Change Remote Machine’s Password over Internet

I need a solution

Hello Masters, 

May i please request your support & assistance for this requirement i have with my company Your advice on this matter would be greaty appriciated. 

Requirement

A company owned laptop (with SEP installed in it) was stolen along with its username/password. In some cases the employee itself do not return their laptops as they move out of the firm.

On a data security perspective, we need to ensure that the local data resding in the laptop is not manupulated or transferred to any other sources. The best scinario would be to lock the machine down completely in such  a way that the user wont be even able to log in to the device, there after.

Option 1

Utlizing SEP lockdown over internet – would locking down Explorer.exe be effective in such scenarios? Would the user still be able to log in & do some data transfers after that?

Option 2

Remotely changing the local username/password (using VN script) so the user would be locked out and wont be able to log in back to the machine there after?

Script

strComputer = “.”

Set objUser = GetObject(“WinNT://” & strComputer & “/Administrator, user”)

objUser.SetPassword “09iuy%4e” objUser.SetInfo

0

Related:

  • No Related Posts

Cisco NX-OS Software Image Signature Verification Vulnerability

A vulnerability in the Image Signature Verification feature of Cisco NX-OS Software could allow an authenticated, local attacker with administrator-level credentials to install a malicious software image on an affected device.

The vulnerability is due to improper verification of digital signatures for software images. An attacker could exploit this vulnerability by loading an unsigned software image on an affected device. A successful exploit could allow the attacker to boot a malicious software image.

Note: The fix for this vulnerability requires a BIOS upgrade as part of the software upgrade. For additional information, see the Details section of this advisory.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-sig-verif

This advisory is part of the March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication, which includes 25 Cisco Security Advisories that describe 26 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication.

Security Impact Rating: High

CVE: CVE-2019-1615

Related:

  • No Related Posts

updating the “protect” password

I need a solution

I’m getting ready to update the “protect” password for the first time since installation of DLP 15.0 using instructions found:

https://support.symantec.com/en_US/article.TECH220…

This article does not discuss options to roll back if there are problems.

Does anyone have experience with this process?

I do not have a test environment in which to walk through the process and want to make sure I have contingency plans before making the changes to the production environment.

TIA,
GiGi

0

Related:

  • No Related Posts

New Integration between File Reporter Technology and Identity Governance Enables Access Reviews for Unstructured Data

buckgashler

The Challenge of Safeguarding Sensitive Data Today’s organizations are facing expansive requirements for safeguarding sensitive and confidential information. Whether it’s intellectual property, financial information, or PII (Personal Identifiable Information), there are data access risks that if not addressed properly, can be potentially devastating to an organization. With the risk of having to pay huge fines …

+read more

The post New Integration between File Reporter Technology and Identity Governance Enables Access Reviews for Unstructured Data appeared first on Cool Solutions. buckgashler

Related:

  • No Related Posts