Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
CapMoron
Nov 20, 2000
Forum Veteran
What is everybody who isn't using SCCM/Forefront using for enterprise anti-virus?

We are currently using Symantec Endpoint Protection and surprise, it sucks.

I'd love to go with Forefront, but our network/server admin doesn't want the headache of setting up/supporting SCCM (I'm in charge of the desktop environment). It was like pulling teeth just to get him to let me build a MDT with WDS server (which I'm currently setting up now and loving).

I'd like something that is centrally managed, without being a resource hog on the clients.

Adbot
ADBOT LOVES YOU

GreenNight
Feb 19, 2006
Turning the light on the darkest places, you and I know we got to face this now. We got to face this now.

We're currently using Sophos and moving to Forefront due to it being included in our CAL. Sophos is pretty great, the central admin works very well, and the client footprint is small. Was very easy to push down the AV to all my clients when we first moved from McAfee 5 years ago.

Also Sophos AV let's you block and log apps which is a nice bonus feature.

skipdogg
Nov 29, 2004
Resident SRT-4 Expert

Sophos here as well. I think it's the best option out there for large enterprise AV software suites. I'm not sure how some of the smaller players like ESET or Vipre are in larger environments.

Trend or Kaspersky might be worth a look. Both of those are in the 'CIO approved' Gartner quadrant.

CapMoron
Nov 20, 2000
Forum Veteran
Sophos is sounding pretty good.

I should point out that we aren't a very large institution, just a small private school, with only about 250 or so Windows machines (and another 150 or so Macs).

incoherent
Apr 24, 2004

01010100011010000111001
00110100101101100011011
000110010101110010

CapMoron posted:

Sophos is sounding pretty good.

I should point out that we aren't a very large institution, just a small private school, with only about 250 or so Windows machines (and another 150 or so Macs).

If you need to sell it, it does handle administering mac quite well. Also, you do get to extend a home-license of the AV (Providing you set up your own relay server. But nobody does that, they just have everything call home to sophos).

quackquackquack posted:

Would AD+GP+WSUS be sufficient for the Windows PCs?

WSUS is perhaps the only software microsoft ever got right. For the task it has to tackle, it does it very well. Personally, I've never had luck pushing installs and updates via the core Group Policy that wasn't Microsoft own software. WSUS and GPO are deliberately "ok, but limited in scope" products. This is where SCCM steps in. If you want to keep an entire network up to date on adobe and java, this is what you'll want.

incoherent fucked around with this message at 06:07 on May 21, 2013

GreenNight
Feb 19, 2006
Turning the light on the darkest places, you and I know we got to face this now. We got to face this now.

CapMoron posted:

Sophos is sounding pretty good.

I should point out that we aren't a very large institution, just a small private school, with only about 250 or so Windows machines (and another 150 or so Macs).

We only have about 250 users as well, all Windows machines. Sophos worked quite well. We also use their email and web appliances. While spendy, they are pretty awesome too.

Mierdaan
Sep 14, 2004

Pillbug
I can't find it anymore, but I thought I read that SCCM 2012 for small environments doesn't require full-blown SQL. Am I crazy, or can you run a standalone site for ~250 clients off of express somehow?

GreenNight
Feb 19, 2006
Turning the light on the darkest places, you and I know we got to face this now. We got to face this now.

SQL Standard or Enterprise is required for the primary site. Secondary sites can use SQL Express.

Mierdaan
Sep 14, 2004

Pillbug

GreenNight posted:

SQL Standard or Enterprise is required for the primary site. Secondary sites can use SQL Express.

I'm crazy; got it.

edit: now I remember, SCCM 2012 client MLs give you rights to run SQL 2012 Standard for SCCM only. I knew there was some reason I didn't need to pay for SQL, I just forgot what that reason was.

Nebulis01
Dec 30, 2003
Technical Support Ninny

Mierdaan posted:

I can't find it anymore, but I thought I read that SCCM 2012 for small environments doesn't require full-blown SQL. Am I crazy, or can you run a standalone site for ~250 clients off of express somehow?

If you own the license to install SCCM it should come with the rights for whatever SQL you need as long as you just use that SQL installation for SCCM

e;fb

Docjowles
Apr 9, 2009

incoherent posted:

If you want to keep an entire network up to date on adobe and java, this is what you'll want.

Yeah. Technically you can patch Adobe and Java with just group policy but it is a pain in the rear end, very fragile and will basically become your full-time job with how often those two get updated.

quackquackquack
Nov 10, 2002
I would rather patch Adobe and Java with Group Policy instead of SCCM.

I would rather Java especially install at startup, when no programs are open. Otherwise I have to set logic in SCCM to warn people to close their browsers, kill them if they don't, and cross my fingers that no other program is using Java.

Which isn't to say Java/Adobe play nice no matter how you deploy them, but I don't think it's worse with GP than SCCM.

Yaos
Feb 22, 2003

She is a cat of significant gravy.
I have tried to deploy VNC in group policy but have no luck. It works fine on my test machine with or without a previous version but not a single computer got the install. :argh:

You could always buy 3rd party software that hooks into WSUS and get updates that way.

Yaos fucked around with this message at 18:48 on May 21, 2013

nexxai
Jul 17, 2002

quack quack bjork
Fun Shoe

Yaos posted:

I have tried to deploy VNC in group policy but have no luck.
I know that LogMeIn != VNC, but with LogMeIn Central, you can create deployable MSI packages. I create groups based on physical (city) locations and make it the first item that gets installed during new system setup as well as upgrades at boot-time so it's always up to date.

Cpt.Wacky
Apr 17, 2005

Docjowles posted:

Yeah. Technically you can patch Adobe and Java with just group policy but it is a pain in the rear end, very fragile and will basically become your full-time job with how often those two get updated.

If anyone really doesn't want to use or pay for SCCM and doesn't mind an unsupported open source solution... I've been using WPKG for a few years now to handle my software deployment and patching. First on XP with regular WPKG and now on 7 with WPKG-GP.

Sacred Cow
Aug 13, 2007

quackquackquack posted:

I would rather patch Adobe and Java with Group Policy instead of SCCM.

I would rather Java especially install at startup, when no programs are open. Otherwise I have to set logic in SCCM to warn people to close their browsers, kill them if they don't, and cross my fingers that no other program is using Java.

Which isn't to say Java/Adobe play nice no matter how you deploy them, but I don't think it's worse with GP than SCCM.

Adobe updates are pretty easy on SCCM with System Center Update Publisher. Just subscribe to the Adobe update feeds and publish to SCCM. Java on the other hand is still a huge pain in the rear end. Trying to get 32-bit v7 Java to deploy on a x64 OS was a nightmare.

quackquackquack
Nov 10, 2002
Is anyone using USMT to migrate from Office 2007 (or 2010) to Office 2013?

I'm using USMT5, but looking at the MigApp.xml, Office 2013 is not mentioned. And nobody else on the internet seems to be talking about it.

GreenNight
Feb 19, 2006
Turning the light on the darkest places, you and I know we got to face this now. We got to face this now.

Sacred Cow posted:

Adobe updates are pretty easy on SCCM with System Center Update Publisher. Just subscribe to the Adobe update feeds and publish to SCCM. Java on the other hand is still a huge pain in the rear end. Trying to get 32-bit v7 Java to deploy on a x64 OS was a nightmare.

Have you ever configured the System Center Update Published on a Windows 2012 server? I have WSUS and SCUP on the same box but SCUP won't connect to WSUS.

peak debt
Mar 11, 2001
b& :(
Nap Ghost

Sacred Cow posted:

Adobe updates are pretty easy on SCCM with System Center Update Publisher. Just subscribe to the Adobe update feeds and publish to SCCM. Java on the other hand is still a huge pain in the rear end. Trying to get 32-bit v7 Java to deploy on a x64 OS was a nightmare.

Nightmare as in "extract the MSI then install that"?

Spermy Smurf
Jul 2, 2004
I've got a Kyocera 4300DN printer that I'm going to throw out the window.

What are you guys using for printers? This one is 60PPM, so I'm looking for something in the similar speed range.

I've got to have 4 paper drawers, plus the MP tray. Duplex, black and white only...

I know I can go read reviews online, but I have no idea if those amazon reviews are from the manufacturer's employees or not.

skipdogg
Nov 29, 2004
Resident SRT-4 Expert

Spermy Smurf posted:

I've got a Kyocera 4300DN printer that I'm going to throw out the window.

What are you guys using for printers? This one is 60PPM, so I'm looking for something in the similar speed range.

I've got to have 4 paper drawers, plus the MP tray. Duplex, black and white only...

I know I can go read reviews online, but I have no idea if those amazon reviews are from the manufacturer's employees or not.

That's a pretty fast printer. I've had no issues with Ricoh or Toshiba printers. An HP at that level won't be complete trash either. Won't be cheap either though.

Sacred Cow
Aug 13, 2007

GreenNight posted:

Have you ever configured the System Center Update Published on a Windows 2012 server? I have WSUS and SCUP on the same box but SCUP won't connect to WSUS.

I haven't done it on a 2012 box (running on 2008R2) but you have to install a self-signed certificate for SCUP to work with WSUS/SCCM. When going through the setup options on SCUP you have to "Enable publishing to an update server". On that same option screen there is a "Signing Certificate" section. You have the option to create one that you deploy to your environment either through a CA or GPO under the computers "Trusted Publishers".




peak debt posted:

Nightmare as in "extract the MSI then install that"?

It took me some time to figure out how to get that to work properly in silent mode with SCCM self-service. It was confusing for me (before I actually tried looking up the issue) since Java v6 deployed as an .exe without any issues....mostly.

GreenNight
Feb 19, 2006
Turning the light on the darkest places, you and I know we got to face this now. We got to face this now.

Sacred Cow posted:

I haven't done it on a 2012 box (running on 2008R2) but you have to install a self-signed certificate for SCUP to work with WSUS/SCCM. When going through the setup options on SCUP you have to "Enable publishing to an update server". On that same option screen there is a "Signing Certificate" section. You have the option to create one that you deploy to your environment either through a CA or GPO under the computers "Trusted Publishers".



Yeah, I got it working. I didn't realize that I'd have to integrate WSUS with SCCM to be able to use SCUP. Currently WSUS runs on it's own.

potato of destiny
Aug 21, 2005

Yeah, welcome to the club, pal.

GreenNight posted:

Yeah, I got it working. I didn't realize that I'd have to integrate WSUS with SCCM to be able to use SCUP. Currently WSUS runs on it's own.

When you're doing updates via SCCM, my understanding is you need a WSUS instance sitting somewhere so it can sync updates from Microsoft.

I'm looking into migrating over to SCCM for update deployments due to the limitations of WSUS starting to get really annoying.

GreenNight
Feb 19, 2006
Turning the light on the darkest places, you and I know we got to face this now. We got to face this now.

We're not doing updates via SCCM at all, that's part of it. It seemed more of administrative headache. I would love to do 3rd party updates via SCCM and zero MS updates.

equation groupie
Feb 7, 2004

debased and dread pilled
This is only sort of a Windows question, so I apologize if it doesn't really fit here, but I hope it's relevant enough to be of interest.

I work for a small company with about 25 desktops. I'm looking for a full-disk encryption solution for us.

Bitlocker looks pretty great, but if your computers don't have a TPM (most of ours don't), users have to remember their Bitlocker PIN in addition to their password - something I'd like to avoid if I can. Is there a way to buy TPM-enabled desktops at our scale? I'm happy to spend a bit more and go through a real vendor, but I honestly don't know if they'd even return my emails if I just want to buy one or two systems at a time (something we do here fairly regularly).

McGlockenshire
Dec 16, 2005

GOLLOCKS!

vlack posted:

Is there a way to buy TPM-enabled desktops at our scale? I'm happy to spend a bit more and go through a real vendor, but I honestly don't know if they'd even return my emails if I just want to buy one or two systems at a time (something we do here fairly regularly).

I work for an integrator / VAR. While we normally do servers, we have been known to build workstations for certain customers. We generally don't like selling workstations because workstations tend to get less expensive consumer-grade hardware, which is more prone to failure and has worse warranties, which translates into being a higher cost for us long-term.

Our current generation of internal workstations (the ones we use ourselves) is based on the Intel DQ77MK, which includes a TPM. They're pretty nifty. UEFI based, everything and the kitchen sink, legacy-free. They're also part of Intel's long-term production plans, so we can probably get them well into Haswell's lifetime.

Alternatively, very frankly, you can get the same hardware off of Newegg if you want to make the trade-off of lower initial price for more spotty warranty coverage and having to deal with individual RMA departments yourself. We currently build ours in the In-Win EM013, but have used the Z583T and Z589T in the past. They're cheap and amazing, never had a power supply fail on one in over eight years of use. We also currently use the quad-core i5 3470S, which is totally overkill for most tasks, but as we use the same build for everyone, and some people need VT-d, etc, hey, why not?

Drop me an email at my username at pleh.net and I'll point you at our sales folks.

McGlockenshire fucked around with this message at 22:35 on Jun 14, 2013

equation groupie
Feb 7, 2004

debased and dread pilled

McGlockenshire posted:

Drop me an email at my username at pleh.net and I'll point you at our sales folks.

Cool, email sent. Thanks for the info.

Bob Morales
Aug 18, 2006


Just wear the fucking mask, Bob

I don't care how many people I probably infected with COVID-19 while refusing to wear a mask, my comfort is far more important than the health and safety of everyone around me!

What are you doing for workstation backups on the LAN? Environment doesn't trust the users at all to use the network drives so they insist on backing up workstations. Using the previous version of Retrospect right now, but the vendor says we're one of their biggest users at ~ 80 server+workstations and I find that hard to believe. Very unreliable so they're currently okay with having basically a weekly backup. Backups should be done every day so I'd like to change that.

GreenNight
Feb 19, 2006
Turning the light on the darkest places, you and I know we got to face this now. We got to face this now.

Who the gently caress backs up workstations? Sounds like a terrible idea beyond automating the usual folders to their home directory on the network and backing that up.

Bob Morales
Aug 18, 2006


Just wear the fucking mask, Bob

I don't care how many people I probably infected with COVID-19 while refusing to wear a mask, my comfort is far more important than the health and safety of everyone around me!

GreenNight posted:

Who the gently caress backs up workstations? Sounds like a terrible idea beyond automating the usual folders to their home directory on the network and backing that up.

I think that's part of the problem - some people have enough trouble just backing up a handful of servers which they control.

Thanks Ants
May 21, 2004

#essereFerrari


I'm not sure I'd backup workstations on the LAN, if the policy says save your important poo poo here and people don't then there's not a lot you can do about that - you can't go around making everything IT's problem to solve.

For laptops however, gently caress roaming profiles/folder redirection so hard. I've been bitten so many times with it just not working. CrashPlan Enterprise back to your own servers. Hopefully Windows 8.1 with Work Folders should solve this one at last, but I can't be so sure the rest of the OS will be usable in any way.

GreenNight
Feb 19, 2006
Turning the light on the darkest places, you and I know we got to face this now. We got to face this now.

We use Syncplicity which is expensive as poo poo but simple for our mobile users. It's basically corporate Dropbox. The rest? We aren't responsible for what you save to your C drive. We make people sign a piece of paper saying so. Gotta have upper management buy in for that though which can be difficult.

Exclusive
Jan 1, 2008

GreenNight posted:

We aren't responsible for what you save to your C drive. We make people sign a piece of paper saying so. Gotta have upper management buy in for that though which can be difficult.

Seriously this. Backing up workstations is not scalable/sustainable. It's expensive and users will constantly gently caress up the PCs and break your backup agent. It should be policy that important stuff is saved to NAS (which you backup) or tough cookies.

Hypnobeard
Sep 15, 2004

Obey the Beard



We're having some issues getting our logon scripts to work without a ugly hack.

We have a 2008 domain with Win7 Pro clients; for some reason the guy that was running things decided not to use group policy to map drives. (I am working to change this but it takes a while to get things through the system.)

Our network is security with AnyConnect/NAC & ISE. Initially the workstations are on one VLAN; after the user logs in there is a delay (typically 30s but ranging up to 2.5m) while authentication with ISE occurs before the workstation transitions to its "real" VLAN for work. The initial VLAN doesn't have access to any servers except the DCs and some connections for AV and monitoring.

The logon script doesn't really work without a big fixed delay (3m currently) due to the lengthy auth period for ISE, as when it normally run the workstation can't actually see any of the servers it's trying to map shares on. The initial "fake" VLAN seems real to the workstation, so waiting for network doesn't work.

My initial efforts were to try to minimize the fixed delay by checking periodically to see if the real network was available and then map drives, but for some reason my powershell script (launched via batch file or vbs, didn't seem to matter) didn't execute. (Ran fine when launched directly, just not during logon).

So, is there any way to delay execution of logon scripts? If not, am I on the right track with the launch script->wait until real network available->map drives? What could be preventing execution of the second script when called by the first?

Thanks.

incoherent
Apr 24, 2004

01010100011010000111001
00110100101101100011011
000110010101110010
That sounds ugly as gently caress. Are your PS scripts are being kicked off via GPO? Microsoft really, really wants PS scripts to be ran in a specific way at login especially if you're not signing and set to execute-all.



Too bad you're not running R2 and using DFS-R for netvol and sysvol, you could speed it all up by enabling client fallback to local sysvol and netvol.

incoherent fucked around with this message at 09:29 on Jun 20, 2013

Hypnobeard
Sep 15, 2004

Obey the Beard



incoherent posted:

That sounds ugly as gently caress. Are your PS scripts are being kicked off via GPO? Microsoft really, really wants PS scripts to be ran in a specific way at login especially if you're not signing and set to execute-all.



Too bad you're not running R2 and using DFS-R for netvol and sysvol, you could speed it all up by enabling client fallback to local sysvol and netvol.

No, they're not currently being kicked off by GPO. That's on the way, but it's not here yet (there's a lot of process and meetings to go through to get a GPO change put in place).

Checking, we are actually at 2008 R2 functional level, but I'm not seeing how client fallback helps me. The same domain controllers are used to authenticate no matter what network the clients are on, so they're not failing to other DCs.

CanOfMDAmp
Nov 15, 2006

Now remember kids, no running, no diving, and no salt on my margaritas.
I'm working on building something of a VDI using Hyper-V (Yeah, I know it might not be ideal but just roll with it) and I can't figure out how licensing will work.

I'll be building a Windows Server 2012 based back-end, with a few machines handling domain and file server capabilities, then with 5+ Hyper-V Server 2012 hosts connected to those two. If the Hyper-V hosts are running the operating systems that each user will be connecting to, would I need a User CAL for each person connecting to those systems, or can I operate under the impression that it's the guest OS they're using, which won't be directly or indirectly connected to the server back-end?

EDIT: I suppose they would "be connected" as they're running on the Hyper-V Hosts, but they'll be operating independently of the domain and network entirely, connecting to a separate network setup for remote access. The current setup is those same OSes running on physical hardware, this is just a transition to a more manageable virtualized setup.

CanOfMDAmp fucked around with this message at 20:00 on Jun 20, 2013

peak debt
Mar 11, 2001
b& :(
Nap Ghost
Ever since Vista came out you should have been using GPPs for network drives
http://blogs.technet.com/b/askds/archive/2009/01/07/using-group-policy-preferences-to-map-drives-based-on-group-membership.aspx

Adbot
ADBOT LOVES YOU

GreenNight
Feb 19, 2006
Turning the light on the darkest places, you and I know we got to face this now. We got to face this now.


Yeah I love this. Mapping drives based on security groups is awesome.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply