{"id":2536,"date":"2017-05-17T12:26:22","date_gmt":"2017-05-17T10:26:22","guid":{"rendered":"http:\/\/lestfrexgn.cluster020.hosting.ovh.net\/?p=2536"},"modified":"2017-05-17T12:26:22","modified_gmt":"2017-05-17T10:26:22","slug":"sccm-des-requetes-pour-reperer-les-systemes-sensibles-a-wannacrypt","status":"publish","type":"post","link":"https:\/\/les2t.fr\/fr_fr\/sccm-des-requetes-pour-reperer-les-systemes-sensibles-a-wannacrypt\/","title":{"rendered":"SCCM \u2013 Des requ\u00eates pour rep\u00e9rer les syst\u00e8mes sensibles \u00e0 WannaCrypt"},"content":{"rendered":"<p><a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2430\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft.png\" alt=\"\" width=\"800\" height=\"250\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft.png 800w, https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft-480x150.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw\" \/><\/a><\/p>\n<p>Microsoft a publi\u00e9 un article venant des ing\u00e9nieurs de support pour aider les professionnels de l\u2019IT \u00e0 d\u00e9couvrir les syst\u00e8mes pouvant \u00eatre attaqu\u00e9 par le Malware Wannacrypt.<\/p>\n<p><!--more--><\/p>\n<p>Vous trouverez dans celui-ci ce qu\u2019il vous faut pour les syst\u00e8mes d\u2019exploitations encore soutenus par Microsoft.<\/p>\n<p>Pour lire l\u2019article\u00a0:<\/p>\n<p>https:\/\/blogs.technet.microsoft.com\/configurationmgr\/2017\/05\/15\/configuration-manager-sql-queries-to-help-it-pros-report-on-kbs-related-to-ms17-010\/<\/p>\n<p>Pour lire le guide officiel des attaques WannaCrypt\u00a0:<\/p>\n<p>https:\/\/blogs.technet.microsoft.com\/msrc\/2017\/05\/12\/customer-guidance-for-wannacrypt-attacks\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft a publi\u00e9 un article venant des ing\u00e9nieurs de support pour aider les professionnels de l\u2019IT \u00e0 d\u00e9couvrir les syst\u00e8mes pouvant \u00eatre attaqu\u00e9 par le Malware Wannacrypt.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[77],"tags":[36,114,160,48,168],"class_list":["post-2536","post","type-post","status-publish","format-standard","hentry","category-divers","tag-microsoft","tag-sccm","tag-truc-et-astuces","tag-windows","tag-windows-10"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SCCM \u2013 Des requ\u00eates pour rep\u00e9rer les syst\u00e8mes sensibles \u00e0 WannaCrypt - Les2T<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/les2t.fr\/fr_fr\/sccm-des-requetes-pour-reperer-les-systemes-sensibles-a-wannacrypt\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SCCM \u2013 Des requ\u00eates pour rep\u00e9rer les syst\u00e8mes sensibles \u00e0 WannaCrypt - Les2T\" \/>\n<meta property=\"og:description\" content=\"Microsoft a publi\u00e9 un article venant des ing\u00e9nieurs de support pour aider les professionnels de l\u2019IT \u00e0 d\u00e9couvrir les syst\u00e8mes pouvant \u00eatre attaqu\u00e9 par le Malware Wannacrypt.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/les2t.fr\/fr_fr\/sccm-des-requetes-pour-reperer-les-systemes-sensibles-a-wannacrypt\/\" \/>\n<meta property=\"og:site_name\" content=\"Les2T\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-17T10:26:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft.png\" \/>\n<meta name=\"author\" content=\"TRARBACH Jean-Yves\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"TRARBACH Jean-Yves\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/les2t.fr\/sccm-des-requetes-pour-reperer-les-systemes-sensibles-a-wannacrypt\/\",\"url\":\"https:\/\/les2t.fr\/sccm-des-requetes-pour-reperer-les-systemes-sensibles-a-wannacrypt\/\",\"name\":\"SCCM \u2013 Des requ\u00eates pour rep\u00e9rer les syst\u00e8mes sensibles \u00e0 WannaCrypt - Les2T\",\"isPartOf\":{\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/les2t.fr\/sccm-des-requetes-pour-reperer-les-systemes-sensibles-a-wannacrypt\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/les2t.fr\/sccm-des-requetes-pour-reperer-les-systemes-sensibles-a-wannacrypt\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft.png\",\"datePublished\":\"2017-05-17T10:26:22+00:00\",\"author\":{\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e\"},\"breadcrumb\":{\"@id\":\"https:\/\/les2t.fr\/sccm-des-requetes-pour-reperer-les-systemes-sensibles-a-wannacrypt\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/les2t.fr\/sccm-des-requetes-pour-reperer-les-systemes-sensibles-a-wannacrypt\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/les2t.fr\/sccm-des-requetes-pour-reperer-les-systemes-sensibles-a-wannacrypt\/#primaryimage\",\"url\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft.png\",\"contentUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/les2t.fr\/sccm-des-requetes-pour-reperer-les-systemes-sensibles-a-wannacrypt\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/les2t.fr\/fr_fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SCCM \u2013 Des requ\u00eates pour rep\u00e9rer les syst\u00e8mes sensibles \u00e0 WannaCrypt\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#website\",\"url\":\"https:\/\/les2t.fr\/fr_fr\/\",\"name\":\"Les2T\",\"description\":\"| BLOG  IT |\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/les2t.fr\/fr_fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e\",\"name\":\"TRARBACH Jean-Yves\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg\",\"contentUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg\",\"caption\":\"TRARBACH Jean-Yves\"},\"description\":\"Head Of Modern Workplace Metsys MVP Windows &amp; devices For IT\",\"sameAs\":[\"https:\/\/les2t.fr\/jean-yves-trarbach\/\"],\"url\":\"https:\/\/les2t.fr\/fr_fr\/author\/kounac\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SCCM \u2013 Des requ\u00eates pour rep\u00e9rer les syst\u00e8mes sensibles \u00e0 WannaCrypt - Les2T","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/les2t.fr\/fr_fr\/sccm-des-requetes-pour-reperer-les-systemes-sensibles-a-wannacrypt\/","og_locale":"fr_FR","og_type":"article","og_title":"SCCM \u2013 Des requ\u00eates pour rep\u00e9rer les syst\u00e8mes sensibles \u00e0 WannaCrypt - Les2T","og_description":"Microsoft a publi\u00e9 un article venant des ing\u00e9nieurs de support pour aider les professionnels de l\u2019IT \u00e0 d\u00e9couvrir les syst\u00e8mes pouvant \u00eatre attaqu\u00e9 par le Malware Wannacrypt.","og_url":"https:\/\/les2t.fr\/fr_fr\/sccm-des-requetes-pour-reperer-les-systemes-sensibles-a-wannacrypt\/","og_site_name":"Les2T","article_published_time":"2017-05-17T10:26:22+00:00","og_image":[{"url":"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft.png","type":"","width":"","height":""}],"author":"TRARBACH Jean-Yves","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"TRARBACH Jean-Yves"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/les2t.fr\/sccm-des-requetes-pour-reperer-les-systemes-sensibles-a-wannacrypt\/","url":"https:\/\/les2t.fr\/sccm-des-requetes-pour-reperer-les-systemes-sensibles-a-wannacrypt\/","name":"SCCM \u2013 Des requ\u00eates pour rep\u00e9rer les syst\u00e8mes sensibles \u00e0 WannaCrypt - Les2T","isPartOf":{"@id":"https:\/\/les2t.fr\/fr_fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/les2t.fr\/sccm-des-requetes-pour-reperer-les-systemes-sensibles-a-wannacrypt\/#primaryimage"},"image":{"@id":"https:\/\/les2t.fr\/sccm-des-requetes-pour-reperer-les-systemes-sensibles-a-wannacrypt\/#primaryimage"},"thumbnailUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft.png","datePublished":"2017-05-17T10:26:22+00:00","author":{"@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e"},"breadcrumb":{"@id":"https:\/\/les2t.fr\/sccm-des-requetes-pour-reperer-les-systemes-sensibles-a-wannacrypt\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/les2t.fr\/sccm-des-requetes-pour-reperer-les-systemes-sensibles-a-wannacrypt\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/les2t.fr\/sccm-des-requetes-pour-reperer-les-systemes-sensibles-a-wannacrypt\/#primaryimage","url":"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft.png","contentUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft.png"},{"@type":"BreadcrumbList","@id":"https:\/\/les2t.fr\/sccm-des-requetes-pour-reperer-les-systemes-sensibles-a-wannacrypt\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/les2t.fr\/fr_fr\/"},{"@type":"ListItem","position":2,"name":"SCCM \u2013 Des requ\u00eates pour rep\u00e9rer les syst\u00e8mes sensibles \u00e0 WannaCrypt"}]},{"@type":"WebSite","@id":"https:\/\/les2t.fr\/fr_fr\/#website","url":"https:\/\/les2t.fr\/fr_fr\/","name":"Les2T","description":"| BLOG  IT |","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/les2t.fr\/fr_fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e","name":"TRARBACH Jean-Yves","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/image\/","url":"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg","contentUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg","caption":"TRARBACH Jean-Yves"},"description":"Head Of Modern Workplace Metsys MVP Windows &amp; devices For IT","sameAs":["https:\/\/les2t.fr\/jean-yves-trarbach\/"],"url":"https:\/\/les2t.fr\/fr_fr\/author\/kounac\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/posts\/2536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/comments?post=2536"}],"version-history":[{"count":0,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/posts\/2536\/revisions"}],"wp:attachment":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/media?parent=2536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/categories?post=2536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/tags?post=2536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}