Russell Smith's Least Privilege Security for Windows 7, Vista, and XP (LPS) is a helpful contribution to the toolbox of many enterprise system administrators. Numerous organizations are finally realizing that the Internet is too hostile an environment to let normal users function with elevated privileges. Although by no means a panacea for preventing intrusions, users operating with least privilege are somewhat more able to resist some attack vectors. Beyond resisting attacks, users operating with least privilege are more likely to meet organizational rules. Thanks to LPS, administrators running Windows 7, Vista, and XP can apply the author's lessons and guidance to their own environment.
I liked LPS because it applies to Windows 7, Vista, and XP. This really reflects the range of environments one is likely to encounter in the real world. (I still see Windows 2000 and even some NT, but those should be considered targets for decommissioning, not new life using least privilege!) The author does not assume that implementing least privilege is a foregone conclusion. He devotes an entire chapter to cultural and political objections to removing local administrator rights. Most chapters present a variety of tools and techniques to accomplish similar goals. The text is also very thorough, with dozens of checklists and supporting screen captures. I also appreciated hearing about several technologies which were fairly new to me, such as DirectAccess, Windows Remote Management (WinRM, Microsoft's version of WS-Management Protocol), Windows Remote Assistance and Easy Connect, and Microsoft's Internet Connectivity Evaluation Shell. The thought of Remote Desktop Protocol over HTTPS through TS Gateways, from the Internet straight to corporate desktops, horrified me.
My main problem with LPS (hence the loss of one star) involved framing the discussions in each chapter. I didn't quite follow some of the material (such as chapter 3). The author seemed too quick to jump to describing an implementation. I could have used more background on the technology and the problem it was trying to solve. However, I felt that it was likely many readers would already know the problem they needed to solve, and Smith's approach would deliver the content fairly well.
I recommend LPS to readers trying to better protect their enterprise, but be sure to include stronger warnings about the limitations of least privilege. Many instances of modern malware are happy to operate with least privilege constraints, so consider improved configuration as one element of a comprehensive security strategy.
Least Privilege Security for Windows 7, Vista and XP (English Edition) Kindle电子书
显示所有 格式和版本 隐藏其他格式和版本
This practical handbook has detailed step-by-step instructions for implementing Least Privilege Security and related management technologies. It has solutions to the most common technical challenges and Microsoft best practice advice. It also covers techniques for managing Least Privilege on the desktop. This book is for System Administrators or desktop support staff who want to implement Least Privilege Security on Windows systems.
Kindle Fire 平板电脑
- ASIN : B005OY7S2U
- 出版社 : Packt Publishing (2010年7月5日)
- 出版日期 : 2010年7月5日
- 语言 : 英语
- 文件大小 : 54337 KB
- 标准语音朗读 : 已启用
- X-Ray : 未启用
- 生词提示功能 : 未启用
- 纸书页数 : 464页
|5 星 (0%)||0%|
|4 星 (0%)||0%|
|3 星 (0%)||0%|
|2 星 (0%)||0%|
|1 星 (0%)||0%|
美国亚马逊： 2 条评论
Very focused and timely book on an important security topic2010年8月23日 - 已在美国亚马逊上发表
Good resource for Windows security professionals2013年2月26日 - 已在美国亚马逊上发表
This book covers Microsoft latest operating systems from the perspective of security and specifically the least privilege security of Windows. It provides a historical background of the principle from Windows 9.x until windows 7, It also discusses the different types of access controls (DAC, MAC, MIC, and RBAC). The book provides some workarounds fixes to solve issues around compatibility issues and LUA problems and hot to configure software distribution, run support accounts with elevated privilege and best practices in using Internet Explorer and ActiveX. Overall, the book is a great resource for security professionals especially those managing environment with Windows operating systems.