quarta-feira, 13 de abril de 2016

USB stick read only

http://www.computerhope.com/issues/ch001617.htm

Setting drive security permissions

In the event that you do not have a write protection switch (they are less common on newer models) on your drive, you can set the and it's contents, and the flash drive itself, to be read only. This process is useful for keeping the contents of you drive safe from malware when you need to view them on a public computer.
  1. Open Windows Explorer by pressing the Windows key + E at the same time.
  2. Find the drive letter associated with your USB flash drive.
  3. Right-click on the appropriate drive and then select Properties from the drop-down menu that appears.
  4. In the Removable Disk Properties window, click on the Security tab. Under Group or user names: select Everyone and click the Edit... button.
USB drive security menu


  1. In the Properties window under the Security tab, you should see a section titled Permissions for Everyone. There are check boxes in the Allow column next to each type of permission currently granted to the Everyone group. By checking the Deny boxes next to permissions like Full Control, Modify, and Write, you are setting the drive and its contents to read only.
USB drive security permissions


  1. Make the appropriate permission changes, click Apply and then click OK.
  2. To disable write protection, repeat these steps and check the Allow boxes.
Note: Changing the security permissions in the Everyone group also affects permissions for you.

sexta-feira, 8 de abril de 2016

Ressetting SCCM agent if package failed to install


Resetting SCCM Agent if patch installation fails


From time to time, a ticket will be created in regards to System Patches failing in an SCCM environment. To fix this, there are really only two major steps:
  1. Rename the C:\Windows\SoftwareDistribution folder to SoftwareDistribution.old (stop Windows Update service before renaming, then restart the service).
  2. Rename C:\Windows\System32\catroot2 to catroot2.old (stop the Cryptography service before renaming, then restart the service).
After this is done, run these actions from the configuration manager:
  1. Discovery Data Collection Cycle
  2. Software Updates Deployment Evaluation Cycle
  3. Software Updates Scan Cycle
The procedure above has taken care of the issue pretty reliably. If the updates still don’t install properly, you may have to download the specific updates and install them manually.