [Major] 3127991: Update for Office 2016 - Office 2016 - KB3127991 (x64) (ID: 312799101) [Major] 3128048: Update for Office 2016 - Office 2016 - KB3128048 (x64) (ID: 312804801) [Major] 3114389: Update for Office 2016 - Office 2016 - KB3114389 (x64) (ID: 311438901) [Major] 3161988: Update for Lync 2013 (Skype for Business 2015) - Skype for Business 2015 - KB3161988 (x64) (ID: 316198801) [Major] 3141499: Update for Project 2013 - Project 2013 SP1 - KB3141499 (x64) (ID: 314149901) [Major] 3141495: Update for Outlook 2013 - Outlook 2013 SP1 - KB3141495 (x64) (ID: 314149501) [Major] 3141494: Update for OneNote 2013 - OneNote 2013 SP1 - KB3141494 (x64) (ID: 314149401) [Major] 3141492: Update for Visio 2013 - Visio 2013 SP1 - KB3141492 (x64) (ID: 314149201) [Major] 3141491: Update for Office 2013 - Office 2013 SP1 - KB3141491 (x64) (ID: 314149101) [Major] 3141461: Update for PowerPoint 2013 - PowerPoint 2013 SP1 - KB3141461 (x64) (ID: 314146101) [Major] 3127966: Update for Office 2013 - Office 2013 SP1 - KB3127966 (x64) (ID: 312796601) [Major] 3127972: Update for Office 2013 - Office 2013 SP1 - KB3127972 (x64) (ID: 312797201) [Major] 3115489: Update for Office 2013 - Office 2013 SP1 - KB3115489 (x64) (ID: 311548901) [Major] 3141514: Update for Project 2016 - Project 2016 - KB3141514 (ID: 314151403) [Major] 3141513: Update for Office 2016 - Office 2016 - KB3141513 (ID: 314151303) [Major] 3141512: Update for OneNote 2016 - OneNote 2016 - KB3141512 (ID: 314151203) [Major] 3141511: Update for Outlook 2016 - Outlook 2016 - KB3141511 (ID: 314151103) [Major] 3141508: Update for Office 2016 - Office 2016 - KB3141508 (ID: 314150803) [Major] 3141509: Update for Office 2016 Language Interface Pack - Office 2016 - KB3141509 (ID: 314150903) [Major] 3141510: Update for Office 2016 - Office 2016 - KB3141510 (ID: 314151003) [Major] 3141505: Update for Office 2016 - Office 2016 - KB3141505 (ID: 314150503) [Major] 3141504: Update for Office 2016 - Office 2016 - KB3141504 (ID: 314150403) [Major] 3141501: Update for Skype for Business 2016 - Skype for Business 2016 - KB3141501 (ID: 314150103) [Major] 3128052: Update for Office 2016 - Office 2016 - KB3128052 (ID: 312805203) [Major] 3141500: Update for Visio 2016 - Visio 2016 - KB3141500 (ID: 314150003) [Major] 3128051: Update for PowerPoint 2016 - PowerPoint 2016 - KB3128051 (ID: 312805103) [Major] 3127991: Update for Office 2016 - Office 2016 - KB3127991 (ID: 312799103) [Major] 3128048: Update for Office 2016 - Office 2016 - KB3128048 (ID: 312804803) [Major] 3114389: Update for Office 2016 - Office 2016 - KB3114389 (ID: 311438903) [Major] 3161988: Update for Lync 2013 (Skype for Business 2015) - Skype for Business 2015 - KB3161988 (ID: 316198803) [Major] 3141499: Update for Project 2013 - Project 2013 SP1 - KB3141499 (ID: 314149903) [Major] 3141495: Update for Outlook 2013 - Outlook 2013 SP1 - KB3141495 (ID: 314149503) [Major] 3141494: Update for OneNote 2013 - OneNote 2013 SP1 - KB3141494 (ID: 314149403) [Major] 3141492: Update for Visio 2013 - Visio 2013 SP1 - KB3141492 (ID: 314149203) [Major] 3141461: Update for PowerPoint 2013 - PowerPoint 2013 SP1 - KB3141461 (ID: 314146103) [Major] 3127972: Update for Office 2013 - Office 2013 SP1 - KB3127972 (ID: 312797203) [Major] 3141491: Update for Office 2013 - Office 2013 SP1 - KB3141491 (ID: 314149103) [Major] 3127966: Update for Office 2013 - Office 2013 SP1 - KB3127966 (ID: 312796603) [Major] 3115489: Update for Office 2013 - Office 2013 SP1 - KB3115489 (ID: 311548903) Modified Fixlets: [Major] 2976978: Compatibility update for keeping Windows up-to-date in Windows 8.1 and Windows 8 - Windows 8.1 - KB2976978 (x64) (V20.0) (ID: 297697805) [Major] 2976978: Compatibility update for keeping Windows up-to-date in Windows 8.1 and Windows 8 - Windows 8.1 - KB2976978 (V20.0) (ID: 297697801) [Major] 2952664: Compatibility update for keeping Windows up-to-date in Windows 7 - Windows 7 SP1 - KB2952664 (V21.0) (ID: 295266401) [Major] 2952664: Compatibility update for keeping Windows up-to-date in Windows 7 - Windows 7 SP1 - KB2952664 (x64) (V21.0) (ID: 295266403) Fully Superseded Fixlets: [Major] 3141470: Update for Project 2013 - Project 2013 SP1 - KB3141470 (x64) (Superseded) (ID: 314147001) [Major] 3141459: Update for Project 2016 - Project 2016 - KB3141459 (x64) (Superseded) (ID: 314145901) [Major] 3141470: Update for Project 2013 - Project 2013 SP1 - KB3141470 (Superseded) (ID: 314147003) [Major] 3141459: Update for Project 2016 - Project 2016 - KB3141459 (Superseded) (ID: 314145903) [Major] 3141473: Update for Office 2016 - Office 2016 - KB3141473 (Superseded) (ID: 314147303) [Major] 3141474: Update for Office 2013 - Office 2013 SP1 - KB3141474 (Superseded) (ID: 314147403) [Major] 3141468: Update for Lync 2013 (Skype for Business 2015) - Skype for Business 2015 - KB3141468 (Superseded) (ID: 314146803) [Major] 3141466: Update for Outlook 2013 - Outlook 2013 SP1 - KB3141466 (Superseded) (ID: 314146603) [Major] 3141465: Update for OneNote 2013 - OneNote 2013 SP1 - KB3141465 (Superseded) (ID: 314146503) [Major] 3141462: Update for Visio 2013 - Visio 2013 SP1 - KB3141462 (Superseded) (ID: 314146203) [Major] 3141455: Update for OneNote 2016 - OneNote 2016 - KB3141455 (Superseded) (ID: 314145503) [Major] 3141453: Update for Outlook 2016 - Outlook 2016 - KB3141453 (Superseded) (ID: 314145303) [Major] 3141451: Update for Office 2016 - Office 2016 - KB3141451 (Superseded) (ID: 314145103) [Major] 3128055: Update for Office 2016 - Office 2016 - KB3128055 (Superseded) (ID: 312805503) [Major] 3127992: Update for Office 2016 - Office 2016 - KB3127992 (Superseded) (ID: 312799203) [Major] 3128049: Update for Skype for Business 2016 - Skype for Business 2016 - KB3128049 (Superseded) (ID: 312804903) [Major] 3128045: Update for Visio 2016 - Visio 2016 - KB3128045 (Superseded) (ID: 312804503) [Major] 3127987: Update for Office 2016 - Office 2016 - KB3127987 (Superseded) (ID: 312798703) [Major] 3127983: Update for Office 2016 - Office 2016 - KB3127983 (Superseded) (ID: 312798303) [Major] 3141474: Update for Office 2013 - Office 2013 SP1 - KB3141474 (x64) (Superseded) (ID: 314147401) [Major] 3141473: Update for Office 2016 - Office 2016 - KB3141473 (x64) (Superseded) (ID: 314147301) [Major] 3141468: Update for Lync 2013 (Skype for Business 2015) - Skype for Business 2015 - KB3141468 (x64) (Superseded) (ID: 314146801) [Major] 3141466: Update for Outlook 2013 - Outlook 2013 SP1 - KB3141466 (x64) (Superseded) (ID: 314146601) [Major] 3141465: Update for OneNote 2013 - OneNote 2013 SP1 - KB3141465 (x64) (Superseded) (ID: 314146501) [Major] 3141455: Update for OneNote 2016 - OneNote 2016 - KB3141455 (x64) (Superseded) (ID: 314145501) [Major] 3141462: Update for Visio 2013 - Visio 2013 SP1 - KB3141462 (x64) (Superseded) (ID: 314146201) [Major] 3141453: Update for Outlook 2016 - Outlook 2016 - KB3141453 (x64) (Superseded) (ID: 314145301) [Major] 3141451: Update for Office 2016 - Office 2016 - KB3141451 (x64) (Superseded) (ID: 314145101) [Major] 3128055: Update for Office 2016 - Office 2016 - KB3128055 (x64) (Superseded) (ID: 312805501) [Major] 3128049: Update for Skype for Business 2016 - Skype for Business 2016 - KB3128049 (x64) (Superseded) (ID: 312804901) [Major] 3127992: Update for Office 2016 - Office 2016 - KB3127992 (x64) (Superseded) (ID: 312799201) [Major] 3127987: Update for Office 2016 - Office 2016 - KB3127987 (x64) (Superseded) (ID: 312798701) [Major] 3128045: Update for Visio 2016 - Visio 2016 - KB3128045 (x64) (Superseded) (ID: 312804501) [Major] 3127983: Update for Office 2016 - Office 2016 - KB3127983 (x64) (Superseded) (ID: 312798301) [Major] 3127982: Update for Office 2016 - Office 2016 - KB3127982 (x64) (Superseded) (ID: 312798201) [Major] 3127981: Update for PowerPoint 2016 - Office 2016 - KB3127981 (x64) (Superseded) (ID: 312798101) [Major] 3127967: Update for PowerPoint 2013 - Office 2013 SP1 - KB3127967 (x64) (Superseded) (ID: 312796701) [Major] 3118324: Update for Office 2016 - Office 2016 - KB3118324 (x64) (Superseded) (ID: 311832401) [Major] 3127982: Update for Office 2016 - Office 2016 - KB3127982 (Superseded) (ID: 312798203) [Major] 3127981: Update for PowerPoint 2016 - Office 2016 - KB3127981 (Superseded) (ID: 312798103) [Major] 3127967: Update for PowerPoint 2013 - Office 2013 SP1 - KB3127967 (Superseded) (ID: 312796703) [Major] 3118324: Update for Office 2016 - Office 2016 - KB3118324 (Superseded) (ID: 311832403) [Major] 3118346: Update for Office 2013 - Office 2013 SP1 - KB3118346 (x64) (Superseded) (ID: 311834601) [Major] 3118343: Update for Office 2013 - Office 2013 SP1 - KB3118343 (x64) (Superseded) (ID: 311834301) [Major] 3118338: Update for Office 2016 - Office 2016 - KB3118338 (x64) (Superseded) (ID: 311833801) [Major] 3118346: Update for Office 2013 - Office 2013 SP1 - KB3118346 (Superseded) (ID: 311834603) [Major] 3118343: Update for Office 2013 - Office 2013 SP1 - KB3118343 (Superseded) (ID: 311834303) [Major] 3118338: Update for Office 2016 - Office 2016 - KB3118338 (Superseded) (ID: 311833803) [Major] 3101491: Update for Office 2013 - Office 2013 SP1 - KB3101491 (x64) (Superseded) (ID: 310149101) [Major] 3101491: Update for Office 2013 - Office 2013 SP1 - KB3101491 (Superseded) (ID: 310149103) [Major] 2910979: Update for Office 2016 - Office 2016 Gold - KB2910979 (x64) (Superseded) (ID: 291097901) [Major] 2910979: Update for Office 2016 - Office 2016 Gold - KB2910979 (Superseded) (ID: 291097903) Reason for Update: Microsoft has released New Non-Security Office Updates. Office Non-security Updates are superseded by the newly released fixlets. New Version of Compatibility Update for Windows 7 and Windows 8.1 was released. Actions to Take: None Published site version: Patches for Windows, version 2686. Additional links: None Application Engineering Team IBM BigFix From besadmin-announcements at bigmail.bigfix.com Mon Feb 13 22:46:55 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 14 Feb 2017 06:46:55 +0000 Subject: [BESAdmin-Announcements] BigFix Patch for RHEL releases a supersedence logic enhancement Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Feb 13 20:00:23 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 14 Feb 2017 04:00:23 +0000 Subject: [BESAdmin-Announcements] IBM BigFix Compliance UPDATE: CIS Checklist for Solaris 11 RG03 (site ver 3) published 2017-02-10 Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Feb 13 23:30:05 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 14 Feb 2017 15:30:05 +0800 Subject: [BESAdmin-Announcements] BigFix Patch releases new CentOS supersedence logic Message-ID: IBM BigFix Patch for CentOS Linux now uses a package-based supersedence logic for the CentOS 5, CentOS 6, and CentOS 7 Fixlets. To know more about the changes, see the previous announcement at https://ibm.biz/BdswuZ. Sites Published: Patches for CentOS 5 Native Tools site, version 85 Patches for CentOS 6 Native Tools site, version 106 Patches for CentOS 7 site, version 77 Actions to Take: Sync your baselines and custom sites to ensure that they match with the Fixlets in the external sites. Review the CentOS content and apply the latest Fixlets that are relevant. Application Engineering team IBM BigFix Patch -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Feb 14 00:22:36 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 14 Feb 2017 08:22:36 +0000 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Feb 14 23:09:55 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 15 Feb 2017 07:09:55 +0000 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Feb 15 00:15:31 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 15 Feb 2017 16:15:31 +0800 Subject: [BESAdmin-Announcements] Content in Updates for Mac Applications has been modified Message-ID: Content in Updates for Mac Applications has been modified. New/Updated Fixlet: Flash Player 24.0.0.221 Available - Mac OS X (ID: 1091167) Published site version: Updates for Mac Applications, version 162 Reasons for Update: Adobe released a newer version of Flash Player Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team IBM BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Feb 15 10:55:32 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 15 Feb 2017 18:55:32 +0000 Subject: [BESAdmin-Announcements] IBM BigFix Compliance UPDATE: CIS Checklist for Windows 2008 DC RG03 (site version 3) and CIS Checklist for Windows 2008 MS RG03 (site version 3) published 2017-02-15 Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Feb 16 03:36:30 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 16 Feb 2017 11:36:30 +0000 Subject: [BESAdmin-Announcements] IBM BigFix Compliance UPDATE: DISA STIG Checklist for Mac OS X 10.10 (site ver 4) published 2017-02-15 Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Feb 16 04:28:27 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 16 Feb 2017 12:28:27 +0000 Subject: [BESAdmin-Announcements] IBM BigFix Compliance NEW SITE: DISA STIG Checklist for Mac OS X 10.11 (site ver 2) published 2017-02-15 Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Feb 17 08:20:47 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 17 Feb 2017 16:20:47 +0000 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows Message-ID: Content in the Patches for Windows site has been modified: Modified Fixlets: [Minor] MS08-052: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Office 2007 Gold (ID: 805236) [Minor] MS12-045: Vulnerability in Microsoft Data Access Components Could Allow Remote Code Execution - Windows Data Access Components 6.0 - Windows 7 Gold/SP1 (x64) (ID: 1204519) [Minor] MS14-026: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows 7 SP1 - .NET Framework 3.5.1 - KB2931356 (ID: 1402607) [Minor] MS14-026: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 3.5.1 - KB2931356 (x64) (ID: 1402633) [Minor] MS14-046: Vulnerability in .NET Framework Could Allow Security Feature Bypass - Windows 7 SP1 - .NET Framework 3.5.1 - KB2943357 (ID: 1404619) [Minor] MS14-046: Vulnerability in .NET Framework Could Allow Security Feature Bypass - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 3.5.1 - KB2943357 (x64) (ID: 1404621) [Minor] MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege - Windows 7 SP1 - KB3011780 (x64) (ID: 1406813) [Minor] MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 - KB3011780 (x64) (ID: 1406815) [Minor] MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows 7 SP1 - KB3003743 (x64) (ID: 1407409) [Minor] MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows Server 2008 R2 SP1 - KB3003743 (x64) (ID: 1407425) [Minor] MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows 7 SP1 - KB3060716 (ID: 1509009) [Minor] MS16-148: Security Update for Microsoft Office - Word Viewer - KB3127995 (ID: 1614827) [Minor] MS16-148: Security Update for Microsoft Office - Word Viewer - KB3128043 (ID: 1614867) [Major] MS14-076: Vulnerability in Internet Information Services (IIS) Could Allow Security Feature Bypass - Windows 8.1 Gold - IIS 8.5 - KB2982998 (ID: 1407603) [Major] MS14-076: Vulnerability in Internet Information Services (IIS) Could Allow Security Feature Bypass - Windows 8.1 Gold - IIS 8.5 - KB2982998 (x64) (ID: 1407601) [Major] MS14-076: Vulnerability in Internet Information Services (IIS) Could Allow Security Feature Bypass - Windows Server 2012 R2 Gold - IIS 8.5 - KB2982998 (x64) (ID: 1407609) [Major] MS15-116: Security Update for Microsoft Office to Address Remote Code Execution - Pinyin IME 2010 SP2 - KB2899516 (ID: 1511617) Reason for Update: Metadata for the various fixlets are updated to match the relevance. Fixlets for MS14-076 were updated due to Relevance false negative. Fixlet 1511617 was updated to match the relevant parent digest. Actions to Take: None Published site version: Patches for Windows, version 2690. Additional links: None Application Engineering Team IBM BigFix From besadmin-announcements at bigmail.bigfix.com Sun Feb 19 20:17:46 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 20 Feb 2017 12:17:46 +0800 Subject: [BESAdmin-Announcements] Content in Updates for Mac Applications has been modified Message-ID: Content in Updates for Mac Applications has been modified. New/Updated Fixlet: Microsoft Office for Mac 2016 - AutoUpdate 3.8.4 Available (ID: 16000065) Microsoft Office for Mac 2016 - Excel 15.31.0 Available (ID: 16000066) Microsoft Office for Mac 2016 - OneNote 15.31.0 Available (ID: 16000067) Microsoft Office for Mac 2016 - Outlook 15.31.0 Available (ID: 16000068) Microsoft Office for Mac 2016 - PowerPoint 15.31.0 Available (ID: 16000069) Microsoft Office for Mac 2016 - Word 15.31.0 Available (ID: 16000070) Published site version: Updates for Mac Applications, version 163 Reasons for Update: Microsoft released a newer version of Office for Mac 2016 Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team IBM BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Feb 20 02:11:09 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 20 Feb 2017 10:11:09 +0000 Subject: [BESAdmin-Announcements] Patches for RHEL: RHSM Download Plug-in and RHSM Download Cacher updated Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Feb 21 00:26:12 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 21 Feb 2017 08:26:12 +0000 Subject: [BESAdmin-Announcements] IBM BigFix Compliance NEW SITE: CIS Checklist for Ubuntu Linux 16.04 04 LTS Server (site version 1) published 2017-02-20 Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Feb 21 09:31:12 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 21 Feb 2017 17:31:12 +0000 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows Message-ID: Content in the Patches for Windows site has been modified: Modified Fixlets: [Major] MS15-118: Security Update for .NET Framework to Address Elevation of Privilege - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB3098780 (x64) (ID: 1511867) [Major] MS15-118: Security Update for .NET Framework to Address Elevation of Privilege - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB3097995 (x64) (ID: 1511831) [Major] MS15-101: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB3074549 (x64) (ID: 1510167) [Major] MS15-101: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB3074229 (x64) (ID: 1510123) [Major] MS15-048: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB3023223 (x64) (ID: 1504835) [Major] MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB2978127 (x64) (ID: 1407205) [Major] MS16-120: Security Update for Microsoft Graphics Component - Monthly Rollup - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 3.0 SP2 - KB3188735 (x64) (ID: 1612075) [Major] MS16-120: Security Update for Microsoft Graphics Component - Monthly Rollup - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 3.0 SP2 - KB3188735 (ID: 1612077) [Major] MS14-053: Vulnerability in .NET Framework Could Allow Denial of Service - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB2977766 (x64) (ID: 1405353) [Major] MS15-101: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows 8 Gold - .NET Framework 4.6 - KB3074231 (x64) (ID: 1510103) [Major] MS15-101: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows 8 Gold - .NET Framework 4.6 - KB3074552 (x64) (ID: 1510165) [Major] MS15-118: Security Update for .NET Framework to Address Elevation of Privilege - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1 - KB3097996 (x64) (ID: 1511871) [Major] MS15-118: Security Update for .NET Framework to Address Elevation of Privilege - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1 - KB3098781 (ID: 1511803) [Major] MS15-118: Security Update for .NET Framework to Address Elevation of Privilege - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1 - KB3097996 (ID: 1511821) [Major] MS15-101: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1 - KB3074550 (x64) (ID: 1510101) [Major] MS15-101: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1 - KB3074230 (x64) (ID: 1510129) [Major] MS15-101: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1 - KB3074550 (ID: 1510149) [Major] MS15-101: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1 - KB3074230 (ID: 1510115) [Major] MS14-053: Vulnerability in .NET Framework Could Allow Denial of Service - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1 - KB2972216 (ID: 1405337) [Major] MS14-053: Vulnerability in .NET Framework Could Allow Denial of Service - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1 - KB2972216 (x64) (ID: 1405355) [Major] MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1 - KB2978128 (ID: 1407207) [Major] MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1 - KB2978128 (x64) (ID: 1407203) [Major] MS15-128: Security Update for Microsoft Graphics Component to Address Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1 - KB3099869 (x64) (ID: 1512823) [Major] MS15-041: Vulnerability in .NET Framework Could Allow Information Disclosure - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1 - KB3037581 (ID: 1504115) [Major] MS15-041: Vulnerability in .NET Framework Could Allow Information Disclosure - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1 - KB3037581 (x64) (ID: 1504125) [Major] MS15-048: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1 - KB3023224 (ID: 1504819) [Major] MS15-048: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1 - KB3023224 (x64) (ID: 1504863) [Major] MS15-118: Security Update for .NET Framework to Address Elevation of Privilege - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1 - KB3098781 (x64) (ID: 1511851) [Major] MS16-133: Security Update for Microsoft Office - Word 2013 SP1 - KB3127932 (ID: 1613323) [Major] MS16-107: Security Update for Microsoft Office - Outlook 2013 SP1 - KB3118280 (ID: 1610781) [Major] MS16-099: Security Update for Microsoft Office - OneNote 2013 SP1 - KB3115256 (ID: 1609903) [Major] 2760601: Description of the SharePoint Workspace 2010 update 2760601 - Office 2010 (ID: 276060103) [Major] 2760601: Description of the SharePoint Workspace 2010 update 2760601 - Office 2010 (x64) (ID: 276060101) Fully Superseded Fixlets: [Major] MS16-065: Security Update for .NET Framework - Windows 7 SP1 - .NET Framework 4.6/4.6.1 - KB3142037 (Superseded) (ID: 1606505) [Major] MS16-065: Security Update for .NET Framework - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 4.5.2 - KB3142033 (x64) (Superseded) (ID: 1606519) [Major] MS16-065: Security Update for .NET Framework - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 4.6/4.6.1 - KB3142037 (x64) (Superseded) (ID: 1606521) [Major] MS16-091: Security Update for .NET Framework - Windows 7 SP1 - .NET Framework 4.5.2 - KB3163251 (Superseded) (ID: 1609125) [Major] MS16-091: Security Update for .NET Framework - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 4.5.2 - KB3163251 (x64) (Superseded) (ID: 1609103) [Major] MS16-120: Security Update for Microsoft Graphics Component - Monthly Rollup - Windows 7 SP1 - .NET Framework 3.5.1 - KB3188740 (Superseded) (ID: 1612031) [Major] MS16-120: Security Update for Microsoft Graphics Component - Monthly Rollup - Windows 7 SP1 / Windows Server 2008 R2 SP1 - .NET Framework 3.5.1 - KB3188740 (x64) (Superseded) (ID: 1612029) [Major] MS16-019: Security Update for .NET Framework to Address Denial of Service - Windows 7 SP1 - .NET Framework 4.5.2 - KB3122656 (Superseded) (ID: 1601931) [Major] MS16-019: Security Update for .NET Framework to Address Denial of Service - Windows 7 SP1 - .NET Framework 4.5.2 - KB3127229 (Superseded) (ID: 1601937) [Major] MS16-019: Security Update for .NET Framework to Address Denial of Service - Windows 7 SP1 - .NET Framework 4.6/4.6.1 - KB3127233 (Superseded) (ID: 1601923) [Major] MS16-019: Security Update for .NET Framework to Address Denial of Service - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 4.5.2 - KB3122656 (x64) (Superseded) (ID: 1601919) [Major] MS16-019: Security Update for .NET Framework to Address Denial of Service - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 4.5.2 - KB3127229 (x64) (Superseded) (ID: 1601905) [Major] MS16-019: Security Update for .NET Framework to Address Denial of Service - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 4.6/4.6.1 - KB3122661 (x64) (Superseded) (ID: 1601913) [Major] MS16-019: Security Update for .NET Framework to Address Denial of Service - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 4.6/4.6.1 - KB3127233 (x64) (Superseded) (ID: 1601961) [Major] MS16-035: Security Update for .NET Framework to Address Security Feature Bypass - Windows 7 SP1 - .NET Framework 4.5.2 - KB3135996 (Superseded) (ID: 1603533) [Major] MS16-035: Security Update for .NET Framework to Address Security Feature Bypass - Windows 7 SP1 - .NET Framework 4.5.2 - LDR Branch - KB3135996 (Superseded) (ID: 1603593) [Major] MS16-035: Security Update for .NET Framework to Address Security Feature Bypass - Windows 7 SP1 - .NET Framework 4.6/4.6.1 - KB3136000 (Superseded) (ID: 1603575) [Major] MS16-035: Security Update for .NET Framework to Address Security Feature Bypass - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 4.5.2 - KB3135996 (x64) (Superseded) (ID: 1603541) [Major] MS16-035: Security Update for .NET Framework to Address Security Feature Bypass - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 4.5.2 - LDR Branch - KB3135996 (x64) (Superseded) (ID: 1603587) [Major] MS16-035: Security Update for .NET Framework to Address Security Feature Bypass - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 4.6/4.6.1 - KB3136000 (x64) (Superseded) (ID: 1603553) [Major] MS16-041: Security Update for .NET Framework - Windows 7 SP1 - .NET Framework 4.6/4.6.1 - KB3143693 (Superseded) (ID: 1604101) [Major] MS16-041: Security Update for .NET Framework - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 4.6/4.6.1 - KB3143693 (x64) (Superseded) (ID: 1604103) [Major] MS16-065: Security Update for .NET Framework - Windows 7 SP1 - .NET Framework 4.5.2 - KB3142033 (Superseded) (ID: 1606511) [Major] 2954853: Description of the security update for the .NET Framework 4.5.2 - Windows 7 SP1 / Windows 2008 R2 SP1 (x64) (Superseded) (ID: 295485301) [Major] MS15-101: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows 7 SP1 - .NET Framework 4.6 - KB3074233 (Superseded) (ID: 1510147) [Major] MS15-101: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows 7 SP1 - .NET Framework 4.6 - KB3074554 (Superseded) (ID: 1510109) [Major] MS15-101: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 4.6 - KB3074233 (x64) (Superseded) (ID: 1510161) [Major] MS15-101: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 4.6 - KB3074554 (x64) (Superseded) (ID: 1510133) [Major] MS15-118: Security Update for .NET Framework to Address Elevation of Privilege - Windows 7 SP1 - .NET Framework 4.6 - KB3098001 (Superseded) (ID: 1511855) [Major] MS15-118: Security Update for .NET Framework to Address Elevation of Privilege - Windows 7 SP1 - .NET Framework 4.6 - KB3098786 (Superseded) (ID: 1511859) [Major] MS15-118: Security Update for .NET Framework to Address Elevation of Privilege - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 4.6 - KB3098001 (x64) (Superseded) (ID: 1511809) [Major] MS15-118: Security Update for .NET Framework to Address Elevation of Privilege - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 4.6 - KB3098786 (x64) (Superseded) (ID: 1511843) [Major] MS16-019: Security Update for .NET Framework to Address Denial of Service - Windows 7 SP1 - .NET Framework 4.6/4.6.1 - KB3122661 (Superseded) (ID: 1601927) Reason for Update: Fixlets are superseded due to the supersedence relationship introduced by .NET monthly rollup. Relevance for Office fixlets are updated due to false positive. Actions to Take: None Published site version: Patches for Windows, version 2692. Additional links: None Application Engineering Team IBM BigFix From besadmin-announcements at bigmail.bigfix.com Tue Feb 21 21:04:55 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 22 Feb 2017 05:04:55 +0000 Subject: [BESAdmin-Announcements] Content Released in Patches for Windows - February 2017 Security Bulletin Message-ID: Content in the Patches for Windows Site has been released. New Fixlets: Fixlets for Microsoft Security Bulletins: MS17-005 Fully Superseded Fixlets: [Major] MS17-003: Security Update for Adobe Flash Player - Windows 10 - Adobe Flash Player - KB3214628 (x64) (Superseded) (ID: 1700301) [Major] MS17-003: Security Update for Adobe Flash Player - Windows 10 Version 1607 - Adobe Flash Player - KB3214628 (x64) (Superseded) (ID: 1700303) [Major] MS17-003: Security Update for Adobe Flash Player - Windows Server 2016 - Adobe Flash Player - KB3214628 (x64) (Superseded) (ID: 1700305) [Major] MS17-003: Security Update for Adobe Flash Player - Windows 10 Version 1511 - Adobe Flash Player - KB3214628 (x64) (Superseded) (ID: 1700307) [Major] MS17-003: Security Update for Adobe Flash Player - Windows 10 Version 1607 - Adobe Flash Player - KB3214628 (Superseded) (ID: 1700309) [Major] MS17-003: Security Update for Adobe Flash Player - Windows 10 Version 1511 - Adobe Flash Player - KB3214628 (Superseded) (ID: 1700311) [Major] MS17-003: Security Update for Adobe Flash Player - Windows 10 - Adobe Flash Player - KB3214628 (Superseded) (ID: 1700313) [Major] MS17-003: Security Update for Adobe Flash Player - Windows Server 2012 - Adobe Flash Player - KB3214628 (x64) (Superseded) (ID: 1700315) [Major] MS17-003: Security Update for Adobe Flash Player - Windows Server 2012 R2 - Adobe Flash Player - KB3214628 (x64) (Superseded) (ID: 1700317) [Major] MS17-003: Security Update for Adobe Flash Player - Windows 8.1 - Adobe Flash Player - KB3214628 (x64) (Superseded) (ID: 1700319) [Major] MS17-003: Security Update for Adobe Flash Player - Windows 8.1 - Adobe Flash Player - KB3214628 (Superseded) (ID: 1700321) Reason for Update: Microsoft has released Adobe Flash Player Security Bulletins for Feb 2017 MS17-005. Actions to Take: None Published site version: Patches for Windows, version 2693. Additional links: Microsoft Security Bulletin Summary: https://technet.microsoft.com/library/security/ms17-005 Important notes: None Application Engineering Team IBM BigFix From besadmin-announcements at bigmail.bigfix.com Wed Feb 22 00:58:07 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 22 Feb 2017 08:58:07 +0000 Subject: [BESAdmin-Announcements] IMPORTANT: Red Hat's RH SSO affects Patches for RHEL Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Feb 22 19:05:32 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 23 Feb 2017 03:05:32 +0000 Subject: [BESAdmin-Announcements] Content Modification in Patching Support Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Feb 23 00:48:45 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 23 Feb 2017 08:48:45 +0000 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Feb 23 09:14:39 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 23 Feb 2017 17:14:39 +0000 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows Message-ID: Content in the Patches for Windows site has been modified: Modified Fixlets: [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (Chinese (Traditional)) (ID: 365271) [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (Update from Local Client Cache) (ID: 365267) [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (Turkish) (ID: 365259) [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (Swedish) (ID: 365253) [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (Spanish) (ID: 365247) [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (Russian) (ID: 365241) [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (Polish) (ID: 365235) [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (Norwegian) (ID: 365229) [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (Korean) (ID: 365223) [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (Italian) (ID: 365215) [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (Hungarian) (ID: 365209) [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (Hebrew) (ID: 365203) [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (Greek) (ID: 365197) [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (German) (ID: 365191) [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (French) (ID: 365185) [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (Finnish) (ID: 365179) [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (Dutch) (ID: 365173) [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (Danish) (ID: 365167) [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (Czech) (ID: 365161) [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (Chinese (Simplified)) (ID: 365155) [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (Portuguese (Brazilian)) (ID: 365149) [Major] Office 2016 Version 16.0.7668.2074 Available for Network Share for Office 2016 - Current Channel - Office 2016 (ID: 365135) [Major] Office 2016 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (ID: 365129) [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (Japanese) (ID: 365089) [Major] Office 365 Version 16.0.7668.2074 Available - Current Channel - Office 2016 (English (United States)) (ID: 365087) [Major] Office 365 Version 16.0.7668.2074 Available for Network Share for Office 365 - Office 2016 - Current Channel - Office 2016 (ID: 365067) Reason for Update: Microsoft has released a new version of Office 365 - Current Channel. Actions to Take: None Published site version: Patches for Windows, version 2694. Additional links: None Application Engineering Team IBM BigFix From besadmin-announcements at bigmail.bigfix.com Thu Feb 23 19:41:03 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 24 Feb 2017 03:41:03 +0000 Subject: [BESAdmin-Announcements] IMPORTANT UPDATE: The Red Hat Download Plug-in and Download Cacher are now up and running Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Sat Feb 25 08:04:01 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Sat, 25 Feb 2017 16:04:01 +0000 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows Message-ID: Content in the Patches for Windows site has been modified: Modified Fixlets: [Major] 2984972: Update for RDC 7.1 to support restricted administration logons on Windows 7 and Windows Server 2008 R2 - Windows Server 2008 R2 SP1 (x64) (ID: 298497207) [Major] 2984972: Update for RDC 7.1 to support restricted administration logons on Windows 7 and Windows Server 2008 R2 - Windows 7 SP1 (x64) (ID: 298497203) [Major] 2984972: Update for RDC 7.1 to support restricted administration logons on Windows 7 and Windows Server 2008 R2 - Windows 7 SP1 (ID: 298497211) [Major] 2894844: Description of the security update for the .NET Framework 3.5.1 on Windows 7 Service Pack 1 and Windows Server 2008 R2 Service Pack 1 - Windows 7 SP1 / Windows 2008 R2 SP1 (x64) (ID: 289484401) [Major] 2894844: Description of the security update for the .NET Framework 3.5.1 on Windows 7 Service Pack 1 and Windows Server 2008 R2 Service Pack 1 - Windows 7 SP1 (ID: 289484403) [Major] MS12-034: Combined Security Update for Microsoft Office, Windows, .NET Framework, and Silverlight - Windows 7 Gold/SP1 (x64) (KB2676562) (ID: 1203473) [Major] MS12-034: Combined Security Update for Microsoft Office, Windows, .NET Framework, and Silverlight - Windows Server 2008 R2 Gold/SP1 (x64) (KB2676562) (ID: 1203481) [Major] MS12-034: Combined Security Update for Microsoft Office, Windows, .NET Framework, and Silverlight - Windows 7 Gold/SP1 (KB2676562) (ID: 1203465) [Major] 2553092: Description of the Office 2010 update - Office 2010 - KB2553092 (ID: 255309201) Reason for Update: Fixlets for KB2984972, KB2894844, MS120-34 were updated due to Relevance false negative. Fixlets for KB2553092 was updated due to Relevance false positive. Actions to Take: None Published site version: Patches for Windows, version 2695. Additional links: None Application Engineering Team IBM BigFix From besadmin-announcements at bigmail.bigfix.com Mon Feb 27 09:38:37 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 27 Feb 2017 17:38:37 +0000 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows Message-ID: Content in the Patches for Windows site has been modified: New Fixlets: [Major] 4010394: Cumulative Update 4 for SQL Server 2014 SP2 - SQL Server 2014 SP2 - KB4010394 (ID: 401039403) [Major] 4010394: Cumulative Update 4 for SQL Server 2014 SP2 - SQL Server 2014 SP2 - KB4010394 (x64) (ID: 401039401) [Major] 4010392: Cumulative Update 11 for SQL Server 2014 SP1 - SQL Server 2014 SP1 - KB4010392 (ID: 401039203) [Major] 4010392: Cumulative Update 11 for SQL Server 2014 SP1 - SQL Server 2014 SP1 - KB4010392 (x64) (ID: 401039201) [Major] 3061064: Updates for Skype for Business Server 2015 - Skype for Business Server 2015 - KB3061064 (x64) (ID: 306106403) Modified Fixlets: [Major] Set the Office 365 - Office 2016 Update Channel to First Release of Deferred Channel - Office 2016 (ID: 36504) [Major] Configure the Update Source of Office 365 - Office 2016 (ID: 36505) [Major] Application Information for Office 365 - Office 2016 (ID: 3650) Fully Superseded Fixlets: [Major] 3204399: Cumulative Update 10 for SQL Server 2014 SP1 - SQL Server 2014 SP1 - KB3204399 (Superseded) (ID: 320439903) [Major] 3204399: Cumulative Update 10 for SQL Server 2014 SP1 - SQL Server 2014 SP1 - KB3204399 (x64) (Superseded) (ID: 320439901) [Major] 3204388: Cumulative update 3 for SQL Server 2014 SP2 - SQL Server 2014 SP2 - KB3204388 (Superseded) (ID: 320438803) [Major] 3204388: Cumulative update 3 for SQL Server 2014 SP2 - SQL Server 2014 SP2 - KB3204388 (x64) (Superseded) (ID: 320438801) Reason for Update: Microsoft updated the channel signature for First Release of Deferred Channel. Fixlets for KB3204399 and KB3204388 were superseded by KB4010392 and KB4010394. Microsoft has released a new Update for Skype for Business Server 2015. Actions to Take: None Published site version: Patches for Windows, version 2698. Additional links: None Application Engineering Team IBM BigFix From besadmin-announcements at bigmail.bigfix.com Tue Feb 28 00:39:13 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 28 Feb 2017 08:39:13 +0000 Subject: [BESAdmin-Announcements] IBM BigFix Patch for Red Hat Enterprise Linux now supports RHEL 7 PPC64LE Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Feb 28 02:18:42 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 28 Feb 2017 10:18:42 +0000 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Message-ID: An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Feb 28 10:20:36 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 28 Feb 2017 18:20:36 +0000 Subject: [BESAdmin-Announcements] Content Modification in Patches for Windows Message-ID: Content in the Patches for Windows site has been modified: Modified Fixlets: [Major] 3061064: Updates for Skype for Business Server 2015 - Skype for Business Server 2015 - KB3061064 (x64) (ID: 306106401) [Minor] MS16-111: Security Update for Windows Kernel - Windows Server 2012 R2 - KB3175024 (x64) (ID: 1611123) [Minor] MS16-112: Security Update for Windows Lock Screen - Windows Server 2012 R2 - KB3178539 (x64) (ID: 1611217) Reason for Update: Microsoft has updated the binary for KB3061064. Meta data for Fixlet 1611123 and 1611217 were updated to reflect the right values. Actions to Take: None Published site version: Patches for Windows, version 2700. Additional links: None Application Engineering Team IBM BigFix From besadmin-announcements at bigmail.bigfix.com Tue Feb 28 17:50:57 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 1 Mar 2017 09:50:57 +0800 Subject: [BESAdmin-Announcements] IBM BigFix Patch: AIX content publish schedule Message-ID: The BigFix Patch for AIX team has been getting questions about the Source Release Date on the AIX Fixlets, and how that date differs from other vulnerability or security update management tracking tools such as FLRT, PSIRT, and similar. This blog post (https://ibm.biz/Bds7qX) aims to shed some light on the BigFix Patch for AIX content publish schedule, as well as the sources used to identify properties and metadata related to the release, publish, and propagation dates. Application Engineering Team IBM BigFix Patch -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Feb 28 20:47:11 2017 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 1 Mar 2017 04:47:11 +0000 Subject: [BESAdmin-Announcements] BigFix Patch is ending support and deprecating the site for Ubuntu 12.04 LTS Message-ID: An HTML attachment was scrubbed... URL: