How will you communicate the status of your Windows 7 / Server 2008 R2 micropatches following January 2020?

mitja.kolsek -

Whenever we become aware of a critical vulnerability affecting Windows 7 or Windows Server 2008 R2 (whether through Microsoft issuing a patch for it, or from any other source), we'll create an article for that vulnerability here on our Support site (https://0patch.zendesk.com) that will provide information such as:

  • CVE ID
  • Our own risk assessment (with explanation)
  • Status of our micropatch (e.g., "in development", "waiting for test case", "issued")
  • Possible (and reported) side effects of our micropatch
  • Workarounds (for when micropatch is not available, or if you don't want to apply it)
  • Frequently asked questions
  • Links to our own and external articles related to this issue
  • Procedure for testing our micropatch (optionally)
  • Credits to people helping us with the micropatch

We will also start sending Patch Tuesday updates and alerts about issued micropatches to 0patch News mailing list (newsletter) so we highly recommend you subscribe to it to know which vulnerabilities we have micropatched and whether we recommend applying any workarounds for issues we can't (yet) micropatch.

To subscribe to 0patch News, visit https://0patch.com/contact.html, provide your email address to the form on the right side, tick the "0patch Newsletter" box and press Subscribe.

We will make our best effort to provide users will timely, accurate, and actionable information for keeping their Windows 7 and Windows Server 2008 R2 systems as secure as possible.

 

Have more questions? Submit a request

0 Comments

Please sign in to leave a comment.