<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>The Server-Side Technology Staff &#8211; The Server Side Technology</title>
	<atom:link href="https://www.theserverside.technology/it/author/tsststaff/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.theserverside.technology/it</link>
	<description>in-depth information for tech pros</description>
	<lastBuildDate>Sat, 30 Oct 2021 15:18:38 +0000</lastBuildDate>
	<language>it-IT</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.0.1</generator>
	<item>
		<title>Come cancellare la history di Powershell (ma davvero)</title>
		<link>https://www.theserverside.technology/it/2021/10/30/how-to-clear-powershell-history-done-right/?pk_campaign=feed&#038;pk_kwd=how-to-clear-powershell-history-done-right</link>
					<comments>https://www.theserverside.technology/it/2021/10/30/how-to-clear-powershell-history-done-right/?pk_campaign=feed&#038;pk_kwd=how-to-clear-powershell-history-done-right#respond</comments>
		
		<dc:creator><![CDATA[The Server-Side Technology Staff]]></dc:creator>
		<pubDate>Sat, 30 Oct 2021 15:02:45 +0000</pubDate>
				<category><![CDATA[SysAdmins]]></category>
		<category><![CDATA[powershell]]></category>
		<category><![CDATA[trick]]></category>
		<category><![CDATA[windows server]]></category>
		<guid isPermaLink="false">https://www.theserverside.technology/?p=1678</guid>

					<description><![CDATA[<div style="margin: 5px 5% 10px 5%;"><img src="https://www.theserverside.technology/wp-content/uploads/2021/10/powershell-300x150.jpg" width="300" height="150" title="" alt="" /></div><div>
<p>Capita di avere la necessità di cancellare la history dei comandi Powershell inviati con un account. A noi, per esempio, è capitato quando abbiamo dovuto preparare dei template per le virtual machine dei nostri clienti ed era necessario attivare un software prima di completare il template.</p>



<p>Sfortunatamente questa attivazione avveniva per mezzo console e bisogna quindi inserire un comando con il codice di attivazione. Questo faceva si che il codice potesse poi essere visibile per gli utenti che usavano quel template che potevano accedere alla history semplicemente premendo PgUp. Se si cerca una soluzione si scopre che Powershell ha un comando per la cancellazione della history:</p>



Clear-History



<p>Tuttavia non tutti i comandi vengono rimossi. Alcuni vengono rimossi, altri no oppure proprio nessuno. Probabilmente non vengono rimosse le invocazioni di eseguibili e comandi esterni. Ad ogni modo, questo lascia la history, o parte di essa, disponibile per gli altri utenti.</p>



<p>C&#8217;è però un comando che consente di visualizzare quale sia il file in cui Powershell memorizza la history dell&#8217;utente:</p>



PS C:\Users\Administrator&#62; (Get-PSReadlineOption).HistorySavePath
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt



<p>Il file mostrato è quello della history. Basta quindi modificarl e rimuovere le righe che non si vogliono rendere disponibili per gli altri utenti.</p>



<p>Un trucco semplice ma rimane il mistero sul perché esista un comando dedicato che non funziona come ci si aspetterebbe.</p>
</div><img src="https://stats1.vaisulweb.cloud/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.theserverside.technology%2Fit%2F2021%2F10%2F30%2Fhow-to-clear-powershell-history-done-right%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dhow-to-clear-powershell-history-done-right&amp;action_name=Come+cancellare+la+history+di+Powershell+%28ma+davvero%29&amp;urlref=https%3A%2F%2Fwww.theserverside.technology%2Fit%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://www.theserverside.technology/it/2021/10/30/how-to-clear-powershell-history-done-right/?pk_campaign=feed&#038;pk_kwd=how-to-clear-powershell-history-done-right/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<enclosure url="https://www.theserverside.technology/wp-content/uploads/2021/10/powershell.jpg" length="19975" type="image/jpg" />
<media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.theserverside.technology/wp-content/uploads/2021/10/powershell-300x150.jpg" width="300" height="150" medium="image" type="image/jpeg">
	<media:copyright>The Server Side Technology</media:copyright>
	<media:title></media:title>
	<media:description type="html"><![CDATA[]]></media:description>
</media:content>
<media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://www.theserverside.technology/wp-content/uploads/2021/10/powershell-300x150.jpg" width="300" height="150" />
	</item>
		<item>
		<title>Windows Server 2022 and Azure Stack HCI: Microsoft is slowly attempting to murder Windows Server &#8211; part 1</title>
		<link>https://www.theserverside.technology/it/2021/08/21/windows-server-2022-and-azure-stack-hci-microsoft-is-slowly-attempting-to-murder-windows-server-part-1/?pk_campaign=feed&#038;pk_kwd=windows-server-2022-and-azure-stack-hci-microsoft-is-slowly-attempting-to-murder-windows-server-part-1</link>
					<comments>https://www.theserverside.technology/it/2021/08/21/windows-server-2022-and-azure-stack-hci-microsoft-is-slowly-attempting-to-murder-windows-server-part-1/?pk_campaign=feed&#038;pk_kwd=windows-server-2022-and-azure-stack-hci-microsoft-is-slowly-attempting-to-murder-windows-server-part-1#respond</comments>
		
		<dc:creator><![CDATA[The Server-Side Technology Staff]]></dc:creator>
		<pubDate>Sat, 21 Aug 2021 17:58:25 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[SysAdmins]]></category>
		<category><![CDATA[Windows Server]]></category>
		<category><![CDATA[azure]]></category>
		<category><![CDATA[azure stack]]></category>
		<category><![CDATA[azure stack hci]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[windows server]]></category>
		<guid isPermaLink="false">https://www.theserverside.technology/?p=1631</guid>

					<description><![CDATA[<div style="margin: 5px 5% 10px 5%;"><img src="https://www.theserverside.technology/wp-content/uploads/2021/08/server2022-300x169.jpg" width="300" height="169" title="" alt="" /></div><div>
<p>Microsoft released Windows Server 2022 a few weeks ago. It did so earlier than expected, which is pretty odd, but it seems that the development of new features was already complete and mature so there was no point to wait a few months more. The last sentence pretty much explains the current status of Windows Server: so few changes, albeit interesting ones, that the product can be released months earlier than planned and without much fanfare.</p>



<p>While generally speaking the development of new features and functionalities for server applications mostly moved out of the base operating system and while we can also concede that Windows Server has many features at the OS level so it is difficult to design new ones, the fact each new release of Windows Server keeps bringing few new features is definitely because of Microsoft errors. Server applications today are either simple, think about a website or a Web application, or complicated. In the latter case, you generally think about microservices, Kubernetes and so on.</p>



<p>So we might say that since a few years Windows Server became more a tool to build base infrastructures than the base for new applications. That means that you usually install something on top of Windows Server to manage and deploy applications and you don&#8217;t usually rely on OS services only to develop your application. It is safe to say that it is a common scenario because Linux too is experiencing the same transformation.</p>



<p>However, Microsoft could have responded to Linux popularity by upping the ante and push more innovation into Windows Server and they didn&#8217;t.</p>



Windows Server 2022 &#8211; continued fragmentation



<p>The new Windows Server version has some nice and neat features. Besides a better Kubernetes compatibility, which is basically mandatory today, it features and big work to improve security. Credit where is due. That improves a lot both standalone servers security but it is also a fundamental improvement when deploying clusters, the famous infrastructures. </p>



<p>Other improvements include TLS 1.3 enabled by default and a few improvements around SMB, all of them improve security.</p>



<p>There would be other two important features to mention, one of them would be very important, but surprise: they won&#8217;t be available to all customers but only to those using Azure. At least for now.</p>



<p>Microsoft introduced Windows Server Datacenter: Azure Edition, another attempt to fragment Windows Server but the first one to draw a line between &#8220;standard&#8221; Windows Server and Azure versions. And we cannot welcome this kind of behavior because it basically starts to leave non-Azure Windows Server installations behind in an attempt to force Windows customers to move to Azure. Quite frankly, this is indecent especially when you factor how much Windows Server costs when compared to its competitor.</p>



<p>Features that Microsoft is withholding from its non-Azure customers are very important.</p>



<p>First, there is the much awaited hot-patching, that is a way to patch Windows without rebooting. Microsoft aims to use hot-patching especially for security patches and it would be a very ground-breaking innovation when considering how many emergency updates are needed [...]</div><img src="https://stats1.vaisulweb.cloud/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.theserverside.technology%2Fit%2F2021%2F08%2F21%2Fwindows-server-2022-and-azure-stack-hci-microsoft-is-slowly-attempting-to-murder-windows-server-part-1%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dwindows-server-2022-and-azure-stack-hci-microsoft-is-slowly-attempting-to-murder-windows-server-part-1&amp;action_name=Windows+Server+2022+and+Azure+Stack+HCI%3A+Microsoft+is+slowly+attempting+to+murder+Windows+Server+%26%238211%3B+part+1&amp;urlref=https%3A%2F%2Fwww.theserverside.technology%2Fit%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://www.theserverside.technology/it/2021/08/21/windows-server-2022-and-azure-stack-hci-microsoft-is-slowly-attempting-to-murder-windows-server-part-1/?pk_campaign=feed&#038;pk_kwd=windows-server-2022-and-azure-stack-hci-microsoft-is-slowly-attempting-to-murder-windows-server-part-1/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<enclosure url="https://www.theserverside.technology/wp-content/uploads/2021/08/server2022.jpg" length="354615" type="image/jpg" />
<media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.theserverside.technology/wp-content/uploads/2021/08/server2022-300x169.jpg" width="300" height="169" medium="image" type="image/jpeg">
	<media:copyright>The Server Side Technology</media:copyright>
	<media:title></media:title>
	<media:description type="html"><![CDATA[]]></media:description>
</media:content>
<media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://www.theserverside.technology/wp-content/uploads/2021/08/server2022-300x169.jpg" width="300" height="169" />
	</item>
		<item>
		<title>L&#039;agent di Acronis, Windows Server Core e problemi di connessione SSL</title>
		<link>https://www.theserverside.technology/it/2020/06/16/acronis-agent-not-registered-windows-server-core-and-ssl-issues/?pk_campaign=feed&#038;pk_kwd=acronis-agent-not-registered-windows-server-core-and-ssl-issues</link>
					<comments>https://www.theserverside.technology/it/2020/06/16/acronis-agent-not-registered-windows-server-core-and-ssl-issues/?pk_campaign=feed&#038;pk_kwd=acronis-agent-not-registered-windows-server-core-and-ssl-issues#respond</comments>
		
		<dc:creator><![CDATA[The Server-Side Technology Staff]]></dc:creator>
		<pubDate>Tue, 16 Jun 2020 23:39:30 +0000</pubDate>
				<category><![CDATA[SysAdmins]]></category>
		<category><![CDATA[acronis]]></category>
		<category><![CDATA[powershell]]></category>
		<category><![CDATA[ssl]]></category>
		<category><![CDATA[tls1.2]]></category>
		<category><![CDATA[windows server]]></category>
		<category><![CDATA[windows server core]]></category>
		<guid isPermaLink="false">https://www.theserverside.technology/?p=1604</guid>

					<description><![CDATA[<div style="margin: 5px 5% 10px 5%;"><img src="https://www.theserverside.technology/wp-content/uploads/2020/06/ssl_website-300x174.jpeg" width="300" height="174" title="" alt="" /></div><div>Avevamo capito prima di procederre cosa fosse successo alle due macchine ma quella spiegazione è fuori dall&#8217;obbiettivo di questo post che si incentra su come poter recuperare velocemente da quella situazione.



<p>Qualche giorno fa abbiamo riscontrato uno strano problema su un paio di server dopo avere aggiornato gli agent di Acronis. La console non consentirva più l&#8217;esecuzione del piano di backup, sia in modo automatico che manuale, segnalando che l&#8217;agent non era più registrato. Sembrava molto strano visto che avevamo effettuato aggiornamenti degli agent diverse volte in passato senza riscontrare alcun problema ma questa volta gli agent non riuscivano più a registrarsi. </p>



<p>In realtà nello stesso ciclo di aggiornamenti avevamo avuto altri due problemi su macchine Linux ma questi erano spariti riavviando i due server. Inoltre, avevamo notato che i due server che presentavano questo problema erano installazioni di Windows Server Core che ospitavano SQL Server. Abbiamo quindi deciso di registrare nuovamente gli agent manualmente ma sorprendentemente non era possibile perchè l&#8217;agent si lamentava del fatto che il certificato dell&#8217;endpoint non fosse valido. Anzi, in maniera più specifica, che la Certification Authority fosse sconosciuta.</p>



<p>Quei due server funzionavano correttamente prima dell&#8217;aggiornamento e, cosa ancora più strana, sembrava che non fossimo in grado di registrare gli agent nemmeno usando l&#8217;endpoint di Acronis invece che il nostro endpoint specifico. Stesso errore. Se era possibile, anche se improbabile, che il nostro endpoint usasse un certificato che causava problemi &#8211; anche se funzionava correttamente con le altre macchine e nei browser &#8211; non era possibile che ci fosse qualche problema con quello di Acronis.</p>



Aggiornamento autorità di root



<p>L&#8217;errore riportato dall&#8217;agent era abbastanza indicativo ma noi avevamo problemi a collegarci agli endpoint anche in modo standard, usando per esempio Powershell</p>



Invoke-WebRequest -UseBasicParsing -Uri https://cloud.acronis.com



<p>C&#8217;era sicuramente un problema con le connessioni SSL. Anche se PowerShell restituiva un errore generico sull&#8217;impossibilità di completare la connessione, l&#8217;agent di Acronis riportava un errore di molto più specifico per il quale abbiamo deciso di aggiornare i certificati di root sulla macchina:</p>



md C:\Temp
cd C:\Temp
# Scarica TUTTI i certificati di root da Windows Update
certutil.exe -generateSSTFromWU roots.sst
# Importa TUTTI i certificati nello store delle autorità di root
$sstContainer = (Get-ChildItem -Path C:\temp\roots.sst)
$sstContainer &#124; Import-Certificate -CertStoreLocation Cert:\LocalMachine\Root



<p>Dopo aver lanciato questo questi comandi sarà necessario riavviare la macchina per consentirle di ricaricare tutti i certificati.</p>



Problemi di cifratura



<p>Questo non ha risolto il problema di per sè. Quando la macchina è tornata online le connessioni agli endpoint di Acronis continuavano a non riuscire anche se con un errore diverso da parte dell&#8217;agent e lo stesso errore da parte di Powershell. Abbiamo quindi deciso di verificare meglio se fosse un problema di cifratura e di forzare le connessioni TLS1.2 in Powershell usando:</p>



# Forza PowerShell ad usare TLS1.2
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12



<p>Ovviamente devi ricordare di non chiudere la sessione o perderai l&#8217;impostazione effettuata e dovrai applicarla di nuovo. Un altro tentativo di connessione ai nostri endpoint e &#8230; bingo! Ora tutto funzionava correttamente! </p>



PS C:\temp> Invoke-WebRequest -UseBasicParsing -Uri https://backup.vaisulweb.cloud                  [...]</div><img src="https://stats1.vaisulweb.cloud/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.theserverside.technology%2Fit%2F2020%2F06%2F16%2Facronis-agent-not-registered-windows-server-core-and-ssl-issues%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dacronis-agent-not-registered-windows-server-core-and-ssl-issues&amp;action_name=L%27agent+di+Acronis%2C+Windows+Server+Core+e+problemi+di+connessione+SSL&amp;urlref=https%3A%2F%2Fwww.theserverside.technology%2Fit%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://www.theserverside.technology/it/2020/06/16/acronis-agent-not-registered-windows-server-core-and-ssl-issues/?pk_campaign=feed&#038;pk_kwd=acronis-agent-not-registered-windows-server-core-and-ssl-issues/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<enclosure url="https://www.theserverside.technology/wp-content/uploads/2020/06/ssl_website.jpeg" length="50287" type="image/jpg" />
<media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.theserverside.technology/wp-content/uploads/2020/06/ssl_website-300x174.jpeg" width="300" height="174" medium="image" type="image/jpeg">
	<media:copyright>The Server Side Technology</media:copyright>
	<media:title></media:title>
	<media:description type="html"><![CDATA[]]></media:description>
</media:content>
<media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://www.theserverside.technology/wp-content/uploads/2020/06/ssl_website-300x174.jpeg" width="300" height="174" />
	</item>
		<item>
		<title>The little virtual machine that is crashing Hyper-V on AMD</title>
		<link>https://www.theserverside.technology/it/2020/03/22/the-little-virtual-machine-that-is-crashing-hyper-v-on-amd/?pk_campaign=feed&#038;pk_kwd=the-little-virtual-machine-that-is-crashing-hyper-v-on-amd</link>
					<comments>https://www.theserverside.technology/it/2020/03/22/the-little-virtual-machine-that-is-crashing-hyper-v-on-amd/?pk_campaign=feed&#038;pk_kwd=the-little-virtual-machine-that-is-crashing-hyper-v-on-amd#respond</comments>
		
		<dc:creator><![CDATA[The Server-Side Technology Staff]]></dc:creator>
		<pubDate>Sun, 22 Mar 2020 16:50:57 +0000</pubDate>
				<category><![CDATA[SysAdmins]]></category>
		<category><![CDATA[amd]]></category>
		<category><![CDATA[hyper-v]]></category>
		<category><![CDATA[intel]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[virtual machines]]></category>
		<category><![CDATA[virtualization]]></category>
		<category><![CDATA[windows server]]></category>
		<guid isPermaLink="false">https://www.theserverside.technology/?p=1545</guid>

					<description><![CDATA[<div style="margin: 5px 5% 10px 5%;"><img src="https://www.theserverside.technology/wp-content/uploads/2020/03/hyperv_1280-300x169.jpg" width="300" height="169" title="" alt="" /></div><div>
<p>At VaiSulWeb virtualization is so pervasive that basically there aren&#8217;t physical machines other than virtualization hosts or storage since about 2008 or 2009. That means about 10 years now. And counting. Microsoft Hyper-V served us very well and over time our reliance on that technology increased with happy results. It has been solid and consistent and allowed us to scale up more and more, adding new technologies and solutions and enabling us to virtualize roles and workloads that seemed a bit difficult to virtualize.</p>



<p>As many other providers, we recently started integrating AMD CPUs into our infrastructure, given the terrific advantages that those could bring to the datacenter especially for generic or mixed workloads. Only a subset of our infrastructure has been migrated to the new AMD servers but things got easier because of the many advantages that the Windows Server (+ Hyper-V) platform could provide and we carefully started to fill those hosts by migrating workloads. Results have been very pleasing.</p>



Performance improvements and security



<p>As we had planned, we immediately started benefiting of performance improvements. Not only CPU-bound tasks were faster but also I/O performance were terrific. </p>



<p>One of our goals was also to improve security by using AMD technologies that showed better resiliency when dealing with security issues when compared to Intel chipsets and CPUs and we were also prepared to face a few limitations. For example, Hyper-V isolated containers are not supported on non-Intel CPUs and thus cannot be used.</p>



<p>We started migrating our workloads to the new servers and Hyper-V functionalities like shared-nothing live migration and live migrations made the process quite easy and straightforward. In a few days about 80% of the target workloads have been migrated with minimal or no disruption at all. So far so good.</p>



Unexpected crashes



<p>Then something odd happened: one of the hosts started to crash. That was surely something we rarely faced in our 10+-years-long experience with Hyper-V but that specific host was crashing up to 2-3 times per day and while it usually was back online in about 2 minutes with all of its VMs restarted, the virtual machines that it was hosting were obviously also crashing causing downtimes. That was very surprising since similar machines (basically identical since they were using the same components) were not exhibiting any issue even after running for weeks in production and even more in our labs.</p>



<p>That machine had been running for days without issues then started crashing 2-3 times per day with no traceable pattern. Sometimes it could run for hours (10 or more) without issues, sometimes it was crashing two times in 15 minutes. Weird. And scary.</p>



<p>We decided to halt our migration to ensure that we didn&#8217;t miss any incompatibility between Windows Server 2019 and those AMD servers yet other servers were not having any issue and tracing back the issues we had, that specific machine had not been exhibiting issues for days before it started crashing so often.</p>



Diagnosing the issues



<p>The first thing that you might want to do in such cases is to ensure [...]</div><img src="https://stats1.vaisulweb.cloud/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.theserverside.technology%2Fit%2F2020%2F03%2F22%2Fthe-little-virtual-machine-that-is-crashing-hyper-v-on-amd%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dthe-little-virtual-machine-that-is-crashing-hyper-v-on-amd&amp;action_name=The+little+virtual+machine+that+is+crashing+Hyper-V+on+AMD&amp;urlref=https%3A%2F%2Fwww.theserverside.technology%2Fit%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://www.theserverside.technology/it/2020/03/22/the-little-virtual-machine-that-is-crashing-hyper-v-on-amd/?pk_campaign=feed&#038;pk_kwd=the-little-virtual-machine-that-is-crashing-hyper-v-on-amd/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<enclosure url="https://www.theserverside.technology/wp-content/uploads/2020/03/hyperv_1280.jpg" length="54089" type="image/jpg" />
<media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.theserverside.technology/wp-content/uploads/2020/03/hyperv_1280-300x169.jpg" width="300" height="169" medium="image" type="image/jpeg">
	<media:copyright>The Server Side Technology</media:copyright>
	<media:title></media:title>
	<media:description type="html"><![CDATA[]]></media:description>
</media:content>
<media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://www.theserverside.technology/wp-content/uploads/2020/03/hyperv_1280-300x169.jpg" width="300" height="169" />
	</item>
		<item>
		<title>Microsoft rilascia una patch inusuale per Windows Server 2003 e Windows XP</title>
		<link>https://www.theserverside.technology/it/2019/05/15/microsoft-rilascia-una-patch-inusuale-per-windows-server-2003-e-windows-xp/?pk_campaign=feed&#038;pk_kwd=microsoft-releases-unusual-patches-for-windows-server-2003-and-windows-xp</link>
					<comments>https://www.theserverside.technology/it/2019/05/15/microsoft-rilascia-una-patch-inusuale-per-windows-server-2003-e-windows-xp/?pk_campaign=feed&#038;pk_kwd=microsoft-releases-unusual-patches-for-windows-server-2003-and-windows-xp#respond</comments>
		
		<dc:creator><![CDATA[The Server-Side Technology Staff]]></dc:creator>
		<pubDate>Wed, 15 May 2019 10:39:48 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[nla]]></category>
		<category><![CDATA[rdp]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[windows server 2003]]></category>
		<category><![CDATA[windows xp]]></category>
		<guid isPermaLink="false">https://www.theserverside.technology/?p=1377</guid>

					<description><![CDATA[<div style="margin: 5px 5% 10px 5%;"><img src="https://www.theserverside.technology/wp-content/uploads/2019/05/windows_server_2003_wallp-300x169.jpg" width="300" height="169" title="" alt="" /></div><div><p>Con una mossa inusuale, Microsoft ha rilasciato una patch per Windows Server 2003 e Windows XP. Questi sistemi operativi sono considerati obsoleti da lungo tempo e di solito non ricevono aggiornamenti che non siano legati ad accordi speciali siglati con i clienti. Tuttavia anche in passato Microsoft ha rilasciato in via eccezionale aggiornamenti per Windows Server 2003 quando il ransomware WannaCry era all&#8217;apice della difusione e stava compromettendo diverse migliaia di macchine. Questa volta le correzioni riguardano Remote Desktop Protocol (RDP) e le vulnerabilità possono essere probabilmente mitigate attivando NLA, una configurazione che richiede l&#8217;autenticazione prima di effettuare la connessione alla macchina. Questo renderebbe probabilmente non efficace la vulnerabilità. L&#8217;attivazione di NLA è da tempo una configurazione raccomandata per tutti i sistemi Windows per limitare le possibilità di accessi non autorizzati e attacchi DDoS e si ritiene che la  maggior parte delle macchine oggi abbiano questa configurazione.</p>
<p>Gli utenti interessati che usino Windows Server 2003 o Windows XP possono nel frattempo installare l&#8217;aggiornamento visitando questa pagina per ottenere maggiori informazioni.</p>
</div><img src="https://stats1.vaisulweb.cloud/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.theserverside.technology%2Fit%2F2019%2F05%2F15%2Fmicrosoft-rilascia-una-patch-inusuale-per-windows-server-2003-e-windows-xp%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dmicrosoft-releases-unusual-patches-for-windows-server-2003-and-windows-xp&amp;action_name=Microsoft+rilascia+una+patch+inusuale+per+Windows+Server+2003+e+Windows+XP&amp;urlref=https%3A%2F%2Fwww.theserverside.technology%2Fit%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://www.theserverside.technology/it/2019/05/15/microsoft-rilascia-una-patch-inusuale-per-windows-server-2003-e-windows-xp/?pk_campaign=feed&#038;pk_kwd=microsoft-releases-unusual-patches-for-windows-server-2003-and-windows-xp/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<enclosure url="https://www.theserverside.technology/wp-content/uploads/2019/05/windows_server_2003_wallp.jpg" length="53597" type="image/jpg" />
<media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.theserverside.technology/wp-content/uploads/2019/05/windows_server_2003_wallp-300x169.jpg" width="300" height="169" medium="image" type="image/jpeg">
	<media:copyright>The Server Side Technology</media:copyright>
	<media:title></media:title>
	<media:description type="html"><![CDATA[]]></media:description>
</media:content>
<media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://www.theserverside.technology/wp-content/uploads/2019/05/windows_server_2003_wallp-300x169.jpg" width="300" height="169" />
	</item>
	</channel>
</rss>
