Started By
Message

Does anyone in I.T. here have luck with keeping users from getting infected?

Posted on 11/12/14 at 11:00 am
Posted by Casty McBoozer
your mom's fat arse
Member since Sep 2005
35495 posts
Posted on 11/12/14 at 11:00 am
I put in some GPO's for executables in temp directories as outlined here LINK,

I have them running MSSE and MBAM pro with Adblock Plus in the browsers, and nothing helps.

This particular company is using MX Logic/McAfee SaaS for spam/virus email filtering so I don't think infection is getting in that way.

Users are always asking me how they got infected, but I don't know what to tell them, because I've never gotten all this crap. Every computer I work on is full of PC Speed fixers/optimizers, have browser add-ons out the arse, etc.

I don't know how to stop it or how it's happening! WAy too many calls this week.
Posted by ILikeLSUToo
Central, LA
Member since Jan 2008
18018 posts
Posted on 11/12/14 at 11:20 am to
Where I work, every office computer is locked down to the point that users can't even update Java without an admin's assistance, or flash or a new browser.

Despite that, a few years ago my office PC picked up some standard (fake virus scanner) malware that arrived just at the time I was browsing some rather innocuous looking site with MS Word tutorials. I'm obviously not a clueless internet user, but it just happened out of no where. I can't think of any possible way of stopping it 100% other than IT blocking everything that isn't intranet, but that wouldn't work for quite a few positions. There's always a flavor of the month malware being circulated somewhere.
This post was edited on 11/12/14 at 11:22 am
Posted by gmrkr5
NC
Member since Jul 2009
14891 posts
Posted on 11/12/14 at 11:32 am to
The simple answer is "no". as new defense mechanism become available the attackers just change what they are doing.

White listing is one of the better things that have come around in the last few years. It even has its flaws.

Bit9 for instance... About a year ago they were the hottest thing since sliced bread. Then attackers just stole their application hashes. Defense mechanisms in infosec are developed in a mainly reactive fashion. the attackers are always 1 step ahead of what is out there to defend.

But past that, reducing user permissions is obviously something you want to do. But it doesn't matter what the user can browse to or install when you open a malicious office document that exploits OLE, etc
This post was edited on 11/12/14 at 11:36 am
Posted by Hopeful Doc
Member since Sep 2010
14962 posts
Posted on 11/12/14 at 11:46 am to
quote:

Where I work, every office computer is locked down to the point that users can't even update Java without an admin's assistance, or flash or a new browser.



Most of our users has power user access, but then my boss got tired of us installing every updates, so he moved people back to full/admin access of workstations. Never had a virus problem though. It was a ~50 user office with state money, so we had a Barraccuda web filter (210 series?) that did a good job of blocking most web traffic we didn't want rolling through. And we had a centrally-managed TrendMicro antivirus that I never particularly noticed as good or bad. It was definitely not intrusive.
Posted by XanderCrews
Member since Mar 2009
774 posts
Posted on 11/12/14 at 11:55 am to
(no message)
This post was edited on 12/21/21 at 10:05 am
Posted by gmrkr5
NC
Member since Jul 2009
14891 posts
Posted on 11/12/14 at 12:12 pm to
quote:

Most of our users has power user access, but then my boss got tired of us installing every updates, so he moved people back to full/admin access of workstations. Never had a virus problem though. It was a ~50 user office with state money, so we had a Barraccuda web filter (210 series?) that did a good job of blocking most web traffic we didn't want rolling through. And we had a centrally-managed TrendMicro antivirus that I never particularly noticed as good or bad. It was definitely not intrusive.



ha, with that type of environment you most likely just didn't know your were compromised.

A content filter and A/V would be considered bare-minimum protection
This post was edited on 11/12/14 at 12:13 pm
Posted by ZereauxSum
Lot 23E
Member since Nov 2008
10176 posts
Posted on 11/12/14 at 12:25 pm to
quote:

Where I work, every office computer is locked down to the point that users can't even update Java without an admin's assistance, or flash or a new browser.


Same here. I can't change anything on my work laptop. I can't even defrag the hard drive or go into device manager :/

Sucks for me, but this level of totalitarianism is probably best for the company.

We also have Websence Endpoint blocking pretty much the entire internet, so the only thing coming in would be a malicious email attachment.
This post was edited on 11/12/14 at 12:26 pm
Posted by foshizzle
Washington DC metro
Member since Mar 2008
40599 posts
Posted on 11/12/14 at 12:49 pm to
quote:

Where I work, every office computer is locked down to the point that users can't even update Java without an admin's assistance, or flash or a new browser.


Same here. End users cannot install anything at all, and if someone attaches an unauthorized external device (thumb drive, external HD, etc.) IT gets notified somehow and someone will be down within 5 minutes to have a word with the user, I've seen it happen.
Posted by TigerMyth36
River Ridge
Member since Nov 2005
39730 posts
Posted on 11/12/14 at 12:51 pm to
We have lots of things locked down. I can't run an exe without admin approval. I think flash upgrades require an admin.

With that, we have still been hit a few times in the last couple of months.

Without 100% lockdown of the net, I don't see how it is possible to stop infections.

You just need to react fast and have the tools in place to fix the mess.
Posted by jdd48
Baton Rouge
Member since Jan 2012
22079 posts
Posted on 11/12/14 at 12:51 pm to
Turn off local admin privileges for users if you haven't. That cuts down on it ALOT, but still doesn't prevent it entirely. Only downside if you have to go and type in an admin password for every software update. I rather do that than fight non-stop infections.

I've heard it said time and time again, and experienced it myself. The weakest part of the IT security program is usually the users.
This post was edited on 11/12/14 at 12:54 pm
Posted by gmrkr5
NC
Member since Jul 2009
14891 posts
Posted on 11/12/14 at 1:02 pm to
quote:

I've heard it said time and time again, and experienced it myself. The weakest part of the IT security program is usually the users.



true statement. for anyone that has never seen it, SANS provides tons of end user training material. SANS is probably the most highly regarded infosec training provider from end users up to infosec engineers, architects, etc


securingthehuman
This post was edited on 11/12/14 at 1:05 pm
Posted by Hammertime
Will trade dowsing rod for titties
Member since Jan 2012
43030 posts
Posted on 11/12/14 at 1:11 pm to
Sounds like job security to me
Posted by gmrkr5
NC
Member since Jul 2009
14891 posts
Posted on 11/12/14 at 1:18 pm to
quote:

Sounds like job security to me



lol, exactly
Posted by Bard
Definitely NOT an admin
Member since Oct 2008
51586 posts
Posted on 11/12/14 at 1:33 pm to
We have everything pretty much locked down, the only updates that don't require us are Windows updates. 8e6 firewall, Barracuda spam blocker for email, Kaspersky for the A/V.

Since switching from the steaming pile of crap that is Computer Associates a/v, our malware issues went from 20-30/month to 1 every other month (around 600 machines, some with multiple users). The most common culprits are the few outside of IT that have admin rights and/or folks with laptops (tip: IT people know what TOR is so don't be shocked when you get called into HR for downloading a copy of "Black Hookers 1998").

Even with that I still run across people that have managed to load things like Spotify.

What browser are you running on user computers? I know there is a big push away from IE (and rightly in many cases) but I have an issue with Chrome's app store being accessible and hardly any of the apps needing admin rights to install (haven't tinkered with Firefox's store).

It's been a while but when we were still using CA I would load occasionally Spybot and put the Tea Timer on to toss out scary warning messages anytime something tried to make a registry change. I had some limited success with it, but again that was years ago.
Posted by Hopeful Doc
Member since Sep 2010
14962 posts
Posted on 11/12/14 at 2:06 pm to
quote:

ha, with that type of environment you most likely just didn't know your were compromised.



We most definitely didn't have intrusive fake a/v viruses as discussed above.
Posted by gmrkr5
NC
Member since Jul 2009
14891 posts
Posted on 11/12/14 at 2:22 pm to
quote:

We most definitely didn't have intrusive fake a/v viruses as discussed above.



that's about the least sophisticated threat out there. it wants you to know its there. the bad ones are the stuff you never find out about
Posted by Hopeful Doc
Member since Sep 2010
14962 posts
Posted on 11/12/14 at 3:27 pm to
quote:

the bad ones are the stuff you never find out about



I'm aware. So the systems that can't even keep the obvious things out are more secure than the ones who can...?
Posted by gmrkr5
NC
Member since Jul 2009
14891 posts
Posted on 11/12/14 at 3:35 pm to
quote:

So the systems that can't even keep the obvious things out are more secure than the ones who can...?



please show me where I said this
This post was edited on 11/12/14 at 3:38 pm
Posted by jcole4lsu
The Kwisatz Haderach
Member since Nov 2007
30922 posts
Posted on 11/12/14 at 3:37 pm to
just wait until one of those sheeple get the cryptowall and find out everything on the hard drive is now encrypted.

then let them bitch at you about how they dont have everything backed up even though you have told them they need to do something about it for the past 2 years.


i hate people
Posted by BigSquirrel
Member since Jul 2013
1880 posts
Posted on 11/12/14 at 3:56 pm to
Yes, I have had great success. There are two easy answers. Open DNS, and Eset antivirus. Since installing these two, we have only had one virus, which was on a VM machine an outside tech logged into, which didn't have ESET on it.
first pageprev pagePage 1 of 2Next pagelast page

Back to top
logoFollow TigerDroppings for LSU Football News
Follow us on Twitter, Facebook and Instagram to get the latest updates on LSU Football and Recruiting.

FacebookTwitterInstagram