Sign up
Forgot password?
FAQ: Login

Smith R. Least Privilege Security for Windows 7, Vista and XP

  • pdf file
  • size 10,35 MB
  • added by
  • info modified
Smith R. Least Privilege Security for Windows 7, Vista and XP
Packt Publishing, 2010. — 464 p. — ISBN: 978-1-849680-04-2.
Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits in implementing Least Privilege Security on the desktop, there are many technical challenges that you will face when restricting privileges.
This book contains detailed step-by-step instructions for implementing Least Privilege Security on the desktop for different versions of Windows and related management technologies. It will provide you with quick solutions for common technical challenges, Microsoft best practice advice, and techniques for managing Least Privilege on the desktop along with details on the impact of Least Privilege Security.
The book begins by showing you how to apply Least Privilege Security to different categories of users. You will then prepare a desktop image with Least Privilege Security enabled from the start and deploy the new image while preserving users' files and settings. You will identify problems with applications caused by Least Privilege Security using the Application Compatibility Toolkit. This book will help you configure User Account Control on multiple computers using Group Policy and support Least Privilege user accounts using reliable remote access. Then, you will modify legacy applications for Least Privilege Security, achieving the best balance between compatibility and security by using Application Compatibility shims. You will install per-machine ActiveX Controls using the ActiveX Installer Service (AxIS). The book will help you implement best practices for working with ActiveX Controls in a managed environment. Finally, you will deploy default Software Restriction Policy (SRP) or AppLocker rules to ensure only programs installed in protected locations can run and blacklist applications using SRP or AppLocker.
Here is a brief summary of what each chapter covers:
An Overview of Least Privilege Security in Microsoft Windows
Explore the principle of Least Privilege Security and implement it in different versions of Microsoft Windows. Control and change system privileges. Benefit from implementing Least Privilege Security on the desktop and overcome the most common technical and political problems and challenges when implementing Least Privilege Security.
Political and Cultural Challenges for Least Privilege Security
Understand the reasons why users may not accept Least Privilege Security on the desktop. Clearly explain and justify the benefits of Least Privilege Security for your organization. Apply Least Privilege Security to different categories of users and get buy-in from management.
Preparing Vista and Windows 7 for Least Privilege Security
Collect and analyze data to identify any potential compatibility problems with Least Privilege Security and software installed on networked PCs using Microsoft's Application Compatibility Toolkit (ACT). Analyze logon scripts for Least Privilege compatibility. Prepare a desktop image with Least Privilege Security enabled from the start and deploy the new image while preserving users' files and settings.
Least Privilege in Windows XP
Redeploy Windows XP with Least Privilege Security using the Microsoft Deployment Toolkit. Identify problems with applications caused by Least Privilege Security using the Application Compatibility Toolkit. Mitigate the problems and limitations users may face when running with a Least Privilege Security account. Handle ActiveX controls in Windows XP.
User Account Control
Achieve a seamless user experience by using the different components and compatibility features of User Account Control. Configure User Account Control on multiple computers using Group Policy and understand the inner workings of User Account Control's core components.
Supporting Users Running with Least-Privilege
Support Least-Privilege user accounts using reliable remote access. Connect to remote systems with administrative privileges using different techniques. Enable remote access using Group Policy and Windows Firewall.
Microsoft Windows Application Compatibility Infrastructure
Modify incompatible applications on the fly and achieve the best balance between compatibility and security by using Application Compatibility shims. Create shims using Application Compatibility Toolkit 5.5 and distribute compatibility databases to devices across the enterprise.
Software Distribution using Group Policy
Prepare to deploy applications using Group Policy Software Installation (GPSI) and Windows Installer. Repackage legacy setup programs in Windows Installer .msi format. Make GPSI more scalable and flexible using the Distributed File System (DFS). Target client computers using Windows Management Instrumentation (WMI) filters and Group Policy Scope of Management.
Internet Explorer Add-on Management
Support per-user and per-machine ActiveX Controls and manage Internet Explorer add-ons via Group Policy. Install per-machine ActiveX Controls using the ActiveX Installer Service (AxIS). Implement best practices for working with ActiveX Controls in a managed environment.
Software Restriction Policies and AppLocker
Deploy default Software Restriction Policy (SRP) or AppLocker rules to ensure only programs installed in protected locations can run. Force an application to launch with standard user privileges even if the user is an administrator. Blacklist an application using SRP or AppLocker.
What You Will Learn:
Explore the principle of Least Privilege Security and implement it across different versions of Microsoft Windows;
Overcome the most common technical challenges of implementing Least Privilege Security on the desktop;
Apply Least Privilege Security to different categories of users and get buy-in from management;
Identify any potential compatibility problems with Least Privilege Security and software installed on networked PCs using Microsoft's Application Compatibility Toolkit (ACT);
Prepare a desktop image with Least Privilege Security enabled from the start and deploy the new image while preserving users' files and settings;
Configure User Account Control on multiple computers using Group Policy;
Modify incompatible applications and achieve the best balance between compatibility and security by using Application Compatibility shims;
Deploy applications using Group Policy Software Installation (GPSI) and Windows Installer and create MSI wrappers for legacy setup programs;
Install per-machine ActiveX Controls using the ActiveX Installer Service (AxIS);
Deploy default Software Restriction Policy (SRP) or AppLocker rules to ensure only programs installed in protected locations can run and blacklist applications using SRP or AppLocker.
Implement Least Privilege Security in Windows 7, Vista and XP to prevent unwanted system changes.
Achieve a seamless user experience with the different components and compatibility features of Windows and Active Directory.
Mitigate the problems and limitations many users may face when running legacy applications.
Distribute applications, updates and ActiveX Controls to least privilege users with Group Policy, application virtualization and the ActiveX Installer Service.
Ensure reliable remote access for IT administrators to support users by configuring support features and firecall access.
Who This Book Is For:
This book is for System Administrators or desktop support staff who want to implement Least Privilege Security on Windows systems.
  • Sign up or login using form at top of the page to download this file.
  • Sign up
Up