Posted in News on January 05 2018 by Lansweeper Team
Shortly after returning from the holidays, IT professionals were confronted with a severe memory-isolation flaw in processors called Meltdown. Meltdown exploits critical vulnerabilities in processors and can be used to unravel some of the most critical security mechanisms used in operating system software. While programs are usually not permitted to read data from other applications, Meltdown can be exploited to get hold of data stored in the memory of other running programs.
Last week, Microsoft released an emergency Windows patch for an array of Windows versions, based on which we created a preliminary report. In the past couple of days, Microsoft followed up with monthly rollups to mitigate the flaw for the remaining operating systems. We have added the latest updates to our report, so Lansweeper can tell you in no time which Windows OS machines are vulnerable to Meltdown and need to be patched.
Instructions can be found in the video below and in this forum post. If any additional information arises, we'll update the report accordingly in the same forum post.
Consult the complete report via this link
Posted in News on January 04 2018 by Lansweeper Team
MICROSOFT ISSUES EMERGENCY UPDATES TO ADDRESS PROCESSOR EXPLOIT
The new year has only just begun, and already serious security vulnerabilities in processors were revealed. The so-called Meltdown and Spectre flaws allow attackers to steal sensitive data from the system memory.
There appears to be a flaw in Intel processors that lets attackers bypass kernel access protections so that regular apps can read the contents of kernel memory. Microsoft released a security patch prior to Patch Tuesday to protect Windows devices against vulnerabilities affecting supported hardware chips. Other versions will receive the update next week as scheduled.
Additionally, the Microsoft updates are not all-out fixes. Some Windows PCs may require additional CPU firmware updates to protect against Spectre attacks, but the Microsoft updates appear to fully address the Meltdown flaw.
Lansweeper can tell you in no time which devices are vulnerable and need to be patched. You can find the preliminary report and additional information in this forum post. In the following days, we’ll update to report as soon as new information arrives.
Posted in News on December 05 2017 by Lansweeper Team
MANAGEMENT ENGINE CRITICAL FIRMWARE UPDATE
Intel® has identified several security vulnerabilities in its Management Engine (ME), Trusted Execution Engine (TXE) and Server Platform Services (SPS) that could place impacted PCs, servers and IoT platforms at risk. Attackers could gain unauthorized access to systems using the Management Engine feature and possibly:
Lansweeper can tell you in no time which devices are vulnerable and need to be patched. Instructions can be found in the video below and in this step-by-step forum post.
Consult the complete step-by-step guide via this link.
In order to make full use of this guide, make sure that all Windows computers you'd like to check meet the scanning requirements, the deployment requirements and have been successfully scanned:
Posted in News on November 30 2017 by Lansweeper Team
COMPUTER SECURITY DAY 2017
The crusade for unauthorized software
Is there any menacing software installed on the corporate workstations in your organization? Lansweeper enables you to mark identified software as authorized, unauthorized and neutral. Using one of the built-in reports, keeping track of unauthorized software installations is just one click away.
Assess your defense strategy
Is your Windows infrastructure protected against viruses? Identify if there are any Windows devices without anti-virus software and whether the anti-virus is up-to-date. Several built-in reports assist you in pinpointing possible vulnerabilities in your network.
Check for breaches in the wall
Do your Windows devices have the latest hotfixes? As notably demonstrated by our WannaCry ransomware report that we released in May, Lansweeper can be used to retrieve Windows machines that are missing crucial hotfixes to mitigate vulnerabilities. Scan your assets regularly and use Lansweeper reports to be alerted of missing hotfixes.
Have an up-to-date garrison
Are your assets covered? Check the warranty for your Dell, Fujitsu, HP, IBM, Lenovo or Toshiba assets to make sure that your assets are still under coverage with the manufacturer. Quickly identify which assets are out of warranty by using our built-in reports.
Only lower the drawbridge for allies
Do you know your administrators? Lansweeper helps you to authorize administrators on an asset-by-asset basis or for an entire domain. Capture all the unauthorized administrators via a built-in report so that you can control who can manage your assets.
Posted in Updates on October 17 2017 by Lansweeper Team
Subscribe to our feed