All servers is still better than all servers and workstations, isn't it? But yes, wacking every server is suboptimal :).
Dave Lum - [email protected] Sent from mobile device, please pardon the brevity. > On May 19, 2014, at 5:01 PM, Ken Schaefer <[email protected]> wrote: > > How does your suggestion prevent someone pushing a Windows Server 2003 image > to all servers? Surely that has the same effect? > > Cheers > Ken > > -----Original Message----- > From: [email protected] [mailto:[email protected]] > On Behalf Of Dave Lum > Sent: Tuesday, 20 May 2014 2:25 AM > To: [email protected] > Subject: RE: [NTSysADM] A Windows 7 image was deployed to EVERYTHING. > > The link doesn't work for me, but.... > > Seems to me a simple breaking up of delegation of servers/desktops would have > prevented this. Only in a very small environment (SMB) would I expect one > console to be configured to be able to push *anything* to both servers and > workstations at the same time. WSUS ***MAAAYBE***, but even in a bigger > environment I'd have servers talking to one WSUS server and desktops to > another, just to avoid this kind of thing. > > > > -----Original Message----- > From: [email protected] [mailto:[email protected]] > On Behalf Of Steven M. Caesare > Sent: Monday, May 19, 2014 6:15 AM > To: [email protected] > Subject: RE: [NTSysADM] A Windows 7 image was deployed to EVERYTHING. > > How does one know if process refinement is necessary when you don't know the > root cause of the issue (yet)? > > -sc > > > > -----Original Message----- > From: [email protected] on behalf of Ken Schaefer > Sent: Sun 5/18/2014 10:17 PM > To: [email protected] > Subject: RE: [NTSysADM] A Windows 7 image was deployed to EVERYTHING. > > Personally, I don't think any of these things will help. > > When creating a change record, the exact steps to be followed are documented. > If someone either: > > a) Creates the wrong documentation, and it's approved by CAB > > b) Creates the right documentation, but someone either fat fingers or > doesn't read the doco > Then creating these extra steps is just process inflation. > > I don't think adding more steps or manual checks to process is the right > answer. Especially in a world where business is clamouring for more agility > and speed, rather than more bureaucracy in the name of risk management. > > If you look at the stuff coming out of CEB or Gartner, we need things like > leaner processes, cross-skilled teams better able to understand implications > across multiple towers, orchestration/automation tied to process and bunch of > other things I don't remember off the top-of-my-head. > > Cheers > Ken > > From: [email protected] [mailto:[email protected]] > On Behalf Of CESAR.ABREG0 > Sent: Monday, 19 May 2014 12:07 PM > To: [email protected] > Subject: Re: [NTSysADM] A Windows 7 image was deployed to EVERYTHING. > > Verify the number of clients in collection before using to deploy a TS to it? > Verify that the dynamic collection being use contains the intended clients? > Verify that the 'all system' collection is not a target? > There could be more but a couple of that I can think of. > > Most this situations happen by human errors and inexperienced as well. I > think HP consulting did it at a bank a couple of years ago and some that > colleagues have shared with me that happened in a USA government branch. I've > been doing imaging over 10 years and I never do mandatory deployments to > populated collections, only to empty ones and I add clients manually or have > a process to do so. > > This got me thinking of steps that can be taken or be part of a TS to prevent > this type of situation up to an extend, can't never be prevented completely. > > 1. Put a step that verify DCs and other critical infrastructure systems and > have human click yes before moving forward or fail if no response. > 2. Creat web service/orchestrator to send email or a type of notification to > a group before continuing. Automated. > 3. What I've used in the past. Create an empty collection, deploy TS to it as > mandatory, add required systems manually or by script from a list. Limit who > can add systems and the type of client, like no DCs or SCCM systems. > > Cesar A. > Meaning is NOT in words, but inside people! Dr. Myles Munroe My iPad takes > half the blame for misspells. > > On May 18, 2014, at 5:31 PM, Ken Schaefer > <[email protected]<mailto:[email protected]>> wrote: > I'm assuming someone clicked the wrong button (i.e. "Finished", when they > should've clicked "Cancel"). How does "process verification" (how do you > define this?) help? > > Cheers > Ken > > From: [email protected]<mailto:[email protected]> > [mailto:[email protected]] On Behalf Of Rankin, James R > Sent: Monday, 19 May 2014 2:59 AM > To: [email protected]<mailto:[email protected]> > Subject: Re: [NTSysADM] A Windows 7 image was deployed to EVERYTHING. > > I think I may use this as an example in an article about the importance of > process verification. > Sent from my (new!) BlackBerry, which may make me an antiques dealer, but > it's reliable as hell for email delivery :-) ________________________________ > From: "Andrew S. Baker" <[email protected]<mailto:[email protected]>> > Sender: [email protected]<mailto:[email protected]> > Date: Sun, 18 May 2014 12:55:37 -0400 > To: > ntsysadm<[email protected]<mailto:[email protected]>> > ReplyTo: [email protected]<mailto:[email protected]> > Subject: Re: [NTSysADM] A Windows 7 image was deployed to EVERYTHING. > > Automation leads to relaxation... > ...unless something goes horribly wrong. > > > > > > > ASB > http://XeeMe.com/AndrewBaker<http://xeeme.com/AndrewBaker> > Providing Virtual CIO Services (IT Operations & Information Security) for the > SMB market. > > > > > On Fri, May 16, 2014 at 10:40 PM, Richard Stovall > <[email protected]<mailto:[email protected]>> wrote: > > Wowzers. That's just incredible. > On May 16, 2014 8:14 PM, "Kennedy, Jim" > <[email protected]<mailto:[email protected]>> wrote: > So SCCM sent win 7 to everything, including servers. > > http://it.emory.edu/windows7-incident/ > > > > Attention: Information contained in this message and or attachments is > intended only for the recipient(s) named above and may contain confidential > and or privileged material that is protected under State or Federal law. If > you are not the intended recipient, any disclosure, copying, distribution or > action taken on it is prohibited. If you believe you have received this email > in error, please contact the sender, delete this email and destroy all copies. > > > >

