Although, it's good to note: ***Do not deploy WSUS outside your corporate firewall to distribute updates to clients directly connected to the Internet. The WSUS license agreement specifically disallows this scenario. http://www.wsuswiki.com/whatsnewinwsus
-----Original Message----- From: Sam Cayze [mailto:[email protected]] Sent: Wednesday, December 17, 2008 11:03 AM To: NT System Admin Issues Subject: RE: DMZ server patching Might be an option (Not my favorite option, but it's an option): Security updates are available on ISO-9660 DVD5 image files from the Microsoft Download Center http://support.microsoft.com/kb/913086 I like the WSUS in DMZ idea Phil mentioned. -----Original Message----- From: Phil Brutsche [mailto:[email protected]] Sent: Wednesday, December 17, 2008 11:00 AM To: NT System Admin Issues Subject: Re: DMZ server patching I do something similar to this - I have a WSUS server in the DMZ that is a replica of the main corporate WSUS server. Only caveat is I had to poke a hole in the firewall so that the replica can talk to the master - TCP port 8530. I also use the DMZ WSUS server for roaming laptops. Eisenberg, Wayne wrote: > Point them back to a WSUS server on the inside? Any other clever ways > of getting patches to them besides just manually copying them from > another computer and running them manually? -- Phil Brutsche [email protected] ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
