Could try it with a machine startup script to launch … but again they’d all have to be rebooted.  You could couple psexec w/ cusrmgr for a quick fix.

 


From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Kern, Tom
Sent: Wednesday, March 02, 2005 11:25 AM
To: [email protected]
Subject: RE: [ActiveDir] worm/bot issues

 

I know you can force password complexity but is there a way to globally change all the local admin account passwords to something complex via a gpo or logon script?

these pc's were set up by the help desk staff and i know they just use blank admin passwords when setting up a pc because these accounts are never used and if a help desk admin has to boot a pc into safe mode, they don't have to remeber 500 diff passwords.

 

also, if my virus defs are up to date and my patches are as well, shouldn't a worm just be killed or ineffective?

thanks

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Wednesday, March 02, 2005 11:14 AM
To: [email protected]
Subject: RE: [ActiveDir] worm/bot issues

Do those users have weak/blank passwords? Do the admin accounts (or other accounts) on those systems have similarly insecure passwords? You may be looking at a dictionary-packing worm, and no virus-def can help you if that is so – unless, of course, you secure the passwords.

 

HTH

 

Deji

 

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Kern, Tom
Sent: Wednesday, March 02, 2005 7:51 AM
To: ActiveDir (E-mail)
Subject: [ActiveDir] worm/bot issues

 

Hi all, i have users that keep getting infected with a worm Symantec calls "W32.Spybot.KHO". The thing keeps coming back unless you disable file and print sharing.

The thing I don't understand is that all my clients(winxp) virus defs are up to date and they are all patched. I use SUS and push out patches on a regular basis. I even ran MS baseline security analyzer on the infected boxes and they come up good for up to datedness.

I don't really understand how an up to date patched pc can become infected over and over.

according to Symantec, the holes that this thing exploits, i've had covered awhile ago.

is it possible to be patched and up to date and STILL get infected?

is there anyway out of this quagmire?

thanks

List info   : http://www.activedir.org/List.aspx

List FAQ    : http://www.activedir.org/ListFAQ.aspx

List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

Reply via email to