Actually with Bit9 Parity even if they have Admin rights, I believe they
can't run the software if its not on the whitelist. Therefore the
(l)user can't bypass. At least in our demo they couldn't. 

Z

Edward E. Ziots
Network Engineer
Lifespan Organization
Email: ezi...@lifespan.org
Phone: 401-639-3505
MCSE, MCP+I, ME, CCA, Security +, Network +

-----Original Message-----
From: Ben Scott [mailto:mailvor...@gmail.com] 
Sent: Monday, December 15, 2008 8:35 PM
To: NT System Admin Issues
Subject: Re: Most vulnerable apps of 2008

On Mon, Dec 15, 2008 at 5:49 PM, Andy Ognenoff <andyognen...@gmail.com>
wrote:
> One of their criteria is that the apps on the list can't be managed
with
> WSUS.  Isn't that a reason to use another tool besides (or in addition
to)
> WSUS rather than not use the application in question?

  I was more surprised to find out that Microsoft Systems Management
Server is now a "free Enterprise tool".  (Page 1, "Criteria" list,
item #6.)

  More seriously: Several of their identified "worsts" come with their
own self-update tools.  Since this list seems to assume it is okay for
lusers to install and manage their own software (aside: WTF?!?), why
isn't it okay to use those self-update tools?

  The strange thing is, this company (Bit9) doesn't appear to sell
update management tools.  Their chief -- if not only -- product is an
"Application Whitelisting" tool.  (Kind of like the Software
Restrictions Policies built-in to MS Windows, but with more
capabilities and a pre-loaded list of signatures.)

  I'm guessing they set out to craft a situation where you couldn't
use Software Restriction Policies (due to allowing lusers running all
sorts of arbitrary random crap; see above) but still wanted
centralized management of the applications they can run.  Of course, I
have to ask, why not just solve the real problem rather than bolting
on a solution that a determined luser could prolly bypass anyway (they
have admin rights, remember).

  Also interesting is the fact that a stack smash with code injection
isn't necessarily going to show up on the radar of their product
anyway.  That doesn't tamper with the files on disk; it just modifies
the in-memory image.  So the bad guys can still do bad nasty things in
the unpatched application.

  I'm not impressed.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to