Malcolm Greene wrote:
> +1. I have the same thing happen to me. EXTREMELY frustrating.

If you want to get around vendor maliciousness or incompetence like this, 
here's what 
you do:

1) Get your system updated to the service pack/patch level you are comfortable 
with. 
Only update to the latest *if you've tested it* in your environment.

2) Turn automatic updates off

3) Disable the security center so users don't get nagged uselessly.

Now (and this is critical). Never update that system again, unless it becomes 
necessary to do so. Once the system is in a known good state, don't EVER update 
it 
again until it is time to, say, upgrade the hardware.

Simple. You have a known system setup, and you aren't going to be woken up at 
4am 
when that early employee calls you because something Windows Update did screwed 
up 
something the user needs to do.

Put the system behind a smart firewall, turn windows firewall on if you like, 
and 
virus/spyware scan the system at off-hours (don't run this stuff in the 
background: 
it isn't very effective and it hogs valuable system resources).

There. Multiple problems with Windows OS solved. Translates to happy users, 
translates to you keeping your job as sysadmin.

Oh, and for testing updates/patches before rolling them out: use a virtual 
machine 
that can take a snapshot and roll back to prior save points.

Paul


_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://leafe.com/mailman/listinfo/profox
OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message: http://leafe.com/archives/byMID/profox/[EMAIL PROTECTED]
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to