Affected processors for each security advisory are included in the published disclosure guidance and can also be found under the Resources tab. We have also published a consolidated affected processors by product CPU guide that includes recommended mitigations to help developers assess the impact of transient execution attacks on currently supported Intel products. The Security Center also identifies which processors are affected within each specific advisory.
Microcode updates (MCU) are typically included with operating system (OS) updates from your OS vendor. End users do not have to take any special actions to apply these mitigations other than ensuring that your system OS and drivers are up to date. Contact your OS vendor for information on which OS versions incorporate the latest microcode. We have also published expanded Microcode Update Guidance that explains details about the MCU process on current Intel processors. Microcode requirements also can be found on the Security Center for each specific advisory.
Intel always recommends running the latest microcode for your system by using an updated BIOS or by OS loading of microcode updates if supported by the platform. See the Security Center for each advisory with the latest details on what options are available. This is especially true when mitigating potential side-channel cache exploits.