Gartner advised users to immediately block access to the vulnerabilities with firewalls while testing and installing the patch.
"This stream of recent vulnerabilities affecting virtually every Windows desktop and server shows that enterprises urgently need robust blocking capabilities and tools to deploy fixes," Gartner said.
Brian Collins, professor of IS at RMC Cranfield, said, "Suppliers are trying to improve the vigour with which they generate, distribute and make systems administrators aware of patches but they are not doing well enough."
Pete Smith, IT manager at communications supplier Inmarsat, said, "When a hole in an operating system needs patching, the patch can be of a considerable size. You have to test it because you do not know what effect the patch will have on PCs. It means a lot of labour to test and install and we are still dealing with the last outbreak."
Microsoft released patches for the three new vulnerabilities last Wednesday. They address serious security holes.
Microsoft rated the severity of the holes as "critical" and recommended systems administrators apply the patch immediately. Two of the vulnerabilities are buffer overruns, the other affects the remote procedure call process, which allows file and printer sharing.