MENU

Status Updates


UM System wide outages can be found on the UM IT System Status website.

Current Outages

Currently there are no outages.

Upcoming Outages

 Campus edge firewall firmware upgrade (11/4/2017 10:00:00 PM - 11/5/2017 8:00:00 AM)

The campus edge firewall will get firmware upgrades and reboots. There should be a series of about 4 outages lasting about 1 to 2 seconds each. No major impact is expected.

Past Outages (Last 72 Hours)

There have been no outages over the last 72 hours.

Current and Upcoming Change Management Notices

 Storage Array Maintenance (12/21/2015 7:00:00 AM)

We will be performing maintenance on our storage arrays. This could result in reduced performance during the process. Our DR array will be worked on first, followed by the production array.

 vCenter Patching (12/23/2015 7:00:00 AM)

We will be applying patches to our vCenter instance. VMs will be unaffected, but no changes to existing VMs will be possible during the upgrade process.

 Enable DNSsec on UMKC managed DNS zones (5/16/2016 12:00:00 PM)

DNSsec signing will be enabled on DNS zones managed by UMKC. This is the first of two parts to better ensuring UMKC DNS information is not tampered with by end ISPs. The second step is to publish the signing key with our registrars, so that outside sites can validate the signing. This will take place at a later date after we confirm the signing is working. (second step can result in loss of name resolution if the first step has any errors)

 Disable IPv6 Source Routing capability on Windows OS devices (5/17/2016 8:00:00 AM)

IPv6 Source Routing is likely enabled by default on Windows OS devices. This will be disabled via a group policy registry key. This will only take effect after a reboot, after the group policy change is put into place. Source Routing is normally only used for testing and diagnostics, and should not be used for production, and can be abused by attackers trying to get around network security devices.

 Emergency data center firewall reboot (5/17/2016 10:00:00 PM)

Due to performance issues seen on the data center firewall, a reboot will be performed tonight between 10pm and 11pm to clear the data plane CPU. This will result in two 1 minute outages as we fail over the firewalls for the reboot.

We are also working to identify high bandwidth uses of data center resources, and working to set reasonable limits on those systems, to ensure enough bandwidth is available for all other users.

 DNSsec public keys will be posted to DNS domain name registrars (5/20/2016 8:00:00 AM)

Once the initial DNSsec signing has been validated, the DNSsec public keys will be posted to our DNS registrars. At that point enforcement of the signing will take effect. This will be done on May 20th, a few days after the initial signing has started, and once the signing has been validated.

 Domain controller security change (5/25/2016 5:30:00 AM)

A security change will be made between UMKC's domain controller and the Active Directory root. This change is necessary to eliminate the use of RC4 ciphers between domains. This will enable Kerberos tickets that cross domains to use AES encryption.

This change should not cause any outages, and should strengthen the signing of Kerberos tickets.

This is a necessary step to re-attempting to disable RC4 Kerberos ticket signing at UMKC. When we disabled RC4 Kerberos ticket signing, any unauthorized Windows 2003 and XP machines will stop talking to Active Directory.

 Proactive Data Center Firewall reboot (6/4/2016 10:00:00 PM)

In order to avoid any issues that may have to do with long uptime (potential memory or process leaks), a Data Center firewall reboot will be performed roughly every 21 days on a weekend during the network maintenance time window. These firewalls participate in active routing, so even with a failover, there is a 1 minute network outage as routing tables sync up.

 Change in Windows 7 and Windows servers to prevent caching passwords in memory (6/23/2016 8:00:00 AM)

(Note adjusting to 23rd from 22nd due to a calendar issue) A change will be applied as per Microsoft KB: https://support.microsoft.com/en-us/kb/2871997 to prevent storing password in memory. This change already exists on Windows 10 machines deployed widely on campus, and Windows 2012 R2 machines. This will bring Windows 7 and Windows 2008/2008R2/2012 servers up to the same level of security. Since this is already running on newer machines successfully, this should not be a major problem.

 Proactive Data Center Firewall reboot (6/25/2016 10:00:00 PM)

In order to avoid any issues that may have to do with long uptime (potential memory or process leaks), a Data Center firewall reboot will be performed roughly every 21 days on a weekend during the network maintenance time window. These firewalls participate in active routing, so even with a failover, there is a 1 minute network outage as routing tables sync up.

 Campus WiFi controller update (6/26/2016 11:45:00 PM)

Wireless will be down while the controllers reboot a few times as part of applying their new code and the APs will reboot prior to rejoining the controller. The Access Points will not be broadcasting nor allowing any WiFi traffic for a period of time that is usually no greater than an hour. All wired traffic should remain unaffected.

 Proactive Data Center Firewall reboot (7/9/2016 10:00:00 PM)

In order to avoid any issues that may have to do with long uptime (potential memory or process leaks), a Data Center firewall reboot will be performed roughly every 21 days on a weekend during the network maintenance time window. These firewalls participate in active routing, so even with a failover, there is a 1 minute network outage as routing tables sync up.

 Enabling Flashback on KC-ISIA-ORAPRD1 (7/15/2016 12:30:00 AM)

KC-ISIA-ORAPRD1 will be down for like 10 minutes during this time.

 Emergency reboot of campus edge firewalls tonight (7/18/2016 10:00:00 PM)

Due to a problem on the campus edge firewalls, a reboot is needed to reset their licensing status. This should not result in any traffic outage due to the redundant setup of the firewalls, but there is a chance of traffic problems with any restart.

 Demotion and removal of KC-DC03 (7/19/2016 8:00:00 AM)

The Domain Controller KC-DC03 will be demoted and taken out of service. The location this DC is currently in, will no longer be used for data center services. This still leaves 3 Domain Controllers on campus, and two off campus for DR and Exchange Support purposes. Systems should already be using the generic names for finding Active Directory services, so this should be a minor change.

 Shutdown of 134.193.159.52 and 2610:e0:a040:68fd::2 for DNS (7/20/2016 8:00:00 AM)

The IP addresses of 134.193.159.52 and 2610:e0:a040:68fd::2 will be taken out of service as a valid client DNS servers at UMKC. The location this DNS server is in, will no longer be used as a Data Center, and the subnet is not a portable subnet, so it cannot be moved to a new location to keep these IP addresses active.

The remaining client DNS IP addresses are:
134.193.1.2
134.193.83.4
2610:e0:a040:64fc::2
2610:e0:a040:6401::2

Any system manually setting DNS servers, should ensure they are only using the above remaining IP addresses. The DNS server will also be monitored to identify any systems still using the old settings. DHCP enabled machines should already be using the new settings.

 Proactive Data Center Firewall reboot (7/23/2016 10:00:00 PM)

In order to avoid any issues that may have to do with long uptime (potential memory or process leaks), a Data Center firewall reboot will be performed roughly every 21 days on a weekend during the network maintenance time window. These firewalls participate in active routing, so even with a failover, there is a 1 minute network outage as routing tables sync up.

 Starfish Connect Production Instance is being upgraded to version 6.4 (8/6/2016 1:15:00 AM)

The Starfish Connect PRD server is being upgraded to version 6.4 this weekend. This is a SAAS solution and is not an opt-in/opt-out type of upgrade. This CM notice is being posted simply to record this change.

 Upgrade campus data center boundary firewalls and Internet edge firewalls to current software level (8/6/2016 10:00:00 PM)

The data center boundary firewall pair and the Internet edge firewalls will be upgraded to the current software levels. This will hopefully help with resource issues seen on the data center firewalls, but also to ensure current levels of fixes. At this time we will stay in the same software major version and only update to its current fixes version. A major version upgrade will be done later when more time can be planned out on the upgrade.

For the Data Center, there will be two 1-minute outages as the firewall pair is involved in OSPF routing that is slow to converge properly on campus.

For the campus edge pair, there should not be any noticable outage as the failover is very fast due to static routing.

 dropbox.umkc.edu update (9/2/2016 10:00:00 PM)

Dropbox.umkc.edu service will be offline September 2, 2016 Friday night for a system update.

 WebEx Faculty / Staff Site Authentication Changes (9/4/2016 9:00:00 AM)

Information Services will be enabling shibboleth authentication on the WebEx Faculty / Staff site umkc.webex.com on Sunday Sept 4th at 9:00am. These changes are expected to take a few hours to complete and during this time users will not be able to access the umkc.webex.com site.

 Urgent campus WiFi controller update to fix major bugs found in new product line (9/4/2016 11:55:00 PM)

Wireless will be down while the controllers reboot a couple of times as part of applying their new code and the APs will reboot prior to rejoining the controller. The Access Points will not be broadcasting nor allowing any WiFi traffic for a period of time that is usually no greater than an hour. Some wired traffic will be affected, such as the ports on our existing 1810w devices.

 Removal of existing Operations Manager agents on campus computers (9/15/2016 12:00:00 PM)

A bootup script change will be made to remove all old versions of Microsoft Operations Manager from campus computers. This will remove 2012R2 and older versions of the agents.

The Operations Manager server is used to collect antivirus events from campus Windows computers. (servers and workstations run this agent)

A new Operations Manager server will be setup using the new 2016 edition of the software. Once installed, the new agents will be deployed to campus computers. Due to problems with some of the settings of the older configuration, a full removal of the old settings and agents is being done first, to ensure the cleanest move into the new edition.

This change will not affect end-users, this is a behind the scenes change of the agents installed on the machines. These changes will happen at reboot time only.

 Datacenter firewall settings change (9/21/2016 10:00:00 PM)

A settings change will be made on the datacenter firewall, that should not be disruptive, but in case it causes problems is being scheduled.
This change will occur at 10pm, and will be reversed if any problems are seen with traffic flow.
The change is intended to lower the dataplane CPU problem we have been seeing over the past two days, in order to ensure we do not have another outage or network slowdown, and is a recommended change by the vendor support team.

 Firmware upgrade of campus edge firewalls (10/1/2016 10:00:00 PM)

In order to support a new licensing model for VPN connections, the campus edge firewall will be upgraded. This is an intermediate version upgrade, a further version upgrade is still scheduled for December to get to the newest set of capabilities.

New versions of Apple iOS and macOS no longer support PPTP VPN connections. In order to provide a VPN capability, a new type of VPN will be setup on the campus firewall, in hopes of supporting these devices. A firmware upgrade is needed to enable the first level of the licensing needed.

The firewall reboot will upgrade one unit at a time. The edge firewalls are setup so that there should be only a 2 second outage as each unit switches over, so no significant impact on services is expected.

 KMS changes for Windows 2016 and Windows 7 (10/19/2016 4:27:00 PM)

KMS licensing servers have been changed to two KMS servers, due to incompatibility with imaged Windows 7 machines and the newer 2016 KMS server code. New Windows 2016 machines will be pointed to the new KMS server, and all other machines will point at the legacy KMS due to this compatibility issue.

 Parking.umkc.edu System Upgrade (10/23/2016 7:00:00 PM)

The parking.umkc.edu server/web site will be offline on Sunday 23, 2016 at 7PM for a system upgrade.

 Switch active PaloAlto unit for campus Internet edge (11/17/2016 11:00:00 PM)

Due to the an unexpected switch of the active/passive setup on the PaloAlto, this will be switched back tonight. Normally switch-over of which unit is active only affects traffic for 2 to 5 seconds. No other impact is expected.

 Upgrade Filemaker server form v13 to v15. (11/18/2016 6:00:00 PM)

Upgrade Filemaker server form v13 to v15 on KC-ISIA_FMP01

 Functionality change with Papercut (11/21/2016 10:00:00 AM)

We will be changing the functionality where the database throws an error for a alphanumeric input (SSO) by the user. The current functionality is causing security issues.

 Apply Oracle CPU patch on KC-CBORD-GOLDDB (11/22/2016 10:00:00 PM)

Applying July Oracle CPU patch on KC-CBORD-GOLDDB

 Change of the file download source for Windows Desktops and Laptops (12/12/2016 2:00:00 PM)

In order to avoid a bottleneck we are facing with workstation (desktop and laptop) updates downloading from the Data Center, we are changing these machines to instead pull update files directly from Microsoft.

Approvals of updates will still pull from UMKC. So for instance a newly released update from Microsoft would not download to a workstation until it is approved for campus use.

Servers will remain pointing at the local update server for files, as they are inside the data center firewall, and not subject to the same bottleneck.

This change will be made today, as some workstations that are significantly behind on updates are not catching up, and this change will allow them to download the catchup files faster. Also patch Tuesday is tomorrow, and this modification should be in place before we start staging the pre-deployment testing updates.

This change will not adversely affect already up-to-date machines, and the November updates are now past-due, so this will help past-due machines.

 Deploy Operations Manager 2016 agent (12/17/2016)

The agent deployment for Operations Manager 2016 agent will be moved to start on bootups after December 16th. There were some issues with the prior attempt where Operations Manager 2016 was not using Active Directory for agent assignment. Instead agents will now be assigned to a management server based on the OS version and based on Workstation or Server classification, and the assignment will be made when the agent is installed.

This agent picks up event and health information from campus Windows computers. (workstations and servers) This should be a minor impact, and is a replacement of the current Operations Manager 2012R2 configuration.

 Exchange 2016 Migration (12/20/2016 5:00:00 PM)

UMKC will be migrating our Exchange services to new servers on Dec 20th after 5:00pm.

 Campus WiFi controller update (12/22/2016 11:30:00 PM)

Wireless will be down while the controller pair reboots as part of applying the new code. The APs will reboot prior to rejoining the controller. The Access Points will not be broadcasting, nor allowing any WiFi traffic for a period of time that is usually no greater than an hour. All wired traffic should remain unaffected. Typical updates and reboot cycles take 30 minutes for all devices to rejoin, with no more than 10% of units taking the full hour to complete.

 Blackboard Unavailable (12/27/2016 6:00:00 PM)

Blackboard will be undergoing major maintenance, beginning on Wednesday, December 28th. Blackboard will NOT be available during this time, as we implement multiple upgrades and fixes. Full service and access will be restored by midnight on Saturday, December 31st.

 dropbox.umkc.edu update (12/27/2016 10:00:00 PM)

Dropbox.umkc.edu service will be offline Tuesday night December 27th for a system update.

 Spam and Phishing reporting buttons for Outlook on Windows (2/22/2017 8:00:00 AM)

A program will be installed on Windows computers to allow spam and phishing reporting from Outlook. The buttons will appear on the top ribbon bar of Outlook on campus managed computers. This will help ease reporting of these types of email.

An equivalent reporting program is not available for Outlook on Macintosh computers at this time.

 ALEKS schema migration (2/23/2017 11:42:00 AM)

Access to the ALEKS website will be down while the underlying database is migrated to a new server

 The Kerberos TGT account password will be changed (3/18/2017 10:00:00 PM)

As part of a yearly process to ensure the Kerberos TGT account is secure, and to block certain attacks related to pass-the-hash, the password on the Kerberos TGT account will be changed. This has the potential to affect currently logged on accounts, as logons prior to the change will have credentials with the prior encryption material attached. This will be done overnight, to ensure the least disruption if any problems occur. The fix for any issue from this change is to logout and logon again, which mostly affects campus managed Windows computers. (This should not affect remote email access.)

 Campus data center firewall reboot (3/18/2017 10:00:00 PM)

The campus data center firewall will be rebooted, to proactively attempt to reduce high data plane usage seen earlier in the week. This will result in a 1 minute outage of campus server resources, and will also require a reboot of certain phones and dependent systems.

 Campus WiFi controller update (3/26/2017 1:30:00 AM)

Wireless will be down while the controller pair reboots as part of applying the new code. The APs will reboot prior to rejoining the controller. The Access Points will not be broadcasting, nor allowing any WiFi traffic for a period of time that is usually no greater than an hour. All wired traffic should remain unaffected. Typical updates and reboot cycles take 30 minutes for all devices to rejoin, with no more than 10% of units taking the full hour to complete.

 Critical Bug Fix on CAT3850 series (3/28/2017 7:05:00 PM)

The 03.07.02E code for the Catalyst 3800 series switches has a critical security flaw that could leave our configs vulnerable without any direct authentication.

 Emergency reboot of campus edge firewalls (4/20/2017 10:00:00 PM)

The live campus edge firewall has become semi-responsive for management changes, and needs a reboot. As traffic is still being filtered and passed correctly, this will be scheduled to be done tonight at 10pm. There will be two brief two-second outages. The first as the main unit is restarted and the secondary unit takes over. The second when the secondary unit is rebooted and traffic resumes running on the primary unit. Internet connectivity should stay active, and phone services should be unaffected by this change.

Without this manual intervention, we cannot make additional changes on the firewall, and a self-reboot at an uncontrolled time is likely to happen. As it is, there is a chance the firewall may select to reboot itself before 10pm if the issue gets worse before the reboot time selected.

 Urgent campus network edge firewall reboot (5/7/2017 10:30:00 PM)

Due to an outage of the edge firewall management interface, an urgent restart of each unit of the edge firewall is needed. This will be seen as 2 outages of about 20 seconds each.

 Apply Oracle CPU patch on KC-ISIA-ORA2 (5/13/2017 9:00:00 PM)

Apply Oracle CPU patch on KC-ISIA-ORA2

 Apply Oracle CPU patch on KC-SCE-APPDB01 (5/13/2017 9:00:00 PM)

Apply Oracle CPU patch on KC-SCE-APPDB01

 Campus edge and data center firewall firmware upgrades (5/13/2017 10:00:00 PM)

As part of a round of firewall upgrades, the edge and data center firewalls will be upgraded to the newest firmware set. There will be at least 2 outages of at least 2 minutes long as the upgrades progress between the two groups of systems.

 Apply Oracle CPU patch on KC-ISIA-CCORM (5/14/2017 9:00:00 PM)

Apply Oracle CPU patch on KC-ISIA-CCORM

 Apply Oracle CPU patch on KC-ISIA-ORAPRD1 (5/14/2017 9:00:00 PM)

Apply Oracle CPU patch on KC-ISIA-ORAPRD1

 Edge firewall replacement (5/20/2017 10:00:00 PM)

The campus edge firewalls will be replaced with upgraded units during this outage window. While attempts will be made to do simple substitution of the links between the passive units, then alternating to the active units, there is still a high likelihood of a multi-hour outage while the changes are made. This will affect all Internet traffic for the UMKC campus. Best case is 2 one-minute outages, worst case is up to a 6 hour outage.

 Apply Oracle CPU patch on kc-cbord-golddb (5/22/2017 7:45:00 AM)

Apply Oracle CPU patch on kc-cbord-golddb

 Correction of email settings for UMKC accounts (6/2/2017 12:30:00 PM)

A problem has been found in the email settings for UMKC email accounts, caused by changes that occurred in the last few email server patches. Settings will be adjusted for UMKC mailboxes to put them back in line with the expected settings. Any issues found when sending large emails, can be reported to the UMKC IS Call Center. We will look to see if your account needs further adjustments related to this change.

 Unity Connection Server Ugrade (6/2/2017 5:00:00 PM)

We will be upgrading the Unity Connection, voice mail, server from version 10.5.2 to version 11.5.1

 Data Center firewall replacement (6/3/2017 10:00:00 PM)

The campus data center firewalls will be replaced. During this time there is likely to be at least 2 one-minute outages, up to a 6 hour outage. These outages will affect all data into and out of the UMKC campus data center. The passive devices will be switched out first, and then live traffic transferred over.

At best this will be just brief outages as routing updates, but if major complications occur, this could be an extended outage. If the change on the week of May 20th is not successful, then this upgrade will be postponed by at least one week, as that equipment is involved in this upgrade. (That equipment would instead be re-attempted on this week)

Tentatively this outage is also a place holder for a campus edge outage, in case the edge replacement on May 20th needs to be rescheduled for June 3rd. So a campus edge outage is likely and this note will be adjusted if that becomes necessary.

 Firewall firmware upgrades (7/1/2017 11:00:00 PM)

The campus edge firewalls will have a firmware to fix issues with VPN failures and packet buffer exhaustion. This is a moderately urgent firmware upgrade. A series of 3 brief 5-second outages are expected as the firewalls are each upgraded and failover occurs to switch the active firewall. The outages will affect traffic into and out of the campus, including between the Internet and the data center.

 Rescheduled: Edge Router BGP Peer Configuration (7/7/2017 10:00:00 PM)

The campus edge router has a few legacy BGP peering configurations which need to be updated. This includes modifying some VLAN configurations and taking out obsolete physical wiring and traffic routing. This will most likely affect all internet traffic for the UMKC campus. Ideally the downtime will take less than five minutes but the downtime window for this configuration change will be two hours for troubleshooting and testing purposes.

 Cisco Prime Infrastructure Upgrade (7/15/2017 10:00:00 PM)

Cisco's PI will be updated from 3.1 to 3.2, resulting in several hours of downtime for the service. Statistical and client logging will be collected on other servers/services still, so nothing critical will be inaccessible.

 Panopto Campus-wide Upgrade (7/16/2017 8:00:00 AM)

The Panopto client on all ILE computers and faculty/staff computers that currently have Panopto installed will be upgraded to version 5.4.0.36377 to comply with Panopto's July 21st requirements. This upgrade will take place on July 16, 2017.

 Voice over IP - DHCP Server Upgrade (7/18/2017 10:00:00 PM)

Networking will be upgrading the DHCP servers that support the UMKC voice network. This upgrade will replace the existing server cluster with a new virtual server cluster.

 Remote Labs Annual Refresh (7/31/2017)

The Remote Labs hosts are updated every August. This year we will be updating all of the servers from Win2012R2 to Win2016 in addition to the regular software updates to align with the version in the physical labs. The Remote Labs website will continue to function. However, on the specified dates there will be complete outages of the particular labs being processed that day. These effected labs will not appear on the website at that time.


July 31 AM / SHOST11 HyperV
July 31-Aug 4 / SCE II VDI OSD (x10)
Aug 1 - Aug 4 / SCE I / RA03

Aug 7 - Aug 8 / General / RA01
Aug 9 / Adobe CC / RA15
Aug 9 / Nursing / RA21
Aug 9 / Primavera / RA16
Aug 10 / Faculty-Staff / RA05
Aug 10 / Math / RA19
Aug 10 / Physics / RA09
Aug 10 / FWI / RA22

Aug 18 / Bloch / RA07

 Labs and ILE Annual Refresh (7/31/2017 9:00:00 AM)

The IS-hosted labs and ILE classrooms are refreshed every August before the Fall semester starts. This year, the refresh includes notable advancements such as Windows 10 and new versions of most major software titles. The dates that specific labs and classrooms are unavailable are listed below:

JULY 31 -
**DAY**
-Bloch Heritage Hall 110
-Health Sciences 3304
-Royall Hall 303
**NIGHT**
-Kiosks (A&S, Print Release Stations, Parking, Administrative Center Admissions, ISAO, KC REP, Records and Registration, Royall Hall First Floor, School of Education Kiosk, Haag Hall Kiosks, Oak Hall Kiosks)

AUGUST 1 -
**DAY**
-Student Union 210 Lab
-Bloch Heritage Hall 005
**NIGHT**
-ILE (Katz, Biology, Spencer Chem, MNL, MNLC, Fine Arts, ASSC, SRC, PAC, and ILE Spares)
-Miller Nichols 2nd Floor Lab

JULY 2 -
**DAY**
-Johnson Hall Labs
-Oak Hall 4078
-Oak Place North lab
-Oak Place South lab

**NIGHT**
-ILE (GSB, Cockefair, Flarsheim (non-SCE), Haag, Royall, Schofield, Grant, School of Education, Brick City)

AUGUST 3 -
**DAY**
-Law Library Lab
**NIGHT**
-ILE (Cherry, CSPS, Johnson Hall, Student Union, Law, Bloch Heritage, Admin Center, Toy and Miniature, Union Station, HSB, Med School, Diastole, Hospital Hill Apts, ILC, Oak Hall)

AUGUST 7 -
**DAY**
-Royall Hall 310 Lab (ODL)
-SPARK (4825 Troost)
-Haag Hall 314 lab
**NIGHT**
-MNL 420/422 (ILC)

AUGUST 8 -
-Katz 007
-Katz 201
-Bloch Exec Hall 413 (ILE)
-Bloch Exec Hall 414 (ILE)
-Bloch Exec Hall 220, 211, 212, 213
-Bloch Exec Hall 211, 212, 213, 218, 220, 333 (All ILE)
**NIGHT**
-Bloch Exec Hall ALC 330
-Bloch Exec Hall ALC 413
-Bloch Exec Huddle Spaces
-Bloch Exec Hall 333 (ILE)
-Bloch Exec Hall 327 and 419 (ILE Conference Rooms)

AUGUST 9 -
**DAY**
-Physics 246/247
-Health Sciences 3309
**NIGHT**
-Kiosks (Welcome Center, UL Kiosks, UMKC Central, ASSC Kiosks, CHTC (1-4), Bloch Heritage Internet Bar, Bloch Exec Hall of Fame)
-SRC251

AUGUST 10 -
**DAY**
-Cherry Hall 117
-Writing Center
-Student Disability Services
**NIGHT**
-Biology Labs

AUGUST 14 -
**DAY**
-CHTC Testing Center
-SCE 364
-SCE 463
-SOE 129E
-SOE 129B

AUGUST 15 -
**NIGHT**
-MML IC
-HSL
-DSL
-MNL114 (LIR)
-MNL121 (LIL)

AUGUST 16 -
**DAY**
-MNLIC
-SCE464
**NIGHT**
-SCE460
-SCE462

 Disable SMBv1 client and server (8/5/2017 10:00:00 PM)

We will disable SMBv1 client and server for campus managed clients and server. This will first be disabled on IS Security managed systems, including WSUS, and Operations Manager. The test group will be done in early July, the campus rollout will begin August 5th. (Changes will be received by computers on first reboot, and activated on second reboot, so most workstations will not activate the change until August 14th, Servers won't fully activate the change until September 25th which is 2 patch cycles after the change goes live.)

Information on how this will be changed and why it should be changed are available from Microsoft at:
https://blogs.technet.microsoft.com/staysafe/2017/05/17/disable-smb-v1-in-managed-environments-with-ad-group-policy/

Fun note from the discussion in the above site, bowser.sys is a legitimate kernel-mode driver name for the browser service dating back to NT 3.1, as per:
https://blogs.msdn.microsoft.com/larryosterman/2006/03/14/fun-with-names/

 Upgrade UMKC Domain Controllers from Windows Server 2012R2 to Windows Server 2016 (8/8/2017 8:00:00 AM)

The UMKC Active Directory Domain Controllers will be upgraded from Windows Server 2012R2 to Windows Server 2016. This will get us to the latest software version for Active Directory, and allow us to start leveraging certain Windows 10 security features that are not available with the older server versions.

Each Domain Controller will be demoted, reinstalled, then promoted back to Active Directory role. This will be scheduled over a 2 week window, with 1 upgrade at a time. If all goes well, this will be completed within the first week, but extra time is planned in case we have timing issues with the upgrades. No outage is expected, as Active Directory is configured redundantly, so each server can be upgraded individually without any impact on service availability.

There is one exception where kc-dc06 will result in users inability to edit Exchange distribution lists while it is being upgraded. This server will be upgraded at a time when it will have the least impact.

 Apply Oracle CPU patch on kc-chi-hftrain/hfprod. (8/11/2017 9:00:00 PM)

Apply Oracle CPU patch on kc-chi-hftrain/hfprod. Server will be unavailable during the maintenance

 Emergency edge firewall failover (8/18/2017 11:15:00 AM)

Due to outages we are seeing with certain Internet traffic, we are failing over the edge firewall pair. This will result in a brief 3 to 20 second Internet traffic and inter-campus traffic outage. Connections should resume after the failover. Currently there is a department which is offline due to the outage we are troubleshooting. If the failover does not reveal the root cause, another outage notice for the campus edge will be posted.

 Emergency Internet Edge Router Reboot (8/18/2017 12:45:00 PM)

Due to intermittent network issues where Internet-bound traffic is dropping or being delayed, we are reboot the edge router to restore services back to normal. This reload will result in a 5 - 10 minute internet outage. The network issue is effecting business operations of departments on campus so we are implementing this change immediately to resolve the issue.

 Security vulnerability identified in Windows 10 Lab image. (9/12/2017 3:59:00 PM)

A security vulnerability was identified with the default users directory where write access was given to all users. The permissions are being locked down via Group Policy, and a cleanup script will be deployed to cleanup any files placed within the default users home directory. After the change has been completed users will no longer be able to write the the default users directory and all data saved there will be deleted.

**Clarification: This change will not affect end user data stored on the Q drive. Data will only be deleted from within the "C:\Users\default" directory.

 Disable SMBv1 on UMKC Domain Controller part 1 (10/7/2017 10:00:00 PM)

We will disable SMBv1 on KC-DC04 to test to see what systems if any are still relying on SMBv1 from UMKC Domain Controllers. The Domain Controllers were unintentionally missed in the disable runs we did in August, so we will phase this in over two weekends at UMKC. The next weekend we will disable this on all UMKC Domain Controllers.

 Disable SMBv1 on UMKC Domain Controllers part 2 (10/14/2017 10:00:00 PM)

This will be the point when SMBv1 will be disabled on at UMKC Domain Controllers. Part 1 disables on a single DC, part 2 disables on the remaining.

 Emergency reboot and firmware update of data center firewalls (10/14/2017 10:00:00 PM)

The data center firewalls are experiencing a problem with the management CPU, which is breaking management capability on the units. In order to avoid a mid-day outage, an emergency reboot with firmware upgrade is being scheduled for this Saturday night. I believe the units will stay stable with minimal management over the next 3 days, but should they degrade too much further, this will get rescheduled for a late night Thursday or Friday night.

The reboots will result in a 1 minute outage for each reboot. 4 reboots are anticipated. One pair of reboots to regain full control of the units, then another pair of reboots to get the newest firmware fixes in place, in hopes of avoiding further outages.

 Chemistry netwok upgrade (10/16/2017 7:10:00 PM)

We will be replacing the network switches at Chemistry. This will result in a total loss of phone and network during this time. We will removing the current Chemistry distribution and combining the access switches to the new Biology distribution. We will be replacing all of the 4506 access switches with 3850s.

 Biology & Chemistry software upgrade (10/20/2017 5:00:00 AM)

I will be upgrading the IOS image on BCdist1 from 3.7.5E to 16.3.5 due to LACP issue. This will cause a phone and network outage during the switch reload.

 Apply Windows patches and MySQL patch on kc-is-redcapdb (10/27/2017 9:00:00 PM)

Apply quarterly Windows patches and MySQL patch on kc-is-redcapdb

 Apply quarterly Windows patches and oracle patch on kc-chi-data (10/27/2017 10:00:00 PM)

Apply quarterly Windows patches and oracle patch on kc-chi-data

 Campus edge firewall firmware upgrade (11/4/2017 10:00:00 PM)

The campus edge firewall will get firmware upgrades and reboots. There should be a series of about 4 outages lasting about 1 to 2 seconds each. No major impact is expected.

 Important security changes to all sites on info.umkc.edu (11/20/2017 2:45:00 PM)

Due to security enhancements coming to popular browsers such as Google Chrome that will categorize non-HTTPS websites as “insecure”, all sites will be forced to communicate solely over HTTPS. Depending on how your site is coded, this could create errors if hard-coded links to resources such as images are using HTTP and not HTTPS URLs.

Moving forward, all WordPress core code, theme, and plugin updates will install automatically, with no interaction required from site admins. This is necessary because out-of-date components can expose your site and its database to exploitation.

Access to your site’s WP-ADMIN folder will be limited solely to UMKC campus network connections. This means you will only be able to log in to your WordPress admin panel from your on-campus computer, campus Wi-Fi, or VPN-connected computers off-campus.

Please reach out to us at wordpress@umkc.edu with any questions or concerns you may have.