SHARE
Facebook X Pinterest WhatsApp

Improve Windows Security by Removing Admin Rights

A new survey of Microsoft security vulnerabilities shows that the vast majority of them can be effectively mitigated while users wait for systems managers to apply the software giant’s monthly patches. The third-party report, compiled by privileged access lifecycle management vendor BeyondTrust, claims that the cure for many ills that might befall users of PCs […]

Mar 30, 2010
Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

A new survey of Microsoft security vulnerabilities shows that the vast majority of them can be effectively mitigated while users wait for systems managers to apply the software giant’s monthly patches.

The third-party report, compiled by privileged access lifecycle management vendor BeyondTrust, claims that the cure for many ills that might befall users of PCs running Microsoft (NASDAQ: MSFT) software is straightforward.

“Key findings from this report show that removing administrator rights will better protect companies,” said the study, dubbed BeyondTrust 2009 Microsoft Vulnerability Analysis.

Administrative rights include the authority for someone designated as the system administrator to control what software and hardware can be installed on a user’s PC. Often, however, the default setting is to let the user have administrative rights on his or her own PC but, as noted in the report, that can be risky because, for instance, a piece of malware might trick the system to prompt a user with such rights to okay its installation.

“By removing the need to grant administrative rights to end-users, IT departments eliminate what is otherwise the Achilles’ heel of the desktop — end-users with administrative power that can be exploited by malware and malicious intent to change security settings and disable other security solutions,” the report said.

Read the rest at eSecurity Planet.

  SEE ALL
ARTICLES
 
SJJ

Stewart J. Johnston is a Datamation contributor.

Recommended for you...

Wormable Malware Hits npm Supply Chain
Datamation Staff
Sep 19, 2025
AI in Cybersecurity: The Comprehensive Guide to Modern Security
Liz Ticong
Apr 29, 2024
What Is Cybersecurity? Definitions, Practices, Threats
Liz Ticong
Apr 8, 2024
How to Secure a Network: 9 Key Actions to Secure Your Data
Liz Ticong
Mar 21, 2024
Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.