By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Can you offer some best practices for dealing with vulnerabilities that show up after XP SP2 is installed? For instance, is there a fix for the IE drag-and-drop flaw?
I'm not sure there's anything new to do other than use the Windows Update features in XP SP2 (many of which have been enhanced to "help" reduce your patching pains). Your best bet is to use a centrally controlled patch management system such as Microsoft's SUS, or even better, a third-party application. As of right now, I'm not aware of any fix for the IE drag-and-drop flaw. The best thing for now would be to notify your users about it and encourage them to be vigilant if they're directed to an unknown Web site.