|
Rob Berendt -- "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." Benjamin Franklin ----- Forwarded by Rob Berendt/DEKKO on 12/31/2001 08:37 AM ----- Support_Update@TrendMicro.c om(Support Update) To: rob@dekko.com Sent by: cc: Support_Update@TrendMicro.c Fax to: om Subject: Trend Micro - Technical Support Update 12/14/01 12/14/2001 04:32 AM Please respond to Support_Update Special TRENDSETTER and Technical Support Newsletter Virus Protection ALERT: PERFORM THIS QUICK CHECK TO ENSURE PROPER FUNCTIONING OF YOUR TREND MICRO ANTIVIRUS PRODUCT(S) Tis the Season to Upgrade Each week, Trend Micro provides your company with the latest virus protection through what are called "pattern files," electronic databases that identify and block malicious code. If you are one of the few companies still using pattern files that number in the 900s ("900-series pattern files"), rather than in the 100s ("100-series pattern files"), it's time to update now. Trend Micro products that are still using 900-series pattern files" for virus protection will not be capable of deploying the latest virus protection updates from Trend Micro once the pattern files reach 999. Because the old pattern file numbering system is now approaching number 985, time is running short to update your Trend Micro products. To be sure that you are not one of the few remaining users of the 900-series pattern files, please verify ? right now ? that your Trend Micro products are using pattern files that are in the 100s. If your pattern files still number in the 900s, please visit Trend Micro's Web site for vital information on how to update your Trend Micro products to the new 100-series pattern files: http://solutionbank.antivirus.com/solutions/scanengine55.asp. Trend Micro's SolutionBank provides step-by-step instructions for upgrading your particular Trend Micro product. If you need additional help, contact information for Trend Micro's technical support is also available at this URL. The Latest Virus Protection Trend Micro introduced its new 100-series pattern files more than three months ago through the release of a scan engine. Pattern files are databases of the latest information used by the scan engine portion of Trend Micro products to identify and detect computer viruses and other forms of malicious code. The scan engine and pattern file components of Trend Micro products are central to their functioning. Both must be updated on a regular basis to ensure the most effective protection against malicious code. Since the September release of scan engine 5.5, Trend Micro products, including PC-cillin, began using the 100-series pattern file numbers. To facilitate the transition to scan engine 5.5, the two pattern series have been running in tandem. Most of Trend Micro's customers were automatically updated to the new 100-series pattern files with the deployment of scan engine 5.5x. Some versions of Trend Micro products, however, required the application of patches or other manual steps to complete the upgrade. If your Trend Micro products are still using the 900-series pattern files, you have either not deployed scan engine 5.5x or some manual steps are required. In either event, it is important for you to visit Trend Micro's Web site and take steps to upgrade your Trend Micro products now. "It's time for administrators to upgrade to the new scan engine 5.5x and 100?series pattern files," said Hammud Saway, director of global premium support services for Trend Micro. "The 900-series pattern files will become obsolete in the near future. To protect installations from unwanted computer viruses during the high-risk holiday season and beyond, administrators can no longer put off updating their systems to the new 100-series pattern files." Happy Holidays and Safe Surfing from all of us at Trend Micro Technical Support ************************************************************************ Here's your weekly dose of Technical Support Update. Trend Micro - Technical Support Update 12/14/01 ************************************************************************ Current Pattern File: 183/983 Current VSAPI Scan Engine: VSAPI 5.630 (Most platforms) Current Product Version Information: ActiveSupport for NT.....................v1.22 ActiveSupport for InterScan UNIX.........v1.1 ActiveSupport for eManager UNIX..........v1.2 ActiveUpdate for NT......................v1.0 TVCS for NT..............................v1.82 InterScan VirusWall for NT...............v3.52 InterScan VirusWall for Solaris..........v3.6 InterScan VirusWall for HP/UX............v3.6 InterScan VirusWall for Linux............v3.6 InterScan VirusWall for SendMail Edition.v3.6 InterScan eManager for NT................v3.52 InterScan eManager for Solaris...........v3.6 InterScan eManager for HP-UX.............v3.5 InterScan eManager for Linux.............v3.6 AppletTrap for NT and Solaris............v2.5 InterScan WebManager for NT..............v2.1 InterScan WebProtect for ISA Server......v3.0 ScanMail for Lotus Notes NT..............v2.51 ScanMail for Lotus Notes Solaris.........v1.91b ScanMail for Lotus Notes AIX.............v1.91b ScanMail for Lotus Notes S/390...........v1.9 ScanMail for Lotus Notes AS/400..........v1.9c ScanMail for Lotus Notes OS/2............v1.5 ScanMail for Exchange NT(ESE API)........v3.7 ScanMail for Exchange NT(MAPI/AVAPI).....v3.52 ScanMail for Exchange 2000...............v6.0 ScanMail for Exchange eManager plugin....v3.11 ScanMail for Exchange eManager 2000......v5.0 ScanMail for HP OpenMail.................v1.1 ScanMail for Outlook.....................v1.1 OfficeScan Corporate.....................v3.54 OfficeScan for SBS.......................v5.1 ServerProtect for NT & Netware...........v5.31 ServerProtect for NetApp filer...........v5.31 ServerProtect for EMC Celerra............v5.31 ServerProtect for Linux..................v1.0 PC-Cillin 95/98/ME.......................v7.61 PC-Cillin NT/2000........................v7.61 To read an HTML version of this list, please visit our page at; http://www.antivirus.com/trendsetter/productnews.htm Now available in Beta for your testing at; http://www.antivirus.com/download/beta_programs/ InterScan VirusWall for WAP 1.0 ScanMail for Lotus Notes AIX 2.5 ScanMail for Lotus Notes Solaris2.5 Trend Micro Product Support Update As you know, Trend Micro supports previous versions of a product for one year after the subsequent version is released. In keeping with this policy, please see a list of the products we currently support at http://www.antivirus.com/support/support_ver.htm . If you are using an outdated product, we strongly encourage you to update to the most recent version to ensure the best possible protection. For a current World Virus Tracking report, please visit our page at; http://wtc.trendmicro.com/wtc/ ************************************************************************ V I R U S R E P O R T (by the Trend Micro US Virus Research Group) ************************************************************************ ------------------------------------------------------------------------ Date: December 14, 2001 ------------------------------------------------------------------------ If you're a corporate user and want to assess your virus protection, check out Trend Micro's Virus Risk Assessment Web site at: http://www.antivirus.com/free_tools/edoctor/ Issue Preview: 1. TREND MICRO UPDATES: Pattern File and Scan Engine Updates 2. Worms of the Week - WORM_UPDATR.A and WORM_GOKAR.A (Low Risk) 3. 10 Most Prevalent In-the-Wild Malware Surveyed by Trend Micro US NOTE: Long URLs may break into two lines in some mail readers. Should this occur, please cut and paste the URL in your browser. ************************************************************************ 1. TREND MICRO UPDATES: Pattern File and Scan Engine Updates ------------------------------------------------------------------------ PATTERN FILE: 183 or 983 http://www.antivirus.com/download/pattern.asp SCAN ENGINE: 5.630 http://www.antivirus.com/download/engines/ 2. Worms of the Week - WORM_UPDATR.A and WORM_GOKAR.A (Low Risk) ------------------------------------------------------------------------ WORM_UPDATR.A arrives with varying subjects and attachments. It drops an UPDATE.EXE and a SETUP.EXE file in the %windows% directory, and drops an UPDATE.VBS file in the startup directory. It then searches for all files with the extensions .DOC, .EXE, and TXT. If found, it creates a copy of the file and adds the file extension .VBS. This worm sends two copies of every email it sends out. On the 12th day of any month, it displays a message box. This virus has been classified as low risk. WORM_UPDATR.A is detected by Trend Micro pattern file #178 or #978. For additional information about WORM_UPDATR.A, please visit Trend Micro at: http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=WORM_UPDATR.A . WORM_GOKAR.A is a Windows-executable worm that is compiled in Visual Basic. It is capable of propagating via Microsoft Outlook and mIRC, and uses the mIRC application to install a backdoor. This worm arrives as a randomly named attachment in an email, and the subject line of the email is also randomly named. It does not have a destructive payload, and has been classified as low risk. WORM_GOKAR.A is detected by Trend Micro pattern file #182 or #982. For additional information about WORM_GOKAR.A, please visit Trend Micro at: http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=WORM_GOKAR.A 3. 10 Most Prevalent In-the-Wild Malware Surveyed by Trend Micro US (week of: December 3, 2001 to December 9, 2001) ------------------------------------------------------------------------ 1. WORM_BADTRANS.B 2. PE_MAGISTR.B 3. WORM_GONE.A 4. PE_MAGISTR.A 5. WORM_SIRCAM.A 6. PE_MAGISTR.DAM 7. JS_EXCEPTION.GEN 8. VBS_HAPTIME.A 9. PE_NIMDA.A 10. PE_NIMDA.A-O To subscribe/unsubscribe to this email update, please visit our Support Update subscription page at; http://www.antivirus.com/support/subscribe.htm Alternatively, you can send a message to this address, with the word 'subscribe' or 'unsubscribe' as the subject line.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.