+ Reply to Thread
Results 1 to 9 of 9

Thread: 2009 Microsoft Vulnerability Analysis

  1. #1

    Join Date
    19.06.09
    Location
    Everywhere and Nowhere
    P2P Client
    VEM
    Posts
    552
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 ssssss552

    2009 Microsoft Vulnerability Analysis

    According to BeyondTrust's article, users who operate with administrator rights are much more Vulnerable to security risks than users who operate on limited rights.

    I, personally, work for over 3 years now in Windows XP on a limited user account and whenever I need to install something or make modification to the registery or whatever that requires admin rights I just use the "Run As.." feature.
    I've hadn't a single virus, trojan, BSOD (when related) or spyware or that stuff in the past 3 years.

    some facts I grabbed out of the article:

    90% of Critical Microsoft Windows 7 Vulnerabilities are Mitigated by Eliminating Admin Rights

    Key findings from this report show that removing administrator rights will better protect companies against the exploitation of:
    • 90% of Critical Windows 7 vulnerabilities reported to date
    • 100% of Microsoft Office vulnerabilities reported in 2009
    • 94% of Internet Explorer and 100% of IE 8 vulnerabilities reported in 2009
    • 64% of all Microsoft vulnerabilities reported in 2009

    Companies and users are better protected against 81% of Critical Microsoft vulnerabilities by configuring users without administrator rights.

    87% of vulnerabilities categorized as Remote Code Execution vulnerabilities are mitigated by removing administrator rights.

    In 2009, exploits of 53% of Windows operating system vulnerabilities can be diminished by configuring users as standard users.

    Of all Windows 7 vulnerabilities ever published, 57% are mitigated by removing administrator rights.

    The Conclusion:
    This report demonstrates the critical role that restricting administrator rights plays in protecting against vulnerabilities. It is important to note that this increased protection is achievable in one simple step without any impact on productivity — by implementing a desktop Privilege Identity Management solution. As companies roll out Windows 7 they need to include plans to implement a desktop Privilege Identity Management solution in order to reduce the severity or prevent the exploitation of undiscovered or unpatched vulnerabilities and to ensure that their users can operate effectively without administrator rights.
    the source of the article is here:
    BeyondTrust 2009 Microsoft Vulnerability Analysis

    you'll need to signup to see it (it's free).

    on a more personal note, it's taking some getting used to when moving to a limited rights user but you'll quickly adjust and you can forget about viruses, tojans, spyware and other stuff that risks your computer!
    Reply With QuoteReply With Quote
    Thanks

  2. #2
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,451
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39451
    I run everything as admin, but use Sandboxie to test new/unknown programs. That's another way.
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  3. #3

    Join Date
    19.06.09
    Location
    Everywhere and Nowhere
    P2P Client
    VEM
    Posts
    552
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 ssssss552
    yeah that could work, but there are methods of infiltrating your system that you are not aware of.. if you're running Sandboxie + an Antivirus and a Firewall you should be okay against most of the Vulnerabilities.

    what OS are you running anon?
    Reply With QuoteReply With Quote
    Thanks

  4. #4
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,451
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39451
    Quote Originally Posted by dreamer View Post
    if you're running Sandboxie + an Antivirus and a Firewall you should be okay against most of the Vulnerabilities.
    NOD32 and Outpost user here

    what OS are you running anon?
    XP SP2. (Don't ask me why I haven't upgraded to SP3)
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  5. #5

    Join Date
    19.06.09
    Location
    Everywhere and Nowhere
    P2P Client
    VEM
    Posts
    552
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 ssssss552
    Quote Originally Posted by anon View Post
    NOD32 and Outpost user here
    XP SP2. (Don't ask me why I haven't upgraded to SP3)
    I imagine you have your own reasons. you're probably an IT expert and know your way around computers.
    but don't forget that not all of SBi are as smart as others and probably using Administrator user accounts without even knowing they're risking themselves.
    this is for them too
    Last edited by dreamer; 02.04.10 at 00:39.
    Reply With QuoteReply With Quote
    Thanks

  6. #6
    Advanced User Renk's Avatar
    Join Date
    17.08.08
    Location
    Elsewhere
    P2P Client
    utorrent
    Posts
    581
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 ssssss581
    Quote Originally Posted by anon View Post


    XP SP2. (Don't ask me why I haven't upgraded to SP3)

    Ahem... So, why ????
    Reply With QuoteReply With Quote
    Thanks

  7. #7
    Moderator
    Instab's Avatar
    Join Date
    17.09.09
    Posts
    6,661
    Activity Longevity
    5/20 17/20
    Today Posts
    0/5 sssss6661
    Quote Originally Posted by anon View Post
    I run everything as admin, but use Sandboxie to test new/unknown programs. That's another way.
    doing the same on unix ... well, not with sandboxie of course :tongü:
    Your account has been disabled.
    Reply With QuoteReply With Quote
    Thanks

  8. #8
    Advanced User saebrtooth's Avatar
    Join Date
    21.06.09
    Location
    somewhere?
    P2P Client
    An eMule & VEM
    Posts
    2,150
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 sssss2150
    what sandbox type software is avaliable for linux or unix?
    dont ban me just spank me
    Reply With QuoteReply With Quote
    Thanks

  9. #9
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,451
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39451
    Quote Originally Posted by Renk View Post
    Ahem... So, why ????
    Probably because my computer works just fine now, and thus I see no need for SP3. Furthermore, I have removed a lot of crap from my install, and disabled a bunch of services (only have ten or so running), so almost everything that could be exploited remotely is gone. Oh, and add a good firewall, antivirus, and common sense (something that seems to be lacking these days) on top of that...
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

+ Reply to Thread

Tags for this Thread

Posting Permissions

  • You may post new threads
  • You may post replies
  • You may not post attachments
  • You may not edit your posts
  •