Solved

Spybot Search and Destroy on Terminal Server?

Posted on 2009-05-16
4
967 Views
Last Modified: 2013-11-21
Anyone used Spybot Search & Destroy on Terminal Server?

Any experiences and suggestions?


Thanks.
0
Comment
Question by:mrmut
  • 2
4 Comments
 
LVL 5

Expert Comment

by:-Q-
ID: 24404830
Yes we have at work before but what is your issue?

Normal users don't have access in most cases to get infected by Spyware. Their accounts don't have enough permissions anyway, so chances of actually getting infected are slim.

I'd suggest using a Kaspersky boot CD and booting the server for a scan if you want to see if it has any virus/malware infections.
0
 

Author Comment

by:mrmut
ID: 24405486
Thank for a reply; - I am just wandering does it work? - That is, - does it work on all user profiles that might use internet?
0
 
LVL 15

Accepted Solution

by:
badgermike earned 500 total points
ID: 24406337
Yes it does work - we have been using it for a while  withough issues and it does run on the profiles. The only thing is that I run scans during off hours because of users complaining of speed issues when I ran the scans during work hours. There also used to be a bug back in 08 that made some issues with the on demand scan preventing users from logging in and assigninig users temp profiles. The issue has since been resolved. We have been using for about a year with no issues.

0
 

Author Closing Comment

by:mrmut
ID: 31582273
Thank you very much.
I've done some testing and it seems everything runs very nice.
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Welcome to my series of short tips on migrations. Whilst based on Microsoft migrations the same principles can be applied to any type of migration. My first tip is around source server preparation. No migration is an easy migration, there is a…
Welcome to my series of short tips on migrations. Whilst based on Microsoft migrations the same principles can be applied to any type of migration. My first tip Migration Tip #1 – Source Server Health can be found listed in my profile here: http:…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question