creating AD accounts for IdM solutions

2006-01-20 Thread Saqib Ali
that account for day to day administration task like create new users, change password, group membership etc. 1) What are some security concerns with this approach. 2) What are best practices to prevent abuse of this account 3) What type of auditing needs to in place to prevent abuse. -- Saqib

Re: creating AD accounts for IdM solutions

2006-01-23 Thread Saqib Ali
equivalent account should not be a requirement. I would be > leery of configuring a 3rd party application to use "domain admin" as you > can't ensure that: -- Saqib Ali, CISSP http://www.xml-dev.com/blog/ "I fear, if I rebel against my Lord, the retribution of an Awful Day (The Day of Resurrection)" Al-Quran 6:15 --- ---

Re: Automate group membership validation

2006-03-10 Thread Saqib Ali
from a Group. > The company for which I work has a security policy that I have to comply > with. According to this policy, all grouplist providing access to shared > information must be reviewed every 6 months. -- Saqib Ali, CISSP http://www.xml-dev.com/blog/ "I fear, if I rebel

Re: New IE flaw and exploit sites/migration to non-MS browser

2006-03-31 Thread Saqib Ali
raphical firewall". Here is a paper that describes it in details: http://www.xml-dev.com/xml/SafeBrowsing/ -- Saqib Ali, CISSP Support http://www.capital-punishment.net --- "I fear, if I rebel against my Lord, the retribution of an Awful Day (The Day of Resurrection)" Al-Quran 6:15 --- --- ---

Re: New IE flaw and exploit sites/migration to non-MS browser

2006-04-03 Thread Saqib Ali
or IE. > Now I'm no coder...but from threads I've seen Firefox's Extensions > are ripe for fun and excitement. that is problem with the poorly developed extensions and not the firefox. -- Saqib Ali, CISSP Support http://www.capital-punishment.net --- &q

Re: Adding Users via Web Interface

2006-04-12 Thread Saqib Ali
sforce) do not attach their workstations to the AD domain. So for them a WebInterface is usually a convenient way of changing passwords. MS provide ADSI to make this process easier and secure. -- Saqib Ali, CISSP, ISSAP Support http://www.capital-punishment.net --- "I fear, if I rebel agains

Re: Laptop Encryption & Write Permissions

2006-05-03 Thread Saqib Ali
be no difference. BindView, pstools etc will work the same way. 1) When the machine is off-line, the drive will be in a encrypted state, and the decryption keys are with the TPM. So any access to the drive in this "off-line" mode will require obtaining the decryption keys from the TP

Re: Laptop Encryption & Write Permissions

2006-05-08 Thread Saqib Ali
ctions are provided by the TPM. BitLocker itself doesn't provide these functions. Key escrow functionality requires a PKI. -- Saqib Ali, CISSP, ISSAP Support http://www.capital-punishment.net --- "I fear, if I rebel against my Lord, the retribution of an Awful Day (The Day of R

Re: Laptop Encryption & Write Permissions

2006-05-08 Thread Saqib Ali
On 5/7/06, Alessandro Giacometti <[EMAIL PROTECTED]> wrote: For bitlocker, there is not a password reset tool BUT you're forced to create a recovery password (it's something like te product key for office or windows). Actually the recovery password is 48 digit to be exact. --

Re: Autorun in screensaver

2006-05-09 Thread Saqib Ali
Hello, I far as I know autorun feature doesn't get executed in a screen lock mode. Autorun only executes when the screen is unlocked. In any case, it is best pratice to disable autorun on computers in a enterprise. -- Saqib Ali, CISSP, ISSAP Support http://www.capital-punishmen

Re: Securing an encryption key within software.

2006-06-16 Thread Saqib Ali
try to decipher or some other computer, they won't be able to. To further secure this implement, you can probably use cryptographic ASIC or HSM to perform the encryption, so that the CPU never sees the decrypted AES key. -- Saqib Ali, CISSP, ISSAP Support http://www.capital-punishmen

Re: Securing an encryption key within software.

2006-06-19 Thread Saqib Ali
You can use a commercial packer/protection program (Armadillo for example). I think when the program is running you can still see the encryption keys in the memory stack even if you use Armadillo... -- Saqib Ali, CISSP, ISSAP Support http://www.capital-punishment.net --- "I fear,

Free encryption and credential management tools for Windows

2006-07-25 Thread Saqib Ali
A write up covering the "Free" encryption and credential management tools shipped with HP and Dell Laptops: http://www.full-disc-encryption.com/biometrics_and_encryption.htm Covers TPM, biometrics, encryption, credential management, SSO to applications etc. Would like to receive comments / criti

Re: Impact of removing administrative rights in an enterprise running XP

2006-07-27 Thread Saqib Ali
t the computer usage to be adversely affected. -- Saqib Ali, CISSP, ISSAP Support http://www.capital-punishment.net --- "I fear, if I rebel against my Lord, the retribution of an Awful Day (The Day of Resurrection)" Al-Quran 6:15 --- --- ---

Re: Whole disk encryption

2006-08-28 Thread Saqib Ali
e of whole disk encryption in an enterprise environment? >--- >--- --- -----------

Re: Whole disk encryption

2006-08-30 Thread Saqib Ali
full-disc-encryption on the physical hardware. -- Saqib Ali, CISSP, ISSAP Support http://www.capital-punishment.net --- "I fear, if I rebel against my Lord, the retribution of an Awful Day (The Day of Resurrection)" Al-Quran 6:15 --- --- ---

Re: Whole disk encryption

2006-08-30 Thread Saqib Ali
Has anyone thought about using something like Truecrypt to lock down a VM image and only use the VM to do sensitive work? If anyone has, does this work well? Technologically this sounds good. However how are you going to force your users to do all their sensitive work frm the vm session? One p