There are extremely simple ways (firewall, proxy, etc) to allow a machine to
be a web client (to allow d/l of fixes) and not a web server.  Is your
entire network opened up to the Internet?  Can people on the outside surf to
web sites hosted on your user's desktop PCs?  



> -----Original Message-----
> From: Luke Brumbaugh [mailto:[EMAIL PROTECTED]] 
> Sent: Friday, August 24, 2001 9:23 AM
> To: NT System Admin Issues
> Subject: RE: Code Red Rant
> 
> 
> OK this is getting kinda nasty.  So I'll ask, because I'd 
> love to.  How does
> one download all the SP's, hotfixes, security updates, etc.  
> other than
> going to windowsupdate.microsoft.com?  (SP2 I got,I need the rest).
> 
> By the way, unless you forgot there was a time, you loaded 
> all your programs
> on a server or networked CD pack and would load all you 
> machines from a
> central location.  Ghost images were on net, you could 
> multicast 20 at a
> time.  
> 
> -----Original Message-----
> From: Kevin Lundy [mailto:[EMAIL PROTECTED]]
> Sent: Friday, August 24, 2001 8:59 AM
> To: NT System Admin Issues
> Subject: RE: Code Red Rant
> 
> 
> If you are working smarter, then simply keep the servers off 
> the public
> network until the system in secured.  Burn a CD with the SPs 
> and hotfixes.
> That is probably faster than downloading them each time for 
> each server.
> 
> Sure locking off port 80 is an option for any business.  If 
> the server is
> getting rebuilt, then there shouldn't be any legitimate 
> traffic to it yet,
> so block 80 to that new server until configured.
> 
> If you are so busy rebuilding servers that you need to double 
> check every
> morning, then you have enough volume to justify imaging - so 
> image your
> servers from a secured image.
> 
> Welcome to the world of security.  Security is a never ending 
> job.  But
> don't rant about something that you are just as guilty of - 
> some of those
> 4,500 addresses are quite possibly servers "rebuilt" the 
> night before just
> like you.
> 
> -----Original Message-----
> From: Luke Brumbaugh [mailto:[EMAIL PROTECTED]]
> Sent: Friday, August 24, 2001 7:31 AM
> To: NT System Admin Issues
> Subject: RE: Code Red Rant
> 
> 
> Hummm let's see I logged 4,500 address in the last month.
> All Machines get hit every 10 - 30 minutes.
> I have to double and triple check the network every morning 
> to make sure
> that if any machine got rebuilt that it is protected with 
> service packs and
> virus protection and all are up to date.  Locking off port 80 
> is not an
> option, that's the business.
> It used to be simpler.  Unfortunately I am a one man show, I 
> have no help.
> I have a wife and newborn, that I would like to see.  I work 
> smarter and not
> harder.  
> 
> -----Original Message-----
> From: Andrew S. Baker [mailto:[EMAIL PROTECTED]]
> Sent: Thursday, August 23, 2001 8:19 PM
> To: NT System Admin Issues
> Subject: RE: Code Red Rant
> 
> 
> Um.... Are you complaining about yourself?
> 
> 
> 
> ==============================================================
>  ASB - http://www.ultratech-llc.com/KB/?File=~MoreInfo.TXT
> ==============================================================
>  "Listen to others, even the dull and ignorant; they too have
>  their story." -- from Desiderata
> 
> 
> 
> >-----Original Message-----
> >From: Luke Brumbaugh [mailto:[EMAIL PROTECTED]]
> >Sent: Thursday, August 23, 2001 9:48 AM
> >To: NT System Admin Issues
> >Subject: OT:Code Red Rant
> >
> >
> >Last night I am building a test box for 2000 AD.  I had to 
> >format a 2nd
> >drive to load AD and stuff.  It was going to take a while so 
> >I left and went
> >home.  When I got in this morning, I had messages from other 
> >people saying
> >that they had got the code red.  I hadn't even got to the 
> >updates yet.  What
> >a pain!  So now I am rebuilding.  Will other people please 
> >fix this.  It is
> >such a pain, our logs are filled with hundreds of ip 
> >addresses trying to
> >infect us.  We got spam abuse, why can't we have a place 
> >that puts people's
> >ip in for not fixing their virus problems!
> >
> >
> >
> >
> >Luke L. Brumbaugh
> >System Administrator,MCSE
> >Ultryx Corporation
> ><mailto:[EMAIL PROTECTED]>
> >
> 
> 
http://www.sunbelt-software.com/ntsysadmin_list_charter.htm
Enterprise Channel Management Software for Manufacturers 
Visit us at http://www.ultryx.com 


http://www.sunbelt-software.com/ntsysadmin_list_charter.htm

http://www.sunbelt-software.com/ntsysadmin_list_charter.htm
Enterprise Channel Management Software for Manufacturers 
Visit us at http://www.ultryx.com 


http://www.sunbelt-software.com/ntsysadmin_list_charter.htm

http://www.sunbelt-software.com/ntsysadmin_list_charter.htm

Reply via email to