Reducing The Negative Impact of Laptops 221
Mark Brunelli wrote to mention a SearchEnterpriseLinux column about reducing the negative impact laptops can have on a network's security. From the article: "Portable computers often become an extension of the person using them. It is no surprise that laptop users are inclined to be rather autonomously minded. Many users don't realize that the power they have to install software and change settings is risk prone. Fortunately, larger corporations that install Microsoft Windows XP Professional usually don't grant the laptop user full administrative rights. The same cannot be said of smaller businesses, many of which simply purchase laptops from the local store -- laptops pre-installed with Windows XP Home Edition. "
Linux (Score:3, Informative)
Better still, use the truly secure Linux operating system. Six months after making the change, you will not use Windows again. The cost of Linux is also much less than the cost of upgrading Windows XP Home Edition to Windows XP Professional.
Unfortunately Linux isn't as easy to use for most people. How about suggesting that they use a Mac? Macs are secure and are easy to use.Re:Linux (Score:4, Insightful)
The real world situation is that people are idiots. They can't even use the big pretty blue buttons in Windows XP, much less Linux. If they don't know that the big Novell login screen with the buttons saying 'Press Ctrl + Alt + Del to begin.' is telling them they should press those keys to get started, what chance is there they'll know what to do with one of the somewhat useless messages Gnome generates when an application crashes? (And yes, that most certainly was a 100% true story... I shit you not!)
Besides, I know our company builds their applications from scratch. While we are moving more to a web-based application model, we still have 95% of our programs written in Delphi, and even support a legacy DOS-based system. There's no way we'd get all that ported to Linux any time in the next 2 years, even if we dropped everything until it was done.
The point is, stop suggesting the supposedly "ideal" scenario that no one will ever be able to obtain. We're stuck with Windows (at least for the time being anyway), so we may as well focus on THAT problem and try to do the best we can with the tools we have. Let's worry about keeping Billy the marketing Intern from bringing Klez onto our network first, and THEN worry about changing the world later...
Re:Linux (Score:3)
Because everyone is using a collection of software comprised of 95% home grown Delphi apps?
So you're stuck with windows. Fine.
Some people aren't, and the suggestion of using Linux is legitimate.
Let's worry about keeping Billy the marketing Intern from bringing Klez onto our network first, and THEN worry about changing the world later...
You worry about your network. No need to try discourage others
Re:Linux (Score:2)
Re:Linux (Score:2)
Re:Linux (Score:2)
Why not? If you couldn't work out how to start your car, would it be your fault? It seems to be what you're implying...
There's too much reliance on the "User is always wrong" approach in producing software and interfaces for it and that if they have a problem, they should just "deal with it". Consumer devices that take this approach just generally fail to catch on. If something says "Press Ctrl+Alt+
Re:Linux (Score:2)
If a big message popped up on the inside of the windshield (mmmmm... automobile HUDs...) that said "Depress [brake/clutch] and insert key. Turn key clockwise." and they still couldn't figure it out... uhh yeah, that would be my fault.
Re:Linux (Score:2)
If you think you can just sit the average user in front of a Mac and they'll have no issues using it, you're seriously delusional. Remember, these same users have problems with the NT login screen.
Re:Linux (Score:2)
There's WINE and DOSEMU. You don't have to worry about porting them.
You may not want to and that's your right, but let's not pretend that you can't.
LK
Re:Linux (Score:2)
Re:Linux (Score:2)
These days, the login screen for windows show a little animation of three buttons being pressed simultaneously. Which prevents people from misinterpreting the message to "press ctrl+alt+del" to mean to press t
Re:Linux (Score:2)
When Microsoft added the windows keys, they just needed to create a new keyboard layout and map two (three?) new scan codes - something trivial to do. Making the windows key generate a hardware interrupt
Re:Linux (Score:3, Interesting)
It's trivial to wire the windows key in such a way that pressing it has the same effect as pressing ctrl, alt and del simultaneously.
In fact, it's easier than adding a new scancode. Just have the ctrl, alt and del circuits on the k
Re:Linux (Score:2)
Why does there, on a modern computer still have to be such a funky key combination just to get into the system? Apple has it right. Just click on a cute picture next to the users name. After typing a password into the little window that appears the user is logged on. Why does it have to be more complicated? On my win2k computer it works that way, except the user has to type the login name above the password space also.
Re:Linux (Score:2)
Such a thing may be possible on Windows computers, since those are insecure by design and must be used with full administrative rights because there are so many programs that will not work for restricted users. I hope MS finally fixes this in VISTA.
On Mac OSX it is possible to restrict users severely, yet still allow them to run all the programs they need. There would be no way a restricted user can get such a fake lo
Re:Linux (Score:2)
It is extremely difficult if not impossible to secure any computer if a person with nastyness in mind has access to it physically. Most computers can be rebooted from a CD or external HD and then then the "vulcan neck pinch" login sequence is no good either. If the perp is really bad, he'll just take you whole computer, which is easy to do with a laptop.
Re:Linux (Score:2)
I simply put the system to sleep when I leave and then it asks for a password in order to get back in after waking. It also goes to sleep own its own after 20 min or so. I suppose on a Mac the closes thing to an attention key is the force quit combination which brings up the force quitting window to enable killing of locked up programs. As for Kiosk systems, I was able to subvert a Kiosk Mac (os7) at a museum once by turning it off and then
Re:Linux (Score:2)
Basically, it's kinda similar to the regular winlogon, except it's got Novell logos, and it's got things to connect to Novell instead of Windows networks.
Re:Linux (Score:3, Informative)
Still this complete and utter shit argument? (Score:2)
And it is isn't Solaris in the background, it is the desktop from wich you control the machine.
Have the people working with it got any problems with using a real OS instead of the pretty button
Re:Linux (Score:2)
It's a lie to say any computer is secure though. Even if it runs Linux or OSX a laptop is more of a security risk for the network simply because it's had more chance to be outside the control of any and all security policy. Never trust that the user's computer is secure.
Of course Windows is so insecure that I would never allow any employee of mine to connect to my corporate network wit
Congratulations ... (Score:2)
That being said I agree with you (despite the troll factor). For the average user OS.X is definetly easyer to install and use on a laptop than Linux. I know a number of Linux laptop users and I shudder to think what Joe User would do when confronted with some of the flaming hoops these guys had to jump through, for expample, to get their Wifi
Re:Congratulations ... (Score:2)
Linux does not make life easy for the user. OS X does. Windows does to some extent.
This is where you find a support solution. (Score:2, Informative)
Well, for a Unbuntu end user there is always just paying [ubuntu.com] for real techsupport. I know Redhat can help out with getting Wine to work (saw it happen), dont know about Canonical.
For a business I would never even consider using a specific distro unless there was a live person on the other end of a phone line. It just wouldn't happen otherwise.
Re
Re:Linux (Score:4, Insightful)
Well, there's that little red-and-white lifesaver icon. That'll bring up the help system in Gnome or KDE. Then there's the speech bubble with the ? in it, that'll give you context-sensitive help. Or you could just start the KDE help center app and search in that. Or maybe you could open a terminal and type "apropos " and Linux would tell you which commands are relevant. Then you could type "man " or "info " and get some compact reading material. If you're still stuck, you could look into whichever distro you're using's forums. People there are almost always ready to assist. Or you could pay for commercial support - plenty of people willing to take money for tech support. Then there's http://www.linuxhelp.net/ [linuxhelp.net], which seems quite, umm, helpful. Typing "linux help" into a search engine will give you just under two hundred million hits to look into too - maybe one of those might be useful, do you think? Of course, for the traditionalists, there's always usenet. If you log onto any of the several hundred groups devoted to the various flavours of Linux, there just might be something to look at perhaps? Or maybe there's a local Linux User Group you could phone and talk to a real geek.
Apart from that, you're right. Linux does really leave you high and dry.
Re:Linux (Score:2)
No, what it boils down to is that you've never used Linux, or you'd know the KDE/Gnome help systems bring the man and info pages into the same interface.
Look, it was a good try at an astroturf, so well done for effort - but face facts - you've failed. Give it up.
Re:Linux (Score:2)
Some standard security items.. (Score:2, Informative)
1) Most laptops now have wireless cards. If this is the case, use an encrypted connection to an AP.
2) Even then, use as many encrypted streams as you can (ssh, https, pop3s/imaps, etc.).
3) Physical security. It's easy for anyone to run off with your computer. So keep track of it... don't leave it on the table at the library.
Laptops get around too much (Score:3, Insightful)
Until recently I was involved in administrating a linux server on a network of windows workstations. The server primarly operated as a gateway to the internet.
Every now and then some horrible worm would get lose on the network and fill the internet connection with crap. I would get the blame for it of course (internet not working).
Outbreaks were correlated with a particular individual coming back to the office with his laptop after working elsewhere. I think it must be something about the way he uses that system; what sites he goes to, probably; which causes it to be so riddled with viruses.
I am not managing that system any more. Good riddance. The versatility of laptops is letting them down in this instance. If the owner is a bit of an idiot no amount of management will keep them out of trouble.
Re:Laptops get around too much (Score:2)
But I think you took the smarter route here (no pun intended). Dump it onto someone else to deal with.
Re:Laptops get around too much (Score:5, Informative)
You would not believe the crap you have to deal with on hotel networks. If anyone is counting on the firewalls keep the network clean, guess again. This has to be at the machine level, each one an island. I keep the shield up on my laptop and (knock on wood) have yet to have an issue - but most of the broad band connections your typical road warrior deals with is a cesspool of worms, viruses, and other such nasties.
Re:Laptops get around too much (Score:2, Insightful)
What I really want is a
DMZ (Score:3)
If your laptop users want
Re:DMZ (Score:2)
Thanks for that. There have been a lot of interesting suggestions in this thread.
I was only brought in to do the server and they didn't pay me to run the whole system. They had a few people with just just the right amount of knowledge (enough to be able to change things, not enough to be able to do it properly) and I would never have been able to lock them out of their machines, even if I had been paid to maintain them.
It was too political, nobody was in charge. I am not sorry they decided to go elsewher
Re:DMZ (Score:2)
As for the network, if you do get the chance then a good stackable managed switch (ie backplane stacking , not connect-the-uplinks) with serial console is your best friend
Re:Laptops get around too much (Score:2)
Your network had a patchbay, right????
Figure out what port that guy connects his laptop to, and put it on it's own subnet. If you don't have a switch that can vlan, then give him a port direct into a linux/BSD box (of you have to, dedicate an old desktop to him as a firewall. A P75 can handle 10 Mbit without breaking into a sweat. (I only have 10Mbit cards in my BSD box, so I can't
Well that solves a pesky problem (Score:2, Funny)
How many people have struggled with the problem of free will. I know I have. The idea of free will is ages old and unresolved until now. Now we know laptop users have free will. Tyranny got you down? Buy a laptop.
Damn you XP Home (Score:3, Insightful)
My company is doing this lockdown approach (Score:5, Insightful)
I will fight this, because users need rights too.
Re:My company is doing this lockdown approach (Score:2, Interesting)
As an long-time IT person myself, I can see the ways in which that would make my job easier, but it also just seemed ridiculously restritictive on the abili
Re:My company is doing this lockdown approach (Score:2)
However they could have access to a shell on a remote box to check email/use cal etc.
Seems quite logical!
Laptop Lockdown (Score:5, Interesting)
Basically, you have your primary LAN of machines that never leave the office, and your wireless lan of laptops that are blocked from the primary lan. Both networks should be able to connect to the Internet, and laptop users would be required to connect to network services just as if they were out of the office.
Good wireless AP's should be able to block laptop to laptop communications, so that all the wireless network provides is internet access. Your network services should be hardened from Internet attacks already, and if they are not that should be addressed before any laptop related issue.
This has worked relatively well for me, might have a huge whole I don't see
*/
Re:Laptop Lockdown (Score:2)
Re:Laptop Lockdown (Score:2)
Laptops are usually given to managers. You will have hard time to convince them to punish or fire themselves.
Re:Laptop Lockdown (Score:2)
lock down your servers (Score:2)
If you want XP Home machines to be able to authenticate on the domain, just force them to connect to an internal VPN - their VPN credentials will be used for connections to local services (exchange, file servers, etc...)
physical security (Score:2)
A slight amendment is in order... (Score:3, Informative)
Mark Brunelli, News Editor of searchEnterpriseLinux.com wrote to mention a SearchEnterpriseLinux column about reducing the negative impact laptops can have on a network's security. From the article: "Portable computers often become an extension of the person using them. It is no surprise that laptop users are inclined to be rather autonomously minded. Many users don't realize that the power they have to install software and change set
I don't mind plugging articles for your own site, but at least practice full disclosure.
http://searchenterpriselinux.techtarget.com/meetE
Hate Laptops with XP Home, eh? (Score:2)
I'm just curious.
We have XP Prof. with Active Directory logins at our school, but I (Teacher ZZZAlpha) often bring my iBook in with me to play MP3s, audiobooks, or show Simpsons episodes that are not out on DVD (I'm a teacher, so I can't afford an iPod). I can login t
Re:Hate Laptops with XP Home, eh? (Score:2)
Re:Hate Laptops with XP Home, eh? (Score:2)
Given that, I'm sure most admins with a clue would far rather have to support i/PBooks on their network than notebooks running XP Home.
I locked my sister's kids out of windows XP Home.. (Score:5, Informative)
Since when does having windows XP Home edition prevent you from adding multiple users, some of them restricted users who can't install software? is it because you only know how to use XP pro's tools to manage security? you don't know how to lock down IE with the help of a few simple freeware utilities you can download off the internet
I don't get it
If I'm missing some big reason please tell me, other than XP pro costs at least $120 more (oem pricing) why someone needs to run Pro to do something i did on XP home just last weekend...
Re:I locked my sister's kids out of windows XP Hom (Score:2)
As far as I have been able to find, there is no practical way to set advanced file permissions on a XP Home OS -- EG, removing all permissions from a troublesome file to preclude "accidental" execution OR reinstallation. And, yes, this is really useful in many security situations.
Domains (Score:2)
Pocket Knife (Score:5, Insightful)
That being said, these people aren't necessarily qualified to administer their own equipment. Some might have a bit of technical prowess but a majority of normal users are just that. So why are they put in charge of managing their own equipment and why are they able to take company information and property with them to get stolen or dropped down a flight of stairs? If they've got light communication needs how about Blackberries or Treos or some other connected devices. Quite a bit can be done through secured web interfaces or through web services with lightweight front ends. A little bit of well designed caching and users would be hard pressed to notice the company's database didn't exist on their little handheld device.
This approach isn't going to solve everyone's problems but it works for some in two major ways. The first is any single field employee can't take the sum of a company's data with them somewhere to have it hijacked by either action or omission. They're also not terribly likely to plug into an office machine and infect the whole network with some new Windows worm. A lost PDA might mean the company is out a few hundred dollars worth of equipment and maybe some confidential documents. A PDA that runs only application/web service front end software is really only out the value of the lost hardware.
If you've got responsible users you can probably trust them with full fledged laptops. For those that are almost more trouble than they're worth, give them cool gadgets they can work on but do limited amounts of damage with. This is of course in addition to better network security in and out of the office. If you've giving even advanced users a laptop to take home let them only take with them the data they absolutely need to get their job done. You don't want a laptop with 98,000 personal records [sfgate.com] on it stolen or something.
Re:Pocket Knife (Score:3, Informative)
Maybe you have forgotten, or maybe not, but 50% of people are of below average intelligence.
I'd bet good money that a good portion of those of above average intelligence, are not working for someone else in a capacity where they have to take their work home with them.
Companies - the kind of person that is willing to take home his/her work home on a laptop is generally unsuitable for the task. (See Groucho Marx on Club Membership)
Re:Pocket Knife (Score:2)
Also, above a certain level of code monkey, you will have to take your laptop on the road occasionally.
hay guys what's going on in this slashdot (Score:2)
I offer to take your company's garbage out for free!
It happened where I used to work (Score:5, Interesting)
Even better: It was a security company.
Best of all: It was the Mac team that brought it to the IT Department's attention.
Well, go and set up the Computer correctly (Score:2, Informative)
Make your checklist and go through it with any Notebook that is introduced to the Company.
# encrypted /home (I don't remember what it is called on Windows) prevents a lot of ugly
things we see from stolen Notebooks nowadays.
# /home (he did it again) must be mirrored (possibly unencrypted) on a Server, (I think
you got to check for the term server side
profiles)
# No Administrative rights! I mean absolutely no administrative rights on the standard
working User!
# The Notebook needs to go back to IT-De
Re:Well, go and set up the Computer correctly (Score:2, Funny)
# Copy an image the laptop's hard drive up to your machine at home
# Shrink the existing partition and install a boot loader
# Install the operating system and software of your choice, with full administrative rights
# Hit the road and enjoy!
# When eye-tee asks for the laptop to check up on you, take an image of it the way you like it, then restore the image saved in the first step and give the pristine laptop to eye-tee
# If origi
Negative? All positive here... (Score:2)
It is my first Mac (and certainly won't be my last) have had it for two years... PCs and Windows just can't compare.
How about this for a compromise (Score:3, Interesting)
1) A laptop with admin rights, that has no direct access to our LAN, but only a connection to a special quarantine server, which we will use to check everything you upload before letting it out onto our LAN, or...
2) A laptop with no admin rights, locked down so tight you can't even change your own wallpaper, but which is a full peer on the LAN.
You get to pick whichever suits your working style best."
Re:How about this for a compromise (Score:2)
Who wants to be a full peer anyway? Maybe the corp. will provide a locked down desktop machine for use when peer status is required.
Life with OS X: what's the big deal? It's locked up by default and almost self-updating.
MAC Address Filtering (Score:2)
The ability to only allow specific devices to operate on a network is very attractive(Hopefully it actually works on most routers). Lazy sysadmins might complain that it entails extra workloads, but honestly lazy admins are half the reason for all
Re:MAC Address Filtering (Score:2)
It only works to prevent your neighbor from accidentally using your network.
If you use WEP, or no encryption the hardware address is sent in the clear and can be picked up by sniffers.
Re:MAC Address Filtering (Score:2)
Cue: EVERY packet has the MAC address in it. So an attacker has to capture exactly ONE packet to get the MAC (actually a partial packet will do too). How hard is that?
How about 10,000 laptops with XP Home? (Score:4, Informative)
By the time I flagged this appalling oversight, the procurement process was too far advanced. So, a US$44 million procurement went ahead using XP Home on the kits.
The application? Electronic Voter Registration in a large sub-saharan country in Africa.
So it's not just small businesses who drop the ball.
The budget will never be there to upgrade to XP Pro. And they simply don't have the skills to replace XP with a Linux distro and port the application (which is proprietary anyway).
Does anyone have thoughts on what can be done to improve the security of XP Home?
Re:How about 10,000 laptops with XP Home? (Score:2)
Ask Microsoft for licenses for Pro. Remember, it costs them nearly nothing and they might use it for PR or something. Remind them how fun the news stories will be when the system gets hacked and all the Poor Africans (TM) are being betrayed by the White Imperialist Multinational Corporation (TM). The story practically writes itself (even though I personally do not subscribe to that narrative [jerf.org]).
Re:How about 10,000 laptops with XP Home? (Score:2)
Why do companies put up with it? (Score:2)
Re:Why do companies put up with it? (Score:2)
business laptop security is a disaster (Score:2)
Laptops are a security risk (Score:2, Insightful)
It's a fundamental rule of systems engineering that workstations are part of the user, not part of the system. This is especially true of laptops.
Any sysadmin that thinks limiting user privileges on the workstation is solving a security problem is fooling herself. System security needs to be set up on the assumption that all workstations are hostile.
Not being able to install is riskier (Score:2)
The risks of not being able to do something when you need to, of losing time due to not being able to install the right tool for a task without a prolonged wait, of requiring a large staff of people working on overhead budgets to maintain machines in ways that reduce a user's flexibility to better their processes, etc. are not only extremely high but usually realized risks on a frequent basis for those who work with locked down machines and rely on IT departments for installation. For laptop users who may
My organization has killed the laptop.... (Score:2)
As far as they are concerned, problem solved.
been there (Score:2)
Wrong solution to the problem (Score:2)
Let them use what they can but don't let them break anything that you couldn't fix. Not letting people use the tools you give them is a braindead solution to the problem. Granted, it may be a temporary necessity because your servers and services are next to impossible to secure any other way but long
Please tell me your joking (Score:3, Informative)
Windows security (Score:5, Insightful)
From the top of the article: In any network setting, laptop and notebook PCs can pose special security risks, particularly those running Microsoft Windows XP Home Edition...
Like I mentioned once before [slashdot.org], the default setting for users on windows always administrator which automatically lowers your armour. After that, using internet explorer, you visit a greek jokes website that installs an ActiveX control on your system. The activex then downloads its friendly spyware and adware, and they in turn continue feeding on your bandwidth and cpu power by repeating the process. While they are doing this, these programs discover they are able to modify the registry and are also able to change settings so they run as soon as windows boots up!! How exciting. You are fucked, my friend!
From usenet: The primary shortcoming in Linux is that it retains the concept of a "superuser". If someone can manage to get themselves logged on as "root", then they have the keys to the kingdom. Now imagine what a malicious demon will feel when it finds itself running under Administrator inside a Windows machine!!!
Re:Windows security (Score:2)
Re:is'nt it mandatory (Score:2)
Re:is'nt it mandatory (Score:2)
Of course, the admin vs. standard structure is still the same in Home, so even on it you can prevent people from installing software.
That being said, it depends on the user. Not all software the user installs is for fun. A lot of people can use various freeware applications. If I trust a user and they have demonstrated a certain level of computer saviness, I wouldn't have a problem allowing them to in
Re:is'nt it mandatory (Score:2)
Re:is'nt it mandatory (Score:3, Insightful)
I'd pull out the harddrive and do my own OS install if it came down to it. And no - I've not gotten a single virus/worm in the past 8 years...
Re:is'nt it mandatory (Score:2)
Insightful? (Score:2)
BUT, in doing so you have even more reponsibility to keep your house in order: it would be you hanging on a thread if a virus/worm/whatever infects your machine, net, or ultimate product.
Re:Insightful? (Score:2)
I can do anything I want on that machine, and I don't even surf
Re:is'nt it mandatory (Score:2)
Why don't you just say, "We need $x worth of software on this computer to put it on the network"? When the boss okays the expensive, blow XP Home off the drive, install XP Pro, and set it up like any other machine. I don't see why this is so hard.
This would even be easier if you already have a site license for Windows.
......and be replaced with someone who'd deal. (Score:3, Insightful)
I'm a sysadmin. All Mac OS X and Windows notebooks I deploy are preconfigured, tested, verified, and locked down. Even Classic.
If any special apps or hardware is needed, it has to be dropped off during the "preconfigured" part of the process.
The truth here is you are being furnished with a portable workstation, not a personal surfboard.
Nine times out of ten, when some one p
Re:......and be replaced with someone who'd deal. (Score:2)
Shit, I wouldn't trust you either. Maybe I should start asking applicants what their
Re:Moronic... (Score:2, Insightful)
Re:Moronic... (Score:2)
Re:A chain is only as strong... (Score:2)
"Good security costs money and means I can't use my spyware infected Windows box to log into highly sensitive data? Phbbt forget that. Norton firewall should be enough!"
Re:A chain is only as strong... (Score:2)
Because PHBs insist on using Windows.
Next question please ...
Re:My laptop w/Pro is just fine... (Score:2)
Dude, if the mouse is moving on its own, you need a bloody exorcist!
Re:My laptop w/Pro is just fine... (Score:2)
I had a wierd situation at home last year where my mouse would move my brothers' pointer from across the house, through 4 walls, on a different model of wireless mouse (both Logitechs tho).
Bar that, are you running a VNC server/remote desktop assistance?
Re:Direction? (Score:2)
Re:Linux, making strides, still not there (Score:2)
Re:The General sure does keep his troops in line (Score:2)