One more time for me. I got some very cool poetic justice on this patch and I owe it all to the Kixstart forums(Big thanks to NTDOC for writing the script)*bows to the power of NTDOC* [Cool] !

My corporate office sent an email out late last week to the branch office Network Admins saying that they are exploring options to roll out this patch. But they also said not to "worry" as they felt it wouldn't be exploited any time soon(i.e. Slammer).

With this forums help and a few hours on a Saturday 2 weekends ago I was NOT hit at all with this virus. Yes I had a few machines hiccup, and a couple of remote users that simply ignored the messages with instructions for them.

In the end, no infections and a handful of machines that I had to manually work on.

Thanks everybody!!

BTW...For those who don't know, there is a free utility to scan subnets for machines that have not been patched.

Click Here for the Retina DCOM Scanner