lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <70F744458EBEA7468722EAA419D3B3B30CBF13@mail.allstateticketing.com>
From: GKPeek at AllstateTicketing.com (George Peek)
Subject: Automating patch deployment

HFNetChk Pro, nothing but problems, fails to schedule updates to 75% of
systems after pushing them to the workstation (account has appropriate
domain admin prv, test deploy worked, scheduler service running).
Application often unstable, seems no way to find out what the error messages
are for failed deployments.

Final Review
Two Thumbs Down, until the problem is resolved.

-----Original Message-----
From: Dave Gonsalves [mailto:dgonsalves@...leinvsys.com]
Sent: Wednesday, August 06, 2003 9:26 AM
To: 'Andy Cuff [talisker]'; George Peek
Subject: RE: [Full-Disclosure] Automating patch deployment


I am actually in the process of a 30-day test of Security Expressions and it
is pretty slick, but the price tag is pretty high. If you are just going to
use it for patch deployment it might not be worth it. I have tested
HFNetChkPro 4 and had success with it. We currently use SMS for all our
patch deployment, but problems with the agent failing has made me look
elsewhere. also take a look at www.patchlink.com. 

-----Original Message-----
From: Andy Cuff [talisker] [mailto:offthecuff@...eone.net]
Sent: Tuesday, August 05, 2003 6:17 PM
To: George Peek; full-disclosure@...ts.netsys.com;
security-basics@...urityfocus.com
Cc: George Peek
Subject: Re: [Full-Disclosure] Automating patch deployment


Hi George
Not sure about free, but SecurityExpressions from Pedestal and LANGuard from
GFI software are both cost effective fix deployment solutions, as always if
you discover more please let me know and I'll update my host scanning pages
accordingly.  I've never included a field on the site for this before but
feel it's a good cause as most of us are looking for such tools to ease the
Windows experience.
Whilst I'm on this soapbox IMHO MS have actually improved their
vulnerability rectification process, though some may say it's about bl**dy
time and if the code was secure in the first place would it be necessary
;o)

take care
-andy
Taliskers Network Security Tools
http://www.networkintrusion.co.uk
----- Original Message ----- 
From: "George Peek" <GKPeek@...stateTicketing.com>
To: <full-disclosure@...ts.netsys.com>; <security-basics@...urityfocus.com>
Cc: "George Peek" <GKPeek@...stateTicketing.com>
Sent: Tuesday, August 05, 2003 9:36 PM
Subject: [Full-Disclosure] Automating patch deployment


> We have two networks, one AD and one NT4.0. We can not use AD to deploy
MSI
> patch packages to workstations that are not part of the AD (Active
> Directory), but are part of the NT domain. Not really interested in
> purchasing SMS as it seems too costly (why should we?). Considering
> HFNetChkPro 4 to automate the deployment of patches to our workstations
and
> servers, as doing it manually is far too costly and time consuming for the
> company. Are there any other utilities or software that anyone (possibly
> free?) recommends that could be used to simplify patch deployment and
> management to every workstation and server. We use Windows NT, 2000 and XP
> workstation products, and NT4.0/2000/2000 Adv server products.
>
> Thank You,
>
> George K. Peek
> Network Specialist
> Allstate Ticketing
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html


---------------------------------------------------------------------------
----------------------------------------------------------------------------

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ