We have to let them though because in many cases there are no alternatives and there are not enough alternatives because nobody is even asking for them. Case in point is the Dept. of Ed. software I mentioned below. There's not a big market for alternate free DoE software. We're effectively mandated by law to make our systems insecure.
I'm not sure why you think Vista will make things worse. Things are already an awful mess, so I don't see how they could get worse. On the contrary, I think Vista, with it's alternate default user perms will start to generate some outcry from other, less cluefull users to the vendors. In any case, the virtualized file/registry writes will make tweaking perms less necessary. -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Susan Bradley, CPA aka Ebitz - SBS Rocks [MVP] Sent: Monday, September 18, 2006 10:20 AM To: ActiveDir@mail.activedir.org Subject: Re: [ActiveDir] OT: Protecting against Spyware/Adware If the vendor supported the "Designed for Windows XP" logo they would support non admin. The reality is that these vendors can code in a Win98 world because "we" the buying public do not care. As long as we don't care they can continued to code exactly the way they are now. When Vista arrives the problem will only get worse. "We" as the buying public need to let the vendors know that this is no longer acceptable. Crawford, Scott wrote: > I would rephrase that as "The ONLY problem with tweaking permissions is that I have to do it at all." Implicit in that is that the time I spend - any time at all - is time I shouldn't have to spend, and would rather spend fixing my problems instead of xyz vendor's. It can also be infered that modifying the system beyond what the vendor expects will, by definition, almost always put you in an unsupported state. If it was supported, they might as well add the tweaks to their install routine. > > If you can reproduce the problem when running as an administrator, you should be able to get support. If you can't, then the program is crashing on an access denied, and further tweaks are needed. > > One tip that might help you is to run Regmon while installing the program and add perms to any key created by the program. We have some software from the Dept. of Ed. that expects access to somewhere around 50 HCCR Class keys. As the program runs, it tries to modify values in these keys one-at-a-time. If it fails, the program exits. It started to get really tedious running Regmon, start the program, crash, find Access Denied in Regmon, modify perm, repeat 50 times. Preemptively giving rights to the keys was much faster. > > ________________________________ > > From: [EMAIL PROTECTED] on behalf of Steve Rochford > Sent: Mon 9/18/2006 4:56 AM > To: ActiveDir@mail.activedir.org > Subject: RE: [ActiveDir] OT: Protecting against Spyware/Adware > > > > One of the problems with tweaking permissions etc is that it can take a > long time to get it right and you leave yourself in an unsupported > position. As an example, we use a package called QL (from Distinction > Systems Limited) for student records. We were told by their helpdesk > that in order to get parts of it to work it needed local admin access. I > tried to use regmon/filemon to get round this but only had limited > success and it doesn't fail gracefully if it can't get the access it > needs but just collapses in a heap and needs reinstalling. The company > was uninterested in fixing the problem and basically said that if you > don't run it as admin then you don't get support. > > Steve > > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of Crawford, Scott > Sent: 15 September 2006 21:33 > To: ActiveDir@mail.activedir.org > Subject: RE: [ActiveDir] OT: Protecting against Spyware/Adware > > "Has" = The user running the program needs to be a member of Power Users > or Administrators to run said program. > > It sounds like your program requires one of two options to run - add the > user to Administrators or tweak the registry. Tweaking the registry is > by far the better option IMO. The benefits to system security outweigh > the time required to find the required perm changes (It gets easier with > practice). My original point was taking the time to tweak problem apps > allows you to let your users run as non-admins, effectively eliminating > spyware. > > I think the link you're referring to is www.threatcode.com. There are > plenty of apps/vendors that *think* they need to be run with admin > privs. I'm just saying that's not the case, provided you're willing to > tweak file/reg perms. > > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of Chinnery, Paul > Sent: Friday, September 15, 2006 1:01 PM > To: ActiveDir@mail.activedir.org > Subject: RE: [ActiveDir] OT: Protecting against Spyware/Adware > > Well, I guess you'd have to define "has." We run a hospital IS from a > major healthcare s/ware vendor that has instructions on its customer > website on making a couple of registry changes to allow non-local admins > to run it. So, technically if a registry change is made, it doesn't > have to run under those privilieges. However, in my mind, if I have to > modify the registry, then it still fits the description. > There was a message (can't remember if it was this listserv or antoher) > where the poster gave a link to a list of programs that needed local > admin to run properly. > > > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] Behalf Of Crawford, Scott > Sent: Friday, September 15, 2006 11:56 AM > To: ActiveDir@mail.activedir.org > Subject: RE: [ActiveDir] OT: Protecting against Spyware/Adware > > > I'm sure there are apps that are written exceptionally stupidly, > requiring admin, but I've yet to run across one. I've had lots of our > guys tell me something HAS to have admin to run, but I've yet to run > across one that really does. I suggest you read this article: > > http://www.microsoft.com/technet/technetmag/issues/2006/08/LUABugs/ > > > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of Chinnery, Paul > Sent: Friday, September 15, 2006 7:15 AM > To: ActiveDir@mail.activedir.org > Subject: RE: [ActiveDir] OT: Protecting against Spyware/Adware > > I agree but, unfortunately, the software being used requires local admin > privileges. Which, as you might imagine, is quite frustratig. > > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] Behalf Of Susan Bradley, > CPA aka Ebitz - SBS Rocks [MVP] > Sent: Thursday, September 14, 2006 3:11 PM > To: ActiveDir@mail.activedir.org > Subject: Re: [ActiveDir] OT: Protecting against Spyware/Adware > > > Nonadmin > > I peronally have had way less issues when users that don't need admin > rights don't have them. > > Chinnery, Paul wrote: > >> We're using CounterSpy Enterprise from Sunbelt Software. Like you, we >> > > >> have seen aperformance hit* on computers with just 128 meg of memory >> but that goes away when we add more memory. The only issue I ran >> into, other than performance, was it blocked a cookie that was >> necessary for our payroll department. However, once I "okayed" that >> cookie, it was fine. >> >> *According to Sunbelt, the next version is supposed to reduce the >> performance impact. >> >> -----Original Message----- >> *From:* [EMAIL PROTECTED] >> [mailto:[EMAIL PROTECTED] Behalf Of *Chris >> Pohlschneider >> *Sent:* Thursday, September 14, 2006 10:44 AM >> *To:* ActiveDir@mail.activedir.org >> *Subject:* [ActiveDir] OT: Protecting against Spyware/Adware >> >> Just curious what other people are using for protecting against >> adware/spyware? We are using Webroot Spysweeper right now, but I >> see some performance hits on computers running this software and >> it does work, but it causes headaches will installing some apps >> that we approve. Any suggestions are appreciated. >> >> >> >> Chris Pohlschneider >> >> Holloway Sportswear IT >> >> 937-494-2559 >> >> 937-497-7300 (Fax) >> >> [EMAIL PROTECTED] >> >> >> >> >> >> > > -- > Letting your vendors set your risk analysis these days? > http://www.threatcode.com <http://www.threatcode.com/> > > If you are a SBSer and you don't subscribe to the SBS Blog... man ... I > will hunt you down... > http://blogs.technet.com/sbs > > List info : http://www.activedir.org/List.aspx > List FAQ : http://www.activedir.org/ListFAQ.aspx > List archive: http://www.activedir.org/ml/threads.aspx > List info : http://www.activedir.org/List.aspx > List FAQ : http://www.activedir.org/ListFAQ.aspx > List archive: http://www.activedir.org/ml/threads.aspx > List info : http://www.activedir.org/List.aspx > List FAQ : http://www.activedir.org/ListFAQ.aspx > List archive: http://www.activedir.org/ml/threads.aspx > List info : http://www.activedir.org/List.aspx > List FAQ : http://www.activedir.org/ListFAQ.aspx > List archive: http://www.activedir.org/ml/threads.aspx > List info : http://www.activedir.org/List.aspx > List FAQ : http://www.activedir.org/ListFAQ.aspx > List archive: http://www.activedir.org/ml/threads.aspx > List info : http://www.activedir.org/List.aspx > List FAQ : http://www.activedir.org/ListFAQ.aspx > List archive: http://www.activedir.org/ml/threads.aspx > > > -- Letting your vendors set your risk analysis these days? http://www.threatcode.com If you are a SBSer and you don't subscribe to the SBS Blog... man ... I will hunt you down... http://blogs.technet.com/sbs List info : http://www.activedir.org/List.aspx List FAQ : http://www.activedir.org/ListFAQ.aspx List archive: http://www.activedir.org/ml/threads.aspx List info : http://www.activedir.org/List.aspx List FAQ : http://www.activedir.org/ListFAQ.aspx List archive: http://www.activedir.org/ml/threads.aspx