Barney's Blog

Blog archive

Exchange 2010 SP Tweaks Fail To Thrill

Exchange 2010 SP2 users got a new rollup this week, but the way these are done has left some IT pros nonplussed. The problem is these fixes seem to go back and forth and aren't released in a cohesive manner.

In the summer of last year there was another rollup that had problems, problems that weren't fixed in the next update.

This rollup, Update Rollup 5 v2 for Exchange 2010 SP2, is really a big bunch of patches. While IT always likes a good fix, they don't always like how they're delivered, such as this blogger: "I for one find the product team's decision to fix security vulnerabilities only in Update Rollups completely unacceptable and at odds with many other products in the Microsoft product line,"  the blogger wrote as reported in Kurt Mackie's news piece. "A security vulnerability should be addressed by a small hotfix that addresses the vulnerability rather than part of a much wider rollup which includes additional functionality and a much broader change to the code base. For those in corporate environments, testing a large rollup is at odds with security patching."

How do you like the way Microsoft patches and rolls up? Thoughts can be shared at dbarney@redmondmag.com.

Posted by Doug Barney on 12/19/2012 at 1:19 PM


Featured

  • Microsoft Publishes Windows Deadlines on Upgrading to SHA-2

    Microsoft on Friday described its 2019 timeline for when it will start distrusting Shell Hashing Algorithm-1 (SHA-1) in supported Windows systems, as well as in the Windows Server Update Services 3.0 Service Pack 2 management product.

  • Performing a Storage Refresh on Windows Server 2016, Part 1

    To spruce up some aging lab hardware, Brien decided to make the jump to all-flash storage. Here's a walk-through of the first half of the process.

  • Datacenters Are Cooling Down as Buildouts Heat Up

    Tech giants Google, Apple and others are expanding their datacenter footprints at a rapid rate, and it's pushing the industry to find better ways to power all that infrastructure.

  • Vendors Issue Patches for Linux Container Runtime Flaw Enabling Host Attacks

    This week, the National Institute of Standards and Technology (NIST) described a high-risk security vulnerability (CVE-2019-5736) for organizations using containers that could lead to compromised host systems.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.