A patch-tastic Xmas for everyone then. Where's my WSUS console?

2008/12/17 Roger Wright <[email protected]>

>  Got 'em!  Thanks!
>
>
>
>
>
>
>
> Roger Wright
>
> Network Administrator
>
> Evatone, Inc.
>
> 727.572.7076  x388
>
> _____
>
>
>
> *From:* Sam Cayze [mailto:[email protected]]
> *Sent:* Wednesday, December 17, 2008 1:34 PM
> *To:* NT System Admin Issues
> *Subject:* FYI the IE Patch has been released and posted
>
>
>
> Online, and avail to wsus.
>
>
>  ------------------------------
>
> *From:* James Rankin [mailto:[email protected]]
> *Sent:* Wednesday, December 17, 2008 9:10 AM
> *To:* NT System Admin Issues
> *Subject:* Re: 0-day IE Exploit "in the wild"
>
> I forgot to mention that the *net view* command will only work well if,
> like mine, all your machines are devoid of comments in the computer name
>
> 2008/12/17 James Rankin <[email protected]>
>
> I just keep a text file with all my server names in and hit it with a *for
> /f %a in (servernames.txt) do psexec \\%a wuauclt /detectnow*
>
> You can mix and match as much as you want, ideal for *gpupdate /force*,
> copy commands,* ipconfig /flushdns*, anything you need
>
> If there is any need to grab machine names from the network, I generally
> use *net view|find "\\" *to pipe them in
>
> for /f "tokens=1 delims=\" %a in ('net view^|find "\\"') do psexec \\%a *your
> command here*
>
> Pretty clunky, but effective
>
> 2008/12/17 David Lum <[email protected]>
>
>  Excel is your friend. I have run WUAUCLT /DETECTNOW on 300 systems – I
> created 6 batch files of 50 machines each and let 'er rip. Works great.
>
>
>
> David Lum
>  ------------------------------
>
> *From:* Jason Morris [mailto:[email protected]]
> *Sent:* Tuesday, December 16, 2008 1:44 PM
>
>
> *To:* NT System Admin Issues
> *Subject:* RE: 0-day IE Exploit "in the wild"
>
>
>
> My experience with PSEXEC is that it doesn't like to have multiple commands
> pasted in. I work them individually, but it's usually in small batches of
> users so it's not bad. I connect to the computer to run cmd.exe then do my
> stuff from there one command at a time. I even made a batch file to make it
> easier…
>
>
>
> Psexecsys.bat 10.1.1.1 jmorris "My Password"
>
> Psexec \\%1 –u domain\%2  -p %3 cmd.exe
>
>
>
> Then I do my things from there one at a time. I've tried to run batch files
> from that cmd prompt but had very poor luck. If you do find a way to do it,
> that would be nice.
>
> Good luck!
>
> Jason
>
>
>
>
>
> *From:* Sean Rector [mailto:[email protected]]
> *Sent:* Tuesday, December 16, 2008 3:35 PM
> *To:* NT System Admin Issues
> *Subject:* RE: 0-day IE Exploit "in the wild"
>
>
>
> Does anyone have a psexec batch file to pass psexec a list of systems (from
> a text file, perhaps) for it to remotely run WUAUCLT on said systems?
>
>
>
> Sean Rector, MCSE
>
>
>
> *From:* Miller Bonnie L. [mailto:[email protected]]
> *Sent:* Tuesday, December 16, 2008 4:17 PM
> *To:* NT System Admin Issues
> *Subject:* RE: 0-day IE Exploit "in the wild"
>
>
>
> Just got this… patch is supposed to be released out of band tomorrow…
>
>
>
> http://www.microsoft.com/technet/security/bulletin/ms08-dec.mspx
>
>
>
> -Bonnie
>
>
>
> *From:* Miller Bonnie L. [mailto:[email protected]]
> *Sent:* Thursday, December 11, 2008 9:12 AM
> *To:* NT System Admin Issues
> *Subject:* 0-day IE Exploit "in the wild"
>
>
>
> http://isc.sans.org/
>
>
>
> http://www.microsoft.com/technet/security/advisory/961051.mspx
>
>
>
> -Bonnie
>
>
>
>
>
>
>
>
>
>
>
>
>
> Information Technology Manager
> Virginia Opera Association
>
> E-Mail:         [email protected]
> Phone:        (757) 213-4548 (direct line)
> {+}
>
> *> 2008-2009 Season:  **Tosca* <http://www.vaopera.org/tosca> |  *The
> Barber of Seville* <http://www.vaopera.org/barber>
> *> Recently Announced:  **Virginia Opera's 35th Anniversary Season
> 2009-2010* <http://www.vaopera.org/upcoming>
> Visit us online at www.vaopera.org or call 1-866-OPERA-VA
>  ------------------------------
>
> This e-mail and any attached files are confidential and intended solely for
> the intended recipient(s). Unless otherwise specified, persons unnamed as
> recipients may not read, distribute, copy or alter this e-mail. Any views or
> opinions expressed in this e-mail belong to the author and may not
> necessarily represent those of Virginia Opera. Although precautions have
> been taken to ensure no viruses are present, Virginia Opera cannot accept
> responsibility for any loss or damage that may arise from the use of this
> e-mail or attachments.
>
> {*}
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>   
> ------------------------------------------------------------------------------------------
>
> The pages accompanying this email transmission contain information from MJMC, 
> Inc., which
>
> is confidential and/or privileged. The information is to be for the use of 
> the individual
>
> or entity named on this cover sheet. If you are not the intended recipient, 
> you are
>
> hereby notified that any disclosure, dissemination, distribution, or copying 
> of this
>
> communication is strictly prohibited. If you received this transmission in 
> error, please
>
> immediately notify us by telephone so that we can arrange for the retrieval 
> of the original
>
> document.
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to