Search

Updates
ManageEngine
ManageEngine
IT Management Seminar, Philippines

ManageEngine Desktop Central helps you to protect your computers from WannaCrypt ransomware. After detecting the computers that are vulnerable, Desktop Central lets you identify the computers that are missing critical patches and then deploy those patches immediately. You can also use Desktop Central's firewall configuration to block the vulnerable ports so that you can prevent WannaCrypt from spreading across your network. WannaCrypt ransomware targets computers that are out of date, so you will have to verify that all the critical security patches are deployed on all the computers. Desktop Central has already released the security patches below. You can now be assured that your network is secure from WannaCrypt ransomeware attack.

Which computers are targeted?

WannaCrypt ransomware is a worm that targets computers running Windows operating systems that are not up-to-date. Refer this article for more details on the ransomware and its effects. Desktop Central has already released the following security patches.

For computers running Windows XP, Windows Vista, Windows Server 2003, Windows
Server 2008 and Windows 8

    
Patch ID 22058 Security Update for Windows Vista for x64-based Systems (KB4012598)
Patch ID 22059 Security Update for Windows Vista (KB4012598)
Patch ID 22060 Security Update for Windows Server 2008 (KB4012598)
Patch ID 22061 Security Update for Windows Server 2008 for x64-based Systems (KB4012598)
Patch ID 22513 Security Update for Windows XP SP3 (KB4012598)
Patch ID 22516 Security Update for Windows XP SP2 for x64-based Systems (KB4012598)
Patch ID 22514 Security Update for Windows Server 2003 (KB4012598)
Patch ID 22517 Security Update for Windows Server 2003 for x64-based Systems (KB4012598)
Patch ID 22515 Security Update for Windows 8 (KB4012598)
Patch ID 22518 Security Update for Windows 8 for x64-based Systems (KB4012598)
Patch ID 22062 March, 2017 Security Only Quality Update for Windows 7 (KB4012212)
Patch ID 22063 March, 2017 Security Only Quality Update for Windows 7 for x64-based Systems (KB4012212)
Patch ID 22064 March, 2017 Security Only Quality Update for Windows Server 2008 R2 for x64-based Systems (KB4012212)
Patch ID 22044 March, 2017 Security Monthly Quality Rollup for Windows 7 (KB4012215)
Patch ID 22045 March, 2017 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4012215)
Patch ID 22046 March, 2017 Security Monthly Quality Rollup for Windows Server 2008 R2 for x64-based Systems (KB4012215)
Patch ID 22070 March, 2017 Security Only Quality Update for Windows Server 2012 (KB4012214)
Patch ID 22070 March, 2017 Security Only Quality Update for Windows Server 2012 (KB4012214)
Patch ID 22150 March, 2017 Security Monthly Quality Rollup for Windows Server 2012 (KB4012217)
Patch ID 22065 March, 2017 Security Only Quality Update for Windows 8.1 (KB4012213)
Patch ID 22066 March, 2017 Security Only Quality Update for Windows 8.1 for x64-based Systems (KB4012213)
Patch ID 22067 March, 2017 Security Only Quality Update for Windows Server 2012 R2 (KB4012213)
Patch ID 22047 March, 2017 Security Monthly Quality Rollup for Windows 8.1 (KB4012216)
Patch ID 22148 March, 2017 Security Monthly Quality Rollup for Windows 8.1 for x64-based Systems (KB4012216)
Patch ID 22149 March, 2017 Security Monthly Quality Rollup for Windows Server 2012 R2 (KB4012216)

For computers running Windows 10:

Patch ID 22509  Security Update for Windows Vista for x64-based Systems (KB4012598) KB401342>KB4015438>KB4016635>KB4015217>KB4019472
Patch ID 22507 2017-05 Cumulative Update for Windows 10 Version 1607 for x86-based Systems (KB4019472) KB4013429>KB4015438>KB4016635>KB4015217>KB4019472
Patch ID 22508 2017-05 Cumulative Update for Windows 10 Version 1607 for x64-based Systems (KB4019472) KB4013429>KB4015438>KB4016635>KB4015217>KB4019472
Patch ID 22345 Cumulative Update for Windows 10 Version 1511 (KB4019473) KB4013198>KB4016636>KB4015219>KB4019473
Patch ID 22346 Cumulative Update for Windows 10 Version 1511 for x64-based Systems (KB4019473) KB4013198 > KB4016636 > KB4015219 > KB4019473
Patch
ID 22340
Cumulative Update for Windows 10 (KB4015221) KB4012606>KB4016637>KB4015221
Patch ID 22341 Cumulative Update for Windows 10 for x64-based Systems (KB4015221) KB4012606>KB4016637>KB4015221

Download Now

 

How do you secure the network from WannaCrypt using Desktop Central?

You can secure your network from WannaCrypt by following the steps:

  1. 1. Deploy the critical patches to the respective computers
  2. 2. Disable SMBv1 protocol

Deploying the critical patches to respective computers 

  1. 1. Ensure that you Patch Vulnerability database is up to date. To update, click Patch Mgmt >> Update Now in the bottom left
  2. 2. After syncing the database, scan the managed computers. To scan click Patch Mgmt >> Scan Systems >> Scan All.
  3. 3. You can detect if these patches are missing by following these steps: Click Patch Mgmt >> Choose All Patches >> Choose Applicable Patches(Detailed View) >> Search 'WannaCrypt' in the Patch Description box >> You can identify the computers that are missing the critical patches or already have the patches installed on them.

Disable SMBv1 protocol

  • For computers running Windows Vista and later versions
  • For computers running Windows XP

For computers running Windows Vista and later versions

Disable SMBv1 protocol in machines with Windows vista and above using Desktop Central by following the steps:

1. Sync your Script Templates. To sync click Configurations >> Script Repository >> Templates >> Sync button

     2.     Add the script, "WannaCry_DisableSMBV1.bat", to the repository. From the repository, deploy this script as a computer configuration to the desired target machines.

3. Ensure that you exclude Windows XP OS in the target. 

For computers running Windows XP

Disable SMB vulnerable port using firewall configurations. You can create a firewall configuration and block the following vulnerable ports

  • TCP 139
  • TCP 445
  • UDP 137
  • UDP 138

These ports can be blocked using the firewall configuration, as explained below:

  1. 1. Open Firewall Configuration 

    2.    Under Windows XP, select ON under Action on Firewall and select Block under Action on Ports. Select the port137 which needed to be blocked. Block the other ports by clicking on Add More Ports.

    3.     Ensure that you have added all the vulnerable ports as given in the below screenshot and deploy this configuration to Windows XP machines.

You can now feel assured that your network is secure from WannaCrypt ransomer attack.
Don't have Desktop Central? Try our free edition and manage 25 computers and 25 mobile devices for free.

 

Philippines - Seminar 2017

ManageEngine
ManageEngine
IT Management Seminar, Philippines

Hi,

If you’re a Chief Technology Officer, IT Director, Head of Technology, IT Manager or alike, you should not miss the ManageEngine IT Management Best Practices
Seminar in Philippines.

ManageEngine IT Management Seminar in Philippines.

Here are 4 reasons why you must attend this free seminar:

  1. Listen to success stories of companies that used ITIL best practices to
    win business battles.
  2. Learn how to automate repetitive tasks such as user account creation, user account management and many more.
  3. Discover how integrated network, server and applications monitoring can help you make better decisions about your IT infrastructure.
  4. Learn how to combat internal and external security threats to protect confidential information.

Event Information:

Where: Makati Shangri-La,

Ayala Avenue, Makati City,
Metro Manila Philippines

When: May 04, 2017 (Thursday)
Cost: Free
Seminar Agenda: Click here
 
Register early - seating is limited.

Register now

If you have any questions, please email us at This email address is being protected from spambots. You need JavaScript enabled to view it. or
call us at +63-2-4373583 | +63-2-4395745 | +63-2-5705175 | +63-2-5712819

Regards,
Rommel Bernabe
ITSM/ManageEngine Product Manager

Email : This email address is being protected from spambots. You need JavaScript enabled to view it.
Landline : 024373583 | 024395745 | 025705175 | 025712819
Mobile No. : +639253040678 | +629177134250

IT GROUP INC. | PT IT GROUP INDONESIA
Philippines | Indonesia
Website: www.itgroupinc.asia

Facebook Twitter LinkedIn Google plus Youtube Pitstop

ManageEngine

© 2017. ManageEngine is a trademark of ZOHO Corp.
All other company and product names may be trademark of the respective companies with which they are associated.

 

MEFreeTool

Make your day to day desktop management simple with our 
14 free windows tools.

Free Windows Admin Tools, helps the IT Administrator in day to day desktop management routines.This windows tool helps in operations like Remote task manager, Software inventory, Remote shutdown, Remote restart , Wake on LAN tool, System inventory tool, Perform Group Policy update, Hard disk space monitor, Remote command prompt, Remote device manager, Local Users/Groups List, Network Share Browser, Join/Unjoin Computer, Currently Logged On User,Laptop Battery Power Monitor from a single console.

download 1915753 640 icon 1968245 640