Enterprise Windows can be set not to spy on you and you have a great deal of control over it. It's only we peons with Home and Professional that get spied on. And Professional only spies on you a little bit.
Actually you can turn it all off in any version with a few hacks
Or with the right group policy templates, saves all the faff in the registry.
Nope, some of the group policy settings now only apply to enterprise version. E.g. you can't turn off the store in pro or lower any more :/
Microsoft snuck it in with an update a while ago.
You can still remove all the MS apps via powershell though I think, which is what I did.
So I was up till 2 last night on calls on how t deal with this. I know the backstory and its not a targetted attack at all, some numpty has opened a link on an email, and the thing has spread over smb
The NHS is only impacted as much due to the different local systems. Has it been on a larger single system, such as MOD, DWP, etc, then there would bigger issues.
Now to plan how to patch over 10K servers in a week
Coffee, lots of coffee
That's the way it goes
I'm involved in the patching this weekend
Nissan in Sunderland and a Renault have stopped production at several sites after being infected.
MS have released the patch to XP...how nice of them. Only when confronted with a catastrophe did they step in.
What's your background?
I thought XP was out of service now?
So I was up till 2 last night on calls on how t deal with this. I know the backstory and its not a targetted attack at all, some numpty has opened a link on an email, and the thing has spread over smb
The NHS is only impacted as much due to the different local systems. Has it been on a larger single system, such as MOD, DWP, etc, then there would bigger issues.
Now to plan how to patch over 10K servers in a week
Coffee, lots of coffee
I thought XP was out of service now?
More to the point, why are these 10k servers not already running a patch that was available 2 months ago ? Doesn't look very good.
I don't think it was intentionally targetted at anything other than large corporations by the nature of its design - I suspect a botnet or similar just sat there pushing emails, sniffing for vulnerable machines and exploiting backdoors if and when opened when infections were successful to push further malware and largely acting autonomously.
I disagree. The fact that it asked for $300 to unlock a machine suggests it was a scattershot across small business and home users as much as it was larger companies. If you were specifically targetting a big business, I think you would come up with something more specific and with a "package deal" so to speak.
Sometimes I find it impossibly unreal thinking about in the way you'd expect this from home users where it is actually the opposite. If this was me and your companies are exposed like this, I'd find it disgracefully embarassing beyond levels one could comprehend.
In my case business is BAU but we have many, many, thousands of Windows servers being patched this weekend. We do have a rolling quarterly patching program in place across all servers so a lot of the estate had probably been patched recently anyway. The activity today is to just identify and mop up any remaining servers. In my companies case (a large blue chip financial business) it's being dealt with extremely professionally and patching is always kept at a high priority.
I'm not aware of us being affected by it and this is purely precautionary.
You do have to wonder if GCHQ was advised of EternalBlue before or after it was leaked by the NSA.