// This is the script to give summary on the main page.
Think IPM

Tuesday, May 30, 2017

Citrix Synergy 2017 recap

Image result for kool aid manSo how do you get people around the world jazzed about your particular brand of nuts and bolts software?  If you are Citrix,  you rent out the Orange County Conference Center in Orlando for a few days and then encourage a few thousand of your hardcore customers, employees, partners and vendors to come and evangelize your message for 96 straight hours and then cap it off with a big private party at Universal Studios Theme Park.  
Doesn’t matter what you might have thought about Citrix at the start, you can’t help but be into it by the end of such an intense communal Kool-Aid drinking marathon.
tldr; The message was pretty consistent with the Citrix messaging of the past : Any.* – Any Device, Anywhere, Anytime.   And the march to the cloud continues. (with or without you)
Three solid days of sessions, parties, networking and fact finding (or mystery solving as Malcolm Gladwell let us know in a super interesting and relevant keynote speech).  From a session standpoint, my clear favorite was #Syn706 – Building a XenApp real-time session monitoring dashboard.    This session was given by my friend Sam Jacobs and walked everyone (about 500 people in the room) through a step by step exercise of building a detailed rich dashboard using PowerShell and the Citrix snapins.  More than the Citrix dashboard, Sam gave everyone an entry level PowerShell foundation to build whatever other scripts they may have been thinking about.  I’m by no means a PowerShell guru so this added bonus was a welcome surprise.  If you missed it, be sure to watch Citrix for the recording. (or watch this blog – I’ll post once it’s available).
On the actual Citrix front, they hammered home the idea that if you are still running 6.5, you should begin down your upgrade path to 7.14 or risk being left behind (both in support and features).  No major earth shattering news was announced or any acquisition news that I heard.  This was definitely a maintenance cycle type of conference.   You had to go seek out useful information and the hands on labs were the perfect tools for that.  Hands on with the full Citrix product line.  The solutions expo, while smaller than usual had a lot of side stages for individual product demonstrations and niche education.  I took advantage of quite a few of those.
Wednesday night was time for the biggest private party event of the conference.  The M7 Global Party at BB Kings.  If you weren’t able to snag an invite this year, you need to contact your local M7 partner and start some projects so you can be on the VIP list for next year.  This was after all, a client appreciation party.  Winking smile
Last stop on the conference party train was Universal Studios.  This was awesome.  After hours access at a theme park with no lines and free food and drink.  What more could you ask for in a final conference party?
All in all, it was absolutely great to reconnect with clients, vendors, peers and colleagues in Florida.
Till next time #CitrixSynergy!
Click Here to Continue Reading >>

Saturday, May 13, 2017

PSA: Powershell script to find unpatched machines. (WannaCry)

imageI’m not a programmer but PowerShell is really starting to grow on me lately.  Here is a quick script that will see if your servers are properly patched for the WannaCry ransomware exploit.

It’s not super fast but it should do the job.  I’m sure there are PLENTY of improvements to be made to it.  If you make any, please drop me (and everyone else) a note in the comments with your new improved version.

The script takes a file as input with a list of machine names in it (1 per line) and outputs that same server list with any appropriate hotfixes next to them.  Any names without hotfixes next to them should be investigated.

You can add additional hotfixes as they are released to the list below.

# List of all HotFixes containing the patch
$hotfixes = "KB4012212", "KB4019215", "KB4012217", "KB4012218",  "KB4015551", "KB4015552",  "KB4019216", "KB4012216", "KB4015549", "KB4015550", "KB4013429", "KB4019472", "KB4015217", "KB4015438", "KB4016635", "KB4019264"

$listofvms = Read-Host " Full path to VM txt file - (i.e. C:\Carlo\VMS.TXT)"
$guests =  get-content $listofvms

foreach ($guest in $guests) {

# Search for the HotFixes
$hotfix = Get-HotFix -ComputerName $guest | Where-Object {$hotfixes -contains $_.HotfixID} | Select-Object -property "HotFixID"

write-host -foregroundcolor yellow $guest $hotfix



As always with scripts on the internet, your mileage may vary and this script comes with no guarantees AT ALL.  Not responsible if it burns your house down, steals your mate or cancels your health insurance.

Click Here to Continue Reading >>

Friday, May 12, 2017

PSA : Patch your Windows Servers (MS17-010)

If you’ve seen the news today, there is a crippling ransom ware spreading across the globe.  I’ve seen reports that say at least 45k attacks hitting more than 74 countries in the past 10 hours.

The ransom ware is called ‘WannaCry’.  It will encrypt your desktop or server’s files and demand that users pay an initial $300 to unlock the files and the sum goes up with each passing hour.

imageThe patch to prevent the exploit can be found here [MS17-010] or just running Windows Update and updating to the latest patches will block the vulnerability.   The patch was released March 14th 2017.

If you have been infected, the patch will not remove the virus so best to be vigilant and process your updates ASAP.

Click Here to Continue Reading >>