BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

eEye Research Report: In Configuration We Trust

Posted May 9, 2011    Marc Maiffret

In configuration we trust. This statement couldn’t be truer to my research team and me, especially after discovering some of the findings in our latest report, which we publicly released last week. In the report, we describe simple configuration changes and software version upgrades that could mitigate many application vulnerabilities before patches are available. Some of these changes could even repel highly sophisticated attacks like Stuxnet and Aurora.

I wanted to post a quick blog on why I am personally pushing IT security people to read this information and where possible, make the changes we recommend. First things first: please go download the paper at www.eeye.com/securityresearch.

So, one of the main reasons I’m strongly encouraging you to take these recommendations seriously is that you can’t simply rely on technology solutions to protect your IT environment. As we state in the paper, you must step back and look beyond technology to build a strong foundation. Properly configuring your systems is a relatively easy and totally free way to do this.

For example, by simply disabling certain features within MS WebDAV and document converters, you would mitigate 12 percent of related vulnerabilities and defend against DLL Hijacking attacks. Another huge finding that will surely cause some heads to shake is fact that upgrading to the latest major release versions of Microsoft software will mitigate more than 50 percent of all MS vulnerabilities identified in 2010.

The other reason that I feel strongly about publishing this report is my desire to kick-start conversation about security best practices within the IT community. The eEye research team chose to cover areas that we feel are important, but the broader point is that there are many things that can be done around proper security configuration and this report only scratches the surface. If researchers and other tech experts contributed more to the conversation, we wouldn’t just hear about big scary attacks or the latest super product. We’d bring the dialogue into a much more reality-based realm and do more to educate and improve the security of business networks.

Leave a Reply

Additional articles

PBPS-screenshot-blog aug2014

Failing the Security Basics: Backoff Point-of-Sale Malware

Posted August 22, 2014    Marc Maiffret

At the beginning of this month, US-CERT issued a security alert relating to a string of breaches that had been targeting Point of Sale (POS) systems. The alert details that attackers were leveraging brute forcing tools to target common remote desktop applications such as Microsoft’s Remote Desktop, Apple Remote Desktop, Splashtop and LogMeIn among others….

Tags:
, , , , , ,

Troubleshooting Windows Privilege Management Rules with Policy Monitor

Posted August 21, 2014    Jason Silva

When defining and testing PowerBroker for Windows rules for production or pilots, customers sometimes tell us, “I don’t think this policy / program is working.” This is usually a case of the policy not properly triggering because of the way the rule was created. A unique feature of PowerBroker for Windows compared to other solutions is a client-side…

Tags:
, , ,
darren-mar-elia

BeyondTrust Webcast: Darren Mar-Elia’s 4 Active Directory Change Scenarios to Track

Posted August 20, 2014    Chris Burd

In our latest webcast, we joined Darren Mar-Elia, CTO at SDM Software, to discuss best practices for Active Directory (AD) change management. Here are some key takeaways from the presentation, followed by a link to a full-length video of the presentation. Mar-Elia kicks things off with a critical insight: that the best AD change management…

Tags:
, , , , , , ,