Keysight Update - Virus Control and the WannaCry Ransomware

Keysight is aware of the worldwide issue with the WannaCry ransomware that attacks vulnerabilities in the Microsoft Windows operating system. PCs and instruments which include an embedded Microsoft Windows operating systems are potentially vulnerable.

For general information on this issue, please refer to Keysight Update - WannaCry (see Note).

For system specific information about protection of former Anite products, Test System PCs and embedded unit PCs, please refer to the user documentation in the links below:

Propsim Channel Emulator - "Patching Propsim F8/F32/FS8 Against WannaCry Ransomware"

StarPoint SP6300 (TD-SCDMA testing in Conformance Toolset and SAS) - "Patching_the_SP6300_against_wannacry_ransomware.pdf"

S-Core LitePoint - "Patching S-CORE Against WannaCry Ransomware" and "S-CORE Application Testing Getting Started Guide", section 3.2

Note - Within the documents "Keysight Technologies Computer Virus Control Program" and "Frequently Asked Questions", the term "Instrument" includes a Test System PC or embedded unit PCs. A Test System PC is classed as Category 1.

The "WannaCry Ransomware Patch Utility Instructions" should not be used on the instruments listed above since there are system specific instructions.

If you have concerns or questions about these issues, please contact your customer support representative.