In addition to our Patch Tuesday Webinar we are starting a few new Webinar series. These are as follows:
vCenter Protect Demonstration – This webinar series is intended to provide a basic overview of the vCenter Protect features for customers evaluating the product. Each demonstration will be followed by Q&A with the host and is a great way to get a quick introduction to the Protect product.
vCenter Protect Tech Talk – This webinar series is intended to provide focused feature demonstrations. Each Tech Talk will focus on a specific feature or scenario to provide Protect users with guidance on how to use the product. Each Tech Talk will also include some Q&A time with the host to allow users to ask questions about the showcased feature or scenario and find the solutions they need to better manage their environment. Stop out to our community to cast your vote on the first topic. Voting closes on the Monday before each Tech Talk webinar.
Then we have our long running Patch Tuesday webinar series. For those of you who are not familiar with it you can view playbacks of previous patch tuesday webinars at the same webinar page. This webinar series gives Admins a quick overview of what released on Patch Tuesday each month. We bring together information from a variety of sources to give you what you need to understand the impact of Patch Tuesday.
Stop out and register for an upcoming webinar today!
vCenter Protect Team, VMware
This is the first of many announcements to come. We are currently gearing up for the vCenter Protect 9.0 public beta and looking for participants. Invitations will start being sent at the end of this week. We are targeting to launch the public beta on March 11th, 2013. If you would like to participate in the beta you can send an email to Shavlik-Beta@vmware.com. The beta will be fully supported in production environments. This means full upgrade support for the beta version when the GA version releases. Now, on to the good stuff, WHATS NEW in vCenter Protect 9.0!
This is a HUGE release! We have been in development on this release for over a year so it is packed with great new features, enhancements, and usability improvements. Here are the highlights:
- Cloud Agents – break free from your visio network and bring order to chaos! Ok, that was a little melodramatic, but this feature is really cool. Come check it out.
- Virtual View and ESXi Hypervisor Patching – Standalone or managed.
- 64 bit edition
- Install support for console on Windows 8, Server 2012, and SQL 2012
- Updated workflow and more flexible scheduling options for Distribution Server sync
- Add detected threats to allowed threats list as right click action
- **Machines Not Scanned right click options have returned! ** (Yes, we heard you and have brought them back.)
- Machine Group Comment Field (at entity level)
- Edit entities in Machine Group
- **Supersedence support for Patch Groups** (Another one I know many of you are anxiously awaiting)
These and other new features await you in vCenter Protect 9.0! Over the next few weeks we will be sharing more details, screenshots, and videos on vCenter Protect 9.0, so stay tuned.
Product ManagerProduct Owner
vCenter Protect Team
This week New York gets hammered with snow and IT Admins get hammered with patches. Microsoft has released 12 new security bulletins addressing 55 vulnerabilities. The number of vulnerabilities this month comes very close to the record 64 vulnerabilities resolved in the April 2011 Patch Tuesday.
Of the 12 bulletins released this Patch Tuesday, 5 are critical. MS13-009 and MS13-010 affecting Internet Explorer, MS13-011 and MS13-020 affecting the Windows Operating System, and MS13-012 affecting Exchange Server.
The first browser patch this month is MS13-009. This is a cumulative security update covering 13 of the reported vulnerabilities and should be a priority for administrators. IE 6-10 on all supported Windows Operating Systems are affected.
The second browser patch is MS13-010. This bulletin resolves a single VML memory corruption vulnerability which could allow a specially crafted website to remotely execute code. Exploit code is likely and Microsoft is aware of this being used as an information disclosure vulnerability. IE 6-10 on all supported Windows Operating Systems are affected.
MS13-011 is a critical patch affecting supported versions of Windows XP, Vista, Server 2003, and Server 2008. It resolves a publicly disclosed vulnerability that can allow remote code execution when a specially crafted streaming media is executed. The attacker could gain equivalent rights to the user who executed the media file. If the media is embedded in other files, like ppt, it can also be exploited.
The next critical bulletin is MS13-012. It is a vulnerability in Exchange Server 2007 and 2010. The vulnerability allows a specially crafted file using the Outlook Web App.
The last critical bulletin, MS13-020, resolves a vulnerability in OLE Automation. The vulnerability could allow remote execution if a user opens a specially crafted file allowing the attacker to gain users rights equivalent to the current user. This vulnerability affects Windows XP SP3.
The remaining seven patches are categorized as Important. The majority are affecting the Windows Operating System, with one .Net, and one Microsoft FAST Search Server bulletin.
Due to a transition in our Webex accounts, we are running into technical difficulties with the Patch Tuesday webinar scheduled for Wednesday. We are working to resolve this problem, but our normal series of Patch Tuesday webinars will resume for March and you will have to take no action to be on the invite list for that webinar. Our apologies for this inconvenience.