Because the user is logged in with administrator rights this malicious code has full rights to the computer, it could install a keylogger, sniffer, run ransomware and encrypt all the files, install remote control software, and so on. This attachment contains executable code and is executed on the computer. Scenario 1: A user is logged in to their computer with administrator rights, this person is fooled into opening an email that contains a malicious attachment. Exploiting administrator rights is a primary method attackers use to spread and gain control of systems inside and organization. You do not want your users to log into computers and perform daily work with administrator rights. Why Local Administrator Rights is a Huge Security Risk Excluding Computers from the GPO Policy (Allow certain users to keep admin rights).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |