I forgot to mention that the *net view* command will only work well if, like
mine, all your machines are devoid of comments in the computer name

2008/12/17 James Rankin <[email protected]>

> I just keep a text file with all my server names in and hit it with a *for
> /f %a in (servernames.txt) do psexec \\%a wuauclt /detectnow*
>
> You can mix and match as much as you want, ideal for *gpupdate /force*,
> copy commands,* ipconfig /flushdns*, anything you need
>
> If there is any need to grab machine names from the network, I generally
> use *net view|find "\\" *to pipe them in
>
> for /f "tokens=1 delims=\" %a in ('net view^|find "\\"') do psexec \\%a *your
> command here*
>
> Pretty clunky, but effective
>
> 2008/12/17 David Lum <[email protected]>
>
>>  Excel is your friend. I have run WUAUCLT /DETECTNOW on 300 systems – I
>> created 6 batch files of 50 machines each and let 'er rip. Works great.
>>
>>
>>
>> David Lum
>>  ------------------------------
>>
>> *From:* Jason Morris [mailto:[email protected]]
>> *Sent:* Tuesday, December 16, 2008 1:44 PM
>>
>> *To:* NT System Admin Issues
>> *Subject:* RE: 0-day IE Exploit "in the wild"
>>
>>
>>
>> My experience with PSEXEC is that it doesn't like to have multiple
>> commands pasted in. I work them individually, but it's usually in small
>> batches of users so it's not bad. I connect to the computer to run cmd.exe
>> then do my stuff from there one command at a time. I even made a batch file
>> to make it easier…
>>
>>
>>
>> Psexecsys.bat 10.1.1.1 jmorris "My Password"
>>
>> Psexec \\%1 –u domain\%2  -p %3 cmd.exe
>>
>>
>>
>> Then I do my things from there one at a time. I've tried to run batch
>> files from that cmd prompt but had very poor luck. If you do find a way to
>> do it, that would be nice.
>>
>> Good luck!
>>
>> Jason
>>
>>
>>
>>
>>
>> *From:* Sean Rector [mailto:[email protected]]
>> *Sent:* Tuesday, December 16, 2008 3:35 PM
>> *To:* NT System Admin Issues
>> *Subject:* RE: 0-day IE Exploit "in the wild"
>>
>>
>>
>> Does anyone have a psexec batch file to pass psexec a list of systems
>> (from a text file, perhaps) for it to remotely run WUAUCLT on said systems?
>>
>>
>>
>> Sean Rector, MCSE
>>
>>
>>
>> *From:* Miller Bonnie L. [mailto:[email protected]]
>> *Sent:* Tuesday, December 16, 2008 4:17 PM
>> *To:* NT System Admin Issues
>> *Subject:* RE: 0-day IE Exploit "in the wild"
>>
>>
>>
>> Just got this… patch is supposed to be released out of band tomorrow…
>>
>>
>>
>> http://www.microsoft.com/technet/security/bulletin/ms08-dec.mspx
>>
>>
>>
>> -Bonnie
>>
>>
>>
>> *From:* Miller Bonnie L. [mailto:[email protected]]
>> *Sent:* Thursday, December 11, 2008 9:12 AM
>> *To:* NT System Admin Issues
>> *Subject:* 0-day IE Exploit "in the wild"
>>
>>
>>
>> http://isc.sans.org/
>>
>>
>>
>> http://www.microsoft.com/technet/security/advisory/961051.mspx
>>
>>
>>
>> -Bonnie
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> Information Technology Manager
>> Virginia Opera Association
>>
>> E-Mail:         [email protected]
>> Phone:        (757) 213-4548 (direct line)
>> {+}
>>
>> *> 2008-2009 Season:  **Tosca* <http://www.vaopera.org/tosca> |  *The
>> Barber of Seville* <http://www.vaopera.org/barber>
>> *> Recently Announced:  **Virginia Opera's 35th Anniversary Season
>> 2009-2010* <http://www.vaopera.org/upcoming>
>> Visit us online at www.vaopera.org or call 1-866-OPERA-VA
>>  ------------------------------
>>
>> This e-mail and any attached files are confidential and intended solely
>> for the intended recipient(s). Unless otherwise specified, persons unnamed
>> as recipients may not read, distribute, copy or alter this e-mail. Any views
>> or opinions expressed in this e-mail belong to the author and may not
>> necessarily represent those of Virginia Opera. Although precautions have
>> been taken to ensure no viruses are present, Virginia Opera cannot accept
>> responsibility for any loss or damage that may arise from the use of this
>> e-mail or attachments.
>>
>> {*}
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>  
>> ------------------------------------------------------------------------------------------
>> The pages accompanying this email transmission contain information from 
>> MJMC, Inc., which
>> is confidential and/or privileged. The information is to be for the use of 
>> the individual
>> or entity named on this cover sheet. If you are not the intended recipient, 
>> you are
>> hereby notified that any disclosure, dissemination, distribution, or copying 
>> of this
>> communication is strictly prohibited. If you received this transmission in 
>> error, please
>> immediately notify us by telephone so that we can arrange for the retrieval 
>> of the original
>> document.
>>
>>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to