Author Archives: Aravind Kolipakkam

Aravind Kolipakkam

About Aravind Kolipakkam

As a member of VMware's Center for Policy & Compliance team, Aravind Kolipakkam is responsible for creating Patch and Compliance content for vRealize Configuration Management, to help VMware customers secure their infrastructure against current threats and vulnerabilities.

VMware CP&C releases Blocker for ‘Get Windows 10’ Application

CPC-LogoThe VMware Center for Policy & Compliance (CP&C) team is pleased to announce the release of a compliance toolkit for blocking the ‘Get Windows 10’ application on all applicable machines.

Microsoft is set to release Windows 10 on July 29th, and will also be available as a free upgrade for applicable systems via the ‘Get Windows 10’ application. In the Enterprise environment, it is important to maintain control over your devices, and the ‘Get Windows 10’ application can cause quite a stir in the corporate environment. There is however relief for those Administrators who wish to smite the application from their environment to ensure that there are no unplanned upgrades.

The “Blocker for ‘Get Windows 10’ application” compliance template in VMware vRealize Configuration Manager (VCM) provides an option to quickly check and enforce remediation to prevent any unplanned upgrade of Windows. The enforcement checks and creates an registry key if needed, and then an registry value to disable the GWX application, which provides an option to upgrade the existing version of Windows.

Block-Win10

VMware vRealize Configuration Manager is not limited to compliance. This solution supports configuration and compliance assessment of your Docker containers, *NIX, Windows and Virtual environments along with patching, change management and various other asset management and reporting capabilities. It also support other regulatory and industry accepted security benchmarks and guidelines such as HIPAA, PCIDSS, DISA, CIS, IRS, SOX, etc. If you have any questions about this solution, please post them here.

Thanks and Regards,
Aravind Kolipakkam
CISSP | CCSK | ITIL | MCSE | Security+

Patch Tuesday Overview – February 2013

For this month’s Patch Tuesday Microsoft released 12 bulletins of which five were rated as Critical and seven as Important updates, addressing a total of 57 vulnerabilities across Internet Explorer, .NET Framework, Office, Windows and Exchange Server.

For those who need to prioritize deployments, there are 3 security bulletins that will need to be addressed right away.

MS13-009 addresses 13 issues across all supported versions of Internet Explorer and MS13-010 addresses issues in the Vector Markup Language (VML) which is used by all versions of Internet Explorer. Both of these issues could allow Remote Code Execution if a user viewed a specially crafted webpage using Internet Explorer.

MS13-020 affecting Windows XP resolves an issue in Microsoft Windows Object Linking and Embedding (OLE) Automation which could allow Remote Code Execution if a user opens a malicious RTF file with an embedded ActiveX control in either Word or WordPad.

In addition to the above mentioned bulletins, for the second time in less than a week, both Microsoft and Adobe released Critical-class bulletins (KB2805940 and APSB13-05) to update Flash Players. These updates address at least 16 distinct vulnerabilities including buffer overflow and use-after-free vulnerabilities that could lead to Code Execution.

All the above mentioned bulletins are now available for deployment via VMware vCenter Configuration Manager (VCM).

Aravind Kolipakkam
Sr. Member of Technical Staff, VMware Center for Policy & Compliance