- Apr 9, 2009
- 7,318
- 4
- 76
I'm not sure if this is the right place to ask this, but here it goes.
Over the past year I have been modifying my images at the High School I work in to lock the student and lab PC's down. I've gone through the regular stuff like locking down the desktop wallpaper, internet settings, disabling access to control panel and desktop properties, run, cmd, etc...
I've been happy with the results, and the computers have stayed a little more clean throughout the year with the exception of viruses. Most of the students claim they were on Google Images when the fake antivirus program was executed, but we can't block everything that GI points too, so I'm looking for a way to block anything from writing to the registry on the account level.
I've been able to set permissions on keys to (hopefully) prevent anything from writing to current user, but I'm thinking that this won't help. My reason for this is because one of the viruses I have been testing writes to HKEY_LOCAL_MACHINE, even while logged in as limited user. I checked, and there are no permissions set in HKLM or it's subkeys to allow read or write access to the local user I'm testing on.
My question is how do viruses override local permissions? Does it somehow grant system or admin rights to these processes when they execute? My students can't install anything on the PC's, yet these applications walk have no issues.
Oh, and as far as antivirus support, we use etrust and pestpatrol, which I know isn't very good with their definitions (we are looking into an alternative), but I still would like to prevent anything from writing to the registry, even if AV fails to detect it on the way in, I'm hoping this is possible.
Any suggestions?
Thanks AT!
Over the past year I have been modifying my images at the High School I work in to lock the student and lab PC's down. I've gone through the regular stuff like locking down the desktop wallpaper, internet settings, disabling access to control panel and desktop properties, run, cmd, etc...
I've been happy with the results, and the computers have stayed a little more clean throughout the year with the exception of viruses. Most of the students claim they were on Google Images when the fake antivirus program was executed, but we can't block everything that GI points too, so I'm looking for a way to block anything from writing to the registry on the account level.
I've been able to set permissions on keys to (hopefully) prevent anything from writing to current user, but I'm thinking that this won't help. My reason for this is because one of the viruses I have been testing writes to HKEY_LOCAL_MACHINE, even while logged in as limited user. I checked, and there are no permissions set in HKLM or it's subkeys to allow read or write access to the local user I'm testing on.
My question is how do viruses override local permissions? Does it somehow grant system or admin rights to these processes when they execute? My students can't install anything on the PC's, yet these applications walk have no issues.
Oh, and as far as antivirus support, we use etrust and pestpatrol, which I know isn't very good with their definitions (we are looking into an alternative), but I still would like to prevent anything from writing to the registry, even if AV fails to detect it on the way in, I'm hoping this is possible.
Any suggestions?
Thanks AT!