Hi 
All,
 
Sasser seems to be 
alive and well, here is some information that you may find 
useful.
 
-- 
Based on the information at the Symantec link: 
- 
Blocking destination tcp ports 5554 and 9996 at the routers will stop the 
payload being transferred across network segments. (5554 appears to be the 
content transfer channel (FTP), 9996 is the remote shell used to run commands on 
a host).
- Deploying an IPSec policy with filter actions for Block on port 
5554 and 9996 can be used to block the transfer of the payload to or from 
individual hosts. Blocking inbound 445 is also possible, but may cause problems 
depending on your specific requirements re File and Print sharing on clients. NB 
This is a technique to limit the spread of the virus, not to mitigate the 
vulnerability.
-- 
Group Policy deployment of the removal tool has not 
been tested to my knowledge, but: 
- When assigned to a computer, the package 
is executed using a Local System logon, so shouldn't encounter any permissions 
issues.
- The cleanup tool fails if the MS04-011 hotfix is not installed. 
- Group Policy does not guarantee an order of completion for assigned 
packages. 
- If the package runs unsuccessfully, it may not be run again by 
the software deployment engine; instead, consider using MSI to get the cleanup 
tool onto the workstations and a computer startup script to execute the 
tool.
- Our typical suggestion is to install MS04-011, reboot, then run the 
cleanup tool; GP software deployment may not be able to accomplish this in a 
single step.