Author Topic: Antispyware 2010 Rogue Group Policy?  (Read 2064 times)

0 Members and 1 Guest are viewing this topic.

teamaamaster

  • Guest
Antispyware 2010 Rogue Group Policy?
« on: February 10, 2010, 01:01:14 AM »
Has anyone at all figured out a way you can block users through group policy from getting this virus/malware? We over over 500 computers and every day someone else is getting this infection. If you notice, the infection puts itself into either a temp folder or application data folder. My users are already "RESTRICTED USERS" and they are still able to get infected. Anyone know how this is possible??

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33902
  • malware fighter
Re: Antispyware 2010 Rogue Group Policy?
« Reply #1 on: February 10, 2010, 01:19:30 AM »
@teamaamaster,

Well there are several measures you can take, educating the users to somewhat safe(r)Hex is one,
because it all starts with P.E.B.A.C. (Problem Exists Between Keyboard And Chair), aka
users causing malcode infections....

Use an av solution for peripherals - MxOne: http://www.mxone.net/en/
this is an av protection for removable storage devices, a main source of infection...

Then in an attempt to suggest something to you, here is a test that was conducted last year with help from Wilders members using different products. The test uses a web-based remote code execution exploit, but the principle applies to anything that triggers an executable to run, including autorun.inf.  »www.urs2.net/rsj/computing/tests/remote

polonus

Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!