Privilege Guard 2.7 and Enhanced UAC Integration

Privilege Guard (Edit: now Defendpoint) first introduced UAC (User Account Control) integration in version 2.5, which enables rules to be defined that trigger when an application requires administrator privileges in order to run. Further enhancements to the UAC rule in version 2.7 now allow you to elevate applications that may trigger UAC after the application has already launched. For instance, disk defragmenter and task manager are two applications that launch with standard user rights and only trigger UAC when the user attempts to perform an operation that requires administrator privileges.

Continue Reading


Curated Computing Promises a More Secure Future on the Desktop

While Windows owes much of its success to its flexibility and ease of use, a new computing model, chiefly heralded by Apple in the consumer space, is changing the proposition value for end users.

Continue Reading


Installing Device Drivers as a Standard User on Windows 7

One of the most common reasons cited for granting administrative privileges to notebook users on Windows is the need to install drivers for new hardware when IT support isn’t available. Happily, Windows 7 has improved driver handling and it’s likely that when a new device is connected, it will either be supported out-of-the-box, i.e. a driver for the device is included with Windows 7, or a driver will be automatically downloaded from Windows Update and pre-staged into the driver store (c:windowssystem32driverstore) so it can be installed by a standard user.

Continue Reading


Architectural Insight into Microsoft UAC and Avecto Privilege Guard

A recent press release from a competitor made some ill-educated statements about Microsoft User Account Control (UAC) and other user mode solutions that control application privileges. The article picked up on a weakness in UAC that has been publicly known since the beta of Windows 7, and then went on to suggest that user mode solutions are not capable of managing application privileges securely and that elevated processes can only be protected at the kernel level.

Continue Reading


The Least Risk Windows 7 Desktop

As we begin 2011 this will be the year that many companies will look to move from pilot to production with Windows 7. The migration to Windows 7 is an ideal opportunity to assess the security posture of the corporate desktop.

Continue Reading