All servers is still better than all servers and workstations, isn't it? But 
yes, wacking every server is suboptimal :).

Dave Lum - [email protected]

Sent from mobile device, please pardon the brevity.

> On May 19, 2014, at 5:01 PM, Ken Schaefer <[email protected]> wrote:
> 
> How does your suggestion prevent someone pushing a Windows Server 2003 image 
> to all servers? Surely that has the same effect?
> 
> Cheers
> Ken
> 
> -----Original Message-----
> From: [email protected] [mailto:[email protected]] 
> On Behalf Of Dave Lum
> Sent: Tuesday, 20 May 2014 2:25 AM
> To: [email protected]
> Subject: RE: [NTSysADM] A Windows 7 image was deployed to EVERYTHING.
> 
> The link doesn't work for me, but....
> 
> Seems to me a simple breaking up of delegation of servers/desktops would have 
> prevented this. Only in a very small environment (SMB) would I expect one 
> console to be configured to be able to push *anything* to both servers and 
> workstations at the same time. WSUS ***MAAAYBE***, but even in a bigger 
> environment I'd have servers talking to one WSUS server and desktops to 
> another, just to avoid this kind of thing.
> 
> 
> 
> -----Original Message-----
> From: [email protected] [mailto:[email protected]] 
> On Behalf Of Steven M. Caesare
> Sent: Monday, May 19, 2014 6:15 AM
> To: [email protected]
> Subject: RE: [NTSysADM] A Windows 7 image was deployed to EVERYTHING.
> 
> How does one know if process refinement is necessary when you don't know the 
> root cause of the issue (yet)?
> 
> -sc
> 
> 
> 
> -----Original Message-----
> From: [email protected] on behalf of Ken Schaefer
> Sent: Sun 5/18/2014 10:17 PM
> To: [email protected]
> Subject: RE: [NTSysADM] A Windows 7 image was deployed to EVERYTHING.
> 
> Personally, I don't think any of these things will help.
> 
> When creating a change record, the exact steps to be followed are documented. 
> If someone either:
> 
> a)      Creates the wrong documentation, and it's approved by CAB
> 
> b)      Creates the right documentation, but someone either fat fingers or 
> doesn't read the doco
> Then creating these extra steps is just process inflation.
> 
> I don't think adding more steps or manual checks to process is the right 
> answer. Especially in a world where business is clamouring for more agility 
> and speed, rather than more bureaucracy in the name of risk management.
> 
> If you look at the stuff coming out of CEB or Gartner, we need things like 
> leaner processes, cross-skilled teams better able to understand implications 
> across multiple towers, orchestration/automation tied to process and bunch of 
> other things I don't remember off the top-of-my-head.
> 
> Cheers
> Ken
> 
> From: [email protected] [mailto:[email protected]] 
> On Behalf Of CESAR.ABREG0
> Sent: Monday, 19 May 2014 12:07 PM
> To: [email protected]
> Subject: Re: [NTSysADM] A Windows 7 image was deployed to EVERYTHING.
> 
> Verify the number of clients in collection before using to deploy a TS to it? 
> Verify that the dynamic collection being use contains the intended clients? 
> Verify that the 'all system' collection is not a target?
> There could be more but a couple of that I can think of.
> 
> Most this situations happen by human errors and inexperienced as well. I 
> think HP consulting did it at a bank a couple of years ago and some that 
> colleagues have shared with me that happened in a USA government branch. I've 
> been doing imaging over 10 years and I never do mandatory deployments to 
> populated collections, only to empty ones and I add clients manually or have 
> a process to do so.
> 
> This got me thinking of steps that can be taken or be part of a TS to prevent 
> this type of situation up to an extend, can't never be prevented completely.
> 
> 1. Put a step that verify DCs and other critical infrastructure systems and 
> have human click yes before moving forward or fail if no response.
> 2. Creat web service/orchestrator to send email or a type of notification to 
> a group before continuing. Automated.
> 3. What I've used in the past. Create an empty collection, deploy TS to it as 
> mandatory, add required systems manually or by script from a list. Limit who 
> can add systems and the type of client, like no DCs or SCCM systems.
> 
> Cesar A.
> Meaning is NOT in words, but inside people! Dr. Myles Munroe My iPad takes 
> half the blame for misspells.
> 
> On May 18, 2014, at 5:31 PM, Ken Schaefer 
> <[email protected]<mailto:[email protected]>> wrote:
> I'm assuming someone clicked the wrong button (i.e. "Finished", when they 
> should've clicked "Cancel"). How does "process verification" (how do you 
> define this?) help?
> 
> Cheers
> Ken
> 
> From: [email protected]<mailto:[email protected]> 
> [mailto:[email protected]] On Behalf Of Rankin, James R
> Sent: Monday, 19 May 2014 2:59 AM
> To: [email protected]<mailto:[email protected]>
> Subject: Re: [NTSysADM] A Windows 7 image was deployed to EVERYTHING.
> 
> I think I may use this as an example in an article about the importance of 
> process verification.
> Sent from my (new!) BlackBerry, which may make me an antiques dealer, but 
> it's reliable as hell for email delivery :-) ________________________________
> From: "Andrew S. Baker" <[email protected]<mailto:[email protected]>>
> Sender: [email protected]<mailto:[email protected]>
> Date: Sun, 18 May 2014 12:55:37 -0400
> To: 
> ntsysadm<[email protected]<mailto:[email protected]>>
> ReplyTo: [email protected]<mailto:[email protected]>
> Subject: Re: [NTSysADM] A Windows 7 image was deployed to EVERYTHING.
> 
> Automation leads to relaxation...
> ...unless something goes horribly wrong.
> 
> 
> 
> 
> 
> 
> ASB
> http://XeeMe.com/AndrewBaker<http://xeeme.com/AndrewBaker>
> Providing Virtual CIO Services (IT Operations & Information Security) for the 
> SMB market.
> 
> 
> 
> 
> On Fri, May 16, 2014 at 10:40 PM, Richard Stovall 
> <[email protected]<mailto:[email protected]>> wrote:
> 
> Wowzers. That's just incredible.
> On May 16, 2014 8:14 PM, "Kennedy, Jim" 
> <[email protected]<mailto:[email protected]>> wrote:
> So SCCM sent win 7 to everything, including servers.
> 
> http://it.emory.edu/windows7-incident/
> 
> 
> 
> Attention: Information contained in this message and or attachments is 
> intended only for the recipient(s) named above and may contain confidential 
> and or privileged material that is protected under State or Federal law. If 
> you are not the intended recipient, any disclosure, copying, distribution or 
> action taken on it is prohibited. If you believe you have received this email 
> in error, please contact the sender, delete this email and destroy all copies.
> 
> 
> 
> 


Reply via email to