In every organization there exists a somewhat buried but very dangerous loophole: the presence of local administrator accounts. Local administrator accounts are often times created directly by users and are hidden from the IT manager’s standard tracked list of administrative accounts managed by Active Directory. These accounts can be used by malware to install malicious software on local computers through the administrator account. Further penetration into the IT environment is then accessible through this loophole.
Bob Gourley, editor of CTOvision.com and founder and Chief Technology Officer (CTO) of Crucial Point LLC, will present the layers of endpoint protection necessary to ensure IT security and operations managers have a method for mitigating critical IT security risk. He will explain how each tool protects the endpoint, and how they work together to prevent breaches.
Next, Viewfinity will demonstrate a method for removing admin rights and managing privileges for standard users through policies, including how to:
* Discover user accounts that have local administrative rights
* Remove users or suspicious groups from the administrators group
* Control user permissions/privilege elevation via granular level policies
Contact Name: Alex Walentisch
Editor Nick Wakeman interviews Kevin DeSanto of the investment bank KippsDeSanto about the highlights of their annual M&A survey and trends driving acquisitions in the federal space.
In our latest Project 38 Podcast, editor Nick Wakeman and senior staff writer Ross Wilkers discuss the major news events so far in 2019 and what major trends are on the horizon.
Sign up for our newsletter.