Least privilege security for Windows 7, Vista, and XP : secure desktops for regulatory compliance and business agility /

Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits...

Full description

Saved in:
Bibliographic Details
Main Author: Smith, Russell.
Format: eBook
Language:English
Published: Birmingham, UK : Packt Pub., 2010.
Subjects:
Online Access:CONNECT
CONNECT
LEADER 05408cam a2200553Ka 4500
001 mig00005370037
003 OCoLC
005 20210517061323.8
006 m o d
007 cr cnu---unuuu
008 110412s2010 enka o 001 0 eng d
016 7 |a 018014959  |2 Uk 
019 |a 741519505 
020 |a 9781849680059  |q (electronic bk.) 
020 |a 1849680051  |q (electronic bk.) 
020 |z 1849680043 
020 |z 9781849680042 
035 |a (OCoLC)712202996  |z (OCoLC)741519505 
035 0 0 |a ocm00000001wrldshrocn712202996 
037 |a CL0500000096  |b Safari Books Online 
040 |a N$T  |b eng  |e pn  |c N$T  |d UMI  |d OCLCQ  |d COO  |d OCLCQ  |d DEBSZ  |d OCLCA  |d OCLCF  |d OCLCQ  |d YDXCP  |d OCLCQ  |d JBG  |d AGLDB  |d CNNOR  |d OCLCQ  |d OCLCO  |d U3W  |d OCLCA  |d VTS  |d CEF  |d NLE  |d INT  |d OCLCA  |d UKMGB  |d OCLCQ  |d OCLCO  |d OCLCQ  |d STF  |d UAB  |d M8D  |d OCLCO  |d UKAHL 
049 |a TXMM 
050 4 |a QA76.9.A25  |b S65 2010eb 
082 0 4 |a 005.8  |2 22 
100 1 |a Smith, Russell. 
245 1 0 |a Least privilege security for Windows 7, Vista, and XP :  |b secure desktops for regulatory compliance and business agility /  |c Russell Smith. 
260 |a Birmingham, UK :  |b Packt Pub.,  |c 2010. 
300 |a 1 online resource (xi, 436 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a An overview of least privilege security in Microsoft Windows -- Political and cultural challenges for least privilege security -- Solving least privilege problems with the application compatibility toolkit -- User account control -- Tools and techniques for solving least privilege security problems -- Software distribution using group policy -- Managing Internet Explorer add-ons -- Supporting users running with least privilege -- Deploying software restriction policies and AppLocker -- Least privilege in Windows XP -- Preparing Vista and Windows 7 for least privilege security -- Provisioning applications on secure desktops with remote desktop services -- Balancing flexibility and security with application virtualization -- Deploying XP mode VMs with MED-V. 
588 0 |a Print version record. 
520 8 |a Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits in implementing Least Privilege Security on the desktop, there are many technical challenges that you will face when restricting privileges. This book contains detailed step-by-step instructions for implementing Least Privilege Security on the desktop for different versions of Windows and related management technologies. It will provide you with quick solutions for common technical challenges, Microsoft best practice advice, and techniques for managing Least Privilege on the desktop along with details on the impact of Least Privilege Security. The book begins by showing you how to apply Least Privilege Security to different categories of users. You will then prepare a desktop image with Least Privilege Security enabled from the start and deploy the new image while preserving users' files and settings. You will identify problems with applications caused by Least Privilege Security using the Application Compatibility Toolkit. This book will help you configure User Account Control on multiple computers using Group Policy and support Least Privilege user accounts using reliable remote access. Then, you will modify legacy applications for Least Privilege Security, achieving the best balance between compatibility and security by using Application Compatibility shims. You will install per-machine ActiveX Controls using the ActiveX Installer Service (AxIS). The book will help you implement best practices for working with ActiveX Controls in a managed environment. Finally, you will deploy default Software Restriction Policy (SRP) or AppLocker rules to ensure only programs installed in protected locations can run and blacklist applications using SRP or AppLocker. A practical handbook containing detailed step-by-step instructions for implementing Least Privilege Security on Windows systems. 
590 |a EBSCO eBook Academic Comprehensive Collection North America 
630 0 0 |a Microsoft Windows (Computer file) 
630 0 7 |a Microsoft Windows (Computer file)  |2 blmlsh 
630 0 7 |a Microsoft Windows (Computer file)  |2 fast  |0 (OCoLC)fst01367862 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
730 0 |a WORLDSHARE SUB RECORDS 
776 0 8 |i Print version:  |a Smith, Russell.  |t Least privilege security for Windows 7, Vista, and XP.  |d [S.l.] : Packt Publishing Limited, 2010  |z 1849680043  |w (OCoLC)633262986 
856 4 0 |u https://ezproxy.mtsu.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=350860  |z CONNECT  |3 EBSCO 
907 |a 4643206  |b 05-23-21  |c 07-02-20 
998 |a wi  |b 05-23-21  |c m  |d z   |e -  |f eng  |g enk  |h 0  |i 2 
994 |a 92  |b TXM 
999 f f |i edd8c476-be58-45b6-8a54-bc9c1b4192e2  |s 1fee90ee-8723-4d3e-9647-5c49f917bf3a 
952 f f |e QA76.9.A25 S65 2010eb  |h Library of Congress classification 
856 4 0 |3 EBSCO  |u https://ezproxy.mtsu.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=350860  |z CONNECT