Seriously, 

 

That is pretty insane, because the higher level rights, when a 0 day
hits the box, it basically can own the system, I guess the other user
doesn't understand. 

 

I can say that removing Admin rights doesn't solving everything some
malware definitely finds places to write where users have write access
to stay persistent. ( A lot of times I am seeing hooks to svchost.exe
and its pointing to the recycle bin.)

 

Z

 

Edward E. Ziots, CISSP, Security +, Network +

Security Engineer

Lifespan Organization

[email protected]

 

From: David Lum [mailto:[email protected]] 
Sent: Tuesday, September 18, 2012 10:47 AM
To: NT System Admin Issues
Subject: RE: This is what I get....

 

After I cooled off, I gave him this reply:

 

Clearly you've never tried to not make them local admins. Give me two of
where a typical employee (this mean not developers) , and I'll give you
two examples of how it can be accomplished WITHOUT them being local
admin...

 

 

From: Jonathan Link [mailto:[email protected]] 
Sent: Tuesday, September 18, 2012 7:30 AM
To: NT System Admin Issues
Subject: Re: This is what I get....

 

Are those calls documented?  And what was the nature of the call?

 

After the initial transition, this will actually make admin's lives
easier, since they have a more controlled environment to work in.

 

Yeah, some things are easier when they have admin rights, but that
doesn't mean that users should be doing those things, either.

On Tue, Sep 18, 2012 at 10:22 AM, David Lum <[email protected]> wrote:

Here's how much fight I get when I even SUGGEST we should be removing
admin right from our users.

 

Worthy to note  I am not a local admin on my own NWEA machine, and none
of my %sidejob% clients are local admins on theirs. This guy knows this,
but still fights me every time.

 

This reply incensed me enough to start again working on the management
buy-in, as it's a lot harder to stop a top down order.

 


Sent: Tuesday, September 18, 2012 6:35 AM
To: David Lum
Subject: RE: IE 0-day, MS releases bulletin

 

We have this very rare instance of a Zero Day attack in IE for a few
sites and you think that is a reason to create the complete nightmare of
taking away Admin rights to a local machine.  Clearly you don't know how
often our users are using their admin rights on their machines.      The
SD got a call once a week from the ONE person who had that setup when
she was moved to Windows 7.   If we spent some time building the
infrastructure that makes such a situation workable (like I did at the
school district I worked at), then we could live with our 500 users not
being admins.

 

David Grand

 

From: David Lum 
Sent: Tuesday, September 18, 2012 6:24 AM
Subject: IE 0-day, MS releases bulletin

 

Please read this article and weigh in on the suggested workarounds.

 

Microsoft has released a bulletin on this, and has suggested
workarounds. Most can be achieved via GPO:

http://technet.microsoft.com/en-us/security/advisory/2757760

 

Note 1: "An attacker who successfully exploited this vulnerability could
gain the same user rights as the current user. Users whose accounts are
configured to have fewer user rights on the system could be less
impacted than users who operate with administrative user rights."

SD - this exact scenario is the benefit of users not being local
administrators.

 

Note 2: Some of this is already done via the Trusted Site GPO. Their
additional recommendations recommend disabling ActiveX for Internet and
Local Intranet. The latter would disable some Commons functionality, but
we can disable it on the Internet site zone temporarily. Even this will
generate Service Desk calls but I feel this is worth mitigating the
risk.

 

Dave

 

From: David Lum 
Sent: Monday, September 17, 2012 12:39 PM
Subject: Just so you know that I know..

 

0-day of the week:

 

http://www.computerworld.com/s/article/9231367/Hackers_exploit_new_IE_ze
ro_day_vulnerability?source=rss_latest_content&utm_source=feedburner&utm
_medium=feed&utm_campaign=Feed%3A+computerworld%2Fnews%2Ffeed+%28Latest+
from+Computerworld%29

 

Dave

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to