It’s a very exciting time at Avecto. Not only are we celebrating our 10-year anniversary this year, but we’re also announcing that Bomgar, a leader in identity and access management solutions, is to acquire the company.
Privilege Guard 2.8 (Edit: now Defendpoint) is the first privilege management solution to introduce an intelligent anti-tamper mechanism that can protect the Privilege Guard software and configuration settings against modification from elevated processes, while still allowing the solution to be administered by true system administrators.
Today we are very pleased to announce the release of Privilege Guard 2.8
Avecto Privilege Guard (Edit: now Defendpoint) is implemented as a Group Policy Extension, which allows it to integrate seamlessly with solutions that enable advanced management of Group Policy. This includes Microsoft’s Advanced Group Policy Management (AGPM), which is part of the Microsoft Desktop Optimization Pack (MDOP), but other vendors have solutions in this space too, such as NetIQ with their Group Policy Administrator (GPA).
SMEs often manage without one, and larger companies have it in their staff handbooks, but an IT security policy without the controls to enforce it is of little value, and only useful for assigning blame when something inevitably goes awry.
One of the comments I receive most frequently from attendees of my Least Privilege webinar is that web conferencing software, such as Citrix’s popular GoToMeeting, prevents IT departments moving forward with least privilege on the desktop
The scope of a Group Policy Object (GPO) can be controlled with WMI filters, based on criteria such as operating system version or hardware specifications. A WMI filter consists of one or more queries, and if all queries evaluate to true then the GPO linked to the filter will be applied.
Windows XP is deemed ‘good enough’ by many, but the fact is that it’s four to five times more vulnerable to malware infection than Windows 7. While this is mainly due to improved security defenses, including least privilege security implemented with the help of User Account Control (UAC), that’s not to say we should be complacent when using Windows 7.