

- #WINDOWS SERVER 2008 R2 SP2 HARDENING TOOLS PATCH#
- #WINDOWS SERVER 2008 R2 SP2 HARDENING TOOLS WINDOWS 10#
The batch in the 2014 link looks like it is doing a lot more than the 2 registry entries that were on the audit report.

Has been updated to check for the additional steps required to enable fix forĪre the 2 registry entries listed in the above all I need to do on the servers? It is only 5 servers so this could be done on each without a problem. This isīecause the fix for CVE-2015-6161 is disabled by default and needs to beĮnabled manually even after applying latest updates on affected Operating Updated to check for the additional steps required to enable fix forĬVE-2015-6161 even when later updates than MS15-124 are applied. The file version of %windir%\System32\win32k.sysĪ)HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\InternetĮxplorer\Main\FeatureControl\FEATURE_ALLOW_USER32_EXCEPTION_HANDLER_HARDENINGī)HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Windows Server 2012, Windows Server 2012 R2
#WINDOWS SERVER 2008 R2 SP2 HARDENING TOOLS PATCH#
If the patch for CVE-2015-6161 is enabled or not by check for: With the help of the file %windir%\System32\mshtml.dll The QID checks if the host is running a vulnerable version of Internet Explorer
#WINDOWS SERVER 2008 R2 SP2 HARDENING TOOLS WINDOWS 10#
Windows Server 2012, Windows Server 2012 R2, Windows 10 (build 15). Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows RT, Windows RT 8.1, Operating Systems: Windows Vista, Windows Server 2008 SP2, Windows 7 SP1, Has been updated to additionally check for MS15-135 (For OS prior to Windowsġ0) and check for "FEATURE_ALLOW_USER32_EXCEPTION_HANDLER_HARDENING" Vulnerabilities could allow remote code execution if a user views a specially Resolves multiple vulnerabilities in Internet Explorer. Is a graphical web browser developed by Microsoft and included as part of the I will copy and paste below from the document But from what the auditor told me I just need to do the registry entry on our servers, 2 of them DC and said the DC would make the change apply to the workstations. If I can just copy and past what they show in the Best Answer into notepad and save as a batch to run that would be great. Which seems to answer what I am asking, but I really don't understand it. When I typed the Subject question I found this post from 2014 Talking with the audit team they told me of 2 that we had the patch but need to make a registry change. Customer had IT audit and had a really good report, only 5 things that were in the High Level.
