In every organization there exists a somewhat buried but very dangerous loophole: the presence of local administrator accounts. Local administrator accounts are often times created directly by users and are hidden from the IT manager’s standard tracked list of administrative accounts managed by Active Directory. These accounts can be used by malware to install malicious software on local computers through the administrator account. Further penetration into the IT environment is then accessible through this loophole.
Bob Gourley, editor of CTOvision.com and founder and Chief Technology Officer (CTO) of Crucial Point LLC, will present the layers of endpoint protection necessary to ensure IT security and operations managers have a method for mitigating critical IT security risk. He will explain how each tool protects the endpoint, and how they work together to prevent breaches.
Next, Viewfinity will demonstrate a method for removing admin rights and managing privileges for standard users through policies, including how to:
* Discover user accounts that have local administrative rights
* Remove users or suspicious groups from the administrators group
* Control user permissions/privilege elevation via granular level policies
Contact Name: Alex Walentisch
Don't miss our Aug. 2 Washington Technology Power Training session on Mastering Stakeholder Engagement, where you'll learned the critical skills you need to more fully connect with your customers and win more business.
In our latest Project 38 Podcast, editor Nick Wakeman interviews Tom Romeo, the leader of Maximus Federal about how it has zoomed up the 2019 Top 100.
Sign up for our newsletter.