Althornin said:
You can't firewall every port, some are needed, and I know firsthand that a virusscanner doesnt help much against worms that are exploiting OS vulnerabilities.
Yes, and they come along en masse all day long, do they?
They work fine for me. You have to manage AD properly, you can handle all of the "problems" you listed (which would be problems on ANY os, so why are you singling out windows? Thats what I don't get...)
I'm not singling out Windows at all in this respect.
create another printer on the server, set up to print transparencies. Call it "same name+ TRANSPARENCIES". Most modern printers will beep and wait for manual tray load, so you are fine. users just choose which printer to print to.
Yes, that's what I do as well, only with a tray. Like with briefhead and mixed as well.
I'm telling you, your "problems" ARE ALL SOLVED.
Agreed. I did so before SUS ea even existed, by myself, so I know how it all can be done.
You just need better admins wherever you are.
Why? Everything works fine where I work, and I do it myself for customers. Which also works fine.
push out most software with a GPO.
Yes, that's the easy way out, just don't support it. It's too hard to do well, isn't it?
Then again, it isn't, when you know how. But that's with everything.
DiGuru said:
Really? Yes, the Windows patches are easy. But do they actually make things safer?
Althornin said:
How do you know? you never have breaches, as you said. You don't know all those patches actually help, only that you have no problems.
you say this, and then in a couple of sentences you are going to talk about "all flaws are not exploited" - so which is it? You can't use this as a counter argument and then counter it yourself later on. Choose.
I said it, so I could post the comment directly above.
Some ports must be open. Virus Scanners are a poor second line of defense, as I explain above.
Yes, you do have to make things safe initially. And look at them every once in a while, to see if they still keep up.
But than again, that's easy to say for me, as I'm actually a programmer. I know how those things all work intimately. Because I write programs that do the same things. I agree, that that is much harder for an administrator who doesn't.
DiGuru said:
Really, if you don't totally slack off with the security altogether on those boxes, they're really safe and sturdy.
Althorin said:
EXACTLY LIKE THE WINDOWS ONES
Exactly.
We don't have infection issues. I do my job.
I don't doubt it. But the question remains: what part of it is needed? Sure, the patches are easy, but how is the support for "other" software?
right, because thats all SP2 brought to the table. pffft.
Well, what wouldn't work if you didn't use it? where is the difference?
OMG, what have I been saying?
Are you deaf?
Alternative? Welcome to reality. Security (ESPECIALLY on Windows) is easier to do right now than its ever been. And WSUS and AD management make it light-years ahead of *nix.
Yes, if you limit yourself to that and see all patches as needed. As long as you see all of that as work you're required to do, or suffer the consequences. And *nix is, to me, much easier to manage. I
LIKE configuration files, and I dislike hunting down buttons. And I'll write a script or program rather than doing things by hand.
But why would you do it like that? Because Microsoft says so, and "anyone can clearly see that it's like that, because". Right. There is only the MCSE way? In such a complex framework? I can think of quite an amount of other ways to do it that all work at least as well. By myself.
And btw, that you want to patch applications doesn't mean they're security risks. They might just be buggy.