Time
3 hours 35 minutes
Difficulty
Intermediate
CEU/CPE
4

Video Transcription

00:00
hello and welcome to P C Security Intermediate Course.
00:04
In this
00:06
video, I will be talking about limiting uses rights. So I will emphasize on the fact that there are benefits of removing admin brights to users
00:18
and just to look at what? What is the situation now, please? To my experience,
00:25
most of the companies all users, have admin brights on their accounts. From my experience, the financial institutions, mostly banks on the insurance companies and also medical Medicare businesses
00:44
that they have a tendency to limit
00:48
privileges of off every user toe, something that is below Administrator. However, in most of other companies, including I t companies in which I was in contact with their users simply have the admin rights and there PC. So
01:02
not just then they can run anything from their PC, but also any malbert that starts and then PC has a privilege to do whatever
01:11
they can,
01:14
and this is really bad thing. So what are the benefits off? Ah, limiting
01:22
you mean the privileges of off regular user billow admin privileges
01:29
Well, 85% off vulnerabilities on Windows systems simply could have in the morning by removing the admin rights to users. And this focuses not just to the fact that we we want to protect programs inside the PC. It's it's any kind of Muller has a difficulty
01:49
running things there they they're supposed to do
01:53
if they are run with non admin privileges. So if something's, they simply cannot change or something like that.
02:00
So
02:00
removing I mean rights can stop. The spread of wire sees through programs
02:07
on and some not all member that is delivered by a fishing and muller for militia sites can also be stopped in this way because they simply cannot perform their function because things they want to start bones the allowed by windows.
02:25
Okay, there is Mother smiled, malware that can bypass these things.
02:30
But so, Aziz, you remember there is no 100% guaranteed protection. But this is really good thing that can stop many, many things.
02:42
There is nothing much more to say about this.
02:45
This leads to a concept that is called this privilege approach, which is also very important and very modern today in the world of cyber security.
03:00
But I have been talking about this saying in my other course, intermediate pieces endpoint security
03:07
and if you want to look into this matter a little bit more that you should take a look at this Course also, um, the whole
03:17
concept off least privilege deserves its own, uh,
03:22
attention. So, uh, it's not everything is even in the end point security intermediate course.
03:30
So the
03:30
that the whole topic is very, very deep and requires a specials approach.
03:38
Okay, So in this video, you have learned about benefits of removing gunman rights to users, and in
03:46
next the lesson, I will be talking about protecting browsing, which is also very important thing.

Up Next

Intermediate PC Security

The Intermediate PC Security course will teach students about endpoint protection. Students will learn fundamental information about PC Security and common attack vectors.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor