The link doesn't work for me, but....

Seems to me a simple breaking up of delegation of servers/desktops would
have prevented this. Only in a very small environment (SMB) would I expect
one console to be configured to be able to push *anything* to both servers
and workstations at the same time. WSUS ***MAAAYBE***, but even in a
bigger environment I'd have servers talking to one WSUS server and
desktops to another, just to avoid this kind of thing.

That's how I've seen it at my last two %dayjobs% and it makes sense to me.

Dave

> That's what I would call "more doco" (process needs to be defined,
> exception process needs to be defined etc.), not to mention additional
> bureaucratic overhead. Eventually it becomes meaningless because the
> supervisors have so much to do (my guess is that they are already busy)
> then they just start signing things without properly checking each one.
>
> If every single major (but unlikely) risk was managed like this, nothing
> would get done in a timely manner. At least for the environment I work in,
> where it takes months to put something into the environment, the business
> is screaming for more agility. They would argue "why can't I get this
> service from this external provider - they can turn it around in a few
> days, and they'll manage the risk of something going wrong"
>
> So, I can see two solutions;
>
> -        build or buy a product that can stop this happening. However, if
> not properly implemented, all you've done is move the risk to another
> step. This is both the product, and elucidation of the correct risks to be
> eliminated. Develop team members who are across multiple towers, so they
> can prepare and sign off on changes that impact multiple towers
>
> -        Outsource to someone who can do it properly
>
> As a general rule, people here don't seem to like "the cloud", or
> outsource providers. But on the other side of the coin, the business
> doesn't like IT - it has lumpy expenditures, it's slow and it can't
> deliver (or delivers clusterf*cks like this). So, how do we fix this?
> Checklists are not the answer.
>
> Cheers
> Ken
>
> From: [email protected]
> [mailto:[email protected]] On Behalf Of Micheal Espinola Jr
> Sent: Monday, 19 May 2014 4:31 PM
> To: ntsysadm
> Subject: Re: [NTSysADM] A Windows 7 image was deployed to EVERYTHING.
>
> Perhaps something you seem to less of in IT nowadays: Procedural
> checklists?  Supervisory/coworker sign-offs/verifications?
>
> --
> Espi
>
>
> On Sun, May 18, 2014 at 10:49 PM, Ken Schaefer
> <[email protected]<mailto:[email protected]>> wrote:
> I would say that most of us are guilty of not following or reading docs
> after we feel comfortable doing something, had success with it or have
> plenty of experience in other areas and with other tools.
>
> How do you intend to inform people of these verification steps? More doco
> I'm guessing
> And how are you going to implement the verification step? Someone checking
> a checkbox or clicking a button?
> And how are you going to record the verification step was done? More post
> implementation doco?
>
> Regards
> Ken
>
>
> From:
> [email protected]<mailto:[email protected]>
> [mailto:[email protected]<mailto:[email protected]>]
> On Behalf Of CESAR.ABREG0
> Sent: Monday, 19 May 2014 2:27 PM
>
> To: [email protected]<mailto:[email protected]>
> Subject: Re: [NTSysADM] A Windows 7 image was deployed to EVERYTHING.
>
> Would I agree that most or any of this things may not work but when some
> one tends to ignore documentation or processes nothing would work. I would
> say that most of us are guilty of not following or reading docs after we
> feel comfortable doing something,had success with it or have plenty of
> experience in other areas and with other tools. (specially when those docs
> are written by a person that does not understand product. ) reason that
> when we buy a new TV we don bother to read the provided paperwork and
> don't use it to the fullest potential.
>
> An example. We would hand out a page of step/guide to our docs department,
> they would turn it into 10 pages that hid the relevant items/steps.
>
> I'm not a good writer or deep reader and would say over 50% of IT
> personnel are not either, based on my experience. I truly believe that
> most writer write to impress people and not to teach or guide and most
> companies have documentation to fill a requirement and not for the value
> that could provide. Just based on my personal access and experience.
>
> I've worked with SCCM for a while and many people do not understand how
> powerful the tool is, therefore not putting enough thought on
> implementation. If you think about it, this tool can bypass or circumvent
> almost any security tools you have in place.
>
> Based on this example and past experiences that have been seen, putting
> extra validation/steps that execute at runtime are the most ideal to me.
> Docs may work up to an extend when followed.
>
> Cesar A.
> Meaning is NOT in words, but inside people! Dr. Myles Munroe
> My iPad takes half the blame for misspells.
>
> On May 18, 2014, at 7:17 PM, Ken Schaefer
> <[email protected]<mailto:[email protected]>> wrote:
> Personally, I don't think any of these things will help.
>
> When creating a change record, the exact steps to be followed are
> documented. If someone either:
>
> a)     Creates the wrong documentation, and it's approved by CAB
>
> b)     Creates the right documentation, but someone either fat fingers or
> doesn't read the doco
> Then creating these extra steps is just process inflation.
>
> I don't think adding more steps or manual checks to process is the right
> answer. Especially in a world where business is clamouring for more
> agility and speed, rather than more bureaucracy in the name of risk
> management.
>
> If you look at the stuff coming out of CEB or Gartner, we need things like
> leaner processes, cross-skilled teams better able to understand
> implications across multiple towers, orchestration/automation tied to
> process and bunch of other things I don't remember off the top-of-my-head.
>
> Cheers
> Ken
>
> From:
> [email protected]<mailto:[email protected]>
> [mailto:[email protected]] On Behalf Of CESAR.ABREG0
> Sent: Monday, 19 May 2014 12:07 PM
> To: [email protected]<mailto:[email protected]>
> Subject: Re: [NTSysADM] A Windows 7 image was deployed to EVERYTHING.
>
> Verify the number of clients in collection before using to deploy a TS to
> it? Verify that the dynamic collection being use contains the intended
> clients? Verify that the 'all system' collection is not a target?
> There could be more but a couple of that I can think of.
>
> Most this situations happen by human errors and inexperienced as well. I
> think HP consulting did it at a bank a couple of years ago and some that
> colleagues have shared with me that happened in a USA government branch.
> I've been doing imaging over 10 years and I never do mandatory deployments
> to populated collections, only to empty ones and I add clients manually or
> have a process to do so.
>
> This got me thinking of steps that can be taken or be part of a TS to
> prevent this type of situation up to an extend, can't never be prevented
> completely.
>
> 1. Put a step that verify DCs and other critical infrastructure systems
> and have human click yes before moving forward or fail if no response.
> 2. Creat web service/orchestrator to send email or a type of notification
> to a group before continuing. Automated.
> 3. What I've used in the past. Create an empty collection, deploy TS to it
> as mandatory, add required systems manually or by script from a list.
> Limit who can add systems and the type of client, like no DCs or SCCM
> systems.
>
> Cesar A.
> Meaning is NOT in words, but inside people! Dr. Myles Munroe
> My iPad takes half the blame for misspells.
>
> On May 18, 2014, at 5:31 PM, Ken Schaefer
> <[email protected]<mailto:[email protected]>> wrote:
> I'm assuming someone clicked the wrong button (i.e. "Finished", when they
> should've clicked "Cancel"). How does "process verification" (how do you
> define this?) help?
>
> Cheers
> Ken
>
> From:
> [email protected]<mailto:[email protected]>
> [mailto:[email protected]] On Behalf Of Rankin, James R
> Sent: Monday, 19 May 2014 2:59 AM
> To: [email protected]<mailto:[email protected]>
> Subject: Re: [NTSysADM] A Windows 7 image was deployed to EVERYTHING.
>
> I think I may use this as an example in an article about the importance of
> process verification.
> Sent from my (new!) BlackBerry, which may make me an antiques dealer, but
> it's reliable as hell for email delivery :-)
> ________________________________
> From: "Andrew S. Baker" <[email protected]<mailto:[email protected]>>
> Sender:
> [email protected]<mailto:[email protected]>
> Date: Sun, 18 May 2014 12:55:37 -0400
> To:
> ntsysadm<[email protected]<mailto:[email protected]>>
> ReplyTo: [email protected]<mailto:[email protected]>
> Subject: Re: [NTSysADM] A Windows 7 image was deployed to EVERYTHING.
>
> Automation leads to relaxation...
> ...unless something goes horribly wrong.
>
>
>
>
>
>
> ASB
> http://XeeMe.com/AndrewBaker<http://xeeme.com/AndrewBaker>
> Providing Virtual CIO Services (IT Operations & Information Security) for
> the SMB market...
>
>
>
>
> On Fri, May 16, 2014 at 10:40 PM, Richard Stovall
> <[email protected]<mailto:[email protected]>> wrote:
>
> Wowzers. That's just incredible.
> On May 16, 2014 8:14 PM, "Kennedy, Jim"
> <[email protected]<mailto:[email protected]>> wrote:
> So SCCM sent win 7 to everything, including servers.
>
> http://it.emory.edu/windows7-incident/
>
>
>
>
>




Reply via email to