Skip to main content

IT Status Alerts

All Open Alerts

Go to Page: 1

6 results found, displaying all results.

Scheduled Service Change: PeopleSoft Online and Batch Object Weekly Migration on 8/5/21

Start:
2021-08-05 05:00:00
Status:
Open
Brief Description:
On August 5, 2021, approximately 5-7am, PeopleSoft Student Center, Faculty Center, Student Essentials, ePay, Student Admissions, Contributor Relations, Financial Aid, Student Financials, Student Records, and Student Employment (PSES) will be unavailable.
more details

Scheduled Service Change: KFS patch release on 8/1/21

Start:
2021-08-01 06:00:00
Status:
Open
Brief Description:
On this Sunday, August 01, 2021, from 6am-12pm EST, KFS, Cynergy, eShop, and Cynergy Applications will be unavailable during a patch release.
more details

Scheduled Service Change: Move to new ClearPass infrastructure on 8/4/21

Start:
2021-08-04 05:00:00
Status:
Open
Brief Description:
On Wednesday, August 4, 2021, between 5am-7am, CIT Network Engineering will move ClearPass to new hardware. ClearPass supports authentication for Cornell Wireless, CUVPN, and GuestID VPN. New authentications may be intermittent during that time.
more details

Scheduled Service Change: EZ-Backup: reboot server hosting most EZ-Backup instances on 8/3/21

Start:
2021-08-03 08:00:00
Status:
Open
Brief Description:
Much of the EZ-Backup Service will be down. Backup, Restore, Archive, Retrieve, or other EZ-Backup related processes run against nodes on the listed EZ-Backup servers during this time will fail. Users can rerun processes once maintenance completes.
more details

Security Alert: Urgent Windows zero-day - Printnightmare

Start:
2021-07-01 08:34:00
Status:
Open
Brief Description:
A critical zero-day vulnerability has just been announced in the Microsoft print spooler service and exploits are available in the wild. Print spooler services should be turned off, especially on domain controllers, until a patch is available.
Current Status:
UPDATE (July 7, 2021) Microsoft has announced additional mitigations will be required to fully address the “PrintNightmare” vulnerability, which is a remote code execution exploit in the Windows Print Spooler service documented by Microsoft on CVE-2021-34527. In addition to the patching detailed in our previous update, Microsoft also recommends changes to the Windows Registry. The IT Security Office (ITSO) has reviewed this additional measure, agrees with Microsoft’s recommendations, and will be making these changes automatically for managed desktop customers. Unmanaged customers should consult with their local IT support provider about which mitigations need to be taken for their systems. Be aware that after making the recommended changes, new printer installations will require admin credentials and will prompt users for automatic printer installs initiated via GPO. A very good write-up of the vulnerability and its impact can be found at the CMU Cert Coordination Center page https://www.kb.cert.org/vuls/id/383432 For managed desktop customers The July 7, 2021, Microsoft patches are available for installation and will be required to be installed by July 9, 2021, at 4:00pm. The registry changes will be pushed out via SCCM Compliance Baseline either by, or in collaboration with, Desktop Engineering. Units who want this change will submit a ticket to md-pc@cornell.edu and we will push the change to whichever group of computers they choose. For unmanaged desktop customers It is recommended that you work with your local IT support provider to ensure your computer is fully patched and using the recommended Windows Registry changes. For managed server customers The CIT Server Farm team has already implemented mitigations to Server Farm hosts that meet or exceed the recommendations issued by Microsoft. If you have concerns about your host, please contact the CIT Server Farm team. For unmanaged server customers The ITSO recommends immediate installation of all Microsoft patches for CVEs 2021-34527 and 2021-1675 and the implementation of the registry changes documented below. Registry changes: technical details (experienced admins and users with admin rights only) - Workstations: Modify the key with the following DWords HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint NoWarningNoElevationOnInstall = 0 (DWORD) or not defined (default setting) UpdatePromptSettings = 0 (DWORD) or not defined (default setting) - Servers with enabled print spoolers: Modify the key with the following DWords HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint RestrictDriverInstallationToAdministrators = 1 Note: Changes to the Windows Registry should only be attempted by experienced administrators or users. Sources • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527https://support.microsoft.com/en-us/topic/kb5005010-restricting-installation-of-new-printer-drivers-after-applying-the-july-6-2021-updates-31b91c02-05bc-4ada-a7ea-183b129578a7 • Cert Coordination Center https://www.kb.cert.org/vuls/id/383432 This information is based on current knowledge of the issue. We will provide additional updates as we learn more.
more details

Scheduled Service Change: Remove CUWebAuth from Shibboleth Identity Provider

Start:
2021-08-01 07:30:00
Status:
Open
Brief Description:
On Sunday, August 1, 2021, Shibboleth Identity Provider (IdP) will be disconnected from CUWebAuth in support of the upcoming service retirement deadline.
more details
Go to Page: 1