<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-1466943200222510404</id><updated>2024-10-07T05:18:29.836+01:00</updated><title type='text'>Least Privilege Security for Windows 7, Vista and XP</title><subtitle type='html'>Secure desktops for regulatory compliance and business agility</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>40</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-74106006638523640</id><published>2011-03-04T15:53:00.001+00:00</published><updated>2011-03-04T15:53:52.231+00:00</updated><title type='text'>Security as a business enabler</title><summary type="text">I often talk about security as a business enabler but very rarely hear others saying the same things. So I was pleased to read recently in Computer Weekly Etienne Greeff’s article Security sceptics should ‘just say yes’.  Greeff talks about taking a strategic approach to IT security to enable adoption of new technologies. Well worth a read. “All too often, senior managers see IT security as a </summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/74106006638523640/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/74106006638523640' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/74106006638523640'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/74106006638523640'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2011/03/security-as-business-enabler.html' title='Security as a business enabler'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-2556085011898382120</id><published>2011-01-13T15:11:00.001+00:00</published><updated>2011-01-13T15:11:34.654+00:00</updated><title type='text'>PACKT Microsoft Monday</title><summary type="text">Great discounts on books, including Least Privilege Security for Windows 7, Vista and XP, over at PACKT’s website on Monday 24th January. Click here for more details.  </summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/2556085011898382120/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/2556085011898382120' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/2556085011898382120'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/2556085011898382120'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2011/01/packt-microsoft-monday.html' title='PACKT Microsoft Monday'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-8022997279285972042</id><published>2010-12-13T13:37:00.001+00:00</published><updated>2010-12-13T13:37:20.134+00:00</updated><title type='text'>The Global State of the Endpoint</title><summary type="text">A recent survey commissioned by Lumension doesn’t reveal many surprising results, but one interesting point was that only 44% of those surveyed thought that application whitelisting was an effective technology.  Maybe those surveyed are expecting too much. It’s not a replacement for antivirus, but even in its own right is very effective at preventing malicious software from running, especially </summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/8022997279285972042/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/8022997279285972042' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/8022997279285972042'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/8022997279285972042'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/12/global-state-of-endpoint.html' title='The Global State of the Endpoint'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-875425069054278696</id><published>2010-11-25T13:40:00.001+00:00</published><updated>2010-11-25T13:42:42.977+00:00</updated><title type='text'>Zero-day flaw allows an attacker to impersonate the system account and bypass UAC</title><summary type="text">Here’s a good example of why implementing standard user accounts isn’t enough to secure your desktop systems. Occasionally bugs are found in Windows that allow privilege escalation – or in other words, permit a standard user to elevate to a higher set of privileges. One such flaw has recently been disclosed and is outlined by Sophos on their Naked Security blog. Additional layers of security, </summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/875425069054278696/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/875425069054278696' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/875425069054278696'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/875425069054278696'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/11/zero-day-flaw-allows-attacker-to.html' title='Zero-day flaw allows an attacker to impersonate the system account and bypass UAC'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-7952019992023885675</id><published>2010-11-17T16:45:00.001+00:00</published><updated>2010-11-17T16:46:36.425+00:00</updated><title type='text'>End-users with admin-level access put your network security at risk</title><summary type="text">Security Adviser columnist, Roger Grimes, has another article on Least Privilege Security at InfoWorld. Not only does he speak about standard user accounts, but also about the advantages of application whitelisting software.  Roger also mentions that Least Privilege Security can help reduce support costs on desktop computers: Locked-down desktops have few support issues since users aren&#39;t </summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/7952019992023885675/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/7952019992023885675' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/7952019992023885675'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/7952019992023885675'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/11/end-users-with-admin-level-access-put.html' title='End-users with admin-level access put your network security at risk'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-8915502833762053940</id><published>2010-11-11T09:00:00.001+00:00</published><updated>2010-11-11T09:00:45.848+00:00</updated><title type='text'>Adobe quietly updates Flash Player</title><summary type="text">Not much fanfare accompanying the latest update to Flash Player (version 10.1.102.64), which includes a security fix, so make sure that your systems are patched as quickly as possible. The MSI version can be downloaded here for deployment using Group Policy or SCCM.  </summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/8915502833762053940/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/8915502833762053940' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/8915502833762053940'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/8915502833762053940'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/11/adobe-quietly-updates-flash-player.html' title='Adobe quietly updates Flash Player'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-6380195945244320450</id><published>2010-11-03T17:37:00.001+00:00</published><updated>2010-11-03T17:39:18.290+00:00</updated><title type='text'>Don’t want to use a heavy-weight virtualization solution to run IE6 on Windows 7? Take a look at UniBrows</title><summary type="text">While Microsoft has its own solutions for running IE6 apps on Windows 7, see their whitepaper Solutions for Virtualizing Internet Explorer, they can be somewhat overkill and expensive to manage.  Dependence on IE6 for legacy web applications is often cited as a reason preventing an upgrade from XP to Windows 7, which provides improved security and easier implementation of least privilege. </summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/6380195945244320450/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/6380195945244320450' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/6380195945244320450'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/6380195945244320450'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/11/dont-want-to-use-heavy-weight.html' title='Don’t want to use a heavy-weight virtualization solution to run IE6 on Windows 7? Take a look at UniBrows'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-5986152428196353820</id><published>2010-10-26T08:30:00.001+01:00</published><updated>2010-10-26T08:30:40.412+01:00</updated><title type='text'>BeyondTrust PowerBroker Desktops, Free Edition</title><summary type="text">While I’m on the subject of free solutions for elevating processes to run with administrative privilege under a standard user account, BeyondTrust have recently rebranded their Privilege Manager product, now called PowerBroker Desktops, and have released a free version of the software.  The product differs from a fully licensed version in that your own custom rules cannot be deployed centrally </summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/5986152428196353820/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/5986152428196353820' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/5986152428196353820'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/5986152428196353820'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/10/beyondtrust-powerbroker-desktops-free.html' title='BeyondTrust PowerBroker Desktops, Free Edition'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-373688934121472141</id><published>2010-10-26T08:01:00.001+01:00</published><updated>2010-10-26T08:01:31.150+01:00</updated><title type='text'>ScriptLogic’s Privilege Authority</title><summary type="text">I recently discovered a free offering from ScriptLogic that allows system administrators to grant standard users administrative rights for specified processes, in much the same way as commercial products. ScriptLogic doesn’t support Privilege Authority, although there is a community support forum which is active at http://privilegeauthority.com, so it may not be suitable for use in large </summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/373688934121472141/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/373688934121472141' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/373688934121472141'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/373688934121472141'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/10/scriptlogics-privilege-authority.html' title='ScriptLogic’s Privilege Authority'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-7048891935520867764</id><published>2010-09-24T08:32:00.001+01:00</published><updated>2010-09-24T08:32:37.114+01:00</updated><title type='text'>Security and Client-Side Virtualization</title><summary type="text">A good article by J. Peter Bruzzese over at Biztech Magazine on the increasing importance of virtualization to provide secure and reliable desktop OSes.  It’s quite common when thinking about virtualization technology to focus on the server side. But moving forward, it’s the client side that will take on a greater role in deploying new operating systems, maintaining those systems, and ensuring </summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/7048891935520867764/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/7048891935520867764' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/7048891935520867764'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/7048891935520867764'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/09/security-and-client-side-virtualization.html' title='Security and Client-Side Virtualization'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-1571838557200605232</id><published>2010-09-21T08:57:00.001+01:00</published><updated>2010-09-21T08:57:33.104+01:00</updated><title type='text'>IT downtime costs UK £2bn a year, study finds</title><summary type="text">Ever wondered how much IT downtime actually costs? Take a look at this Computer Weekly summary of a report by CA Technologies.  The time taken to fix failed IT systems costs the average UK business £208,000 a year in lost revenue, the research revealed.  France tops the league of average losses at £424,000 a year, followed by Germany (£330,000) and Norway (£271,000).  </summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/1571838557200605232/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/1571838557200605232' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/1571838557200605232'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/1571838557200605232'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/09/it-downtime-costs-uk-2bn-year-study.html' title='IT downtime costs UK £2bn a year, study finds'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-5006052700488049469</id><published>2010-09-21T08:52:00.001+01:00</published><updated>2010-09-21T08:54:07.265+01:00</updated><title type='text'>Forrester’s Zero Trust model for security</title><summary type="text">Forrester is currently pushing their Zero Trust model for network security, where they state that hosts on the corporate intranet should be untrusted in the same way as Internet devices. This makes a lot of sense, and can be implemented to various degrees according to the risk to your business. For instance, Windows clients should be isolated from one another using IPSec domain isolation. In most</summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/5006052700488049469/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/5006052700488049469' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/5006052700488049469'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/5006052700488049469'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/09/forresters-zero-trust-model-for.html' title='Forrester’s Zero Trust model for security'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-7559379841155820941</id><published>2010-09-21T08:41:00.001+01:00</published><updated>2010-09-21T08:43:33.880+01:00</updated><title type='text'>A rational look at By Your Own PC (BYOPC)</title><summary type="text">Matthew Clark writes a rational overview of BYOPC on his Confessions of an IT Manager blog, addressing the benefits and concerns of such schemes. One of his concerns is naturally security:  To be clear, there are many possible security issues and implications with BYOPC.&amp;nbsp; These include virus and malware issues, installation of unknown software packages, secure access to business data, and so</summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/7559379841155820941/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/7559379841155820941' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/7559379841155820941'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/7559379841155820941'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/09/rational-look-at-by-your-own-pc-byopc.html' title='A rational look at By Your Own PC (BYOPC)'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-1329791776335686771</id><published>2010-09-20T08:36:00.001+01:00</published><updated>2010-09-20T08:36:52.490+01:00</updated><title type='text'>AppSense to include User Rights Management in user virtualization solution</title><summary type="text">Monday 20th September, AppSense announce the integration of User Rights Management into their user virtualization solution. For more information on URM and the development of User Installed Applications, check out Can You Give Power to Users Responsibly?  </summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/1329791776335686771/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/1329791776335686771' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/1329791776335686771'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/1329791776335686771'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/09/appsense-to-include-user-rights.html' title='AppSense to include User Rights Management in user virtualization solution'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-5161828975240598352</id><published>2010-09-18T09:20:00.001+01:00</published><updated>2010-09-18T09:20:21.709+01:00</updated><title type='text'>Least Privilege Security book review by security expert Kevin Beaver</title><summary type="text">Another positive review of the book:  I&#39;ve been reading through Russell Smith&#39;s new book Least Privilege Security for Windows 7, Vista and XP and I&#39;ve realized it&#39;s about time for a book on this subject. I&#39;ve covered some of the material in the past including in my recent SearchWinIT.com tip Should Windows users have full administrative rights? and I know there&#39;s content on this topic scattered </summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/5161828975240598352/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/5161828975240598352' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/5161828975240598352'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/5161828975240598352'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/09/least-privilege-security-book-review-by.html' title='Least Privilege Security book review by security expert Kevin Beaver'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-4293987349710432642</id><published>2010-09-15T06:51:00.001+01:00</published><updated>2010-09-15T06:51:41.966+01:00</updated><title type='text'>Deploying software to computers without Group Policy</title><summary type="text">Need a quick way to deploy software to standard users without SCCM or Group Policy? Take a look at PDQ Deploy from Admin Arsenal. It’s free, can deploy MSI, MSP, MSU, EXE and Batch files and monitors installs until they’re complete. Make sure you test your unattended installs thoroughly before pushing them to multiple machines on your network.  </summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/4293987349710432642/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/4293987349710432642' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/4293987349710432642'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/4293987349710432642'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/09/deploying-software-to-computers-with.html' title='Deploying software to computers without Group Policy'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-5082518649547965085</id><published>2010-09-10T07:06:00.001+01:00</published><updated>2010-09-10T07:06:49.817+01:00</updated><title type='text'>Consumerisation of IT</title><summary type="text">There’s been a lot in the press during the last week about IT consumerisation, and how IT departments might become extinct if they continue a line of ‘command and control’. In an ideal world, we’d let users buy whatever hardware and software they see fit to do their jobs. In certain environments this may actually work, but I imagine that for the most part, this would be a costly nightmare for the</summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/5082518649547965085/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/5082518649547965085' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/5082518649547965085'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/5082518649547965085'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/09/consumerisation-of-it.html' title='Consumerisation of IT'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-412857899031367985</id><published>2010-09-06T06:02:00.001+01:00</published><updated>2010-09-06T06:02:12.494+01:00</updated><title type='text'>A Strong Password Isn’t the Strongest Security</title><summary type="text">Great article over a the New York Times on password security.  “Keeping a keylogger off your machine is about a trillion times more important than the strength of any one of your passwords,” says Cormac Herley, a principal researcher at Microsoft Research who specializes in security-related topics. Least Privilege Security, as part of a defence-in-depth security strategy, can help to keep </summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/412857899031367985/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/412857899031367985' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/412857899031367985'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/412857899031367985'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/09/strong-password-isnt-strongest-security.html' title='A Strong Password Isn’t the Strongest Security'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-3643218291301977731</id><published>2010-08-31T05:49:00.001+01:00</published><updated>2010-08-31T05:49:02.173+01:00</updated><title type='text'>3 IT mistakes that helped bring down Russian spy ring</title><summary type="text">An interesting article over at IT Manager Daily that describes some of the basic security mistakes made by the Russian spy ring. One thing’s for sure, they weren’t using least privilege security…  In addition to clear and enforced security policies, the spy ring could have used some better help desk support. Some laptops took months to troubleshoot, and one spy was so frustrated with her computer</summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/3643218291301977731/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/3643218291301977731' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/3643218291301977731'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/3643218291301977731'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/08/3-it-mistakes-that-helped-bring-down.html' title='3 IT mistakes that helped bring down Russian spy ring'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-6813420410549873455</id><published>2010-08-25T09:35:00.001+01:00</published><updated>2010-08-25T09:35:14.244+01:00</updated><title type='text'>Book review at TaoSecurity</title><summary type="text">Another review for Least Privilege Security for Windows 7, Vista and XP has just been published over at TaoSecurity by Richard Bejtlich, Director of Incident Response at General Electric.  Very focused and timely book on an important security topic.  </summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/6813420410549873455/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/6813420410549873455' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/6813420410549873455'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/6813420410549873455'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/08/book-review-at-taosecurity.html' title='Book review at TaoSecurity'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-6466031178789986060</id><published>2010-08-23T09:08:00.001+01:00</published><updated>2010-08-23T09:08:00.320+01:00</updated><title type='text'>Least Privilege Security book at Avecto</title><summary type="text">Least Privilege Security for Windows 7, Vista and XP now has it’s own page over at Avecto’s website: http://www.avecto.com/ebook/index.html  </summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/6466031178789986060/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/6466031178789986060' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/6466031178789986060'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/6466031178789986060'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/08/least-privilege-security-book-at-avecto.html' title='Least Privilege Security book at Avecto'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-6175463963237944471</id><published>2010-08-20T10:50:00.001+01:00</published><updated>2010-08-20T10:50:40.854+01:00</updated><title type='text'>Antivirus is not enough</title><summary type="text">Psst: Can You Keep A Secret? over at Biztech Magazine tells the story of a SME that seemed to be relying solely on their antivirus software to provide protection and as a result suffered a devastating virus outbreak.     “Small businesses are definitely more at risk than large businesses with respect to security because if they are attacked and their information is compromised, they can go out of</summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/6175463963237944471/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/6175463963237944471' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/6175463963237944471'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/6175463963237944471'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/08/antivirus-is-not-enough.html' title='Antivirus is not enough'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-4749096604380382734</id><published>2010-08-16T13:47:00.001+01:00</published><updated>2010-08-16T13:47:49.480+01:00</updated><title type='text'>Two more book reviews</title><summary type="text">Another short review of Least Privilege Security for Windows 7, Vista and XP at Ward Vissers:     I have read already some chapters. I think it is a great book to have on your collection.     You have always not enough time thinking about security. This book does it for you.   And here at Anything about IT:     I haven’t read the entire book yet, but from what i have seen thus far, it’s </summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/4749096604380382734/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/4749096604380382734' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/4749096604380382734'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/4749096604380382734'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/08/two-more-book-reviews.html' title='Two more book reviews'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-5372854075435025740</id><published>2010-08-16T12:15:00.001+01:00</published><updated>2010-08-16T12:15:53.322+01:00</updated><title type='text'>AV alone is not enough</title><summary type="text">According to an article on Help Net Security, AV vendors detect on average 19% of malware attacks, a recent study by Cyveillance claims that the most popular antivirus products detect less than 19% of new malware threats, and that rate increases only to to 61.7% after 30 days.      Top AV solutions take an average of 11.6 days to catch up to new malware. Since this does not include malware </summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/5372854075435025740/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/5372854075435025740' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/5372854075435025740'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/5372854075435025740'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/08/av-alone-is-not-enough.html' title='AV alone is not enough'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1466943200222510404.post-6009857688398392251</id><published>2010-08-13T14:02:00.001+01:00</published><updated>2010-08-16T12:16:24.056+01:00</updated><title type='text'>Inadequate Security</title><summary type="text">It’s no surprise that in a recent survey of 488 IT workers, according to IT PRO, two thirds of them claim that security is not mission critical to their company. Tom Gaffney of F-Secure thinks that desktop security is a non-starter:     Gaffney expressed concerns over whether top level executives will ever recognise how important security is.    “I am very skeptical they ever will. That is the </summary><link rel='replies' type='application/atom+xml' href='http://leastprivilegesecurity.blogspot.com/feeds/6009857688398392251/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1466943200222510404/6009857688398392251' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/6009857688398392251'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1466943200222510404/posts/default/6009857688398392251'/><link rel='alternate' type='text/html' href='http://leastprivilegesecurity.blogspot.com/2010/08/inadequate-security.html' title='Inadequate Security'/><author><name>Russell Smith</name><uri>http://www.blogger.com/profile/18318064087483507597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>