Originally posted by: FLegman
The implimentation of the SRP from that blog slightly varies from your own MechBgon. In step 3 the Program files and Windows directory paths were added as unrestricted to "Additional Rules" within the srp subfolder. This setting is applied in your tutorial but only as adjustment for 64 bit version as they happen to have extra Program files folder.
Another difference is also the "Enforcement" strategy, in your tutorial the srp is applied to All Software files and All Users except local Administrators, from the other blog it is applied only to All Software files.
Windows Integrity Control is there for Vista, but does the Data Execution Prevention tied to SRP will help render to zero the ability to circumvent SRP in a "stand alone" mode?
Originally posted by: snikt
We have over 100+ PCs accessible to the Public. With the Group Policy, NTFS permissions, and other various security measures, i.e. physically disable CD-ROM, floppy, boot USB, BIOS passwords, etc., that we have implemented on these PCs they have never been compromised in the 5+ years that they have been made available for use by the Public, not one PC.