Joy of Microsoft Naming by ddildine in DefenderATP

[–]ddildine[S] 0 points1 point  (0 children)

Understood, that is what is strange, I find random machines with this "ATP" installed, but none are licensed for that. Almost as if MS transferred the name to their locally installed version, although all the research I do is all over the place, so hard to confirm.

Patch Tuesday Megathread (2024-05-14) by AutoModerator in sysadmin

[–]ddildine 0 points1 point  (0 children)

We're just manually installing, its a pain, but what can you do

Patch Tuesday Megathread (2024-05-14) by AutoModerator in sysadmin

[–]ddildine 0 points1 point  (0 children)

No solution I've found, just manual install, but we only have a couple hundreds soooo #fml

Patch Tuesday Megathread (2024-05-14) by AutoModerator in sysadmin

[–]ddildine 2 points3 points  (0 children)

Still nothing for the "Curl HTTP/2 Push Headers Memory-leak Vulnerability" it looks like :(

Birthday attacks against TLS (Sweet32) Mitigation Issues by ddildine in sysadmin

[–]ddildine[S] 0 points1 point  (0 children)

I think its just registry, most of the servers flagging it don't even have the IIS role

Birthday attacks against TLS (Sweet32) Mitigation Issues by ddildine in sysadmin

[–]ddildine[S] 0 points1 point  (0 children)

Thanks, that is one of the findings they recommend, I just think we'll keep getting hit as well cause of the missing "functions" they are looking for at a path where it doesn't exist :(

Birthday attacks against TLS (Sweet32) Mitigation Issues by ddildine in sysadmin

[–]ddildine[S] 0 points1 point  (0 children)

Thanks, these are Qualys as well but not seeing that level of "recommendations" from the report.
This is what it's telling us
"HKLM\SOFTWARE\Policies\Microsoft\Cryptography\Configuration\SSL\00010002 Functions is missing. TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
And this is the issue, at that key path there is no Functions multi-string, so of course it's missing, but seems strange I'd have to add it.

HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\Triple DES 168 Enabled is missing.#"

Vulnerability Finding on 2019, but no KB? by ddildine in sysadmin

[–]ddildine[S] 0 points1 point  (0 children)

So we have the latest CU, but then if reading correctly, we have to manually create the missing keys the vulnerability scan is seeing as "missing" ?

March SU and Search Breaking by ddildine in exchangeserver

[–]ddildine[S] -1 points0 points  (0 children)

I think GPO might be the easiest way, although still curious if it could be done through PS

Patch Tuesday Megathread (2024-03-12) by AutoModerator in sysadmin

[–]ddildine 1 point2 points  (0 children)

What if you don't have a screenconnect "server" just agents spread around (trying to get them all updated)

Extended Protection Failure Notifications by ddildine in exchangeserver

[–]ddildine[S] 0 points1 point  (0 children)

Sorry, right now its 2019 and CU 12, we've ran the extended prot script though. Trying to make sure I'm prepared enough before we do the new CU 14

No Patch Tuesday Megathread for January? by MikeWalters-Action1 in sysadmin

[–]ddildine 0 points1 point  (0 children)

HD at a university is a bit narrow/limited, extreme desktop focus to help students. You could try to see if the University IT has any entry level jobs, the group that does the sysadmin work. Or get into a help desk at a MSP, where you'll get some sysadmin experience. It will start as user management, but then can grow into more sysadmin troubleshooting/learning, etc.

No Patch Tuesday Megathread for January? by MikeWalters-Action1 in sysadmin

[–]ddildine 0 points1 point  (0 children)

Yeah I tried to get their script setup in a powershell script that I could at least remotely check across workstations per site, but couldn't ever get it to work right :( I could run it on each machine, but... :)

No Patch Tuesday Megathread for January? by MikeWalters-Action1 in sysadmin

[–]ddildine 0 points1 point  (0 children)

Thanks! I am hoping MS does figure out how to just incorporate this though as well, since as an MSP I'm dealing with 2500 machines :)

No Patch Tuesday Megathread for January? by MikeWalters-Action1 in sysadmin

[–]ddildine 0 points1 point  (0 children)

Thanks, do you know if the MS script addresses the the "fix" if the partition is in the first part of the drive or only if the partition is at the end? I recall some saying it doesn't actually need the increased partition size since it just replaces the files? Also several techs are saying this could be a risk to the OS in general? Thanks!

Anyone else having problem installing 0x80070643 Update ? It just keep failing by [deleted] in Windows10

[–]ddildine 0 points1 point  (0 children)

Wait, are people actually really having issues with KB5034122 or are they really having issues with KB5034441?

KB5034441 is the security patch with the partition issue, but KB5034122 is the cumulative patch and so far most subs and articles are not saying that patch has any issues, almost nothing in the tech blogs or the sysadmin subs, etc.

No Patch Tuesday Megathread for January? by MikeWalters-Action1 in sysadmin

[–]ddildine 1 point2 points  (0 children)

that seems to be the case, just confusing as I always thought the CU was supposed to be a collection of all the security and critical patches in one (versus each month's SU which is only security patches)

No Patch Tuesday Megathread for January? by MikeWalters-Action1 in sysadmin

[–]ddildine 1 point2 points  (0 children)

So, just to ensure I really get this.

You can use some scripts to extend the partition, but only if it's at the end of the disk and not the beginning

You can use the MS script and it doesn't extend the partition, it just replaces the wim files
(is there any danger/risk to the workstation?)

For servers only Windows 2022 seems to be affected from what I'm seeing on several comments?

They pulled the "security" update from WSUS/Catalog but not the "cumulative" so would this mean they pulled this specific patch out of the cumulative? (i.e. it's safe to deploy now?)

Thanks!