By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Can you offer some best practices for dealing with vulnerabilities that show up after XP SP2 is installed? For instance, is there a fix for the IE drag-and-drop flaw?
I'm not sure there's anything new to do other than use the Windows Update features in XP SP2 (many of which have been enhanced to "help" reduce your patching pains). Your best bet is to use a centrally controlled patch management system such as Microsoft's SUS, or even better, a third-party application. As of right now, I'm not aware of any fix for the IE drag-and-drop flaw. The best thing for now would be to notify your users about it and encourage them to be vigilant if they're directed to an unknown Web site.