Securing your Microsoft Machine

Realistically AV doesn’t stop current attacks.

Drive by attacks with Java 0day, IE 0day, etc

Semi targeted phishing attacks and this isn’t even getting into targeted attacks

My point was running EMET would stop most 0day since its stop exploits from getting around built in Windows anti exploitation techniques.

If you look at the amount of time you spend dealing with viruses/malware and weighing it against spending two weeks building a more secure base image you usually find it being worth while.

Some A/V will stop the results of these exploits…SOME of the results, not all. I really want to push for removing Java from our machines at work. I even have a script that removes all versions V. 7 and below. Problem is, that some user NEED websites that us Java. Also patching, testing, and pushing out updates to machines in our domain is incredibly time consuming.

Our base image that we use is considered bare metal. It doesn’t even include drivers or software. So in that sense, it’s fairly secure.

If you guys currently use a proxy its pretty easy to filter Java and white list known external applications and block everything else.

You could probably review currently logs and see what jar files are being loaded etc

It’s a lot less work :slight_smile:

^ That part would be out of my realm.

Implementing technology is easy. Dealing with the fallout BLOWS.

I have played in all realms of IT I understand the suck

The proxy thing I suggested works really well from customer feed back I have been getting. They were able to review a few months of proxy logs and figure out all valid apps block everything else and this was with very large companies.

It’s honestly to the point with most companies understand being secure will cause some pain but its a necessity for a successful business. Most of the companies I work with are F500 however its trickling down to smaller companies now.

In my anti-virus logs a lot of what comes through it Java exploits. As far as patching and upgrading, etc. goes. Java is one of the worst fucking apps to deal with.

Days since last Java 0day http://java-0day.com/

I like to think that we are a pretty large/major organization. After all, we are a top 10 hospital/health system and just had a nobel prize winner. Even still, the fallout of implementing big brother-like controls in a “University” environment (which is bullshit, because our hospitals and health system size crushes the university) is mind-boggling.

arrgghh, i’ve probably already said too much

In a similar environment. If you’re like my place of employment, there’s also political shit. “Oh make him full admin”, “Don’t put AV on his machine”…blah blah blah.

UGGGGGG. Political exemptions FTL! I wonder how many compromised networks stem from these bullshit exemptions. It always seems the people that “need admin” end up breaking shit and demand you drop everything to help them fix their fuckup.

DLP - http://securityreactions.tumblr.com/post/50091088474/dlp

that is the most accurate representation of DLP that I have ever seen. I wish that a gif was printable, so that I could post that on my wall.

Looking at deploying Google Chrome Enterprise (yes it’s seperate), it comes with some ADMX templates too. There is an option to block javascript and allow certain sites. Pretty awesome.

Never heard of it most companies lean on internet explorer pretty hard because of legacy/other applications.

post up how it works out

I’ve never heard of chrome enterprise either.

I’m pretty sure the Chrome app itself may be the same. It does come as an .msi file which typically is easier to work with in a windows environment as far as deploying goes.

I love the fact that Chrome stars settings that are pushed through Group Policy:
http://img.photobucket.com/albums/v398/Thorguitarist/pic1_zpse46f9db1.jpg~original

Two different types of policies for Chrome…obviously by the picture, ones users can change (like the homepage) and ones they can’t
http://img.photobucket.com/albums/v398/Thorguitarist/pic2_zps7111da3b.jpg~original

Here’s a good chunk of some of the settings you can push out.

Some of the more security “intense” settings:
http://img.photobucket.com/albums/v398/Thorguitarist/Untitled-4_zps6337bed3.jpg~original

Now some didn’t get applied, and I think that’s due to me having Chrome already configured on my end and not making some policies mandatory.

Chrome is still the most secure web browser I wish more places would adopt it.

Actually Google hired the company I work for to do an independent security analysis of all the popular browsers.

I still suggest taking sometime to look at EMET 4.0 Beta for desktops :slight_smile:

Agreed. Also I think it just works the best UI and feature wise. I read awhile ago that for most Java exploits, Chrome is the only browser that prompts the “Are you sure you want to run this plug-in” message.

It depends on the version of Java/Browser now.

By default applets would auto run if they were signed…If they were not signed they would prompt.

There were a handful of Java 0day exploits that would bypass this entire process and auto run.

Now everything is supposed to prompt to execute but signed applets have a blue box vs some other color for unsigned.

It’s funny how many people select the “I accept the risk” and then click run