Okay, I'm concerned about this, but need more direction than what has been posted so far. We've been running BGinfo here in our login script for years and we've been putting "domain users" into their local admin group to keep it from erroring. We've recently started just giving full access to the bginfo file, but still have a couple hundred machines with "domain users" in the local admin group. 1. Is there a way (script or GP) to take "domain users" out of the local admin group? 2. How can I give users full access to the bginfo file without visiting every machine? 3. Where in GP do I disable Autorun? 4. How do I do the INI redirection trick? 5. How can I make sure the svchost key has read-only rights for everyone? Could this adversely affect some applications? 6. Is there a way to change the local admin password via script or GP?
Thanks, Paul -----Original Message----- From: Ben Scott [mailto:[email protected]] Sent: Friday, March 20, 2009 5:11 PM To: NT System Admin Issues Subject: Re: April 1st Conflicker Version C to erupt On Fri, Mar 20, 2009 at 4:54 PM, Ziots, Edward <[email protected]> wrote: > Just as a followup the following KB article fixed that issue, what I am > still concerned about even though these systems where patched about 2-3 > months ago with MS08-067 they still got somewhat infected... As mentioned, Conficker has multiple methods of propagation. The MS08-067 Server RPC vulnerability is only half the problem. The other common vector is removable media, such as USB flash drives. Combined with Autorun, all you have to do is insert the media, and Windows will automatically run Conficker for you. Even with Autorun completely disabled, the user can still find the Trojan horse executable on the media and double-click to run it manually. If you're running with unprivileged users, it can still set itself up in the user's profile. It shouldn't (*shouldn't*) be able to disable anti-virus or compromise the local system, but it can run within the privilages of the user. It can scan for hosts still vulnerable to MS08-067. It can scan for network shares, and try to copy itself to them. It can try to brute force passwords to propagate to more hosts. That last is presumably what leads to the account lockouts others have described. -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
