February 28th, 2010
It surprises me how few vendors use Active Directory Group Policy as a mechanism to centrally manage and deploy policy settings for their Windows based products, and instead build their own backend infrastructure for this purpose. I could rattle off a long list of benefits, including hierarchical management, a strong security model that includes delegated administration, built-in replication, stability and scalability, to name but a few..
- May 27th, 2016
There are many aspects of customer service that are often portrayed as more complicated than they really are. This happens in all industries; sometimes for good reason, but regularly it occurs unnecessarily.
- August 7th, 2013
Privilege Guard’s UAC Replacement Extends to MSI Packages
For quite some time we have supported Windows Installer packages, empowering standard users to run MSI’s, MSU’s and MSP’s that would require administrator privileges to complete. This functionality is fundamental in most least privilege deployments, where power users are delegated the privilege of choosing their own productivity tools.
- May 21st, 2013
Do you give local administrative rights to all your users? Or maybe it’s just to the executives or laptop users? As companies now have under a year to move away from Windows XP, this is the perfect, once-in-a-decade opportunity to make your environment more secure, raise user productivity and make the lives of your support personnel easier.
- December 20th, 2012
IT departments are often met with employee demand for unrealistic levels of service and autonomy. This can be especially problematic when migrating to a least privilege environment. There are, however, steps that can be taken to communicate and convey the benefits of least privilege, reducing friction between end users and the IT department.
- November 28th, 2012
Modern IT organizations recognize the cost savings to be gained by empowering users to source and install their own applications, and least privilege provides the layer of security required to grant the use of admin privileges, required for nearly all software installations, without giving the user a full administrator account.