-----Original Message-----
From: Kurt Buff [mailto:[email protected]]
Sent: Tuesday, 17 April 2012 2:57 AM
To: NT System Admin Issues
Subject: Re: Whitelisting



>>> Whitelisting helps those who help themselves (corporately or individually). 
>>> Think of it as evolution in action.

>>

>>Those people generally don't run into problems in the first place.

>> Digital signatures, signed kernel mode code etc. can be used to verify that 
>> software

>> you are running is mostly legitimate.

>

>Digital signatures, signed kernel mode code, etc., are whitelisting.



And the point I'm making is that these whitelisting technologies are *not* 
helping make the problem I'm describing go away.



1.       For SOHO environment, the end user simply overrides the warnings

a.       Only when the end user cannot override the settings (e.g. Windows x64 
kernel code signing requirements) has any major improvement occurred

                                                               i.      I doubt 
that this type of central control by Microsoft would be tolerated for user mode 
applications

                                                             ii.      It could 
still be bypassed by packaging a CA cert with the malware – I’m surprised that 
this isn’t more prevalent.

2.       For corporate environment of small size, the “administrator” is 
responsible for managing this on behalf of their users. Many smaller orgs are 
probably over staffed, so there is bandwidth to manage this

3.       In the enterprise, this can’t be centrally controlled without 
impacting business agility. So the response from software vendors will be to 
create more applications like Access which allow *end users* to develop 
applications. How are you going to stop malicious applications like this? It’s 
just like spam – a never ending, escalating war.







You are correct- I haven't implemented them yet for our users. But, I am doing 
so for myself. I've put my user account and my machine into a test OU, and am 
applying policies that are more restrictive than what apply to standard users 
now. I do understand how difficult it is. I recently ran md5sum against one of 
our older standard image machines, prior to deployment (booted from a USB stick 
to have complete access), and redirected the hashes into a text file. I ran the 
machine through a round of patches, and did an md5sum again, then ran a diff. 
It was amazing how many files changed.



And this is just files on a disk. Are you also going to monitor which files are 
loaded by which processes (e.g. which .dll files are loaded by which .exe 
files?) Not just what the on-disk signatures, but an actual mapping of .dlls 
used by which .exe? Otherwise, a new, malicious dll file can be loaded into an 
existing, trusted, application.



Cheers

Ken

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to