Although, it's good to note:

***Do not deploy WSUS outside your corporate firewall to distribute
updates to clients directly connected to the Internet. The WSUS license
agreement specifically disallows this scenario.
http://www.wsuswiki.com/whatsnewinwsus






-----Original Message-----
From: Sam Cayze [mailto:[email protected]] 
Sent: Wednesday, December 17, 2008 11:03 AM
To: NT System Admin Issues
Subject: RE: DMZ server patching

Might be an option (Not my favorite option, but it's an option):
Security updates are available on ISO-9660 DVD5 image files from the
Microsoft Download Center
http://support.microsoft.com/kb/913086

I like the WSUS in DMZ idea Phil mentioned.






-----Original Message-----
From: Phil Brutsche [mailto:[email protected]]
Sent: Wednesday, December 17, 2008 11:00 AM
To: NT System Admin Issues
Subject: Re: DMZ server patching

I do something similar to this - I have a WSUS server in the DMZ that is
a replica of the main corporate WSUS server. Only caveat is I had to
poke a hole in the firewall so that the replica can talk to the master -
TCP port 8530.

I also use the DMZ WSUS server for roaming laptops.

Eisenberg, Wayne wrote:
> Point them back to a WSUS server on the inside? Any other clever ways 
> of getting patches to them besides just manually copying them from 
> another computer and running them manually?

-- 

Phil Brutsche
[email protected]

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to