What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
Mar 27

Reston, VA


In every organization there exists a somewhat buried but very dangerous loophole: the presence of local administrator accounts. Local administrator accounts are often times created directly by users and are hidden from the IT manager’s standard tracked list of administrative accounts managed by Active Directory. These accounts can be used by malware to install malicious software on local computers through the administrator account. Further penetration into the IT environment is then accessible through this loophole. Bob Gourley, editor of CTOvision.com and founder and Chief Technology Officer (CTO) of Crucial Point LLC, will present the layers of endpoint protection necessary to ensure IT security and operations managers have a method for mitigating critical IT security risk. He will explain how each tool protects the endpoint, and how they work together to prevent breaches. Next, Viewfinity will demonstrate a method for removing admin rights and managing privileges for standard users through policies, including how to: * Discover user accounts that have local administrative rights * Remove users or suspicious groups from the administrators group * Control user permissions/privilege elevation via granular level policies

Cost: Complimentary Webcast

Contact Name: Alex Walentisch

ph: 888-662-2724 email: [email protected]

Company Info:

Carahsoft Technology Corp.

12369 Sunrise Valley Dr.
Reston, VA. 20191 United States

Federal Computer Week eNewsletters

  • Subscribe to Newsletters Subscribe

    Federal Computer Week's eNewsletters deliver the latest policy and management news to your inbox.