By disabling "ActiveX", you'll  be telling your users they can only have a
limited experience (HTML, graphics, scripting) with IE.  Not completely
unsound, but most users will revolt.  Disable all ActiveX and then surf.
You'll not be able to read most popular web sites.  It won't load Flash,
RealPlayer, Windows Media Player, or most other plug-ins or Helper
Applications.  This does decrease your risk of exploitation, but will your
users even listen to you?

How will you stop them from loading ActiveX controls?  There are ways (IEAK,
Software Restriction Policies, registry edits), but it certainly won't be as
easy as telling your user's not to do it.  They will do it.  They don't have
an understanding of what ActiveX is or the security risks.  It's not like
the Flash program (or Adobe Acrobat, etc.) download that they will be
prompted to install says, "I'm an ActiveX control, does your
almost-all-knowing-demi-god-like network administrator allow you to install
ActiveX controls?"

And do you really want to limit their the functionality of their browser so
they are cussing you all the time?  If security is really that essential on
your network, remove any browser and any email client off their
workstations.   Too much risk.  Want to use another browser that doesn't
accept ActiveX controls?  Again, you're be limiting the user's browsing
experience, and in any case, malicious scripting is capable of doing many,
many things without ActiveX involved at all.  Are you going to disable all
browser scripting languages and leave them to pure HTML?  Since I can send
malicious PDF and graphic pictures, you going to disable downloading
graphics?  And if so, how?

What about Java applets?  Secure?  Nope.  Java's been hacked dozens of
times.

You sound like someone new to this whole process.  Unless you have your
administrative ducks in a row, you won't be able to stop your users from
installing whatever they want.  How will you prevent them from install your
"illegal" apps?  How will you detect when they install them anyways?

The point is that you need to support the applications you're users
want/need, and then it's your job to secure them to the best of your
ability.

If you insist on your grand plan, come back in six months and tell me how
successful you were...and be honest.

Roger

****************************************************************************
****
*Roger A. Grimes, Computer Security Consultant
*CPA, MCSE (NT/2000), CNE (3/4), A+
*email: [EMAIL PROTECTED]
*cell: 757-615-3355
*Author of Malicious Mobile Code:  Virus Protection for Windows by O'Reilly
*http://www.oreilly.com/catalog/malmobcode
****************************************************************************
*************

----- Original Message ----- 
From: "Chris Berry" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Monday, June 30, 2003 6:58 PM
Subject: Re: Ten least secure programs


> I've since added rsh and activeX.


---------------------------------------------------------------------------
Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts!
The Gartner Group just put Neoteris in the top of its Magic Quadrant,
while InStat has confirmed Neoteris as the leader in marketshare.
     
Find out why, and see how you can get plug-n-play secure remote access in
about an hour, with no client, server changes, or ongoing maintenance.
          
Visit us at: http://www.neoteris.com/promos/sf-6-9.htm
----------------------------------------------------------------------------

Reply via email to