BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘windows’

windows of opp-img1

Seizing Windows of Opportunity for Vulnerability Assessment

The change control process for many organizations dictates that vulnerability assessment scanning can only occur during predefined scan windows. During these times, teams are notified that an assessment will be conducted and that alerts from IDS/IPS sensors, SIEMS, and local AV agents should be ignored or whitelisted from the scanners. This is a very typical…

Post by Morey Haber April 1, 2014
Tags:
, , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
beyondtrust-dashboard-auditingprivaccessblog

Auditing Privileged Access on Windows

When a user is given privileged access to a Windows host, they gain access to a wide variety of tools to control the system. Everything from the GUI and Start Menu to PowerShell and command line allow system alteration and software installation. In truly secure world, no end users would have administrative privileges. However, we…

Post by Morey Haber March 20, 2014
Tags:
, , , , , , , ,
PBW-Risk Report

Greylisting Applications with PowerBroker for Windows Risk Compliance

PowerBroker for Windows is designed to elevate privileges on an application based on rules. It does so using technology that does not alter the user but rather the security token for the application at runtime. The results allow a standard user to launch and interact with an application that requires administrative privileges, without changing the…

Post by Morey Haber February 10, 2014
Tags:
, , , , ,
BT_Privilege Gone Wild Infograpic v1

Privilege gone wild! Our latest survey finds privileged users are out of control.

Did you know that 40% of employees have unnecessary access rights? What about that over 25% of employees admitted to having retrieved information not relevant to their job like financial, reports, salary info, HR and personnel docs? Now have I caught your attention? As our latest security survey proves, insider threats continue to be a…

Post by Sarah Lieber October 22, 2013
Tags:
, , , , , , , , , ,
PBIS-operations-dashboard

Our Newest Product Release: PowerBroker Identity Services 7.5

We are very excited for the announcement of our latest release of PowerBroker Identity Services 7.5, the industry’s most effective solution for bridging Linux, UNIX and Mac OS X assets into Active Directory. This latest update provides the strongest communications encryption to date, as well as the utmost flexibility with regards to event notification and management….

Post by Sarah Lieber June 26, 2013
Tags:
, , , , , , , , ,
retinacs-dashboard

PowerBroker for Windows Policy Through Retina CS Web Services

PowerBroker for Windows has traditionally relied on Active Directory Group Policy to populate assets with the latest rules and policies. The technology also contains a utility for managing off-line systems called PBDeploy and has met the challenges for many organizations when a domain is not available for authentication. With the growing number of portable Windows…

Post by Morey Haber May 29, 2013
Tags:
, , , , ,
PIM-DefaultCricklewood

The Integrity of Files and Privileged Identity Management

The concept of privilege identity management allows for the elevation of applications and operating system functions to authoritative users based on rules and policies. While the basic context of the user does not have permissions to perform these tasks, the rules and policies in place provide a vehicle for them to operate in a privileged…

Post by Morey Haber May 27, 2013
Tags:
, , , , ,
PBW-session-viewer

Session Monitoring Provides Context Aware Security for Windows

The Windows world is about to get a long overdue lesson from Unix. Privilege Identity Management does not stop at just logging that an application gets launched with elevated privileges; administrators need to know what the user does with that application, as well. Did they use the program within the guidelines of company policy or…

Post by Morey Haber May 23, 2013
Tags:
, , , , ,
session-viewer-pbw

Tech Tip: PowerBroker for Windows 6.0 Sneak Peek

Have you ever wanted to see what activities someone has performed inside one of your line-of-business apps for troubleshooting purposes? Maybe you just want to monitor what activities a network administrator performed on your Exchange Server to track down a configuration change. Well, we’ve got an exciting new feature in the upcoming release of PowerBroker…

Post by Peter Beauregard May 16, 2013
Tags:
, , , , ,
retinacs-img9

Creating a Gold Image SCAP Template for Windows

One of the challenges of Benchmark Configuration management is creating or modifying SCAP OVAL content to match your business policies and requirements. The following procedure is recommended to create custom Windows benchmarks for the Retina Network Security Scanner and Retina CS via local system policy, Local GPO, and Microsoft Security and Compliance Manager. For starters,…

Post by Bill Tillson March 21, 2013
Tags:
, , , ,