The Integrity of Process's has been in Since Windows Vista/7, its not new in 
Windows 8. But yes the premise is correct that running process in least 
privilege context is the correct method of reducing the attack surface of the 
operating system by default., 

Z

Edward E. Ziots, CISSP, CISA, CRISC, Security +, Network +
Security Engineer
Lifespan Organization
[email protected]
Work:401-255-2497


This electronic message and any attachments may be privileged and confidential 
and protected from disclosure. If you are reading this message, but are not the 
intended recipient, nor an employee or agent responsible for delivering this 
message to the intended recipient, you are hereby notified that you are 
strictly prohibited from copying, printing, forwarding or otherwise 
disseminating this communication. If you have received this communication in 
error, please immediately notify the sender by replying to the message. Then, 
delete the message from your computer. Thank you.




-----Original Message-----
From: [email protected] [mailto:[email protected]] On 
Behalf Of Ben Scott
Sent: Tuesday, May 13, 2014 9:52 AM
To: [email protected]
Subject: Re: [NTSysADM] Security groups in AD

On Tue, May 13, 2014 at 6:00 AM, James Rankin <[email protected]> wrote:
> Just noticed this on a Windows 8 machine running RSoP - what are 
> "Authentication authority asserted identity" and "medium mandatory level"?

  I believe the "medium mandatory level" is part of the MIC (Mandatory 
Integrity Control) stuff.  Basically, the system automatically assigned 
integrity levels to things, and they propagate automatically.
 I learned about MIC in the context of Microsoft Internet Explorer.
MSIE runs the most vulnerable parts at a lower integrity level, so when they 
get compromised, there is a chance of minimizing the damage.

  In terms of the (all rise) Orange Book (be seated), it's Microsoft deploying 
some Mandatory Access Control for you.

-- Ben


Reply via email to