BTW on MU this has the number of KB2920189

On 5/14/2014 3:23 PM, Susan Bradley wrote:
Read the known issues in KB2962824 and it's impact on HyperV and guest/childrens. It won't install if they child supports UEFI (Server 2012/2012R2) and either you have to do a funky workaround involving shutting down the kids or install bitlocker role.
(I don't like the resolution IMHO)

I've seen several folks report that they can't open Outlook 2013 after yesterday's update. Outlook 2013 relies on DirectX and thus update the video driver/disable hardware acceleration or disable aero.

MS14-025 is an interesting patch that you can shut down the auditors/pentesters from grabbing passwords. You can deploy the Group policy preferences patch to everyone BUT your machine that has the RSAT tools to give you time to fix up how you do things as pentesters keep grabbing credentials from passwords left behind in Group policy preference and RSAT consoles (note this patch is not on MU but on the download site/catalog and on WSUS)

http://blogs.technet.com/b/srd/archive/2014/05/13/ms14-025-an-update-for-group-policy-preferences.aspx

In addition to the change in behavior, Microsoft is providing customers with two PowerShell scripts. The first script, Enum-SettingsWithCpassword, will search existing GPO’s for use of the account password functionality. We urge companies to immediately run this script and delete vulnerable GPO’s detected.

The second script, Invoke-PasswordRoll, can be used to set local administrator passwords on remote systems (something that Group Policy Preferences is commonly used for). The script takes a list of usernames and computers, and uses PowerShell remoting to connect to each computer and change each specified usernames password to a randomized password. The username/password combinations will be written recorded in a file on disk (which is encrypted, but optionally can be stored in clear-text). Note that the script enforces randomized passwords to ensure the local accounts cannot be used in pass-the-hash attacks.

You can find both scripts athttp://support.microsoft.com/kb/2962486.


On 5/14/2014 3:12 PM, Jonathan Link wrote:
Sometimes it's good to follow...


On Wed, May 14, 2014 at 6:07 PM, Kennedy, Jim <[email protected] <mailto:[email protected]>> wrote:

    Oh, I will have plenty to say about that tomorrow. Too busy
    cleaning up the mess right now.
    ------------------------------------------------------------------------
    *From:* [email protected]
    <mailto:[email protected]>
    [[email protected]
    <mailto:[email protected]>] on behalf of Jon Harris
    [[email protected] <mailto:[email protected]>]
    *Sent:* Wednesday, May 14, 2014 5:56 PM
    *To:* [email protected]
    <mailto:[email protected]>
    *Subject:* [NTSysADM] Sure is quiet today

    It is sure quiet today.  I figured with the Microsoft patches out
    I would see some chatter on issues.

    Jon



--
Got your CryptoLocker prevention in place?
http://www.thirdtier.net/2013/10/cryptolocker-prevention-kit-updates/
Our last day of XP patching.  Wave it goodbye.

--
Got your CryptoLocker prevention in place?
http://www.thirdtier.net/2013/10/cryptolocker-prevention-kit-updates/
Our last day of XP patching.  Wave it goodbye.



Reply via email to