Dear Users... (A thread for Sysadmin, Technical Support, and Help Desk people)

Status
Not open for further replies.
Admin: I'm trying to remotely remove your software from 10 of our machines.
Me: What error are you getting?
Admin: None.
Me: Please describe what you're doing, what you expect, and what happens instead.
Admin: The 10 machines are powered down. They don't respond.
Me: You cannot remotely access a powered-down machine. It's not running.
Admin: But...
Me: No.
Boot on LAN. That'll wake the up.
 
Admin: I'm trying to remotely remove your software from 10 of our machines.
Me: What error are you getting?
Admin: None.
Me: Please describe what you're doing, what you expect, and what happens instead.
Admin: The 10 machines are powered down. They don't respond.
Me: You cannot remotely access a powered-down machine. It's not running.
Admin: But...
Me: No.

Boot on LAN. That'll wake the up.

True, but for security reasons, this is usually disabled by "wise" PC configurationers.

Most corporates I've worked in use it as standard. It's quite possible to secure it.

Catsmate beat me to it.

Computers sold for corporations generally come with some ILO software on the motherboard, that provides for remote access to the system, including power on/off and even sometimes access to the OS. They can also monitor hardware and firmware to provide for notices of updates, hardware problems, and similar things. We have the system in place at my business.

These are heavily restricted, password protected, encrypted, use certificate security to verify remote access, and run on a segregated, private network with limited access (only certain users/locations can get on that network, and it's not connected to any external network).

Same type of thing for servers, too.
 
Turning the computers on was one option, certainly. But he wanted to remove software while they were shut down.
 
A lot of people were baffled by Windows at first, it's really not obvious how to use it when you were seeing it for the first time. Doubly so if no one had told you about double clicking.

I was absolutely convinced that Windows was just a fad and that nobody would like giving up their command lines.
 
I was absolutely convinced that Windows was just a fad and that nobody would like giving up their command lines.

Heh.

My oldest brother wanted to be a computer science major when he first was going to college in '84. His counselor talked him out of it because computers were "just a fad".

He majored in math instead. He's still kicking himself.
 
No one who matters gave up their command lines.

Actually, it's making a big comeback in Windows administration. While batch files and command line has always remained in use, PowerShell is really bringing it back.

Pretty much, if it can be done on Windows, I can automate it via PowerShell. And usually in less than 10 lines of code ;)

I have several automated tasks to generate various reports on all my assigned servers, perform reboots of groups of systems when necessary, collect software inventories, all sorts of stuff. Usually takes about 15 to 30 minutes to write (including look up syntax) and saves hours.
 
Catsmate beat me to it.

Computers sold for corporations generally come with some ILO software on the motherboard, that provides for remote access to the system, including power on/off and even sometimes access to the OS. They can also monitor hardware and firmware to provide for notices of updates, hardware problems, and similar things. We have the system in place at my business.

These are heavily restricted, password protected, encrypted, use certificate security to verify remote access, and run on a segregated, private network with limited access (only certain users/locations can get on that network, and it's not connected to any external network).

Same type of thing for servers, too.
That is indeed what you have to do to secure boot-on-LAN. But in locations like hospitals and universities which are fairly open to the public and even staff bringing their own gear (not to mention various departments building their own shadow IT operations), boot-on-LAN can be a gateway to unwitting drone and zombie machines, and also undesirable packet-sniffers which are security hazards.

So it's very nice to have boot-on-LAN capability (in the past I used it to quickly bulk-reset classrooms full of training PCs and servers). But if you don't know who is going to do the booting and what they are booting or where it is then it is a problem

ETA: Not that I'm saying no iLO. We use real iLO all the time for servers, on a highly secure network. :)
 
Last edited:
Actually, it's making a big comeback in Windows administration. While batch files and command line has always remained in use, PowerShell is really bringing it back.

Pretty much, if it can be done on Windows, I can automate it via PowerShell. And usually in less than 10 lines of code ;)

I have several automated tasks to generate various reports on all my assigned servers, perform reboots of groups of systems when necessary, collect software inventories, all sorts of stuff. Usually takes about 15 to 30 minutes to write (including look up syntax) and saves hours.

It really is good. I'd been waiting for ages for the bank to extract the finger and get a SCOM upgrade that would allow me to replace lots of expensive vendor software with direct management custom made for our needs. That went sideways when they let the real SCOM experts go and kept the script kiddies.
 
That is indeed what you have to do to secure boot-on-LAN. But in locations like hospitals and universities which are fairly open to the public and even staff bringing their own gear (not to mention various departments building their own shadow IT operations), boot-on-LAN can be a gateway to unwitting drone and zombie machines, and also undesirable packet-sniffers which are security hazards.

So it's very nice to have boot-on-LAN capability (in the past I used it to quickly bulk-reset classrooms full of training PCs and servers). But if you don't know who is going to do the booting and what they are booting or where it is then it is a problem

ETA: Not that I'm saying no iLO. We use real iLO all the time for servers, on a highly secure network. :)

Well, the iLO network is what has boot-on-LAN capability, and that's a separate network from the public one, with certificate-based access and encryption controls. SO even if someone just walked in and plugged up whatever, it's only going to be on the regular network, not the iLO network. If that makes sense :)

It really is good. I'd been waiting for ages for the bank to extract the finger and get a SCOM upgrade that would allow me to replace lots of expensive vendor software with direct management custom made for our needs. That went sideways when they let the real SCOM experts go and kept the script kiddies.

Yeah, I've written custom monitors for our SCOM system. It's not that difficult, and the ability to customize exactly what you want is great :)
 
Well, the iLO network is what has boot-on-LAN capability, and that's a separate network from the public one, with certificate-based access and encryption controls. SO even if someone just walked in and plugged up whatever, it's only going to be on the regular network, not the iLO network. If that makes sense :)
It certainly does. So any publicly-connected device can be booted (and thus accessed) from...anywhere, really. And what is running on that device? What is it doing with my network? FIIK! :D

ETA: Started life as a programmer decades ago, so I have no idea how many millions of lines of code I've written since then. Including all sorts of scripts on a variety of platforms.
 
Last edited:
It certainly does. So any publicly-connected device can be booted (and thus accessed) from...anywhere, really. And what is running on that device? What is it doing with my network? FIIK! :D

ETA: Started life as a programmer decades ago, so I have no idea how many millions of lines of code I've written since then. Including all sorts of scripts on a variety of platforms.

Apparently I'm not explaining very well. It's two separate networks. You can't just plug in to the iLO net (it's protected, assigned ports, etc, and the firewalls prevent any external access to it except from specific management locations). You can plug into the guest net (but doesn't provide access to the iLO net or our internal domain, only internet access).

No, you can't access and boot a device from anywhere (well, technically, we can use our remote access tools to access the VM Server and boot something...but that's not the same thing).
 
I'm actually one of the few IT people I know that thinks the current balance of GUI for most all user interface function and GUI/Command Line for most system admin functions have actually struck a pretty fair balance.

I cut my teeth on commands lines but I don't want to go back to them for everything.
 
I'm actually one of the few IT people I know that thinks the current balance of GUI for most all user interface function and GUI/Command Line for most system admin functions have actually struck a pretty fair balance.

I cut my teeth on commands lines but I don't want to go back to them for everything.

I remember the joy of an interactive command line, on a VDU (as we called them in those days), being such an improvement on using paper tape, punched cards or a teletype. Some things are more easily done with a GUI, but I'll usually have at least one CLI window open somewhere.
 
I'm actually one of the few IT people I know that thinks the current balance of GUI for most all user interface function and GUI/Command Line for most system admin functions have actually struck a pretty fair balance.

I cut my teeth on commands lines but I don't want to go back to them for everything.
I completely agree. Those with the chops can do amazing things with a command line. For most functions, the GUI serves the rest of us extremely well.

More and more admin functions are being done through a browser now, actually. I do pretty much everything in a browser except those few functions I still need to use AD for.
 
Status
Not open for further replies.

Back
Top Bottom