Security Basics mailing list archives

RE: AW: SUS Help


From: "Steven A. Fletcher" <sfletcher () bcsc com>
Date: Mon, 15 Sep 2003 20:53:58 -0500

Unfortunately, Shavlik has changed the capabilities of HFNetChkLT.  LT will now only patch up to 10 PC's, but still 
scans an unlimited number.  We just had a situation where a customer needed to patch a number of PC's and one my 
coworkers pointed out the licensing change.

Hope this helps.

Steven A. Fletcher, A+, MCP, MCSE (NT 4), Master ASE, CCNA, CCA
Senior Network Engineer
BCSC Technology Solutions
(309)664-8162
sfletcher () bcsc com

-----Original Message-----
From: Meidinger Chris [mailto:chris.meidinger () badenit de] 
Sent: Monday, September 15, 2003 11:53 AM
To: 'Spencer D'oro'; 'Markus Rossi'; security-basics () securityfocus com
Subject: AW: AW: SUS Help

Wow, i was under the impressino that HFNetCheck could only check, and not
patch.
I am about to leave work, but testing will commence tomorrow - this is a
current project of mine (one of about 50) to automate patch distribution.

Thanks for the tips, will report on the outcome,

Chris

-----Ursprüngliche Nachricht-----
Von: Spencer D'oro [mailto:sdoro () comcast net] 
Gesendet: Samstag, 13. September 2003 00:18
An: 'Markus Rossi'; security-basics () securityfocus com
Betreff: RE: AW: SUS Help


You can try HFNetCheckLT from Shavlik Technologies, or HFNetCheck Pro 4. I
like the Pro, it does scanning of domains,subnets, etc. and also does
deploymeny patching.  Both use hfnetchk, and they interface is GUI.  LT is
free with a 50 client license, pro will cost you.

Spencer

-----Original Message-----
From: Markus Rossi [mailto:news1 () familyrossi com] 
Sent: Thursday, September 11, 2003 12:13 PM
To: security-basics () securityfocus com
Subject: Re: AW: SUS Help


Meidinger Chris wrote:

Hi guys,

i'm dealing with exactly the same problem, and i can promise you there
is
*no* affordable option to automagically patch NT boxes without
scripting it
yourself. Which is what i will spend the next week doing.....
 

HFNetChk sounds good. Someone just recommended it to me so I haven't 
tried it. It sounds solid, though, and should work with NT4. 
http://hfnetchk.shavlik.com/

MR

Cheers,

Chris

-----Ursprüngliche Nachricht-----
Von: Roger A. Grimes [mailto:rogerg () cox net]
Gesendet: Donnerstag, 11. September 2003 03:40
An: Gooch, Linnie; security-basics () securityfocus com
Betreff: RE: SUS Help


It doesn't work in NT environments.  SUS must be installed on a W2K or
Server 2003 server, and the client must run the Automatic Updates 
service (which doesn't run on NT).

There are few options available when patching an NT environment.  Even
Win98 has more patch mgmt options.

Roger

***********************************************************************
****
*Roger A. Grimes, Computer Security Consultant
*CPA, MCSE (NT/2000), CNE (3/4), A+
*email: rogerg () cox net
*cell: 757-615-3355
*Author of Malicious Mobile Code:  Virus Protection for Windows by
O'Reilly
*http://www.oreilly.com/catalog/malmobcode/
*Author of Apress's upcoming Honeypots for Windows
***********************************************************************
****


-----Original Message-----
From: Gooch, Linnie [mailto:Linnie () wescom org]
Sent: Tuesday, September 09, 2003 8:28 PM
To: security-basics () securityfocus com
Subject: SUS Help


I've been reading everyone's input on SUS and I'm trying to evaluate it

at my company. I want to know if anyone has deployed it with an NT4
environment? We aren't moving to AD for another 3 months, but with the 
blaster worm and other such vulnerabilities, I want to get it up and 
running right away.

Here is what I'm looking for.

I'm reading the documentation for SUS, and it talks about setting the
registry on client machines, which is no problem, but the documentation

is so unclear about what exactly I need to add to the registry. I was
wondering if anyone knew exactly what registry keys needed to be added 
or changed so I could test it right away.

Thanks guys. This list rocks!


Linnie Gooch, MCSE
Manager of Systems and Technology
Wescom Credit Union
(888) 493 7266 x 8801



**********************************************************************
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they 
are addressed. If you have received this email in error, please delete 
it immediately and advise the sender. WESCOM CREDIT UNION (626) 
535-1000
**********************************************************************


-----------------------------------------------------------------------
----
Captus Networks
Are you prepared for the next Sobig & Blaster?
- Instantly Stop DoS/DDoS Attacks, Worms & Port Scans
- Precisely Define and Implement Network Security
- Automatically Control P2P, IM and Spam Traffic
FIND OUT NOW -  FREE Vulnerability Assessment Toolkit 
http://www.captusnetworks.com/ads/42.htm
-----------------------------------------------------------------------
-----


-----------------------------------------------------------------------
----
Captus Networks
Are you prepared for the next Sobig & Blaster? 
- Instantly Stop DoS/DDoS Attacks, Worms & Port Scans 
- Precisely Define and Implement Network Security 
- Automatically Control P2P, IM and Spam Traffic 
FIND OUT NOW -  FREE Vulnerability Assessment Toolkit 
http://www.captusnetworks.com/ads/42.htm
-----------------------------------------------------------------------
-----

-----------------------------------------------------------------------
----
Captus Networks
Are you prepared for the next Sobig & Blaster? 
- Instantly Stop DoS/DDoS Attacks, Worms & Port Scans 
- Precisely Define and Implement Network Security 
- Automatically Control P2P, IM and Spam Traffic 
FIND OUT NOW -  FREE Vulnerability Assessment Toolkit 
http://www.captusnetworks.com/ads/42.htm
-----------------------------------------------------------------------
-----
 





------------------------------------------------------------------------
---
Captus Networks 
Are you prepared for the next Sobig & Blaster? 
 - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans 
 - Precisely Define and Implement Network Security 
 - Automatically Control P2P, IM and Spam Traffic 
FIND OUT NOW -  FREE Vulnerability Assessment Toolkit 
http://www.captusnetworks.com/ads/42.htm
------------------------------------------------------------------------
----

---
Incoming mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.512 / Virus Database: 309 - Release Date: 8/19/2003
 

---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.512 / Virus Database: 309 - Release Date: 8/19/2003
 


---------------------------------------------------------------------------
Captus Networks 
Are you prepared for the next Sobig & Blaster? 
 - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans 
 - Precisely Define and Implement Network Security 
 - Automatically Control P2P, IM and Spam Traffic 
FIND OUT NOW -  FREE Vulnerability Assessment Toolkit 
http://www.captusnetworks.com/ads/42.htm
----------------------------------------------------------------------------

---------------------------------------------------------------------------
Captus Networks 
Are you prepared for the next Sobig & Blaster? 
 - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans 
 - Precisely Define and Implement Network Security 
 - Automatically Control P2P, IM and Spam Traffic 
FIND OUT NOW -  FREE Vulnerability Assessment Toolkit 
http://www.captusnetworks.com/ads/42.htm
----------------------------------------------------------------------------


---------------------------------------------------------------------------
Captus Networks
Are you prepared for the next Sobig & Blaster?
 - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans
 - Precisely Define and Implement Network Security
 - Automatically Control P2P, IM and Spam Traffic
FIND OUT NOW -  FREE Vulnerability Assessment Toolkit
http://www.captusnetworks.com/ads/42.htm
----------------------------------------------------------------------------


Current thread: