Skip to main content

Beyond Trust

Beyond Trust

Last one year I am working on tool called Beyond Trust. Beyond Trust is basically a tool make sure none of our users should have administrative privileges on their computer in return we save number of virus calls for service desk/help desk, non-standard applications related problem. (User is no more empowered to install any application from Internet to their box).

You must be having question how we handle applications which need Administrative Right to get it executed or get it going. '

Yes that’s the question we also came across to avoid such issues we started creating Beyond Trust Exception rules which means those particular applications will only run in evalution instead user get entire admin privileges.

Beyond Trust- We normally publish Beyond Trust Power Broker tool in user’s computer which does all the magic for limiting users from being administrative privileges on their id locally on their workstation.

Polmon Logs: Polmon.exe (Policy Monitor) Tool help you understand what is happening in particular computer, where it needs admin privileges, does it blocks the ActiveX.

There are number of types of rules can be made in Beyond Trust and following are the important once which we should understand. These are few rules to start with.

1) Path Rule: Here you can specify which .Exe you want to be run in Admin privilege along with path.
2) Folder Rule: There is thin line between path rule & folder rule both works same but basic difference is whatever you specify in particular folder & its sub folder will run in admin privileges.
Sometime few applications comes with their executable you make a path rule for those & afterwards you come  to know that it’s not working because primary rule is calling several other executable in these scenario we should create a folder rule.

Sometime certain application comes up with frequent upgrades like every month. In this case also you can create a secure folder and make a folder path. User just needs to copy executable in particular folder & run the executable which will solve their purpose & can be save number of calls to Service Desk/Help Desk.

3) Active X Rule: Today’s Complex world we all know no company wants to take risk in terms of security or Virus. That’s why our Beyond Trust block all the ActiveX which are try to get install. If your business returns back to you with Source Link, Control, and Classid & Version you can make a BT allow rule to get that working. You must be thinking how user can get above information.
That’s magic Beyond Trust show all those details in the Error Screen which user needs to pass to the  beyond Trust Admin.

4) Hash Rule: A hash rule target a specific application regardless of its location so that you can modify its permissions or privileges when it is run.




Thanks,
Avi


Comments

Popular posts from this blog

"kerberos: the specified credentials were rejected by the server", "unreachable": true" Ansible

Hello Friends, I was getting following Error while deploying my Ansible script, Basically my credential were getting rejected by server. SSH password: PLAY [Playbook_Name] ***************************************************************02:00:30 TASK [Gathering Facts] *********************************************************02:00:30 fatal: [Server_Inventory_Name]: UNREACHABLE! => {"changed": false, "msg": "kerberos: the specified credentials were rejected by the server", "unreachable": true} PLAY RECAP *********************************************************************02:00:30 Server_Inventory_Name    : ok=0    changed=0    unreachable=1   failed=0  It was resolved using one additional parameter in Inventory  i.e  "ansible_winrm_server_cert_vaildation:ignore"

NBSUTIL commands

Frustrated with syntax finding hence decided to post all NBSTLUTIL related commands so people will not face same problem. Common SLP Related Commands Show EMM Image list of Images that were backed up to an SLP STU [ -I / -U ] nbstlutil list nbstlutil list –lifecycle <name> nbstlutil list –backupid <id_value> nbstlutil list -image_state <value> nbstlutil list -copy_state <value> nbstlutil list -frag_state <value> nbstlutil list –mediaid <media_id>_–state 3 Activate /Inactivate SLP operations nbstlutil inactive –lifecycle <lifecycle name> nbstlutil inactive –backupid <backupid> nbstlutil active –lifecycle <lifecycle name> nbstlutil active –backupid <backupid> Cancel pending operations on selected image nbstlutil cancel -backupid <backupid> nbstlutil cancel -lifecycle <lifecycle> Show status on Incomplete copies of Lifecycle Managed images nbstlutil stlilist –lifecycle <lifecycle name> nbstlutil stlil

OSD or Onscreen menu is locked.

OSD or Onscreen menu is locked. I am having HP 20 Inch monitors on my Desk and was not able to change brightness and Sleep Timer etc for my monitor and was not able to get into the menu due to On Screen menu locked error. I know it's irritating issue. fix what i found for this is "Just hold menu button for 30 Sec and it will be solved. :)