<div class="socmaildefaultfont" dir="ltr" style="font-family:Trebuchet MS, Helvetica, sans-serif;font-size:10.5pt" ><div dir="ltr" ><div>Ordinarily, our customers expect to simply install the latest patches and ignore anything that has been superseded. This minimizes workload while adhering to the policies that Microsoft has published.</div>
<div> </div>
<div>Due to the critical nature of WannaCry and new emerging threats related to this vulnerability (Petya), the superseded patch updates that apply to <strong>MS17-010 (Security Update for Microsoft Windows SMB Server)</strong> will now be re-enabled for applicability reporting and patch deployment. We will remove the "False" relevance statements from lines 2 and 3 for these patches in order to allow our relevance to test if these older patches may still be applicable. This change will allow for continued reporting against these older critical patches which is normally not possible once a patch has been superseded.</div>
<div> </div>
<div>While we realize this may mean some customers will see older patches as now “relevant” and may require additional patch deployment to your endpoints, we felt that this extra level of visibility was warranted. IBM BigFix still encourages customers to follow Microsoft recommendations to install the latest cumulative patches to patch all known vulnerabilities.</div>
<div> </div>
<div>Our intention is to carry this policy forward for all superseded patch content, but we would welcome your feedback on adopting this approach more gloabally. Please share any comments/concerns you have on the BigFix Forum at <a href="https://forum.bigfix.com/t/supersedence-handling-change-for-ms17-010/21900" >https://forum.bigfix.com/t/supersedence-handling-change-for-ms17-010/21900</a>.</div>
<div> </div>
<div><strong>Please Note:</strong> Fixlet IDs 269654701 and 269654705 to disable or remove SMB v1, respectively, are also available to help further limit the spread of WannaCry and related threats.</div></div></div><BR>