On-access AV scanning

Victor Sudakov vas at mpeks.tomsk.su
Sun Jul 29 16:36:07 UTC 2012


Polytropon wrote:
> Surely it would be better for the company that has _admitted_
> to have had more than one significant infection to do the
> simplest, most stupid and absolutely basic tasks:

Sorry for the offtopic, but from my experience, the risk of virus
infection on can be greatly reduced by two simple steps:

1. Users should not have administrative privileges on their systems.

2. A software restriction policy (SRP) should be configured which allows the
execution of files only from the %windir% and "Program Files". Such a
SRP is the Windows equivalent of "mount -o noexec" only it is more
versatile.

As a user without administrative privileges has no possibility to put
files into the %windir% and "Program Files", and no code can run from
other places such as flash drives and browser downloads, these two
measures combined are very effective.

With these two simple measures, I was able to prevent virus infection
on Windows hosts with a very high risk (such as public computers in a
summer children's camp).


-- 
Victor Sudakov,  VAS4-RIPE, VAS47-RIPN
sip:sudakov at sibptus.tomsk.ru


More information about the freebsd-questions mailing list