« 
Take Aways from SANS Log ... | 
New doc from MS for stori... »
                        
                            Custom Administrative Template for Setting the Kill Bit on ActiveX Controls
                        
                            Wed, 01 Nov 2006 15:30:04 GMT
                        
                            
    With as many IE related ActiveX control vulnerabilities we’re seeing, you would be well served to use an administrative template (.ADM file) to push out kill bits via group policy and subsequently roll them back after associated patches are released and deployed. Setting a kill bit is just making a registry tweak which you can pretty easily accomplish via group policy using a custom administrative template. Then just roll it back when the actual vulnerability is patched.
    I’ve created just such an Administrative Template and you are welcome to use it. ---> ADM File For Setting The Kill Bit 
  
                         
                        
                            
                            
                                                       
                            
                        
                        
                                
                                
                        
                            
                            email this
                            •
                            
                            digg
                            •
                            
                            reddit
                            •
                            
                            dzone
                            
                            
                            
                            comments (0)
                            •
                            references (0)
                            
                            
                        
                        
                            Related:
                            Auditing Privileged Operations and Mailbox Access in Office 365 Exchange Online
Severing the Horizontal Kill Chain:  The Role of Micro-Segmentation in  Your Virtualization Infrastructure 
5 Indicators of Endpoint Evil
Anatomy of a Hack Disrupted: How one of SIEM’s out-of-the-box rules caught an intrusion and beyond
                        
                    
                    Comments disabled
powered by Bloget™