We had a virus outbreak. SCEP support was horrible and so is the reporting. MS 
couldn't even give me a list of all the files that had been removed from my 
machines so that I could try to restore them. I finally pieced together a 
report for that but honestly I don't know how accurate it is.

The problem with support is the SCEP guys don't know CM and vice-versa. The 
SCEP guy actually told me the only way to find the list of quarantined files 
was to read a local log on each client. Plus AV and CM shouldn't be under the 
same roof to begin with. That's not normal lines of division inside of any IT 
department that I know of.



John Marcum
Lead Desktop Engineer
Bradley Arant Boult Cummings LLP


-----Original Message-----
From: [email protected] [mailto:[email protected]] On 
Behalf Of Brian McDonald
Sent: Monday, February 10, 2014 7:40 PM
To: <[email protected]>
Subject: Re: [mssms] SCEP 2012

Interesting. What drove this decision out of curiosity?

Brian

Sent from my iPhone

> On Feb 10, 2014, at 7:38 PM, "Marcum, John" <[email protected]> wrote:
>
> We are ripping SCEP out and installing Trend.
>
> -----
> On 02/10/14, at 17:54, Russ Rimmerman <[email protected]> wrote:
>
>
> Which malware was it (per Malwarebytes), and out of curiosity does it
> (or a similar variation) come up in the Malware Encyclopedia
> http://www.microsoft.com/security/portal/threat/threats.aspx
>
> Do you still have the .exe saved somewhere, if so I'd recommend submitting a 
> sample to https://www.microsoft.com/security/portal/submission/submit.aspx 
> and they will let you know if it is already in the database which should help 
> w/troubleshooting why it skipped it.
>
> From: [email protected]
> [mailto:[email protected]] On Behalf Of Brian McDonald
> Sent: Monday, February 10, 2014 4:14 PM
> To: [email protected]
> Subject: RE: [mssms] SCEP 2012
>
> No. :(
>
>
> ________________________________
> From: [email protected]<mailto:[email protected]>
> To: [email protected]<mailto:[email protected]>
> Subject: RE: [mssms] SCEP 2012
> Date: Mon, 10 Feb 2014 20:09:39 +0000
> Was anything excluded from scanning?  Was the path excluded by any chance 
> where the EXE live(d)?
>
>
> Michael Dzikowski
> Senior Systems Engineer |  Ally Technical Infrastructure - Windows
> Hosting [cid:[email protected]]
>
> From:
> [email protected]<mailto:[email protected]>
> [mailto:[email protected]] On Behalf Of Brian McDonald
> Sent: Monday, February 10, 2014 3:01 PM
> To: [email protected]<mailto:[email protected]>
> Subject: [mssms] SCEP 2012
>
> I came across some random issues with SCEP alerts and detection. Recently an 
> EXE made it through to a startup of a computer. Malware Bytes caught it, but 
> SCEP did not. Yikes!
>
> Has anyone seen any issues similar? What is the best approach in terms of 
> analyzing this to pin-point this down and get to the crux of the problem? As 
> far as I know, my environment is optimally configured according to best 
> practice.
>
> Thanks,
>
> Brian
>
>
>
>
>
>
>
>
>
>






________________________________

Confidentiality Notice: This e-mail is from a law firm and may be protected by 
the attorney-client or work product privileges. If you have received this 
message in error, please notify the sender by replying to this e-mail and then 
delete it from your computer.

________________________________

Confidentiality Notice: This e-mail is from a law firm and may be protected by 
the attorney-client or work product privileges. If you have received this 
message in error, please notify the sender by replying to this e-mail and then 
delete it from your computer.





Reply via email to