A bit of background, I work level 1 helpdesk.
$User calls in, he suspects his laptop has a virus on it. Curious, I ask him what made him think so. "Norton tells me it found adware, the system is running really slow lately, and one of my USB ports aren't working". I blink at this and ask why he's using Norton when this particular company has McAfee on all corporate machines.
Its his personal laptop, just bought in Feb from a big box company and has Vista on it (still not supported, which I'm sure is no surprise to anyone in this community).
At that point, I give him the general advice (run a full system scan or use a company that offers virus removal services) and told him to contact his manager to get a corporate laptop.
So, lets do the counting:
1) Got laptop infected with viruses (sadly, this company has the users have full admin abilities on their own computers)
2) Laptop is a personal machine
3) Laptop is running Vista
4) Hooked personal laptop to corporate network
5) Hooked infected personal laptop to corporate network
I'm still boggling how he thought that this was in any way, a good idea. Oh yes, he's also a temp employee and he needed the laptop to work on a certain web-based app. IE: Give him the weakest computer there is and thats all he needs.
$User calls in, he suspects his laptop has a virus on it. Curious, I ask him what made him think so. "Norton tells me it found adware, the system is running really slow lately, and one of my USB ports aren't working". I blink at this and ask why he's using Norton when this particular company has McAfee on all corporate machines.
Its his personal laptop, just bought in Feb from a big box company and has Vista on it (still not supported, which I'm sure is no surprise to anyone in this community).
At that point, I give him the general advice (run a full system scan or use a company that offers virus removal services) and told him to contact his manager to get a corporate laptop.
So, lets do the counting:
1) Got laptop infected with viruses (sadly, this company has the users have full admin abilities on their own computers)
2) Laptop is a personal machine
3) Laptop is running Vista
4) Hooked personal laptop to corporate network
5) Hooked infected personal laptop to corporate network
I'm still boggling how he thought that this was in any way, a good idea. Oh yes, he's also a temp employee and he needed the laptop to work on a certain web-based app. IE: Give him the weakest computer there is and thats all he needs.
no subject
Date: 2007-06-23 01:33 am (UTC)Then onto other troubleshooting steps.
no subject
Date: 2007-06-25 01:50 pm (UTC)