This slide deck presentation on best practices for architecting and implementing Windows Server Update Services (WSUS) was used at a technology conference. The document provides an overview and outline of the presentation topics, which include WSUS architecture designs, implementation, troubleshooting tips, and a demonstration. Contact information is provided for the presenting company for additional information.
Puppet Enterprise allows you to more effectively integrate OS patch management into a unified platform management approach. It ties together proven Microsoft technologies like WSUS and DSC to define OS update policies, manage patches as part of overall system configuration, and continuously enforce patching policies. The demo shows managing the WSUS client, packages with Chocolatey, and configuration with PowerShell using Puppet's unified approach.
Linux is an open-source operating system modeled after UNIX. It was created in 1991 by Linus Torvalds, a Finnish computer science student. Linux can run on various devices from computers and servers to smartphones. It provides users with free software and high levels of security, customization, and stability compared to other operating systems. Linux distributions have gained popularity for uses like learning computer programming, reviving old devices, home servers, and web hosting. While Linux has many advantages, some Windows programs are incompatible and there is a learning curve for new users.
Virtualization allows multiple operating systems to run on a single physical system by sharing hardware resources. It provides isolation between virtual machines using a virtual machine monitor. Virtualization provides benefits like server consolidation, running legacy applications, sandboxing, and business continuity. However, it also presents risks if not properly secured, such as increased attack channels, insecure communications between virtual machines, and virtual machine sprawl consuming excess resources. Security measures are needed at the hypervisor, host, virtual machine, and network layers to harden the virtualization environment against threats.
J'ai mis en place un serveur de messagerie, HmailServer avec pour client Microsoft Outlook, les envois de mails entre mes clients de messagerie sont effectifs
Cet ouvrage vient compléter et détailler le premier livre blanc Cloud Computing édité par Syntec Numérique en avril 2010.
Avec l’apparition dans les années 1980 de la virtualisation, de l’infogérance et de l’externalisation ; avec la démocratisation de l’informatique dans les années 90 ; et - au cours de la dernière décennie - avec la généralisation d’Internet, le développement des réseaux à haut débit, la location d’application, le paiement à l’usage et la quête sociétale de mobilité… on peut expliquer à rebours l’avènement du Cloud Computing (CC).
Le Livre Blanc « Cloud Computing » se veut avant tout didactique et pragmatique. Il a pour but d’apporter un premier éclairage sur un sujet passionnant et en plein devenir !
This document provides an overview of setting up a mail server on Linux. It discusses what Linux is and its features. It then describes the key components needed for a mail server, including Bind for DNS, Httpd for a web server, Dovecot for protocols, Postfix for accepting connections, and Squirrelmail for accessing the IMAP server. Instructions are provided on installing and configuring the necessary software packages to establish a functional mail server on a Linux system.
Building an Interactive Query Service in Kafka Streams With Bill Bejeck | Cur...HostedbyConfluent
This document discusses building interactive queries in Kafka Streams. It provides background on Kafka Streams and state management. It then covers the requirements and steps to build a query service, including implementing it with Spring Boot. It describes executing queries by finding the correct host and querying locally or remotely. Finally, it discusses options for query types and results and displaying results in an index page.
A penetration test involves four main phases: reconnaissance, scanning, exploitation, and maintaining access. In the reconnaissance phase, tools are used to gather information about the target system without authorization. Scanning identifies open ports and vulnerabilities. Exploitation attempts to gain unauthorized control of systems by exploiting vulnerabilities, such as using password crackers. Maintaining access involves creating backdoors for future unauthorized access, such as using network sniffing tools or installing rootkits. Popular tools used in penetration tests include Nmap for scanning, Metasploit for exploitation, and Netcat for creating backdoors. Defending against penetration tests requires monitoring information published online, properly configuring firewalls and access controls, patching systems, and using antivirus and intrusion detection software
Le Cloud computing est la prestation de services informatiques sur Internet. Ses services
permettent à des individus et des entreprises d'utiliser les logiciels et les matériels qui sont
gérées par les tiers sur les sites distants. Les services proposés par le Cloud comprennent le
stockage de fichiers en ligne, sites de réseaux sociaux, webmail, et les applications en ligne.
Le modèle de Cloud computing permet d'accéder à des ressources d'information et de
l'informatique depuis n'importe quel endroit, où une connexion réseau est disponible. Les
avantages du Cloud computing comprennent l'économie de coûts, la haute disponibilité et
l'évolutivité facile.
This document outlines an agenda for a workshop on Red Hat Enterprise Linux 8. The workshop will cover an overview of RHEL 8, managing software from application streams, the future of infrastructure including container deployment with Podman, and other RHEL 8 features. It will run from 9:00-14:00 and include presentations and demos from two Red Hat solutions architects.
A presentation from internal meeting on Message Broker System and RabbitMQ. RabbitMQ is open source message broker software that implements the Advanced Message Queuing Protocol (AMQP).
Here I covered the cores of Apache and also discuss each and every core. Virtual host, resistance server process some protocols like HTTP, SMTP, DNS FTP, are also be highlighted.
Focus on some installing part of apache.
Mise en place d'une Plateforme de Supervision et de Détection d'Intrusion Sys...Alaaeddine Tlich
Rapport de Projet de Fin d'Etudes.
Pour l’obtention du diplôme de Licence appliquée en Réseaux de l’Informatique Spécialité : Technologies de l’Informatique et de Télécommunication
Intitulé : Mise en place d'une Plateforme de Supervision et de Détection d'Intrusion Système et Réseau
Réalisé par : Alaadine Tlich & Nabil Kherfani
Au sein de : Hexabyte
Presentation Zabbix en Français du 6 Juin 2013Alain Ganuchaud
Vue d'ensemble des fonctionnalités Zabbix, plus particulièrement la version 2.0, présentée en Français par Alain Ganuchaud (CORE IT PROJECT) pour l'éditeur Zabbix SIA.
The document discusses new features in Windows Server 2019 including Windows Admin Center, System Insight, Storage Migration Service, Storage Spaces Direct, and Storage Replica. It explains that Windows Admin Center is a browser-based tool for managing Windows servers and clients. Storage Migration Service allows migrating servers and data to new hardware or virtual machines. Storage Spaces Direct pools storage across servers for hyperconverged or converged deployments with options for mirroring or parity resiliency. Storage Replica enables replication of volumes for disaster recovery between servers or clusters.
Windows Server 2022 is now in preview, the next release in our Long-Term Servicing Channel (LTSC), which will be generally available later this calendar year. It builds on Windows Server 2019, our fastest adopted Windows Server ever. This release includes advanced multi-layer security, hybrid capabilities with Azure, and a flexible platform to modernize applications with containers.
Linux is an open-source operating system that originated as a personal project by Linus Torvalds in 1991. It can run on a variety of devices from servers and desktop computers to smartphones. Some key advantages of Linux include low cost, high performance, strong security, and versatility in being able to run on many system types. Popular Linux distributions include Red Hat Enterprise Linux, Debian, Ubuntu, and Mint. The document provides an overview of the history and development of Linux as well as common myths and facts about the operating system.
This document provides an overview of sample scripts for Windows Server Update Services (WSUS). It describes scripts that can remotely install the WSUS client, enumerate installed and missing patches on multiple computers, perform on-demand patching of multiple machines, and match security updates to their corresponding Microsoft advisory numbers. The scripts are offered without warranty and are intended to demonstrate what can be automated through scripting WSUS functionality.
For more information on Patch Manager, visit: http://www.solarwinds.com/patch-manager.aspx
Learn how WSUS Reporting can be made easier by looking at the Updates Report, Computers Reports, Synchronization Report and Custom Reporting.
Este documento describe cómo instalar y configurar el software de monitoreo Pandora FMS para monitorear dos servidores con sistemas operativos diferentes (Red Hat Enterprise Linux 6.2 y Windows Server 2008 R2). Explica los pasos para instalar Pandora FMS en una máquina virtual, instalar los agentes en los servidores, y configurar el monitoreo de servicios específicos como DNS, DHCP y FTP. Demuestra cómo Pandora FMS puede detectar cuando estos servicios se detienen o reinician en cada servidor.
The document discusses the history and current state of virtualization technology. It covers major developments from the 1960s to present day, including the introduction of virtualization concepts, early vendors like VMware, the growth of open source solutions, and the emergence of cloud computing. The document also examines current adoption rates and trends, noting that virtualization is becoming standard across enterprise data centers but challenges remain for desktop virtualization and cloud adoption.
Locking down server and workstation operating systemsBen Rothke
The document discusses approaches to securing systems when rapid patching is not possible. It recommends implementing network segmentation, monitoring technologies, and user access controls to shield vulnerable systems that cannot be patched quickly. While patching is important, it is not a panacea, and targeted attacks use other vectors beyond exploiting unpatched vulnerabilities. A proactive application security program integrated into the development lifecycle can help mitigate issues before exploits are found. When patching is truly not possible, additional defenses like host-based IPS, firewalls, and encryption should be used to minimize risk.
Beyond Windows Patching: Dealing with the New Imperative to Patch Adobe, Appl...Lumension
In today’s complex IT environment, you must be able to rapidly patch not only servers and operating systems, but also PC’s and third party applications. Join Randy Franklin Smith from Ultimate Windows Security in this live webcast as he discusses going “beyond Windows patching” to other operating systems like Linux, UNIX and Apple, as well as the applications that run on them.
Download the presentation to:
*Learn the security gaps that exist by relying upon multiple, platform-specific patch management utilities.
*See a product demonstration that shows how you can centralize and streamline patch management across your entire organization.
For more information on Patch Manager, visit: http://www.solarwinds.com/patch-manager.aspx
This two-part presentation will cover how to do WSUS Deployment on Windows Server 2008.
Part 1 – General considerations:
• Documentation review
• General considerations for deployment
• Local database vs Remote database
• Installation prerequisites
Part 2 – Installation:
• Installation on connected server
• Installation on disconnected server
• Migrating existing WSUS server
• Upgrade existing WSUS server
Common WSUS Errors Codes - Decoded and Resolved SolarWinds
For more information on Patch Manager, visit: http://www.solarwinds.com/patch-manager.aspx
This presentation decodes common WSUS error codes as well as how to resolve them!
Part 1
• HTTP errors
Part 2
• Configuration errors
• Security errors
• Other errors
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?SolarWinds
Looking to complement your SCCM Patch Management Solution to improve 3rd party application patching? Learn how SolarWinds Patch Manager might be the right choice for you.
This document discusses incident response procedures before and after a hacking incident. It defines key terms like incident, incident response, and outlines the main steps of incident response including preparation, detection and analysis, containment, eradication, recovery and post-incident activities. Specific topics covered include what to look for to detect incidents, centralizing logs, forensic investigation, and lessons learned.
Este documento proporciona información sobre el símbolo del sistema en Windows, incluyendo su definición como el intérprete de comandos equivalente a command.com en sistemas anteriores, una lista de comandos comunes del símbolo del sistema, cómo se pueden crear y ejecutar scripts .bat y .cmd, y cómo se puede acceder a través de Telnet desde el símbolo del sistema.
Este documento proporciona instrucciones para configurar una instalación de Windows Server 2012 R2, incluyendo la instalación de controladores, software de seguridad, configuración de red, actualizaciones automáticas, zona horaria, nombre del equipo, acceso remoto, cambio de nombre de adaptadores de red y configuración de valores IP desde CMD y PowerShell.
O documento discute conceitos básicos de comunicação e redes, incluindo arquitetura de redes, modelos de comunicação, tipos de redes locais e referências bibliográficas.
DEJEN COMENTARIOS
La primera versión de WSUS se conoce como Software Update Services ( SUS) . [ 2 ] En un primer momento , sólo entregó revisiones y actualizaciones para los sistemas operativos de Microsoft . SUS corrió en un
sistema operativo Windows Server y descargar actualizaciones para las versiones especificadas de Windows desde el sitio de Windows Update a distancia que fue operado por Microsoft .
Servers are critical to your IT infrastructure. Attend this session to learn how best to make sure they are running smoothly with the K1000: http://dell.to/1GDYpr8
Manual de Instalacion y Configuracion de WSUSK-milo Rivera
El documento describe los pasos para configurar un servidor de actualizaciones WSUS, incluyendo: 1) instalar el rol de servidor de actualizaciones en Windows Server 2008 R2; 2) configurar el servidor para descargar actualizaciones de Microsoft Update; y 3) seleccionar los idiomas, productos y tipos de actualizaciones a descargar.
Certificate - Windows Server 2012 R2 Storage Jump Start New ChoicesAsef Liria
Este certificado confirma que Asef Liria completó con éxito el curso "Windows Server 2012 R2 Storage Jump Start: New Choices" de manera online el 31 de diciembre de 2014 a través de Microsoft Virtual Academy.
Common WSUS Issues in Deployment Operations and DiagnosticsSolarWinds
For more information on Patch Manager, visit: http://www.solarwinds.com/patch-manager.aspx
Tips & Solutions for Common WSUS Issues
Deployment
• Documentation
• Database Engine
• Target Group Management
Operations
• Superseded updates
• Server Cleanup Wizard
Diagnostics
• Content Downloading
• Duplicate SusClientID
• High CPU Utilization
• Client Diagnostics Tool
• WindowsUpdate.log
The document discusses VMware's strategy and solutions for virtualization. It highlights virtualization as the top strategic technology for 2009 according to Gartner. It outlines VMware's virtualization solutions like server consolidation, virtual desktop infrastructure, and disaster recovery. It also discusses VMware's strategy to evolve its virtualization platform into a "Virtual Datacenter Operating System" to provide services and automation across the entire datacenter.
Tech Ed 2008 Israel Server Management 360Amit Gatenyo
The document outlines an agenda for a server management presentation discussing how tools like OpsManager, VMM, and SCCM can be used to dynamically provision new virtual machines from monitoring data to ensure high availability of web servers during increased user loads and maintain normal loads. It also discusses how Windows 2008 features like PowerShell, WinRM, and WinRS can help achieve this level of automated server management and provisioning. The presentation will include demonstrations of these tools in action and a final raffle prize drawing.
This document outlines deploying IBM Notes in VMware View and Microsoft RemoteApp environments. It discusses the benefits of each approach and provides an overview of the infrastructure required. It also provides guidance on installing Notes clients and tips for ensuring optimal performance on both platforms. VMware View allows full virtualized workstations on zero clients, while RemoteApp streams individual applications. The document aims to help administrators deliver the Notes client while reducing support overhead and infrastructure complexity.
Microsoft System Center 2012 R2 Overview - Presented by AtidanDavid J Rosenthal
System Center 2012 R2 provides unified management capabilities for hybrid cloud environments. It allows for comprehensive monitoring of physical, virtual, and cloud infrastructure as well as deep application performance monitoring. Key capabilities include infrastructure provisioning, application-focused automation and self-service, and flexible IT service management. System Center 2012 R2 provides enterprises with solutions for challenges around managing complex IT environments, application evolution, and budget pressures.
Microsoft Virtualization for VMware ProfessionalsEduardo Castro
Esta es la presentación utilizada en el WebCast de Semana de la Nube
https://msevents.microsoft.com/CUI/EventDetail.aspx?culture=es-AR&EventID=1032491907&CountryCode=AR
En este evento encontrará una introducción a la virtualización con productos y soluciones Microsoft para los VMware Professionals.
This document discusses challenges and opportunities related to virtualization and cloud computing in 2011. It begins by stating that server virtualization is very popular but also has some issues related to quality of service, monitoring, and capacity planning. Desktop virtualization is emerging but has challenges around cost and maturity. The document advocates a hybrid cloud approach and emphasizes the importance of standardization and well-defined processes.
- Windows Server 2008 R2 aims to provide regular and compatible server releases through an R2 update model, allowing for feature enhancements and adapting to changing industry needs.
- It focuses on compatibility while enabling the latest server technologies, and emphasizes scalability, virtualization, management improvements, and synergies with the Windows client platform.
- Key areas of focus include virtualization, management automation through PowerShell, support for new hardware, and addressing trends like multi-core systems and 64-bit computing.
- Windows Server 2008 R2 aims to provide regular and compatible server releases through an R2 update model, allowing for feature enhancements and adaptation to changing industry needs.
- It focuses on compatibility while enabling the latest server technologies, and emphasizes scalability, virtualization, management improvements, and synergies with the Windows client platform.
- Key goals include supporting the latest hardware, drivers, and applications, while addressing trends like power efficiency, multi-core processors, and virtualization.
The document discusses new features and configuration tips for Lotus Connections 3.0. Key points include:
- New features like subcommunities, mobile enhancements, social analytics, and improved user lifecycle management.
- Configuration is done through the user interface, wsadmin command line tool, or WebSphere console. Wsadmin uses XML files that must be checked in and out.
- Installation tips stress reading documentation carefully, meeting system requirements, optimizing disk speed, and planning server architecture and profiles.
- Future sections discuss a reporting tool and additional capabilities.
The document discusses the evolution of VMware products from 1999 to present. It outlines key milestones like the introduction of ESX Server, VirtualCenter, and more recent developments like vCloud and the Virtual Datacenter Operating System (VDC OS). It describes how the VDC OS will aggregate server, storage and network resources and provide built-in services to applications.
Virtualization allows organizations to reduce hardware costs and improve efficiency by running multiple virtual machines on a single physical server. This allows applications to be isolated from one another while sharing common resources. Virtualization provides benefits like faster deployment times, reduced maintenance costs, increased availability, and better performance. While virtualization introduces dependencies on vendors, it provides clear returns on investment for testing environments through lower costs and faster setup times.
Microsoft System Center Virtual Machine Manager 2008 R2 provides centralized management of virtual machines running on Hyper-V, Virtual Server, and VMware ESX/ESXi hypervisors. It allows administrators to provision and deploy virtual machines, perform conversions between physical and virtual machines, and optimize resource utilization across virtualized hosts. The latest release adds enhanced VMware management capabilities and more flexible delegation of administrative tasks through self-service portals and PowerShell scripting.
Virtual desktop infrastructure (VDI) allows users to access a virtualized desktop hosted on a remote server over the internet. It provides flexibility for remote access and centralized management. Implementing VDI involves sizing server infrastructure, determining networking needs, and deploying virtual desktops on a hypervisor. Major vendors like VMware and Citrix provide VDI solutions consisting of client software, virtual desktop agents, connection servers, and administrative consoles.
PHD Virtual Technologies presented their virtual backup appliance product. Their solution uses virtual backup appliances that deploy as small VMs to conduct backups without impacting production. It leverages deduplication and compression for efficient backups. The virtual appliance architecture provides reliability, security, ease of use, scalability and fault tolerance compared to traditional backup methods. PHD also highlighted features like SureRestore technology to ensure backup integrity and one step restore capabilities.
The document provides an overview of Windows Server Update Services (WSUS) 3.0, which allows administrators to deploy and manage Microsoft product updates. Key features include improved ease of use through a new administration console, enhanced deployment options such as more flexible update approvals and server hierarchies, and improved performance. The document discusses WSUS server and client requirements, server-side features like update targeting and notifications, and deployment scenarios for single or multiple WSUS servers.
The document provides an overview of the new features in Microsoft Windows Server Update Services (WSUS) 3.0, which allows administrators to more easily manage and deploy updates from Microsoft to computers in their network. Key improvements in WSUS 3.0 include enhanced ease of use through a new administration console, improved deployment options such as more flexible update approvals and support for server hierarchies, and better performance through features like faster synchronization intervals and bandwidth optimization. The document also outlines the server and client requirements for WSUS as well as its various features on both the server and client sides.
This document summarizes a presentation on understanding virtualization's role in auditing and security. It begins with introducing the speaker, Greg Shields, and his background and expertise in virtualization. It then discusses some key points about virtualization including what it is, what it does by virtualizing computer resources like memory, processors, network cards and disks, and some of the problems it can help solve like disaster recovery and server consolidation. It also discusses the seven elements of a successful virtualization architecture including recognizing hype, doing an assessment of your environment, purchase and implementation, physical to virtual conversions, high availability, backups, virtualizing desktops, and disaster recovery implementation.
This document discusses how VDI-in-a-Box can be used to deliver applications and desktops in small business scenarios. It provides steps to set up a VDI-in-a-Box server with Remote Desktop Services, Hyper-V, and RemoteApp capabilities. Problem applications can be hosted on pooled desktops using RemoteApp for Hyper-V as a lighter-weight alternative to full virtual desktops. The document aims to help IT professionals right-size application delivery based on user needs.
This document is a slide deck presentation about converting scripts from VBScript to PowerShell. It discusses how PowerShell uses objects and pipelines instead of text and loops. It provides examples of writing modular, reusable functions and using PowerShell commands and techniques instead of those from VBScript. The presentation encourages attendees to download the materials and scripts from the company's website and consider attending future classes.
This document summarizes various command line tricks and tools for managing ESXi hosts, including Linux commands like find, grep, cat, and vi, as well as VMware-specific commands like esxtop, vmkfstools, vim-cmd, esxcli, esxupdate, and vm-support. It is divided into four parts that cover understanding the ESXi command line, Linux commands, VMware commands, and using the vMA and scripting. The document provides examples for using these commands to locate files, read logs, control services, get process and disk information, configure networking and storage, manage VMs, troubleshoot issues, and install updates.
This document contains slides from a presentation about supporting SQL Server. The presentation provides an overview of how SQL Server works, including how data is stored physically and accessed. It discusses backup strategies, indexing, query optimization, high availability options and basic SQL queries. The presenter provides their contact information and offers to share additional resources.
This document summarizes a presentation about building, deploying, and supporting Server Core in Windows Server 2008 R2. The presentation covers the benefits of Server Core, including a smaller footprint, fewer patches required, and greater stability. It also discusses some of the limitations of Server Core, such as limited GUI functionality and .NET framework support. The presentation provides guidance on installing and configuring Server Core, and recommends using remote management tools like PowerShell instead of direct console access for ongoing management.
This document discusses different ways to deploy RemoteApps using Remote Desktop Services (RDS), including RDP file distribution, RD Web Access, local desktop installation, and client extension re-association. It compares the pros and cons of each approach and how they enable users to access applications remotely in different ways.
This document discusses how to automatically and rapidly deploy software in a small environment. It covers the two main parts of the process: software packaging and software deployment. For packaging, it explains how to configure software installations to run silently without user input using techniques like installation switches, MSI properties, and diff tools. For deployment, it discusses options like GPSI, PSExec, and paid solutions to remotely install packaged software on machines.
This document is a slide deck presentation about Windows PowerShell scripting and modularization. The presentation covers topics such as starting with commands, moving to scripts, parameterizing scripts, encapsulating in functions, using dot-sourcing, building pipeline functions, adding help, building script modules, and making script cmdlets. The presentation provides examples and guidance for improving PowerShell scripts through modularization and best practices.
The document is a slide deck about PowerShell error handling and debugging. It discusses two types of bugs, techniques for debugging like using trace code, breakpoints, and the step debugger. It also covers error handling using try/catch blocks and setting error actions. The slide deck was presented at a conference by Concentrated Technology.
This PowerShell crash course for SharePoint administrators introduces PowerShell and demonstrates how to use it to manage SharePoint and other Microsoft products and services. The presentation covers PowerShell basics like running commands, piping, formatting output, remoting, and using WMI. It aims to help administrators learn PowerShell and show how it can simplify and automate administrative tasks. Attendees are encouraged to download the slides and materials from the presenter's website for reference.
The document discusses preparing software for automated deployment after upgrading to Windows 7. It covers two key aspects: repackaging software to install silently without user input, and deploying the repackaged software using a deployment tool. For repackaging, it describes analyzing the installation format (EXE, MSI, etc.), identifying any silent installation switches, and using tools like WinINSTALL LE to capture changes if switches cannot be found. It also discusses customizing software post-installation using registry changes packaged via these same tools.
This slide deck discusses remote computer management using PowerShell v2. It covers prerequisites, an overview of PowerShell remoting and underlying technologies like WinRM. Specific configuration steps are provided for domains, workgroups and individual machines. Troubleshooting tips and techniques for using remoting sessions and Invoke-Command are also summarized. The instructor encourages attendees to contact them for additional materials or questions.
This PowerShell crash course for SharePoint administrators introduces PowerShell and demonstrates how to use it to manage SharePoint and other Microsoft products and services. The presentation covers PowerShell basics like running commands, piping, formatting output, remoting, and using WMI. It aims to help administrators learn PowerShell and show how it can simplify and automate administrative tasks. Attendees are encouraged to download the materials from the presenter's website for reference.
This document is a slide deck presentation on Windows PowerShell given by Don Jones of Concentrated Technology. The presentation introduces PowerShell, covering topics like why it was created, running commands, piping, remoting, and more. It encourages attendees to download the transcript and scripts from the company's website for further reference.
This document contains a slide deck presentation about eight tips and tricks for using PowerShell. The presentation covers remote control using WinRM and PSRemoting, parameter binding, splatting, tracing commands, suppressing errors, making reusable tools, comment-based help, and creating GUI apps. The presentation encourages attendees to download the slides and scripts from the Concentrated Technology website.
This slide deck discusses customizing PowerShell output using calculated properties. It explains that calculated properties allow dynamically extending objects with custom columns. The hashtable syntax for defining a calculated property is shown, with the expression using $_ to access the object being piped. Examples are provided like calculating free disk space, performing secondary WMI queries, and formatting output for AD user creation. More advanced formatting options like alignment, width, and format strings are also covered.
This 75-minute PowerShell crash course presentation teaches key PowerShell usage patterns using real-world tasks as examples. It covers loading extensions and modules, cmdlet and parameter names, piping, formatting output as tables, manipulating objects, comparison operators, filtering with Where-Object, using WMI, batch cmdlets like Invoke-WmiMethod, and PowerShell scripting. The slide deck is available on the company's website and they offer additional training resources.
This slide deck presentation introduces Windows PowerShell and WMI (Windows Management Instrumentation) and provides tips on using them together. The presenter is Don Jones, a Windows PowerShell MVP. The presentation covers what WMI is, how it is organized and explored, its documentation, how to use it with PowerShell through Get-WmiObject and other cmdlets. It also provides tips for handling WMI output and building an inventory tool using WMI to retrieve system information like OS version, disks, BIOS, and processor architecture. Attendees are invited to use the materials freely and provided information on other resources from the presenter.
This document provides an overview and agenda for a PowerShell crash course presentation. It introduces PowerShell concepts like cmdlets, aliases, snap-ins, objects, and the pipeline. It also covers PowerShell security features and using alternate credentials. The agenda includes a PowerShell backgrounder, accomplishing admin tasks with PowerShell, and available resources.
Securiport Gambia is a civil aviation and intelligent immigration solutions provider founded in 2001. The company was created to address security needs unique to today’s age of advanced technology and security threats. Securiport Gambia partners with governments, coming alongside their border security to create and implement the right solutions.
Welcome to our third live UiPath Community Day Amsterdam! Come join us for a half-day of networking and UiPath Platform deep-dives, for devs and non-devs alike, in the middle of summer ☀.
📕 Agenda:
12:30 Welcome Coffee/Light Lunch ☕
13:00 Event opening speech
Ebert Knol, Managing Partner, Tacstone Technology
Jonathan Smith, UiPath MVP, RPA Lead, Ciphix
Cristina Vidu, Senior Marketing Manager, UiPath Community EMEA
Dion Mes, Principal Sales Engineer, UiPath
13:15 ASML: RPA as Tactical Automation
Tactical robotic process automation for solving short-term challenges, while establishing standard and re-usable interfaces that fit IT's long-term goals and objectives.
Yannic Suurmeijer, System Architect, ASML
13:30 PostNL: an insight into RPA at PostNL
Showcasing the solutions our automations have provided, the challenges we’ve faced, and the best practices we’ve developed to support our logistics operations.
Leonard Renne, RPA Developer, PostNL
13:45 Break (30')
14:15 Breakout Sessions: Round 1
Modern Document Understanding in the cloud platform: AI-driven UiPath Document Understanding
Mike Bos, Senior Automation Developer, Tacstone Technology
Process Orchestration: scale up and have your Robots work in harmony
Jon Smith, UiPath MVP, RPA Lead, Ciphix
UiPath Integration Service: connect applications, leverage prebuilt connectors, and set up customer connectors
Johans Brink, CTO, MvR digital workforce
15:00 Breakout Sessions: Round 2
Automation, and GenAI: practical use cases for value generation
Thomas Janssen, UiPath MVP, Senior Automation Developer, Automation Heroes
Human in the Loop/Action Center
Dion Mes, Principal Sales Engineer @UiPath
Improving development with coded workflows
Idris Janszen, Technical Consultant, Ilionx
15:45 End remarks
16:00 Community fun games, sharing knowledge, drinks, and bites 🍻
Leading Bigcommerce Development Services for Online RetailersSynapseIndia
As a leading provider of Bigcommerce development services, we specialize in creating powerful, user-friendly e-commerce solutions. Our services help online retailers increase sales and improve customer satisfaction.
Understanding the NFT marketplace ecosystem involves exploring platforms for creating, buying, selling, and trading digital assets. These platforms use blockchain technology for security and smart contracts for automated transactions. Key components include digital wallets, NFT standards, and marketplaces like OpenSea and Rarible. This ecosystem is shaped by the roles of creators, collectors, and developers, offering insights into the dynamics and trends of the digital asset economy.
Project management Course in Australia.pptxdeathreaper9
Project Management Course
Over the past few decades, organisations have discovered something incredible: the principles that lead to great success on large projects can be applied to projects of any size to achieve extraordinary success. As a result, many employees are expected to be familiar with project management techniques and how they apply them to projects.
https://projectmanagementcoursesonline.au/
Generative AI technology is a fascinating field that focuses on creating comp...Nohoax Kanont
Generative AI technology is a fascinating field that focuses on creating computer models capable of generating new, original content. It leverages the power of large language models, neural networks, and machine learning to produce content that can mimic human creativity. This technology has seen a surge in innovation and adoption since the introduction of ChatGPT in 2022, leading to significant productivity benefits across various industries. With its ability to generate text, images, video, and audio, generative AI is transforming how we interact with technology and the types of tasks that can be automated.
Network Auto Configuration and Correction using Python.pptxsaikumaresh2
- Implemented Zero Touch Provisioning, Network Topology Mapper, and Root Cause Analysis using Python, GNS3, Netmiko, SSH, OSPF, and Graphviz.
- Developed a Python script to automate network discovery based on Core Router IP and login details, significantly reducing manual intervention.
- Enhanced network visualization by generating detailed network graphs, aiding in quick network analysis and troubleshooting.
Selling software today doesn’t look anything like it did a few years ago. Especially software that runs inside a customer environment. Dreamfactory has used Anchore and Ask Sage to achieve compliance in a record time. Reducing attack surface to keep vulnerability counts low, and configuring automation to meet those compliance requirements. After achieving compliance, they are keeping up to date with Anchore Enterprise in their CI/CD pipelines.
The CEO of Ask Sage, Nic Chaillan, the CEO of Dreamfactory Terence Bennet, and Anchore’s VP of Security Josh Bressers are going to discuss these hard problems.
In this webinar we will cover:
- The standards Dreamfactory decided to use for their compliance efforts
- How Dreamfactory used Ask Sage to collect and write up their evidence
- How Dreamfactory used Anchore Enterprise to help achieve their compliance needs
- How Dreamfactory is using automation to stay in compliance continuously
- How reducing attack surface can lower vulnerability findings
- How you can apply these principles in your own environment
When you do security right, they won’t know you’ve done anything at all!
The Challenge of Interpretability in Generative AI Models.pdfSara Kroft
Navigating the intricacies of generative AI models reveals a pressing challenge: interpretability. Our blog delves into the complexities of understanding how these advanced models make decisions, shedding light on the mechanisms behind their outputs. Explore the latest research, practical implications, and ethical considerations, as we unravel the opaque processes that drive generative AI. Join us in this insightful journey to demystify the black box of artificial intelligence.
Dive into the complexities of generative AI with our blog on interpretability. Find out why making AI models understandable is key to trust and ethical use and discover current efforts to tackle this big challenge.
Ensuring Secure and Permission-Aware RAG DeploymentsZilliz
In this talk, we will explore the critical aspects of securing Retrieval-Augmented Generation (RAG) deployments. The focus will be on implementing robust secured data retrieval mechanisms and establishing permission-aware RAG frameworks. Attendees will learn how to ensure that access control is rigorously maintained within the model when ingesting documents, ensuring that only authorized personnel can retrieve data. We will also discuss strategies to mitigate risks of data leakage, unauthorized access, and insider threats in RAG deployments. By the end of this session, participants will have a clearer understanding of the best practices and tools necessary to secure their RAG deployments effectively.
3. Best Practices in Architecting& Implementing WSUSGreg ShieldsPartner & Principal TechnologistConcentrated Technologywww.ConcentratedTech.comSession Code: WSV208
4. Presentation Outline (hidden slide):Speakers:complete this slide using the session information found at the speaker portal.Title: Best Practices in Architecting and Implementing Windows Server Update ServicesTechnical Level: 200Intended Audience: Technologists, Systems Administrators, WSUS ImplementersObjectives (what do you want the audience to take away from this session):1. Bad WSUS architectures will equal poor update installation.2. Using WSUS for servers is different than for workstations.3. What are the real-world best practices for applying updates.Presentation Outline (including demos):
7. WSUS Product VisionSimple, zero-cost solution for distributing Microsoft Updates content in a corporation.A “free” RTW add-on for Windows ServerSolution only distributes Microsoft Updates Distributing 3rd party patches require purchasing advanced management tools such as SCE or Configuration Manager 2007Provides a foundation for Update Management across Microsoft products: SCE, Configuration Manager 2007, MBSA, WU, SBS, Forefront, …Consistent scan resultsUnified client scan mechanism (WUA) irrespective of which server actually manages the updates.
8. WSUS MomentumOver 500,000 distinct WSUS servers synched with Microsoft Update last monthUsed by over 60% medium/large orgs and built into SBSWSUS 3 released April 30 2007Huge improvements in performance, deployment options, reporting and UIEasy in-place upgrade from WSUS2WSUS 3.0 SP1 released Feb 7, 2008WSUS 3.0 SP2 released Jan 26, 2009
10. WSUS 3.0 SP1/SP2 Adds FeaturesWSUS 3 SP1 added the following features:Installs on Windows Server 2008, integrated with Server Manager (after installing Server Manager update KB940518)API enhancements for advanced management toolsBug fixesWSUS 3 SP2 adds:Installs on Windows Server 2008 R2Supports managing Win7 clientsSupport for BranchCacheAuto-approval rules with deadlinesBug fixes (DSS gets languages from USS, target groups sorted alphabetically, more robust setup upgrade)Compliance against approved updates
11. New Features in WSUS SP2Greg ShieldsPartner & Principal TechnologistConcentrated Technologywww.ConcentratedTech.comdemo
12. Elements of ArchitectureWhy Architecture?Problems are usually results of improper architectureA correct architecture will drive a better designEspecially in situations of administrator distrust or insufficient bandwidthDesign your WSUS solution with the same goals as your AD solutionRoaming users should be dealt with separately12
13. “Simple” ArchitectureSingle, well-connected siteWSUS Updates from MUClients update from WSUSSingle server can handle 25,000 clients50K clients with 2x front-end servers and big SQL back-endRemote SQL configuration reduces server loadFront-end handles update sync loadBack-end handles reporting load13
14. “Simple, with Groups” Architecture14Largest use case in production todayDriving forces to move to Machine Groups:Differing patching requirements or schedulesTest groupsServers vs. WorkstationsPoliticsNot necessarily used for load distribution
15. WSUS ChainingChaining involves downstream servers getting updates (and sometimes Group data) from upstream serversOptions for chainingDistributed vs. Centralized model“Autonomous Mode” vs. “Replica Mode”Chaining solves the problem of “mesh” or “fully independent” architecturesWastes resources and bandwidthNot that some situations don’t mandate “mesh” or “fully independent” architectures!15
16. “Centralized” ArchitectureDownstream servers are replicas of primary serverLittle downstream control over serversDownstream admins drop machines into predefined groupsAll update approvals and schedule done at primary server16
17. “Distributed” ArchitectureDownstream servers obtain updates from primary server, except:Update approvals do not flow down. Assigned at each site individually.Downstream admins have greater control. Can create groups and assign approvals.Used for distribution rather than control of updates17Combinations of centralized anddistributed possible. Depends onintra-IT trust model.
18. “Disconnected” ArchitectureMany environments don’t have Internet connectivity.Test/dev, government, classified, air gap environmentsData must be imported from “the outside”Any the previous architectures will workManual import process requiredGives CM/QA/Security the option to review updates prior to bringing “inside”.18Sneakernet
19. “Disconnected” ArchitectureMatch advanced options between source and target.Express installation files & languages must match.Backup & restore updates from source to target.Back up C:SUSSUSContentRestore to the same location on the target server.Transfer update metadata from source to target.Navigate to C:rogram Filespdate ServicesoolsExport metadata using wsusutil.exe export {packageName} {logFile}Import with wsusutil.exe import {packageName} {logFile}packageName & logFileare unique names you choose19Database validation can take multiple hours to complete!
20. “Roaming” ArchitectureManages updates for external resourcesWSUS servers distribute approval metadataClients download updates from Windows Update directly.Extra security for internet-facing WSUS serverUseful separate architecture for mostly off-net clients20Laptop WSUSLaptops
21. “Roaming” ArchitectureFour Steps to Internet-facing WSUSBuild server in DMZ and position behind ISA proxyLocate database on server not reachable from InternetEnable SSL for communicationsHost content on Microsoft Update21Laptop WSUSLaptops
22. “High Availability” ArchitectureWSUS 3.0 includes native support for high availabilityNLB Clusters connect multiple WSUS web servers via a single cluster IPSQL Cluster manages the databaseNo single point of failureCritical: This design isuseful for availability,but does little forperformance.22
23. Managing Branch OfficesBranch offices are typically managed through replica WSUS serversReplica servers take all orders from the central server.Settings at the top flow downward, but take time.Alternatively, unify architecture through a single “central server”Single server manages all clients across all officesDeploy ISA proxy in the branchEnable BITS peer-cachingUse delta files to reduce network traffic.10x more server disk space4x less client download 23
24. Upgrade deploymentWSUS 3 SP1 setup supports in-place upgradeOne-way upgrade (no rollback)Can’t be done from WSUS 2 on Windows Server 2000 or using SQL 2000Alternative is migration upgrade:Install second serverIf original server is WSUS2 SP1:Perform disconnected replica steps (wsusutil, ntbackup, wsusmigrate)Switch over client via policyIf original server is also WSUS3Configure new server to be a replica of the first and syncAfter sync, configure new server to be autonomousUpgrade hierarchy from top down
26. Errors and Error CodesNumerous WSUS error codes exist.A complete list of all WSUS error codes is available on-line at http://inetexplorer.mvps.org/archive/ windows_update_codes.htmFor example, 0x8DDD0018 occurs when one of these services is DisabledAutomatic UpdatesBITSEvent Log26
27. Errors and Error Codes II0x80072EE2, 0x80072EFDThis issue occurs because the Windows Update client did not receive a timely response from the Windows Update Web site server. Likely a proxy configuration, personal firewall, or trusted hosts problem27
28. Errors and Error Codes III0x80246008, 0x8024402CCaused by BITS malfunctioning or corrupted.Download and extract the BITSAdmin tool from the Windows Support Tools CD.Bitsadmin /util /repairservice /forceIf that doesn’t work, try a BITS re-installThough if you do a BITS re-install, clear out the %SystemRoot%oftwareDistribution folder and reboot when done.Its worth mentioning here that thereis no “backup” download process for WUA.…like HTTP or FTP…If BITS is non-functional, so is patching!28
29. Errors and Error Codes IV0x80244019This error is often caused when the Proxy server is not properly configured.Ensure that your Proxy server allows Anonymous access to these external addresses:http://windowsupdate.microsoft.com http://*.windowsupdate.microsoft.com https://*.windowsupdate.microsoft.com http://*.update.microsoft.com https://*.update.microsoft.com http://*.windowsupdate.com http://download.windowsupdate.comhttp://download.microsoft.com http://*.download.windowsupdate.com http://wustat.windows.com http://ntservicepack.microsoft.comMicrosoft doesnot publish the IP’sassociated with theseFQDN’s.So, if you do perimeternetwork security by IPyou’ve gotta’ stayon the ball with these!29
30. WUA Client IssuesTo enable auto-updates, ensure:Anonymous access granted to Self Update virtual directory on WSUS serverAuto-updates requires TCP/80 to function on WSUS serverBe aware of GP replication times90 to 120 minute GP refresh timing will impact speed of clients becoming visible in WSUS admin toolBe aware of AU detection frequency timesWUA client set to check with server every 22 hours (minus offset).When WUA checks in is when it checks WUA version.Need to do wuauclt /detectnow to force this to occur on-demand.30
31. WUA Client Issues IIKnown issue with imaged workstations:If you image your workstations (and who doesn’t these days!), you must change SIDSysinternals NewSID, Microsoft SysPrepNot doing this will prevent WUA from contacting WSUSTo fix this problem:Run one of the above tools to change the SIDHKLMoftwareicrosoftindowsCurrentVersionindowsUpdateDelete PingID, SUSClientID, and AccountDomainSID valuesRestart wususerv serviceRun wuauclt /resetauthorization /detectnow31
32. WUA Client Issues IIIDisabling the Automatic Updates Service or the BITS Service at any point in the past prevents it from starting properly when you need it!Reset permissions on these services to re-enable functionality.Use the Service Control Resource Kit tool (sc.exe) to do this:sc sdset bits "D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU)"sc sdsetwuauserv "D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU)“Every disabled client needs this!32
34. Optimize Patch DistributionIn large, multi-site environments low bandwidth may cause problems for remote offices.Distributing updates to downstream servers is big problemPotential solutions:Ensure downloading only the languages you needConfigure patch distribution to occur in the evenings.Stagger patch distributions between tiered sitesExpress installation files can exacerbate this.The bandwidth savings in express installation files occurs from WSUS server to client, not between WSUS servers.Throttle BITS34
35. Throttling BITSBITS can be throttled either on the WSUS server or additionally on all the clients.Alleviates network saturation during update distribution and during client installationBe aware that this does slow down update distributions!Throttle BITS in Group Policy:Computer Configuration | Administrative Templates | Network | Background Intelligent Transfer ServiceTwo settings:Maximum network bandwidth that BITS usesLimit by Kbps based on time of day or at all timesBe aware that Kbps is kiloBITS not kiloBYTES (divide by 8)Timeout (in days) for inactive jobs35
36. DNS Netmask OrderingNon-centralized architectures can better route clients through DNS Netmask ordering.Microsoft DNS Round Robin will first provide an IP address in the same subnet as the requestor.If no IP exists in the same subnet, a random IP will be selected.All WSUS hosts must respond to the same FQDN.DNS FQDN record is populated with IP addresses of all WSUS servers in the network.36
37. Server TuningRun cleanup and DB defrag every few monthsCleanup wizard is a feature in WSUS 3Removes stale computers and updatesDB index defrag script available on ScriptCenterkeeps the server running fastLook out:Take care to not remove computers that are still active (but having trouble contacting the server)Populate from AD sample tool can helpIn a hierarchy, need to run cleanup on each WSUS server.Clean computers from bottom-upClean updates from top-down (or between sync intervals)Can be automated through the API
38. 38Considerations for Updating ServersServers require more care than workstations…A rebuild is usually not an acceptable solution for a failed patch installation.Outage windows are shorter.But in some ways servers are easier…Data and system drives usually separated.Hardware configuration is usually more stable or well-understood.Service isolation and redundancy – in larger environments – limits exposure/risk.People typically aren’t “surfing” on servers.The RAID 1 Undo Trick…
39. What About Reboots?I’ve said this before, and I’ll say it again:“If you have a patch management plan without a reboot strategy, you don’t have a patch management plan.”Three methods:Client-initiatedWSUS-initiatedScript-initiatedTwo methodologies:Scheduled reboots vs. rebooting for patch installationI will argue in favor of scheduled, forced rebootsover mid-day reboots.39
40. Handling RebootsRebootFile = "computers.txt“LogFile = "results.txt"Set fso = CreateObject("Scripting.FileSystemObject")Set f = fso.OpenTextFile(RebootFile, 1, True)Set objTextFile = fso.OpenTextFile(LogFile, 2, True)On Error resume nextDo While f.AtEndOfLine <> TruestrComputer = f.ReadLine Set objWMIService = GetObject("winmgmts:{impersonationLevel=impersonate}!" & strComputer & "ootimv2") If Err.Number <> 0 ThenobjTextFile.WriteLine(strComputer & " is not responding.")Err.Clear Else Set colOperatingSystems = objWMIService.ExecQuery("Select * from Win32_OperatingSystem")objTextFile.WriteLine(strComputer & " is rebooting.") For Each objOperatingSystem in colOperatingSystemsObjOperatingSystem.Reboot() Next End IfLoop
41. Custom ReportsUI supports basic customization (filters)Advanced customization can be built onWSUS (.Net) APICan use of PowerShell scripts to generate reportsPublic read-only SQL viewsCan use SSRS to generate reports (if full SQL)Samples available from MSDNE.g., compliance against approved updates
42. Match KBs to MSRCsEver wish you had a nice mapping of knowledgebase numbers to MSRC numbers?“The Q-numbers to the MS-numbers”This script outputs a .CSV file that provides just that mappingAdd the name of your WSUS server into the top line of the script: strWSUSServer = “<Enter WSUS Server here>"42
43. Match KBs to MSRCsstrWSUSServer = “<Enter WSUS Server here>"Set fso = CreateObject("Scripting.FileSystemObject")Set objTextFile = fso.OpenTextFile("OUTPUT.csv", 2, True)objTextFile.WriteLine("MS Number,Q Number")Set conn = CreateObject("ADODB.Connection")Set rs = CreateObject("ADODB.Recordset")dbconn = "Driver={SQL Server};Server=" & strWSUSServer & ";Database=SUSDB"conn.opendbconnstrSQLQuery = "SELECT dbo.tbSecurityBulletinForRevision.SecurityBulletinID, dbo.tbLocalizedProperty.Title FROM dbo.tbLocalizedPropertyForRevision INNER JOIN dbo.tbLocalizedProperty ON dbo.tbLocalizedPropertyForRevision.LocalizedPropertyID = dbo.tbLocalizedProperty.LocalizedPropertyID INNER JOIN dbo.tbSecurityBulletinForRevision ON dbo.tbLocalizedPropertyForRevision.RevisionID = dbo.tbSecurityBulletinForRevision.RevisionID WHERE (dbo.tbLocalizedPropertyForRevision.LanguageID = 1033) ORDER BY dbo.tbSecurityBulletinForRevision.SecurityBulletinID"rs.OpenstrSQLQuery, conn, 3, 3While Not rs.EOFobjTextFile.WriteLine(rs.Fields(0).Value & "," & Replace(rs.Fields(1).Value, ",", ""))rs.MoveNextWendWScript.Echo "Done!"
44. Agent ControlUse WUA API to control the agentCustom install schedulesUpdating servers in web farmsImplementing “install now” functionality
45. On-Demand Patching(You Patch Now!)Ever wish you had a WSUS “Big Red Button”?Such a button might automatically download and install all approved patches and reboot if necessary…How about this VBScript?Run this script from any server consoleImmediately downloads and installs all approved patches.If a reboot is required, it will then reboot the server.45
46. The WSUS Big Red ButtonSet fso = CreateObject("Scripting.FileSystemObject")Set objAutomaticUpdates = CreateObject("Microsoft.Update.AutoUpdate")objAutomaticUpdates.EnableServiceobjAutomaticUpdates.DetectNowSet objSession = CreateObject("Microsoft.Update.Session")Set objSearcher = objSession.CreateUpdateSearcher()Set objResults = objSearcher.Search("IsInstalled=0 and Type='Software'")Set colUpdates = objResults.UpdatesSet objUpdatesToDownload = CreateObject("Microsoft.Update.UpdateColl")intUpdateCount = 0For i = 0 to colUpdates.Count - 1intUpdateCount = intUpdateCount + 1 Set objUpdate = colUpdates.Item(i)objUpdatesToDownload.Add(objUpdate)Next‘<<This is only the first half of the script. Add the code from the next page to ‘create the full script>>
47. The WSUS Big Red Button‘<<Add this half to the code on the previous page!>>If intUpdateCount = 0 ThenWScript.QuitElse Set objDownloader = objSession.CreateUpdateDownloader()objDownloader.Updates = objUpdatesToDownloadobjDownloader.Download() Set objInstaller = objSession.CreateUpdateInstaller()objInstaller.Updates = objUpdatesToDownload Set installationResult = objInstaller.Install() Set objSysInfo = CreateObject("Microsoft.Update.SystemInfo") If objSysInfo.RebootRequired Then Set objWMIService = GetObject("winmgmts:{impersonationLevel=impersonate,(Shutdown)}!localhostootimv2") Set colOperatingSystems = objWMIService.ExecQuery("Select * from Win32_OperatingSystem") For Each objOperatingSystem in colOperatingSystemsobjOperatingSystem.Reboot() Next End IfEnd If
48. Other API UsesISVs use APIs for many other features as wellDistribute 3rd party updates (quite complex)Gather software and hardware inventoryDistribute updates to non-Windows devicesYour starting point is http://technet.microsoft.com/en-us/wsus/bb466192.aspxAPI SamplesDiagnostic ToolsHeader Files
49. SummaryWSUS is simple to use, but scales to enterpriseFlexible server deployment optionsSingle server, scale up, branch office, scale out, disconnected, roaming laptopsFlexible update deployment optionsPeer caching, delta patching, auto approval rules, auto-reapprove revisionsPeriodically tune the server (defrag + cleanup)Public API and DB views can be used to extend the base functionality for many advanced scenariosStarting point for all WSUS informationhttp://www.microsoft.com/updateservices
51. Required SlideSpeakers, TechEd 2009 is not producing a DVD. Please announce that attendees can access session recordings at TechEd Online. www.microsoft.com/techedSessions On-Demand & Communitywww.microsoft.com/learningMicrosoft Certification & Training Resourceshttp://microsoft.com/technetResources for IT Professionalshttp://microsoft.com/msdnResources for Developerswww.microsoft.com/learningMicrosoft Certification and Training ResourcesResources