February 27th, 2017
- May 12th, 2011
Privilege Guard (Edit: now Defendpoint) first introduced UAC (User Account Control) integration in version 2.5, which enables rules to be defined that trigger when an application requires administrator privileges in order to run. Further enhancements to the UAC rule in version 2.7 now allow you to elevate applications that may trigger UAC after the application has already launched. For instance, disk defragmenter and task manager are two applications that launch with standard user rights and only trigger UAC when the user attempts to perform an operation that requires administrator privileges.
- April 26th, 2011
- April 5th, 2011
One of the most common reasons cited for granting administrative privileges to notebook users on Windows is the need to install drivers for new hardware when IT support isn’t available. Happily, Windows 7 has improved driver handling and it’s likely that when a new device is connected, it will either be supported out-of-the-box, i.e. a driver for the device is included with Windows 7, or a driver will be automatically downloaded from Windows Update and pre-staged into the driver store (c:windowssystem32driverstore) so it can be installed by a standard user.
- February 18th, 2011
A recent press release from a competitor made some ill-educated statements about Microsoft User Account Control (UAC) and other user mode solutions that control application privileges. The article picked up on a weakness in UAC that has been publicly known since the beta of Windows 7, and then went on to suggest that user mode solutions are not capable of managing application privileges securely and that elevated processes can only be protected at the kernel level.
- January 3rd, 2011
As we begin 2011 this will be the year that many companies will look to move from pilot to production with Windows 7. The migration to Windows 7 is an ideal opportunity to assess the security posture of the corporate desktop.