Unless their local admins they wont be able to stop the service via a
login script anyway, you would need to stop it via GP or run a remote
script against them regularly.

-----Original Message-----
From: Joseph L. Casale [mailto:[EMAIL PROTECTED] 
Sent: Thursday, October 23, 2008 6:41 PM
To: NT System Admin Issues
Subject: RE: Out of Cycle Critical Windows Patch to be released today,
stay tuned

Prolly nothing, my clients all have the browser disabled and none of
them except maybe two with thermal printers share anything...

-----Original Message-----
From: Kurt Buff [mailto:[EMAIL PROTECTED] 
Sent: Thursday, October 23, 2008 4:30 PM
To: NT System Admin Issues
Subject: Re: Out of Cycle Critical Windows Patch to be released today,
stay tuned

Hmmmm......

I wonder what the impact would be if I put "net stop server" in the
login script for my users...

Kurt

On Thu, Oct 23, 2008 at 9:19 AM, Michael B. Smith
<[EMAIL PROTECTED]> wrote:
> I completely agree it is a major pain in the tookus.
>
>
>
> Regards,
>
>
>
> Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
>
> My blog: http://TheEssentialExchange.com/blogs/michael
>
> Link with me at: http://www.linkedin.com/in/theessentialexchange
>
>
>
> From: Ziots, Edward [mailto:[EMAIL PROTECTED]
> Sent: Thursday, October 23, 2008 12:00 PM
> To: NT System Admin Issues
> Subject: RE: Out of Cycle Critical Windows Patch to be released today,
stay
> tuned
>
>
>
> Ok not so much of a trend, problem is they probably knew of the issue
before
> this months patch cycle, and didn't release it with Critical rating on
patch
> Tuesday but a week afterwards, during everyone(s) patching cycle for
there
> information systems. Now we have to validate yet another patch and ask
yet
> again for more downtime from the business on servers and workstations
etc
> etc to get required patches on the machines to protect against the
latest
> threat.
>
>
>
> What compounds it this month that there is already 11 patches to be
tested,
> validated and deployed and vetted for issues afterwards, one of these
> patches is exploitable and could definitely lead to a worm (SMB flaw)
now
> you add this remote exploitable, wormable patch, quiet possibly with
public
> exploit code in the wild and active exploits, the risk factor goes up
> through the dam roof.
>
>
>
> Now imagine if you was the only person responsible for accomplishing
all (4)
> tasks above, and this new exploit on top. That doesn't make for a
happy
> camper in anyones reguards.
>
>
>
> Then factor the number of assets to protect by about 10,000.
>
>
>
> I think you start to get the idea, its pretty crystal clear in my
mind.
>
>
>
> Z
>
>
>
> Edward E. Ziots
>
> Network Engineer
>
> Lifespan Organization
>
> MCSE,MCSA,MCP,Security+,Network+,CCA
>
> Phone: 401-639-3505
>
> ________________________________
>
> From: Michael B. Smith [mailto:[EMAIL PROTECTED]
> Sent: Thursday, October 23, 2008 11:48 AM
> To: NT System Admin Issues
> Subject: RE: Out of Cycle Critical Windows Patch to be released today,
stay
> tuned
>
>
>
> Trend? This is the first out-of-cycle patch from MSFT since April
2007.
>
>
>
> Regards,
>
>
>
> Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
>
> My blog: http://TheEssentialExchange.com/blogs/michael
>
> Link with me at: http://www.linkedin.com/in/theessentialexchange
>
>
>
> From: Ziots, Edward [mailto:[EMAIL PROTECTED]
> Sent: Thursday, October 23, 2008 11:39 AM
> To: NT System Admin Issues
> Subject: RE: Out of Cycle Critical Windows Patch to be released today,
stay
> tuned
>
>
>
> I am just pissed that they couldn't get this one out last week> Don't
be
> surprised if you see a column in a leading magazine from me about this
trend
> with M$ and other vendors.
>
>
>
> Z
>
>
>
> Edward E. Ziots
>
> Network Engineer
>
> Lifespan Organization
>
> MCSE,MCSA,MCP,Security+,Network+,CCA
>
> Phone: 401-639-3505
>
> ________________________________
>
> From: Tim Vander Kooi [mailto:[EMAIL PROTECTED]
> Sent: Thursday, October 23, 2008 11:25 AM
> To: NT System Admin Issues
> Subject: RE: Out of Cycle Critical Windows Patch to be released today,
stay
> tuned
>
>
>
> The report on line shows Reboot Required if you open all the drop
downs. It
> is for Remote Code Execution. It is Critical for Server 2003 all SPs
and XP
> all SPs, Important for Vista/SP1 and Server 2008.
>
> TVK
>
>
>
> From: Ziots, Edward [mailto:[EMAIL PROTECTED]
> Sent: Thursday, October 23, 2008 10:19 AM
> To: NT System Admin Issues
> Subject: RE: Out of Cycle Critical Windows Patch to be released today,
stay
> tuned
>
>
>
> We wont know until 2:00est, I am assuming it is, and it's a bad one so
there
> is probably exploit code for it roaming the internet and its probably
> wormable on top of it.
>
>
>
> Z
>
>
>
> Edward E. Ziots
>
> Network Engineer
>
> Lifespan Organization
>
> MCSE,MCSA,MCP,Security+,Network+,CCA
>
> Phone: 401-639-3505
>
> ________________________________
>
> From: Tim Vander Kooi [mailto:[EMAIL PROTECTED]
> Sent: Thursday, October 23, 2008 11:16 AM
> To: NT System Admin Issues
> Subject: RE: Out of Cycle Critical Windows Patch to be released today,
stay
> tuned
>
>
>
> And it does require a reboot after install. I hate when out of cycle
patches
> require reboots. I prefer when my users don't know.
>
>
>
>
>
> From: Ziots, Edward [mailto:[EMAIL PROTECTED]
> Sent: Thursday, October 23, 2008 6:28 AM
> To: NT System Admin Issues
> Subject: Out of Cycle Critical Windows Patch to be released today,
stay
> tuned
> Importance: High
>
>
>
> Heads up gang, more patching for this month, this one out of cycle and
> critical no additional information yet.
>
> Z
>
> Edward E. Ziots
>
> Network Engineer
>
> Lifespan Organization
>
> MCSE,MCSA,MCP,Security+,Network+,CCA
>
> Phone: 401-639-3505
>
> _____________________________________________
>
>
http://www.computerworld.com/action/article.do?command=viewArticleBasic&;
articleId=9117878&source=NLT_AM&nlid=1
>
> As if the 11 patches this month wasn't enough, now they releasing an
> out-of-cycle critical patch,
>
> Gotta love patchin,
>
> Z
>
> Edward E. Ziots
>
> Network Engineer
>
> Lifespan Organization
>
> MCSE,MCSA,MCP,Security+,Network+,CCA
>
> Phone: 401-639-3505
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to