njem said:
I'm trying to move workstaions in our office to non-admin logons for
better virus protection. Man, what a pain. The complications seem to
be unending. So now I want to verify that it's even worth it. Who
understands how viruses infect well enough to really know (not just
have heard) that not having an admin logon as the normal user logon
actually makes it harder for viruses? None of my stations are logged
on as "Administrator" just as some user that is an admin. And it's a
mix of XP and W7 stations and I _think_ that makes a difference. I
have a vauge idea that under XP if the user is an admin they, or a
virus, can do pretty much anything with no need to give permission.
So maybe on an XP station it's worse. On a W7 station even if they
are an admin level user (and UAC is at default level) you'll get an
ask dialog if a virus wants to install something, I think. But
would a virus infection really trigger a "you don't have
permission" message if on XP a user was not an admin? Would it
trigger a UAC confirmation box in W7? Or do they manage to bypass
all that? (I know if a scam can trick a user into clicking okay all
bets are off.)
Is it worth it? Yes.
Inexperienced users with full rights to the machine *(even through a UAC
prompt) can cause more damage in a short period of time than you think. It
is not necessarily just for viruses, spyware, adware and other malware -
although that is a great reason to switch to it (you'll still have to
cleanup some user-only messes.) For the most part, if the user *can*
install - they will. It may not be on purpose - but it will likely happen.
What you want when managing many computers is as much homogeniality between
the machines as possible. It makes your job much easier and keeps the
computers running better because there is no doubt what should/should not be
on the machine, what might conflict with what, etc.
What happens when someone installs 'coupon printer' and suddenly their
actual printer starts printing garbage instead of that presentation that
have to give in an hour? They install some java-based weather application
and suddenly the java-based web interface for the accounting application
your company uses ceases to function (happens to work great when the weather
app isn't running?) What if you have to have a specific version of java
installed for certain apps but when the popup came up for them to upgrade -
they did now... uh oh. The antivirus kept popping up warning them of an
issue, so they right-clicked and disabled it so they could get their work
done, then forgot about it and went browsing the web.
The question should not be "Is non-admin worth it?" it should be, "Why'd
they ever have administrative rights anyway when the idea that one should
not run daily with admin rights has been around for a *LONG* time?"
Let me address this part, "None of my stations are logged on as
"Administrator" just as some user that is an admin. And it's a mix of XP and
W7 stations and I _think_ that makes a difference."
In the long run.... wait, what? If you have administrative rights, you have
administrative rights. Period. Doesn't matter if your username happens to
be "administrator" and associated with the built-in SID/original
administrator account or not. Yes - the UAC is nice, it does pop up an
additional warning. That's it though - really - a warning. It can (and
does - from my experience with home users and repairing their machines)
become just another click that the end-user will barge through to get to the
part they are interested in (damn the consequences.) It's not a cure-all.
Truthfully - neither is limiting their rights because they can (and most
likely will) still get themselves in trouble. Malware can be tricky enough
to infest just a user's account if it cannot infest the entire machine (many
try to do both, probably don't even check if they succeed, but who knows -
some might even check.) However - cleaning up an individual account versus
a whole machine or network of machines - I'll trade happily.
And - with a little decent programming/scripting skills - you could probably
convince a end-user to unwittingly turn off any protections you think you
have... Unless they don't have the rights to do so. ;-)
It's only a pain because it was done incorrectly in the first place. It
does get easier - although there *will be* things that pop up where you
think, "If they had admin rights..." - but guess what - that's what your job
is. To administrate the machines so they don't have to (I usually stop at
"don't") and ensure the end-users can smoothly do their job without worry
over things that are *not* their job. ;-)