TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: All
from: NL
date: 2004-02-05 10:41:18
subject: Corporate variant (SUS) of Windows Update

From: Jan van Hoek (NL) 

Within our company (1 head office, 50 branch offices) we are planning to
start using MS SUS (Software Update Services) to keep our workstations
(500) and servers (75) up to date. SUS is advertised as the corporate
variant of Windows Update, the latter being designed with the home user in
mind. FYI: We are using a mixture of Windows NT 4.0 and Windows 2000.

We have configured a SUS server, which tries to retrieve hotfixes and the
like on a daily basis. My problem is related to the fact that the files
that are pulled from the Windows Update website, are inspected by our
virus/vandal server (Aladdin eSafe), which works with a very strict policy
and hence often refuses those files.

In an attempt to escape from that anti-virus policy, we added a list of
IP-addresses that are part of the Windows Update site, to the
"trusted" (VIP) list within the eSafe server. We started this
seemingly trivial task, guided by blocked addresses as reported in the
eSafe logfiles. But gradually it starts looking more like what Sysiphus had
to do for many years in a row (or the 50 daughters of Danaus AKA Danaides
for that matter).

The current situation is that we continuously have to deal with new
IP-addresses that are shown blocked by the eSafe server. Obviously (and
understandably) MS uses some load balancing strategy, which involves a lot
of distinct websites and hence a lot of IP-addresses that we are forced to
add into the "trusted" list.

It started with 207.46.249.126 and 62.58.34.75, being the "front"
websites for Windows Update. We had to add the full 213.161.82.* range soon
after that. This went well for a few days. This process seems to have no
end, because we see new addresses being blocked every day.

This repressive way to establish the full range of IP-addresses that are
used indirectly by Windows Update, by inspecting "blocked"
entries in eSafe's logfiles and subsequently adjusting the VIP list, is not
the right way. Acting such, the SUS server cannot be guaranteed to be
complete ever. There will remain a considerable chance that we forgot some
IP-addresses and that part of the Windows Update contents fails to get
retrieved.

We tried to get this problem across with MicroSoft NL. Though always
helpful and friendly, problems like this one seems beyond their league.

I may assume that someone reading this message has already encountered (and
tackled!) this problem in a corporate environment, and is willing to share
his/her secrets with us.
--
-- Jan van Hoek (NL)
-- Thu 5 Feb 2004 10:02 CET

PS: Please don't recommend to relax our content policy. Our company belongs
to the 3% of the Dutch industry that were virus free for almost 4 years now
(the Loveletter incident was the last one). This is largely due to our
strict virus policy (that is OTOH felt as a nuiscance by most non-IT
people).

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270
@PATH: 379/45 1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.