Least Privilege Security for Windows 7, Vista, and XP

Least Privilege Security for Windows 7, Vista, and XP
Authors
Russell Smith
ISBN
1849680043
Published
05 Jul 2010
Purchase online
amazon.com

Secure desktops for regulatory compliance and business agility *Implement Least Privilege Security in Windows 7, Vista and XP to prevent unwanted system changes *Achieve a seamless user experience with the different components and compatibility features of Windows and Active Directory *Mitigate the problems and limitations many users may face when running legacy applications

Page 1 of 2
  1. Editorial Reviews
  2. Customer Reviews

Editorial Reviews

Secure desktops for regulatory compliance and business agility

  • Implement Least Privilege Security in Windows 7, Vista and XP to prevent unwanted system changes
  • Achieve a seamless user experience with the different components and compatibility features of Windows and Active Directory
  • Mitigate the problems and limitations many users may face when running legacy applications
  • Distribute applications, updates and ActiveX Controls to least privilege users with Group Policy, application virtualization and the ActiveX Installer Service
  • Ensure reliable remote access for IT administrators to support users by configuring support features and firecall access

In Detail

Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits in implementing Least Privilege Security on the desktop, there are many technical challenges that you will face when restricting privileges.

This book contains detailed step-by-step instructions for implementing Least Privilege Security on the desktop for different versions of Windows and related management technologies. It will provide you with quick solutions for common technical challenges, Microsoft best practice advice, and techniques for managing Least Privilege on the desktop along with details on the impact of Least Privilege Security.

The book begins by showing you how to apply Least Privilege Security to different categories of users. You will then prepare a desktop image with Least Privilege Security enabled from the start and deploy the new image while preserving users' files and settings. You will identify problems with applications caused by Least Privilege Security using the Application Compatibility Toolkit. This book will help you configure User Account Control on multiple computers using Group Policy and support Least Privilege user accounts using reliable remote access. Then, you will modify legacy applications for Least Privilege Security, achieving the best balance between compatibility and security by using Application Compatibility shims. You will install per-machine ActiveX Controls using the ActiveX Installer Service (AxIS). The book will help you implement best practices for working with ActiveX Controls in a managed environment. Finally, you will deploy default Software Restriction Policy (SRP) or AppLocker rules to ensure only programs installed in protected locations can run and blacklist applications using SRP or AppLocker.

A practical handbook containing detailed step-by-step instructions for implementing Least Privilege Security on Windows systems

What you will learn from this book

  • Explore the principle of Least Privilege Security and implement it across different versions of Microsoft Windows
  • Overcome the most common technical challenges of implementing Least Privilege Security on the desktop
  • Apply Least Privilege Security to different categories of users and get buy-in from management
  • Identify any potential compatibility problems with Least Privilege Security and software installed on networked PCs using Microsoft's Application Compatibility Toolkit (ACT)
  • Prepare a desktop image with Least Privilege Security enabled from the start and deploy the new image while preserving users' files and settings
  • Configure User Account Control on multiple computers using Group Policy
  • Modify incompatible applications and achieve the best balance between compatibility and security by using Application Compatibility shims
  • Deploy applications using Group Policy Software Installation (GPSI) and Windows Installer and create MSI wrappers for legacy setup programs
  • Install per-machine ActiveX Controls using the ActiveX Installer Service (AxIS)
  • Deploy default Software Restriction Policy (SRP) or AppLocker rules to ensure only programs installed in protected locations can run and blacklist applications using SRP or AppLocker
  • Here is a brief summary of what each chapter covers:

Chapter 1: An Overview of Least Privilege Security in Microsoft Windows Explore the principle of Least Privilege Security and implement it in different versions of Microsoft Windows. Control and change system privileges. Benefit from implementing Least Privilege Security on the desktop and overcome the most common technical and political problems and challenges when implementing Least Privilege Security.

Chapter 2: Political and Cultural Challenges for Least Privilege Security Understand the reasons why users may not accept Least Privilege Security on the desktop. Clearly explain and justify the benefits of Least Privilege Security for your organization. Apply Least Privilege Security to different categories of users and get buy-in from management.

Chaper 3: Preparing Vista and Windows 7 for Least Privilege Security Collect and analyze data to identify any potential compatibility problems with Least Privilege Security and software installed on networked PCs using Microsoft's Application Compatibility Toolkit (ACT). Analyze logon scripts for Least Privilege compatibility. Prepare a desktop image with Least Privilege Security enabled from the start and deploy the new image while preserving users' files and settings.

Chapter 4: Least Privilege in Windows XP Redeploy Windows XP with Least Privilege Security using the Microsoft Deployment Toolkit. Identify problems with applications caused by Least Privilege Security using the Application Compatibility Toolkit. Mitigate the problems and limitations users may face when running with a Least Privilege Security account. Handle ActiveX controls in Windows XP.

Chapter 5: User Account Control Achieve a seamless user experience by using the different components and compatibility features of User Account Control. Configure User Account Control on multiple computers using Group Policy and understand the inner workings of User Account Control's core components. OA Chapter 6: Supporting Users Running with Least-Privilege Support Least-Privilege user accounts using reliable remote access. Connect to remote systems with administrative privileges using different techniques. Enable remote access using Group Policy and Windows Firewall.

Chapter 7:Microsoft Windows Application Compatibility Infrastructure Modify incompatible applications on the fly and achieve the best balance between compatibility and security by using Application Compatibility shims. Create shims using Application Compatibility Toolkit 5.5 and distribute compatibility databases to devices across the enterprise.

Chapter 8: Software Distribution using Group Policy Prepare to deploy applications using Group Policy Software Installation (GPSI) and Windows Installer. Repackage legacy setup programs in Windows Installer .msi format. Make GPSI more scalable and flexible using the Distributed File System (DFS). Target client computers using Windows Management Instrumentation (WMI) filters and Group Policy Scope of Management.

Chapter 9: Internet Explorer Add-on Management Support per-user and per-machine ActiveX Controls and manage Internet Explorer add-ons via Group Policy. Install per-machine ActiveX Controls using the ActiveX Installer Service (AxIS). Implement best practices for working with ActiveX Controls in a managed environment.

Chapter 10: Software Restriction Policies and AppLocker Deploy default Software Restriction Policy (SRP) or AppLocker rules to ensure only programs installed in protected locations can run. Force an application to launch with standard user privileges even if the user is an administrator. Blacklist an application using SRP or AppLocker.

Approach

This practical handbook has detailed step-by-step instructions for implementing Least Privilege Security and related management technologies. It has solutions to the most common technical challenges and Microsoft best practice advice. It also covers techniques for managing Least Privilege on the desktop.

Who this book is written for

This book is for System Administrators or desktop support staff who want to implement Least Privilege Security on Windows systems.

You might also like...

Comments

Contribute

Why not write for us? Or you could submit an event or a user group in your area. Alternatively just tell us what you think!

Our tools

We've got automatic conversion tools to convert C# to VB.NET, VB.NET to C#. Also you can compress javascript and compress css and generate sql connection strings.

“The question of whether computers can think is just like the question of whether submarines can swim.” - Edsger W. Dijkstra