Hell Id be shot if I was more than a few weeks behind on my server farm. Of 
course after 5-6 yrs of testing, deploying, and blowing stuff up it tends to 
run pretty smoothly now, with little or no gotchas, because we catch the issues 
in testing, and can just role-back the VM's or test systems accordingly, before 
we patch production. Basically saved the bacon on the last IIS patch also. 

I agree, the WSUS admin should be flogged, but so should the sys admin for not 
verifying there systems up to date, and allowing said WSUS admin to send 36 
untested patches at one time to said server and cause said barfing of said 
server which make said sys admin extremely angry and hostile...

Something to be said about change management... 

Z

Edward E. Ziots
CISSP, Network +, Security +
Network Engineer
Lifespan Organization
Email:ezi...@lifespan.org
Cell:401-639-3505

-----Original Message-----
From: Steven Peck [mailto:sep...@gmail.com] 
Sent: Thursday, July 22, 2010 5:08 PM
To: NT System Admin Issues
Subject: Re: Net Use requires password

I see a meeting in your future too ;)

I _ahem_ may, perhaps, at some point, attended such meetings myself.  :)

On Thu, Jul 22, 2010 at 11:33 AM, David McSpadden <dav...@imcu.com> wrote:
> Yeah well damn that manager (me) as well for not paying better attention to 
> the weekly reports.
>
> -----Original Message-----
> From: Steven Peck [mailto:sep...@gmail.com]
> Sent: Thursday, July 22, 2010 2:28 PM
> To: NT System Admin Issues
> Subject: Re: Net Use requires password
>
> Umm.... That's a silly reason to not do Windows Update.  (We use SCCM
> which is an advanced version of the same thing).
>
> And bad WSUS admin.  I see a meeting ni his future.
>
> On Thu, Jul 22, 2010 at 11:17 AM, David McSpadden <dav...@imcu.com> wrote:
>> WSUS admin is way behind.
>> Sees Security audit on horizon.
>> Says screw it and updates all.
>> Out of 36 servers only one bit it so....
>> Damn that admin...
>>
>>
>> -----Original Message-----
>> From: Ziots, Edward [mailto:ezi...@lifespan.org]
>> Sent: Thursday, July 22, 2010 2:12 PM
>> To: NT System Admin Issues
>> Subject: RE: Net Use requires password
>>
>> Why I don't do Windows Update...
>>
>>
>> Dang MS09-041 is an old update. Wonder why this one came to bite ya...
>>
>> Z
>>
>> Edward E. Ziots
>> CISSP, Network +, Security +
>> Network Engineer
>> Lifespan Organization
>> Email:ezi...@lifespan.org
>> Cell:401-639-3505
>>
>>
>> -----Original Message-----
>> From: David McSpadden [mailto:dav...@imcu.com]
>> Sent: Thursday, July 22, 2010 1:33 PM
>> To: NT System Admin Issues
>> Subject: RE: Net Use requires password
>>
>> Windows Update 971657 killing me softly.
>>
>> -----Original Message-----
>> From: Ziots, Edward [mailto:ezi...@lifespan.org]
>> Sent: Thursday, July 22, 2010 11:11 AM
>> To: NT System Admin Issues
>> Subject: RE: Net Use requires password
>>
>> This was the complete issue with the DCOM for me, I posted on earlier:
>> Happened with RDP in my case.
>>
>> Problem:
>> * TCPIP NetBIOS helper service and Win32 time service
>> * When doing an RDP we were getting an "RPC server is unavailable."
>> Cause: DCOM Permissions were modified
>> Resolution:
>> 1. Imported Winsock2 and Winsock from a different machine and applied
>> 2. Updated Netbt.sys to latest, KB961799 5.2.3790.4452
>> 3. Disabled SNP.
>> 4. Disabled Non-Microsoft services using msconfig
>> 5. Set the Dcom permissions:
>> I. Open up the "Component Services" MMC.
>> II. Click on the Start Menu, then select "Programs" and then
>> "Administrative Tools" and click on "Component Services".
>> III. Then Expand "Component Services", and then "Computers",
>> IV. Highlight "My Computer" then right click and select "Properties"
>> V. Click on the "COM Security" tab.
>> VI. Click on the "Edit Limits" button, under "Access Permissions"
>> VII. Click on the Add Button, and add "Everyone" with "Local Access" and
>> "Remote Access"
>> VIII. Click the OK button.
>> IX. Click on the "Edit Limits" button, under "Launch and Activation
>> Permissions"
>> X. Click the OK button.
>> XI. Click on the Add Button, and add "Everyone" with "Local Launch" and
>> "Local Activation"
>> Results:
>> * We went to services and started the TCPIP NetBIOS helper service and
>> win32 time service
>> * We were able to RDP to the server.
>>
>> Edward E. Ziots
>> CISSP, Network +, Security +
>> Network Engineer
>> Lifespan Organization
>> Email:ezi...@lifespan.org
>> Cell:401-639-3505
>>
>>
>> -----Original Message-----
>> From: David McSpadden [mailto:dav...@imcu.com]
>> Sent: Thursday, July 22, 2010 10:59 AM
>> To: NT System Admin Issues
>> Subject: RE: Net Use requires password
>>
>> c:\>nltest /server:10.0.50.27 /sc_query:imcu_local
>> I_NetLogonControl failed: Status = 1722 0x6ba RPC_S_SERVER_UNAVAILABLE
>>
>> c:\>
>>
>> -----Original Message-----
>> From: Ziots, Edward [mailto:ezi...@lifespan.org]
>> Sent: Thursday, July 22, 2010 10:55 AM
>> To: NT System Admin Issues
>> Subject: RE: Net Use requires password
>>
>> Did you do the sc_query:DOMAINNAME with the nltest to verify the
>> channel.
>>
>> Also do you have the right to logon over the network to this system. (Or
>> has it been denied?)
>>
>> Z
>>
>> Edward E. Ziots
>> CISSP, Network +, Security +
>> Network Engineer
>> Lifespan Organization
>> Email:ezi...@lifespan.org
>> Cell:401-639-3505
>>
>>
>> -----Original Message-----
>> From: David McSpadden [mailto:dav...@imcu.com]
>> Sent: Thursday, July 22, 2010 10:27 AM
>> To: NT System Admin Issues
>> Subject: RE: Net Use requires password
>>
>> Nltest /server:10.0.50.27
>> Command completed successfully
>> Net use x: \\10.0.50.27\c$
>>
>> Enter user name for '10.0.50.27':
>>
>>
>> WTF?
>>
>>
>>
>> -----Original Message-----
>> From: Free, Bob [mailto:r...@pge.com]
>> Sent: Thursday, July 22, 2010 10:16 AM
>> To: NT System Admin Issues
>> Subject: RE: Net Use requires password
>>
>> Did you test the secure channel?
>>
>> Success should look something like this-
>>
>> C:\Admin\Util>nltest /sc_query:DOMAINname
>> Flags: 30 HAS_IP  HAS_TIMESERV
>> Trusted DC Name \\ABC08
>> Trusted DC Connection Status Status = 0 0x0 NERR_Success
>> The command completed successfully
>>
>> -----Original Message-----
>> From: David McSpadden [mailto:dav...@imcu.com]
>> Sent: Thursday, July 22, 2010 7:03 AM
>> To: NT System Admin Issues
>> Subject: RE: Net Use requires password
>>
>> Update Services.
>>
>> -----Original Message-----
>> From: Michael B. Smith [mailto:mich...@smithcons.com]
>> Sent: Thursday, July 22, 2010 10:02 AM
>> To: NT System Admin Issues
>> Subject: RE: Net Use requires password
>>
>> Well the 7034 errors are definitely not good. That means you have
>> services crashing. Which ones?
>>
>> The DCOM errors may, or may not, be relevant.
>>
>> Regards,
>>
>> Michael B. Smith
>> Consultant and Exchange MVP
>> http://TheEssentialExchange.com
>>
>>
>> -----Original Message-----
>> From: David McSpadden [mailto:dav...@imcu.com]
>> Sent: Thursday, July 22, 2010 9:13 AM
>> To: NT System Admin Issues
>> Subject: RE: Net Use requires password
>>
>> I have DCOM errors (10016) and Service Control Manager (7034) errors?
>>
>>
>> -----Original Message-----
>> From: Michael B. Smith [mailto:mich...@smithcons.com]
>> Sent: Thursday, July 22, 2010 9:01 AM
>> To: NT System Admin Issues
>> Subject: RE: Net Use requires password
>>
>> Sounds to me like the secure channel is busticated.
>>
>> You should find errors in your system event log if that is the case.
>>
>> Regards,
>>
>> Michael B. Smith
>> Consultant and Exchange MVP
>> http://TheEssentialExchange.com
>>
>>
>> -----Original Message-----
>> From: David McSpadden [mailto:dav...@imcu.com]
>> Sent: Thursday, July 22, 2010 8:39 AM
>> To: NT System Admin Issues
>> Subject: Net Use requires password
>>
>> I have a share that has everyone full on security and sharing but I have
>> a domain user that is requiring to put in a password during a login
>> script??
>> The share server was rebooted last night but I am confused.  Even me a
>> domain admin needs to key a password??
>>
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
>> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
>> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
>> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to