Solved

Microsoft Security Compliance Manager WIndows 2008 R2 Baseline

Posted on 2010-11-23
3
817 Views
Last Modified: 2012-05-10
For some reason, the WIndows 2008 R2 baseline fails to download through the Microsoft Security Compliance Manager. It's the only one that fails, and it happens to be the only one that I need. I get an error that it cannot find the network connection; obviously it can for ALL the other ones so network access is not an issue. Does anyone else have this issue? Can I download the Windows 2008 R2 baseline manually?  
0
Comment
Question by:nsgguy245
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 37

Expert Comment

by:bbao
ID: 34207281
> I get an error that it cannot find the network connection

what's the result of IPCONFIG /ALL and ROUTE PRINT for this server? are you able to PING the target server and the internet?
0
 

Accepted Solution

by:
nsgguy245 earned 0 total points
ID: 34207362
This was actually resolved by Microsoft. I made no changes; my network was fine. Sounds like that particular file was just inaccessible on the MS site for a time.
0
 

Author Closing Comment

by:nsgguy245
ID: 34228737
This was a MS accessibility issue that was corrected by them.
0

Featured Post

Is Your AD Toolbox Looking More Like a Toybox?

Managing Active Directory can get complicated.  Often, the native tools for managing AD are just not up to the task.  The largest Active Directory installations in the world have relied on one tool to manage their day-to-day administration tasks: Hyena. Start your trial today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of you may be aware of the recent Google Docs scam emails that have been floating around coming from various people that you know. Here's a guide on identifying How To Identify the Scam Email You will see an email from someone you’ve had co…
Email attacks are the most common methods for initiating ransomware and phishing scams. Attackers want you to open an infected attachment or click a malicious link, and unwittingly download malware to your machine. Here are 7 ways you can stay safe.
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question