Removing Microsoft admin rights from employees mitigates 92% of critical vulnerabilities and 60% of all vulnerabilities reported by the software firm in the past year, a study has revealed.
The study showed that removing admin rights would mitigate 96% of critical vulnerabilities affecting Windows operating systems, 91% of critical vulnerabilities affecting Microsoft Office and 100% of vulnerabilities in Internet Explorer.
The security precaution would also mitigate 100% of critical remote code execution vulnerabilities and 80% of critical information disclosure vulnerabilities.
Employees with admin can install, modify and delete software and files as well as change system settings.
More on privilege management
- Study: Privilege management policies unaltered after Snowden leaks
- Privileged user management a must for DBAs
- Privileged account policy: Securely managing privileged accounts
- Privileged accounts key to most APT attacks, says Cyber-Ark
- Privileged accounts are hacker sweet spot
The report said this means if malware infects a user with admin rights, it can cause damage locally as well as on a wider network.,
“It is astounding just how many vulnerabilities can be overcome by the removal of admin rights,” said Paul Kenyon, co-founder and executive vice-president of Avecto.
However, he said many companies are still not fully aware of how many admin users they have and consequently face an unknown and unquantified security threat.
“Awareness of the importance of privilege management is growing, but we need to get to the point where it is a standard measure for all organisations,” said Kenyon.
“These findings make it clear that privilege management is a critical element of an endpoint security strategy that just cannot be ignored,” he said.