As an MSP, you work to always be there for your clients and any difficulties that they run into. This task isn’t always as simple as it seems. You are the one that your clients are outsourcing to, and it probably doesn’t cross your mind to outsource even further.
The July 2019 release of Kaseya patch 126.96.36.199 includes various new features, enhancements, performance improvements and bug fixes. Kaseya has not released a new patch since April ’19, which makes the July ’19 patch even more important.
Important Note: This patch requires .NET version 4.7.2 to be installed on the machines.
This month’s Microsoft Patch Tuesday addresses 77 vulnerabilities with 15 of them labeled as Critical. Of the 15 Critical vulns, 11 are for scripting engines and browsers, with the remaining four covering DHCP Server, GDI+, .NET Framework, and Azure DevOps Server / Team Foundation Server.
Every product has its own lifecycle, it starts with its release and moves towards maturity with bug fixes and the addition of more features, and then ends when it is no longer supported by the vendor. Similarly, this is currently happening with most windows builds, which are either already unsupported by Microsoft or are going to unsupported by November 2019.
This month’s Microsoft Patch Tuesday addresses 88 vulnerabilities with 21 of them labeled as Critical. Of the 21 Critical vulns, 17 are for scripting engines and browsers, and 3 are potential hypervisor escapes in Hyper-V. The remaining vulnerability is an RCE in the Microsoft Speech API. Microsoft also issued guidance on Bluetooth Low Energy FIDO keys, HoloLens, and Microsoft Exchange.
When we think of a state-of-the-art Contemporary User Interface (UI), a few points that come to mind would be simple, user-friendly, easily accessible, minimal clutter, intuitive, and fast.
Kaseya’s new UI aims its focus on the points above, and so far, seems to have made a good first impression on most users.
This month’s Microsoft Patch Tuesday addresses 79 vulnerabilities with 22 of them labeled as Critical. Of the 22 Critical vulns, 18 are for scripting engines and browsers. The remaining 4 are remote code execution (RCE) in Remote Desktop, DHCP Server, GDI+, and Word.
During the most recent Kaseya product release webinar, multiple announcements were made regarding the new interface, upcoming functionality, new product additions to the portfolio, and much more. Below are 4 key items discussed during the Webinar:
New Kaseya User Interface/Experience: UI Modernization, Simplified GUI, Improved Usability and Enhanced Consistency.
This month’s Patch Tuesday addresses 74 vulnerabilities, with 16 labeled as Critical. Eight of the Critical vulns are for scripting engines and browser components, impacting Microsoft browsers and Office, along with another 5 Critical vulns in MSXML. Two Critical remote code execution (RCE) vulnerabilities are patched in GDI+ and IOleCvt.
Patching is the process of repairing system vulnerabilities discovered within the infrastructure or an enhancement to an existing application with addon features. The number of patches required on a consistent basis can be overwhelming. Therefore, it is necessary to devise a patch management process to ensure the proper preventive measures are taken against potential threats, and to assist in attaining new features.