Removing 'admin' mitigates most Windows flaws

Businesses should consider making employees log in as standard users, BeyondTrust has advised.

The vast majority of all critical Microsoft vulnerabilities, some 92 per cent, could have been mitigated by removing the administrator rights of Windows users, a new report has revealed.

The researchers BeyondTrust said that the results demonstrated that if companies configured users as 'standard', they could better protect themselves against malware and zero-day threats.

Advertisement - Article continues below

According to the findings, removing administrator rights could have protected against 2008 vulnerabilities reported in Microsoft Office (94 per cent), Internet Explorer (89 per cent), and Microsoft Windows itself (53 per cent).

Microsoft already has best practice advice on this issue in its security bulletins, which says users whose accounts were configured to have fewer user rights on the system would be less affected than those who had administrative rights.

This issue has cropped up recently with the alleged flaw' in the Windows 7 Beta, where blogger Long Zheng said that its User Access Control (UAC) could be completely disabled without user interaction, increasing the risk of malware.

In a disclaimer, he said: "The user must be in the 'Administrative' user group, and not in the 'Standard' user group, where they will be prompted for an administrative password."

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement

Recommended

Visit/security/355013/10-quick-tips-to-identifying-phishing-emails
Security

10 quick tips to identifying phishing emails

16 Mar 2020
Visit/business-strategy/mergers-and-acquisitions/354941/panda-security-to-be-acquired-by-watchguard
mergers and acquisitions

Panda Security to be acquired by WatchGuard

9 Mar 2020
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/infrastructure/server-storage/355118/hpe-warns-of-critical-bug-that-destroys-ssds-after-40000-hours
Server & storage

HPE warns of 'critical' bug that destroys SSDs after 40,000 hours

26 Mar 2020
Visit/software/video-conferencing/355138/zoom-beaming-ios-user-data-to-facebook-for-targeted-ads
video conferencing

Zoom beams iOS user data to Facebook for targeted ads

27 Mar 2020
Visit/software/355113/companies-offering-free-software-to-fight-covid-19
Software

These are the companies offering free software during the coronavirus crisis

25 Mar 2020
Visit/mobile/mobile-phones/355088/apple-lifts-iphone-purchase-restrictions
Mobile Phones

Apple lifts iPhone purchase restrictions

23 Mar 2020