Thanks Jinx79,
We have done all that, and have now got our EPO fully working so AV updates should be up to date - we cleaned alot of machines using stinger, but now we have got EPO pushing stinger as well out to all the clients, so that side is fine, but unfortunately there are a few infected...
Yeah I wish I knew too - my mmc is also missing the dial-in tab, so each time I have to terminal service to a server and access the AD to check......strange nobody else has really not noticed it.
Well we too have a WGF2500, it constantly freezes and we must have powered it off and on at least 30\40 times in the last 3 months, when checking the logs we found that it was machines infected with MsBlaster, especially w32.nachi. But strangely it only takes one infected machine to bring down...
I've noticed that most of these w32swen emails are those pathetic "Microsoft Critical Update bull" - I have seen that all/most of those emails end in *msdn.com. So we have put this in the exceptions list of our firewall software. Dunno if you can try doing that under the Rules Wizard...
Another one to try is PowerQuest V2i - I've used it and it is brilliant. Save the system to an image file on another harddrive or partition and if you need to restore, boot from PowerQuest CD and it loads network protocols and a mini explorer and you browse back to the image file and restore...
To be honest I haven't tried it myself but I have seen this type of editing done via batchfiles before at my previous firm with a unix cmd called SED. Now the cmd line "sed" works for windows as well.
This could possibly help or do a search for sed on the internet ...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.