Jump to content


anyweb

Root Admin
  • Posts

    9246
  • Joined

  • Last visited

  • Days Won

    368

Everything posted by anyweb

  1. Reports have surfaced about a new security hole that has been in Windows since the release of Windows NT 3.1 on July 27, 1993. The vulnerability is present in all 32-bit versions of Windows released since then, including all supported versions: Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, and Windows 7. Microsoft has issued Security Advisory (979682) to address the elevation of privilege vulnerability in the Windows kernel, making sure to note that 64-bit versions of Windows, including Windows Server 2008 R2, are not affected. ... Despite the fact that there is no patch available from Microsoft, Ormandy decided to publish the information because he believes the workaround is simple enough: disable the MS-DOS subsystem. via > http://arstechnica.com/microsoft/news/2010/01/microsoft-investigates-17-year-old-windows-flaw.ars
  2. As promised, Microsoft released the patch that fixes the Google attack vulnerability. Seven other holes are closed off as well. "Microsoft on Thursday issued a cumulative critical patch for Internet Explorer that fixes eight vulnerabilities, including a hole targeted in the China-based attacks on Google and other U.S. companies. The security update is rated critical for all supported releases of IE 5, 6, 7, and 8, according to the advisory. The more severe vulnerabilities could allow remote code execution if a user views a malicious Web page using IE, it said." via > http://www.osnews.com/story/22774/Microsoft_Fixes_8_IE_Holes_Including_One_Used_in_Attacks
  3. well lots of ways but most commonly discovery methods as they are what puts your computer or user in a collection in the first place (unless you add them using direct membership queries or such like), and you are most likely basing your application installs on what collection a user/computer is a member of, so... you could tweak your discovery methods to go more often, and for the collection update to update itself within a time period that corresponds to the discovery methods so lets say you do some AD discoverys every 3 hours, well then you might want some application collections refreshing themselves every 4 hours, I would strongly suggest testing this backwards in a lab, here are some good pointers Deploy software through AD Groups linked to Collections in SCCM, AD Group for deployments everyone needs software eventually Fully automated Application Groups One of the best ways of using AD groups for deploying software in addition to the above, the user (and computer if used) policy updates on the CLIENT will need to be tweaked cheers
  4. hi Matt a simple alternative would be to have a thick image (your base os plus vital apps like office, adobe reader, winzip, whatever...) and let the other less commonly used apps install as normal via SCCM let's see what the others have to say about it cheers niall
  5. it's this
  6. i think proxy settings have to be configured via the Internet Explorer Administration Kit, have you checked that out ? of course if you find out differently post it here
  7. can't you increase the hdd size/partition size/storage of the vm ?
  8. Posted by Ed Bott @ 12:05 pm I just spoke with George Stathakopoulos, General Manager of Trustworthy Computing Security at Microsoft, regarding the ongoing security issue affecting Internet Explorer. (For background, see my earlier post, It’s time to stop using IE6. For an update on the vulnerability and its impact, see this Zero Day blog post from ZDNet’s Ryan Naraine.) According to Stathakopoulos, a security update for all versions of Internet Explorer will be released “out of band” - that is, earlier than the next regularly scheduled update cycle on Patch Tuesday, February 9. The update is currently undergoing testing, and Microsoft expects to announce a release schedule tomorrow, January 19. Separately, Gregg Keizer at ComputerWorld reports that French security researchers claim to have circumvented the Data Execution Prevention security feature and executed their own exploit code on Internet Explorer 8 with DEP enabled. A Microsoft spokesperson says they are investigating those claims and “will take appropriate action to help protect customers.” Stathakopoulos reiterated that Microsoft so far has seen only “very limited and targeted attacks” and confirmed that the only successful attacks have been against IE6. via > http://blogs.zdnet.com/Bott/?p=1651
  9. if you reinstall sp2 on this box does it change the version of the boot image ?
  10. sorry, i meant the Windows PE tab, it lists the drivers
  11. if you click on the drivers tab of that boot image are any listed ?
  12. well the sp2 update wont update custom images, the boot images (both those that get updated and those that fail to update) are listed in the ConfigMgrSetup.log
  13. can you show a screenshot(s) of what you did so others will know ? cheers niall
  14. This post is not finished yet, work in progress... The following task sequence can be used to deploy Server 2008 R2 with ADDS, deploy server 2008r2.xml note: leave out Windows Powershell from the TS otherwise Roles and Features will be ignored.
  15. The German government has warned web users to find an alternative browser to Internet Explorer to protect security. The warning from the Federal Office for Information Security comes after Microsoft admitted IE was the weak link in recent attacks on Google's systems. Microsoft rejected the warning, saying that the risk to users was low and that the browsers' increased security setting would prevent any serious risk. However, German authorities say that even this would not make IE fully safe. Thomas Baumgaertner, a spokesman for Microsoft in Germany, said that while they were aware of the warning, they did not agree with it, saying that the attacks on Google were by "highly motivated people with a very specific agenda". "These were not attacks against general users or consumers," said Mr Baumgaertner. "There is no threat to the general user, consequently we do not support this warning," he added. Microsoft says the security hole can be shut by setting the browser's security zone to "high", although this limits functionality and blocks many websites. However, Graham Cluley of anti-virus firm Sophos, told BBC News that not only did the warning apply to 6, 7 and 8 of the browser, but the instructions on how to exploit the flaw had been posted on the internet. "This is a vulnerability that was announced in the last couple of days. Microsoft have no patch yet and the implication is that this is the same one that exploited on the attacks on Google earlier this week," he said. Computer expert Alan Stevens: "It's like having a window left open in your house" "The way to exploit this flaw has now appeared on the internet, so it is quite possible that everyone is now going to have a go." Microsoft traditionally release a security update once a month - the next scheduled patch is the 9th of February. However, a spokesman for Microsoft told BBC News that developers for the firm were trying to fix the problem. "We are working on an update on this issue and this may well involve an out of cycle security update," he said. full story > http://news.bbc.co.uk/2/hi/technology/8463516.stm
  16. The Cumulative Update 974144 is available at the following URL It resolves the following issues: # The Product Knowledge tab is displayed as the Company Knowledge tab after you import a language pack for System Center Operations Manager 2007 R2. # An agent cannot be removed successfully from a Windows Cluster service node. # The Heathservice.exe process on a Windows Cluster service passive node may have excessive CPU utilization. # The Healthservice.exe process may crash when it uses the OLE DB module. # The workflows that use the OLE DB data source may unload themselves if the underlying provider returns a null string or an empty string. # An instance of the MonitoringHost.exe process may cause a memory leak in nonpaged pool memory. # The notification subscriptions do not work if they are configured to parse a CustomField field or an AlertOwner field. # The Operations console loses the status as the current object that is in focus when a search filter is applied. # The SRSUpdateTool.exe process returns an error that states “Failed while updating registry entry for reporting code MSI component” when you try to upgrade SQL Reporting Services 2005 to SQL Reporting Services 2008. # The Operations Manager UI may crash when the Connector column and the Forwarding Status column are added to an Alert view. # The agents may re-process old Windows event log entries and then incorrectly generate alerts for these events that are not new. # Health state reliability fixes and improvements. # The Operations Manager Audit Collection Service (ADTServer.exe) does not start on an ACS Collector if the operating system is upgraded to Windows Server 2008 R2. # In a performance report that is exported, the list of object instances is not displayed. Support for Windows Server 2008 R2 and Windows 7 is also included in this CU. Here is the recommended installation order : 1. Root Management Server (RMS) 2. Manual update of the Operations Manager database together with the included stored procedure file that is discussed later 3. Manual import of the Management Pack library that is discussed later 4. Secondary Management Servers 5. Gateway Servers 6. Deploy the agent update to the agents that used a discovery-based installation 7. Operations console role computers 8. Web Console server role computers 9. Audit Collection Service role computers 10. Apply the agent update to manually installed agents via > http://myitforum.com/cs2/blogs/fdufour/archive/2010/01/17/cumulative-update-1-for-system-center-operations-manager-2007-r2-kb974144.aspx
  17. hi Peter !

    I really appreciate how much you help out here, good job, you are really a showcase for SCCM !

  18. show me a screenshot of what section you are referring to
  19. well if it's not accepting the key then the key is not matching the media, ie: the windows 7 ISO you are using is NOT the MAK version, contact microsoft to obtain the correct version or correct key. cheers niall
  20. thanks, spread the word !
  21. if you leave the license key out and deploy it what happens ?
  22. no in the upgrade it doesnt do it for you, you have to do it manually after the event here's how
  23. if you look at the zticonfigure.log file you should see references to the unattend.xml file being merged (or not) with your one, so what does it tell you ?
  24. did you use the hotfix ?
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.