{"id":7324,"date":"2017-04-12T12:30:23","date_gmt":"2017-04-12T20:30:23","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/12\/news-1115\/"},"modified":"2017-04-12T12:30:23","modified_gmt":"2017-04-12T20:30:23","slug":"news-1115","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/04\/12\/news-1115\/","title":{"rendered":"Microsoft kills off security bulletins after several stays"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt0.staticworld.net\/images\/article\/2016\/04\/3_patches-100654092-primary.idge.jpg\"\/><\/p>\n<p><strong>Credit to Author: Gregg Keizer| Date: Wed, 12 Apr 2017 13:21:00 -0700<\/strong><\/p>\n<p>Microsoft this week retired the security bulletins that for decades have described each month&#8217;s slate of vulnerabilities and accompanying patches for customers &#8212; especially administrators responsible for companies&#8217; IT operations.<\/p>\n<p>One patch expert reported on the change for his team. &#8220;It was like trying to relearn how to walk, run and ride a bike, all at the same time,&#8221; said Chris Goettl, product manager with patch management vendor Ivanti.<\/p>\n<p>The move to a bulletin-less Patch Tuesday brought an end to months of Microsoft talk about killing the bulletins that included an aborted attempt to toss them.<\/p>\n<p>Microsoft announced the demise of bulletins in November, saying then that the last would be posted with January&#8217;s Patch Tuesday, and that the new process would debut Feb. 14. A searchable database of support documents would replace the bulletins. Accessed through the <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\">&#8220;Security Updates Guide&#8221; (SUG) portal<\/a>, the database&#8217;s content can be sorted and filtered by the affected software, the patch&#8217;s release date, its CVE (Common Vulnerabilities and Exposures) identifier, and the numerical label of the KB, or &#8220;knowledge base&#8221; support document.<\/p>\n<p>SUG&#8217;s forerunners were the web-based bulletins that have been part of Microsoft&#8217;s patch disclosure policies since at least 1998. Microsoft did such a good job turning out those bulletins that they were considered the aspirational benchmark for all software vendors.<\/p>\n<p>In February <a href=\"http:\/\/www.computerworld.com\/article\/3169617\/windows-pcs\/microsoft-shelves-all-february-security-updates.html\">Microsoft canceled that month&#8217;s Patch Tuesday<\/a> just hours before the security updates were to reach customers, making the bulletins&#8217; planned demise moot. Microsoft kept the bulletins the following month as well, saying it wanted to give users more time to prepare for the change to SUG.<\/p>\n<p>Finally, when Microsoft yesterday shipped cumulative security updates for Windows, Internet Explorer, Office and other products, it omitted the usual bulletins.<\/p>\n<p>Goettl, who had withheld his final appraisal as Microsoft kept postponing the bulletins&#8217; passing, was not terribly impressed with the SUG substitute.<\/p>\n<p>Earlier this year, Goettl said today, he had reserved judgment, but noted that the SUG portal had &#8220;some great capabilities.&#8221; Yet he was undecided whether it would be able to deliver the same quantity and quality of information as the bulletins, without burdening administrators with more work.<\/p>\n<p>&#8220;I was on the fence, but hopeful that we would get the same level of detail,&#8221; he said.<\/p>\n<p>While most of the information packed into the earlier bulletins remained available through SUG by digging into the numerous online documents, Goettl acknowledged, there was a big difference in accessibility.<\/p>\n<p>&#8220;This month there were 46 vulnerabilities resolved by Microsoft,&#8221; Goettl explained. &#8220;It took me about four hours to do the research [in SUG] that I would normally do with the bulletins. But last month, with 136 vulnerabilities, it took me only two hours. So [with the bulletins] I was able to do three times the amount of research in half the time.&#8221;<\/p>\n<p>Goettl blamed Microsoft for the additional time it will take for IT and security administrators to root through the information. Because the database&#8217;s foundation were CVEs &#8212; the identifiers for each discrete vulnerability &#8212; he had to open scores of pages in his browser to reveal information about the Windows 10 flaws Microsoft had patched.<\/p>\n<p>&#8220;You used to go to a bulletin page, say for Windows 10, and there were the vulnerabilities being resolved and the related KB pages, all in one place,&#8221; said Goettl. &#8220;But this month, because there were 26 [patched] vulnerabilities in the Windows 10 cumulative update, I had to open 26 web pages. I had to open every CVE page.<\/p>\n<p>&#8220;So that was a little disappointing,&#8221; he said.<\/p>\n<p>Goettl was stumped by one question today. &#8220;I don&#8217;t know why it made any sense for them [to drop the bulletins],&#8221; he said when asked to speculate on Microsoft&#8217;s motivation for the change. Earlier today, Goettl had led a free webinar on Microsoft&#8217;s security updates for the month &#8212; a standard practice for Ivanti &#8212; and said many of the participants shared his take.<\/p>\n<p>&#8220;They were all scratching their heads, wondering why Microsoft made it harder to find stuff.&#8221;<\/p>\n<p>He remains hopeful Microsoft will listen to customers and make changes to SUG. &#8220;There needs to be some refinement. This can&#8217;t be the end of this,&#8221; Goettl argued.<\/p>\n<p>In the meantime, Ivanti created what Goettl called &#8220;artificial bulletins&#8221; from the information in SUG for customers using the Shavlik patch management systems. (Shavlik was one of several firms acquired by LANDesk; the latter, in turn, rebranded itself as Ivanti in January.) Goettl said that customers of other legacy systems under the Ivanti brand would get a similar workup from the vendor.<\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3189686\/windows-pcs\/microsoft-kills-off-security-bulletins-after-several-stays.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt0.staticworld.net\/images\/article\/2016\/04\/3_patches-100654092-primary.idge.jpg\"\/><\/p>\n<p><strong>Credit to Author: Gregg Keizer| Date: Wed, 12 Apr 2017 13:21:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Microsoft this week retired the security bulletins that for decades have described each month&#8217;s slate of vulnerabilities and accompanying patches for customers &#8212; especially administrators responsible for companies&#8217; IT operations.<\/p>\n<p>One patch expert reported on the change for his team. &#8220;It was like trying to relearn how to walk, run and ride a bike, all at the same time,&#8221; said Chris Goettl, product manager with patch management vendor Ivanti.<\/p>\n<aside class=\"fakesidebar\"><strong>[ Further reading: <a href=\"http:\/\/www.computerworld.com\/article\/3147819\/security\/fighting-ransomware-a-fresh-look-at-windows-server-approaches.html#tk.ctw-infsb\">Fighting ransomware: A fresh look at Windows Server approaches<\/a> ]<\/strong><\/aside>\n<p>The move to a bulletin-less Patch Tuesday brought an end to months of Microsoft talk about killing the bulletins that included an aborted attempt to toss them.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3189686\/windows-pcs\/microsoft-kills-off-security-bulletins-after-several-stays.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714,11079],"class_list":["post-7324","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security","tag-windows-pcs"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7324"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7324\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}