Windows security: no right, no fright

| | No TrackBacks
A crown

Defaults aren't best

According to a report by BeyondTrust, 90 percent of Windows vulnerabilities can be mitigated by configuring users to operate without administrator rights. In other words, the less powerful is the user, the less unpleasant consequences follow.

System administrators do not grant privileges easily: the more is the number of privileges, the more powerful is the account, the more destruction it might cause. Many an action, relatively safe when no privileges are available, become very dangerous otherwise. However, all the personal PC users are tempted to grant their main users all the rights. Yes, it is simpler: no need to logout and log in as an administrator, if it is necessary to install or upgrade software and so on.

In total, 64 percent of all Microsoft vulnerabilities reported last year are mitigated by removing administrator rights. The default state of an operating system when user has too much access has become very dangerous.

No power or superpower

The security model of Un*x means you have either all the rights possible (if you use a root, superuser account), or, roughly speaking, you have no rights at all (if you use a regular user).

The very idea of using privileged user all the time must be discarded and strongly advised against.

It is well known that there are two types of people: those who have never lost important data, and those making regular backups.

Of course it's joke, yet it bears an important truth: the less time you spend restoring lost or corrupted data, the more time you have for more important tasks.

So, the conclusion is:

  • avoid assigning users any privilege unless it's absolutely inevitable
  • use privileged users to perform local administrative tasks only

Have you experienced any problems working under a privileged user account?

No TrackBacks

TrackBack URL: /blog/mt-tb.cgi/98

blog comments powered by Disqus

About this Entry

This page contains a single entry by Konstantin Boyandin published on March 29, 2010 5:17 PM.

Network monitoring basics: teach your sites to express themselves was the previous entry in this blog.

Planning security: breaches in the wall is the next entry in this blog.

Find recent content on the main index or look in the archives to find all content.