To get all available protections, hardware or firmware updates and software updates are required. Microsoft continues working closely with industry partners including chip makers, hardware OEMs, and app vendors to protect customers. Microsoft has not yet received any information to indicate that these vulnerabilities have been used to attack customers. "Microsoft is aware of a new publicly disclosed class of vulnerabilities that are referred to as “speculative execution side-channel attacks” that affect many modern processors and operating systems, including chipsets from Intel, AMD, and ARM. Windows Server guidance to protect against speculative execution side-channel vulnerabilities This document will step through the configuration to specifically target the new Security Tool and deploy it your clients. The Ivanti Content Team created a Security Tool to help implement the required registry keys discussed in the Microsoft article linked below.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |