jueves, 21 de enero de 2010

Windows 7: Copy A Modified User Profile Over The Default Profile



Según el artículo de Microsoft que anexo, para personalizar un perfil de usuario de red predeterminado o un perfil de usuario obligatorio, es necesario personalizar en primer lugar el perfil de usuario local predeterminado. Una vez realizado, ya puedes copiar el perfil de usuario local predeterminado en el recurso compartido correspondiente para convertir ese perfil de usuario en el perfil predeterminado de red o en un perfil de usuario obligatorio.

Cuando el perfil predeterminado se personaliza de la forma descrita en este artículo, éste reconstruye el perfil de origen con un formato que permite que lo utilicen varios usuarios. Se trata del único método de personalización del perfil de usuario predeterminado para el sistema operativo Windows 7. Si intenta utilizar otros métodos para personalizar el perfil, puede provocar que se incluya información extraña en el nuevo perfil de usuario predeterminado. Dicha información podría causar graves problemas relacionados con la aplicación y la estabilidad del sistema operativo.

http://support.microsoft.com/kb/973289

Después de esto, aquí debajo describimos un Workaroun que puedes usar en entornos de testing para modificar el Default User Profile.Tener en cuenta que no está soportado por Microsoft con lo que usarlo bajo vuestra propia resposnsabilidad.
Espero que os sea de utilidad.

Windows 7: Copy A Modified User Profile Over The Default Profile

Below is the work around you can use to modify the Default profile by copying any profile you have previously modified over the Default profile. It is VERY much not supported by Microsoft, but for my limited tests seems to work.

The Steps: After setting up the profile for one user, lets call the account "Test", do the following:

0. Login as an admin user, but NOT Test (you don't want the files in the profile to be locked).

1. Go to c: drive in Explorer (or whatever your system drive is), hit the ALT key, go to the Tools Menu-> Folder Options and start unchecking "Hides" so Explorer sees all files (system, hidden and what not).

2. Go to Users\ and rename "Default" to "Default Back" (we want to keep the old one around in case things go south and we need to but the original Default profile back).

3. Make a copy of "Test", then rename the copy of "Test" (not the original!!!) to "Default".

4. Right click on "Default" and set the permissions so that the "Everyone" and "Users" groups have "Read & Execute", "List Folder Content" and "Read" NTFS permissions (this was the default already when I tested). At this point, you can use the Right click Computer -> "Properties"-> "Advanced System Settings"->"User Profiles" tool to delete the Adrian profile if you like.

5. Try to login as an account that does not already have a profile. If the new user's profile looks like the setting you did for "Test", all is good in the hood.

I have no idea what other problems may crop up later with this method, and keep in mind this is not the way Microsoft wants you to copy profiles. Use at your own risk, but so far these instructions have worked fine when I try to overwrite the Default user profile.

Security Advisory KB979352

Buenas tardes.Os informo de la próxima publicación de un nuevo boletín de seguridad considerado como Crítico y que afecta a todas las versiones de Internet Explorer, el cual será lanzado hoy 21 de Enero, fuera del ciclo mensual de boletines, debido a su alto impacto y criticidad.

Por este motivo, os recomiendo su revisión y la instalación de la actualización correspondiente.
A continuación os dejo los detalles técnicos de este boletín de seguridad.

--------------------------------------------------------

What is the purpose of this alert?

This is an advance notification of one out-of-band security bulletin that Microsoft is intending to release on January 21, 2010. The bulletin will be for Internet Explorer to address limited, targeted attacks against customers using Internet Explorer 6, as well as fixes for vulnerabilities rated Critical that are not currently under active attack.

The purpose of the notification is to assist customers with resource planning for this security bulletin release. The information offered in the notification is purposely general in nature to provide enough information for customers to plan for deployment without disclosing vulnerability details or other information that could put them at risk.

New Bulletin Summary
Bulletin Identifier Internet Explorer
Maximum Severity Rating Critical
Impact of Vulnerability Remote Code Execution
Restart Requirement The update will require a restart.
Affected Software All supported versions of Internet Explorer on Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008*, Windows 7, and Windows Server 2008 R2*.

* Where indicated in the Affected Software table on the Advance Notification Web Page, the vulnerabilities addressed by this update do not affect supported editions of Windows Server 2008 or Windows Server 2008 R2, when installed using the Server Core installation option. Please see the Advance Notification Web page at the link below for more details.

Although we do not anticipate any changes, the information provided in this summary is subject to change until the release.

The full version of the Microsoft Security Bulletin Advance Notification for this release can be found at http://www.microsoft.com/technet/security/bulletin/ms10-jan.mspx.

Public Bulletin Webcast

Microsoft will host a webcast to address customer questions on these bulletins:
Title: Information about Microsoft January (OOB) Security Bulletin (Level 200)
Date: Thursday, January 21, 2010, at 1:00 PM Pacific Time (U.S. & Canada).
URL: http://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032440627
At this time no additional information on these bulletins, such as details regarding severity or details regarding the vulnerability, will be made available until the bulletin is published.

Resources related to this alert

1. Security Advisory 979352 – Vulnerability in Internet Explorer Could Allow Remote Code Execution: http://www.microsoft.com/technet/security/advisory/979352.mspx

2. Microsoft Knowledge Base Article 979352: http://support.microsoft.com/kb/979352

3. Issue Landing Page: http://www.microsoft.com/security/updates/ie.aspx

4. Microsoft Security Response Center (MSRC) Blog: http://blogs.technet.com/msrc/

5. Microsoft Security Research & Defense (SRD) Blog: http://blogs.technet.com/srd/

6. Microsoft Malware Protection Center (MMPC) Blog: http://blogs.technet.com/mmpc/

7. Microsoft Security Development Lifecycle (SDL) Blog: http://blogs.msdn.com/sdl/