In every organization there exists a somewhat buried but very dangerous loophole: the presence of local administrator accounts. Local administrator accounts are often times created directly by users and are hidden from the IT manager’s standard tracked list of administrative accounts managed by Active Directory. These accounts can be used by malware to install malicious software on local computers through the administrator account. Further penetration into the IT environment is then accessible through this loophole.
Bob Gourley, editor of CTOvision.com and founder and Chief Technology Officer (CTO) of Crucial Point LLC, will present the layers of endpoint protection necessary to ensure IT security and operations managers have a method for mitigating critical IT security risk. He will explain how each tool protects the endpoint, and how they work together to prevent breaches.
Next, Viewfinity will demonstrate a method for removing admin rights and managing privileges for standard users through policies, including how to:
* Discover user accounts that have local administrative rights
* Remove users or suspicious groups from the administrators group
* Control user permissions/privilege elevation via granular level policies
Contact Name: Alex Walentisch
Sign up for our newsletter.
Don't miss Senior Staff Writer Ross Wilkers Interview with Leidos executive Donnelly Bohan about the technology, strategy and success behind the company's Sea Hunter project.
In this episode of the Project 38 podcast, we talk to Hitachi Vantara Federal leader David Turner about a project at Disney World that can teach the federal government how powerful the Internet of Things and data can be.