yes

> -----Original Message-----
> From: Rod Trent [mailto:[email protected]]
> Sent: Thursday, March 17, 2011 5:05 PM
> To: NT System Admin Issues
> Subject: RE: App-V (response from original product designer)
> 
> Did you tell him I said, hey?
> 
> -----Original Message-----
> From: Webster [mailto:[email protected]]
> Sent: Thursday, March 17, 2011 5:57 PM
> To: NT System Admin Issues
> Subject: RE: App-V (response from original product designer)
> 
> <quote>
> 
> It depends...
> 
> Never say never, but at a minimum, the chance of infection and the impact
> of any vulnerability are greatly reduced by virtualizing the application
with
> App-V.
> 
> Only executables within the package have a chance to alter any bits in the
> streamed package.  So if you package up Excel by itself, no email or
browser
> can mess with it.  As email, web browsing, and running an executable that
> you downloaded are the three most likely sources of infection, none of
> these can get there, except if you run an infected XLS file that you
received.
> 
> Starting with App-V 4.6, you can make the executable components you are
> concerned with getting altered read only inside the package.  Originally
> App-V made all files inside the package writable in order to solve
problems
> with apps written assuming users have power or admin privileges.  Now,
> you have the option of enabling permissions on those files.
> 
> If a file is changed, the file is captured and isolated to the user PKG.
So
> something in your Excel package can't affect other apps on the system, or
in
> a TS case, other users of Excel on the same system.
> 
> The name we gave the isolation component, SystemGuard, came from our
> thinking about this in the sense of anti-virus when we developed the
> product
> 10 years ago.  Fortunately, we were smart enough to realize that this
wasn't
> as good as AV software and threw the Marketing people off from
> advertising it as such, but it is a significant advantage to fighting
malware,
> even in combination with AV which uses a pattern match for known things.
> 
> 
> I hope this answers the query.
> 
> 
> Tim Mangan Founder, TMurgent Technologies [email protected]
> President, Virtualization Boston User Group Microsoft MVP and Citrix CTP
> 
> </quote>
> 
> > -----Original Message-----
> > From: Rankin, James R [mailto:[email protected]]
> > Subject: App-V
> >
> > Is an App-V streamed application, say, Excel 2000, still vulnerable to
> > exploitation in the same way as a traditionally-installed app? Or does
> > the streaming somehow insulate the process? My gut instinct says it
> > can still
> be
> > exploited, maybe someone can provide a little irrefutable clarity.
> 
> 
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
> 
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to [email protected]
> with the body: unsubscribe ntsysadmin
> 
> 
> 
> 
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
> 
> ---
> To manage subscriptions click here: http://lyris.sunbelt-
> software.com/read/my_forums/
> or send an email to [email protected]
> with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to