Skip to content
ProVal Technologies
407-588-0101
Facebook Twitter Instagram Linkedin Youtube
  • Home
  • Company
    • ProVal’s Journey
    • Approach
    • Culture & Values
    • Our Team
  • NOC SERVICES FOR MSPS
    • ConnectWise
      • ConnectWise Automate
      • ConnectWise RMM
      • ConnectWise Manage PSA
    • Kaseya
      • Kaseya VSA
      • Datto RMM
    • Managed Backups
    • 24×7 Monitoring
  • Careers
  • Resources
    • MSP Blogs
    • Your Tools. Our Experts.
    • MSP Webinars
    • Testimonials
  • Contact Us
  • Client Portal
Menu
  • Home
  • Company
    • ProVal’s Journey
    • Approach
    • Culture & Values
    • Our Team
  • NOC SERVICES FOR MSPS
    • ConnectWise
      • ConnectWise Automate
      • ConnectWise RMM
      • ConnectWise Manage PSA
    • Kaseya
      • Kaseya VSA
      • Datto RMM
    • Managed Backups
    • 24×7 Monitoring
  • Careers
  • Resources
    • MSP Blogs
    • Your Tools. Our Experts.
    • MSP Webinars
    • Testimonials
  • Contact Us
  • Client Portal

Microsoft Security Updates: December 2017

  • December 18, 2017
  • ProVal Technologies, Inc
  • Microsoft Security Updates
Microsoft Patch notes

File Attachment: December-2017

This December Patch Tuesday is considerably lighter than last month’s patch releases. While only three of the fixes were for Windows operating systems, the majority of the vulnerabilities to pay attention to are Browser/Scripting Engine-based.

Overall, this month’s updates address are fixes for 32 unique CVEs, 19 of which are critical, and 24 of which address remote code execution at varying severity levels. No active exploits are listed by Microsoft again this month.

From a prioritization standpoint, again we turn our focus to the browsers and the Scripting Engine Memory Corruption Vulnerabilities. We recommend prioritizing patching user-facing workstations to address the 19 critical Internet Explorer and Edge updates released today by Microsoft, as they are listed as “Exploitation More Likely”. There are no known exploits as of yet, but this is an opportunity to remain ahead of any future exploits that may be released.

There is one Windows OS vulnerability that should be reviewed, and that is the fix for CVE-2017-11885, which is a Remote Code Execution using RPC on systems that have Routing and Remote Access service (RRAS) enabled. Make sure you are patching systems that are using RRAS, and ensure it is not enabled on systems that do not require it, as disabling RRAS will protect against the vulnerability. For that reason it is listed as Exploitation less likely, but should get your attention after patching the browsers.

Additionally, we recommend you take some time to review ADV170021, a Defense-in-Depth update that has configuration options to allow you to exert more control over DDE behaviors, in light of the recent DDE exploits that have been publicized. Note that this configuration change would be made after installing the update referenced in the advisory.

It should also be noted that on December 7, Microsoft released an out-of-band emergency patch for CVE-2017-11937 and CVE-2017-11940, which was a flaw in the Microsoft Malware Protection engine that could allow an attacker to create a specially crafted file that would be scanned by the Malware Protection engine, allowing for code execution on the endpoint. The patch was automatically ingested by the affected engines via definition updates, so no action should be required. As a precautionary measure, if you are using Microsoft’s Malware Protection engine in Defender, Security Essentials, Forefront Endpoint Protection, or the engines in Exchange 2013 or 2016, ensure that your updates are being applied automatically, and that you are on at least Version 1.1.14405.2 of the Malware Protection Engine.

From the Adobe side, there was only one Flash update, APSB17-42 listed as a “Business Logic Error”.

You may download the following Excel spreadsheet listing all security updates for all products released in December 2017 by Microsoft.

Executive Summary
• Microsoft released security updates for all versions of Windows the company supports (client and server).
• No critical updates for Windows, but for IE and Edge.
• Other Microsoft products with security updates are: Microsoft Office, Microsoft Exchange Server, Microsoft Edge and Internet Explorer.

Operating System Distribution
• Windows 7: 2 vulnerabilities of which 2 are rated important
• Windows 8.1: 2 vulnerabilities of which 2 are rated important
• Windows 10 version 1607: 3 vulnerabilities of which 3 are rated important
• Windows 10 version 1703: 3 vulnerabilities of which 3 are rated important
• Windows 10 version 1709: 3 vulnerabilities of which 3 are rated important

Windows Server products:
• Windows Server 2008: 2 vulnerabilities of which 2 are rated important
• Windows Server 2008 R2: 2 vulnerabilities of which 2 are rated important
• Windows Server 2012 and 2012 R2: 2 vulnerabilities of which 2 are rated important
• Windows Server 2016: 3 vulnerabilities of which 3 are rated important

Other Microsoft Products
• Internet Explorer 11: 13 vulnerabilities, 9 critical, 4 important
• Microsoft Edge: 13 vulnerabilities, 12 critical, 1 important

ProVal Technologies, Inc

ProVal Technologies, Inc

PrevPreviousRequirements to Upgrade to Automate 12
NextUsing the Ignite Manager in AutomateNext

Categories

Labtech
  • Mac Agent Functionality Within ConnectWise Automate
  • ConnectWise RMM vs Automate: Should I be using CW RMM?
  • ConnectWise Automate on Linux – Best Practices
  • ConnectWise Automate Maintenance Mode Explained Best Practice
  • Uninstalling and Offboarding Automate Agents
  • How to Set Up Automate users to use ConnectWise SSO
  • Windows 10 Build Upgrades are Inevitable – Use Kaseya/ConnectWise Automate to Deploy
  • Best Practice Naming of Patching Groups
  • Automate 12 Patch 9 Now Available!
  • 5 Tips for using the Report Center
  • See All Labtech Posts
Business Continuity
  • See All Business Continuity Posts
Proactive Maintenance
  • See All Proactive Maintenance Posts
Kaseya
  • What Should I be Automating in Kaseya VSA 9.5?
  • Security Best Practices for Kaseya VSA
  • Kaseya VSA: Software Management vs. Patch Management
  • Software Management Enhancements
  • Two-Factor Authentication in Kaseya VSA
  • Windows 7 & Windows 10 Multiple Builds End of Life – Upgrade Using Kaseya or ConnectWise Automate
  • Kaseya Network Monitor: Benefits & Features
  • Kaseya Patch 9.5.0.22 and Future Updates
  • Kaseya’s New State-of-the-Art Contemporary User Interface
  • Kaseya Product Release – April ’19
  • See All Kaseya Posts
Datto
  • Creating & Implementing a Disaster Recovery Plan
  • Disaster Recovery – Minimizing Impact of Downtime
  • Updating a Datto Device
  • Datto Agent Communication Errors
  • Datto
  • See All Datto Posts
StorageCraft
  • See All StorageCraft Posts

Get in touch today for MSP NOC Services

Contact Us

ProVal Technologies, Inc

498 Palm Springs Drive, Ste. 130
Altamonte Springs, FL 32701
United States
Phone: 407-588-0101

Facebook Twitter Instagram Linkedin Youtube
SOC 2 Certified Logo
Form CTA

©2023 ProVal Technologies, Inc All Rights Reserved.

Privacy Policy – Disclaimer

Microsoft Security Updates: December 2017

Microsoft Patch notes

I truly view ProVal as a partner and extension of my team, not as one of my vendors

When our NOC Manager left last fall we wanted to replace the position with an outsourced NOC to reduce headcount, and bring in an expert to both Labtech and our backup solutions. Bringing in ProVal Technologies was one of the best decisions we made last year and has paid for itself.During our first few monthly recurring Labtech admin meetings the ProVal team discovered incorrect settings and policies that were not applying correctly in our Labtech server. Things that we thought were automated and working were not. For example, there were multiple scripts and policies running but set to do nothing such as disk cleanup scripts. Cisco Umbrella was not configured correctly. Server alerting was not set right and the list went on.The backup team sends daily and weekly reports and updates that reduce my technicians time that we used to spend on backup or antivirus tickets that took forever and were tedious.ProVal also brings in great insights to our business and really cares about our success. They will frequently mention to me in meetings what new scripts they can import to make us more efficient or will schedule upgrades to our backups, Labtech, etc so I don’t have to worry. I truly view ProVal as a partner and extension of my team not as one of my vendors.

Chris-Warnick-Headshot
Chris Warnick
Vision Computer Solutions
Northville, MI

They will quickly become an extension of your team and your ROI will reflect the results

We have been a long time user of Labtech and had tried for many years to manage the product internally with no real success at the level we needed to make our solutions more efficient for our customers. Once we hired Vikram and his team at ProVal, it solved all our pain points with the product and we really felt like we were leveraging the tool as it was designed. If this sounds like you and it’s keeping you up at night, then you need these guys. They will quickly become an extension of your team and your ROI will reflect the results.

Bryan-Wolff-Headshot
Bryan Wolff
CEO, Wolff Logics LT Managed & Admin Services
Cedar Park, Texas

They work well, fast and on budget

We met Vikram from ProVal Tech at Gary Pica’s Shnizzfest a year ago. Vikram explained the advantage of having trained, certified personnel take care of our recent Automate implementation. Even though we had taken an implementation package from ConnectWise to start up the program, we felt many custom configurations we needed for our business were lacking. We hired ProVal Tech after Automate was installed to help us with this task. From sales to technicians everyone was professional and knowledgeable. Onboarding was simple, and well documented. Tools on the web were supplied while we did the work, and they allowed us to track what was done, and see the improvements in the environment. It was easy to reach any of the team members, for any concern or question – all answered with courtesy and smile. Once the work was finished, we were given some training and explanations, add to that documentation, about the work and the scripts and features added to the program. We have been happily working with Automate since then. We can only recommend this efficient team of people for any work into Automate: they work well, fast and on budget.

Ben-Prevost-Headshot
Ben Prevost
FarWeb IT
Sherbrooke, Canada