The NSW Department of Education and Training (DET) has come out and said that due to the new features in Windows 7 they were able to essentially build a computer to survive “the most hostile environment you can roll computers into”.
“DET also uses the AppLocker functionality within Windows 7 to dictate which applications can be installed on the device.”
AppLocker is a new feature with Windows 7 that allows IT administrators to lock down application to specific product and/or vendors with having to specific the specific version. This feature allows them to only allow a specific white list of application on the computers. This essentially prevents anyone from running any non-authorised code on the computer thus making it VERY difficult to prevent people hacking the computer with third-party tools or malware. What is really nice with this feature is that it does not stop computer from running applications after they have been updated with hot fixes and service packs as AppLocker works on the digital signature on the file and not a hash of the file itself. This makes the IT Administrators overhead far less as they no longer need to add every possible version of an application to the white list when they want it to work.
While DET does seem to have done a lot in securing the devices to the Nth degree I still reckon it wont take long for someone to find some hack or workaround. I think the itNews headline is just inviting trouble by calling it “Unhackable”. I call it the “If something is said to be “unhackable” then it is far from being secure” maximum. ( More info about Security Maximum’s can be found at http://whysecurityfails.com/maxims.html ). But don’t get me wrong I don’t think that this will be a flaw in the technology but more a security issue with them forgetting to lock down some or even leaking the default BIOS password.
Source: NSW seeks to build ‘unhackable’ netbook network – Security – Technology – News – iTnews.com.au
Technorati Tags: Group Policy,AppLocker
Adam Bomb sat down with Michael Kleef and Mark Gray in the Group Policy team to talk about the kind of settings in Windows 7 that can be controlled by policy. Mark also gives us a primer on how to troubleshoot group policy issues by turning on GP logging on the client. Find out the latest about Group Policy by…
Adam Bomb had a recent visit with the Group Policy program managers, Michael explained the challenges that used to be involved in setting printers via group policy, and Lilia walks through the steps to easily do so today. You can follow Michaels blog at http://blogs.technet.com/mkleef, and Lilia contributes to the Group Policy team blog.
After about 18 months since Group Policy Preference were released with Windows Server 2008 Microsoft has finally release a migration tool to convert you PolicyMaker Group Policies to Group Policy Preferences. Here is the link to download the tool http://www.microsoft.com/downloads/details.aspx?FamilyID=35791cb6-710b-48c4-aaa1-90db170bcf2a&displaylang=en Source: Group Policy Team Blog : How do I migrate PolicyMaker Items to Group Policy Preference Items?
The Group Policy team hasn’t been sitting idly by, they’ve added a bunch of new features to Group Policy and Group Policy Preferences, and Adam Bomb sat down with Michael and Lilia to go over some of them. They cover PowerShell integration, new functionality in Directory Services, Auditing, new policies to cover new features like Direct Access, and UI enhancements…