Or XP

 John W. Cook
Network Operations Manager
Partnership For Strong Families
5950 NW 1st Place
Gainesville, Fl 32607
Office (352) 244-1610
Cell     (352) 215-6944
MCSE, MCP+I, MCTS, CompTIA A+, N+, VSP4, VTSP4


-----Original Message-----
From: Kurt Buff [mailto:kurt.b...@gmail.com]
Sent: Thursday, January 31, 2013 3:04 PM
To: NT System Admin Issues
Subject: Re: Mobile Device Management

BitLocker is only available on Win7 Enterprise.

Betcha they're using Win7 Pro.

On Thu, Jan 31, 2013 at 7:56 AM, John Cook <john.c...@pfsf.org> wrote:
> Just curious as to why not Bitlocker?
>
>
>
>  John W. Cook
>
> Network Operations Manager
>
> Partnership For Strong Families
>
> 5950 NW 1st Place
>
> Gainesville, Fl 32607
>
> Office (352) 244-1610
>
> Cell     (352) 215-6944
>
> MCSE, MCP+I, MCTS, CompTIA A+, N+, VSP4, VTSP4
>
>
>
> From: Chinnery, Paul [mailto:pa...@mmcwm.com]
> Sent: Thursday, January 31, 2013 8:28 AM
> To: NT System Admin Issues
> Subject: RE: Mobile Device Management
>
>
>
> +1 on that.  All of our laptops (even ones secured to Medsurg carts)
> +are
> encrypted with Truecrypt.
>
>
>
> From: Cameron Cooper [mailto:ccoo...@aurico.com]
> Sent: Wednesday, January 30, 2013 6:02 PM
> To: NT System Admin Issues
> Subject: RE: Mobile Device Management
>
>
>
> Thanks for the info below.  Since we’ve deployed more laptops
> recently, we’ve encrypted the entire drive with TrueCrypt.
>
>
>
> Regards,
>
>
>
> Cameron
>
>
>
> ___________________________________________________
>
> Cameron Cooper | IT Manager | Aurico
> Direct: 847.890.4021 | Cell: 224.688.2854 | Fax: 847.255.1896
> ccoo...@aurico.com | www.aurico.com
>
>
>
> From: Angus Scott-Fleming [mailto:angu...@geoapps.com]
> Sent: Wednesday, January 30, 2013 3:49 PM
> To: NT System Admin Issues
> Subject: Re: Mobile Device Management
>
>
>
> On 30 Jan 2013 at 20:24, Cameron Cooper  wrote:
>
>
>
>> In light of one of our company laptops being stolen (from the user's
>> car),
>
>> we've been tasked to look for a mobile solution that would allow us
>> to track,
>
>> recover and remote wipe a laptop, tablet and smartphone and would
>> like some
>
>> recommendations on what some are currently using. So far we've looked
>> at
>
>> LoJack for Laptops and Prey (PreyProjects). Thanks, Cameron
>
>
>
> Whole-disk-encryption on laptops is an absolute must IMHO.  That way
> you're only out hardware no matter what.
>
>
>
> The biggest problem with most tracking-and-wiping solutions like Prey
> is that the laptop has to be booted and the OS loaded for them to
> work. Since I use Truecrypt whole-disk-encryption and the password is
> required to boot or to awake after hibernation I don't use Prey.
>
>
>
> LoJack has a version which installs in the BIOS (installed at the
> factory on many bigger brands now, but you have to activate it $$$).
> This version phones home if there is an active network connection no
> matter how the computer is booted.  But security flaws in the BIOS
> implementation of LoJack for Laptops were documented at a 2009
> BlackHat session.  Don't know if they're still there.
>
>
>
> This might be of interest:
>
>
>
> Intel® Anti-Theft Technology — What is Intel® Anti-Theft Technology?
>
> http://www.intel.com/support/services/antitheft/sb/CS-030335.htm
>
>
>
> More info:
>
>
>
> LoJack - Wikipedia, the free encyclopedia
>
> https://en.wikipedia.org/wiki/LoJack#for_Laptops
>
>
>
> At the Black Hat Briefings conference in 2009, researchers Anibal
> Sacco[15] and Alfredo Ortega showed that the implementation of the
> Computrace/LoJack agent embedded in the BIOS has vulnerabilities and
> that this "available control of the anti-theft agent allows a highly
> dangerous form of BIOS-enhanced rootkit that can bypass all chipset or
> installation restrictions and reutilize many existing features offered
> in this kind of software."[16][17] Absolute Software rejected the
> claims made in the research, stating that "the presence of the
> Computrace module in no way weakens the security of the BIOS". Another
> independent analyst confirmed the flaws, noted that a malware
> hijacking attack would be a "highly exotic one", and suggested that
> the larger concern was that savvy thieves could disable the phone home
> feature.[18]
>
>
>
> Core Security Technologies
>
> http://www.coresecurity.com/content/Deactivate-the-Rootkit
>
> Deactivate the Rootkit - Black Hat USA 2009
>
> Link to paper:
>
> http://www.coresecurity.com/files/attachments/Paper-Deactivate-the-Roo
> tkit-AOrtega-ASacco.pdf
>
>
>
> Share your findings back here please.
>
>
>
> HTH
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
> ________________________________
>
>
>
> CONFIDENTIALITY NOTICE: This email message is intended only for the
> person or entity to which it is addressed and may contain confidential 
> material.
> Any unauthorized review, use, disclosure, downloading, copying or
> distribution is prohibited. If you are not the intended recipient,
> please contact the sender by reply email and permanently delete all
> copies of the original message. If you are the intended recipient but
> do not wish to receive communications through this medium, please
> advise the sender immediately.
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
>
> ________________________________
>
> CONFIDENTIALITY STATEMENT: The information transmitted, or contained
> or attached to or with this Notice is intended only for the person or
> entity to which it is addressed and may contain Protected Health
> Information (PHI), confidential and/or privileged material. Any
> review, transmission, dissemination, or other use of, and taking any
> action in reliance upon this information by persons or entities other
> than the intended recipient without the express written consent of the
> sender are prohibited. This information may be protected by the Health
> Insurance Portability and Accountability Act of 1996 (HIPAA), and
> other Federal and Florida laws. Improper or unauthorized use or
> disclosure of this information could result in civil and/or criminal 
> penalties.
> Consider the environment. Please don't print this e-mail unless you
> really need to.
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


________________________________

CONFIDENTIALITY STATEMENT: The information transmitted, or contained or 
attached to or with this Notice is intended only for the person or entity to 
which it is addressed and may contain Protected Health Information (PHI), 
confidential and/or privileged material. Any review, transmission, 
dissemination, or other use of, and taking any action in reliance upon this 
information by persons or entities other than the intended recipient without 
the express written consent of the sender are prohibited. This information may 
be protected by the Health Insurance Portability and Accountability Act of 1996 
(HIPAA), and other Federal and Florida laws. Improper or unauthorized use or 
disclosure of this information could result in civil and/or criminal penalties.
Consider the environment. Please don't print this e-mail unless you really need 
to.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Reply via email to