I've had to chop the word "critical" out of the title, so apologies for that.
I’m pretty sure I recall a previous version of this report floating around but this is the latest release and I thought I’d post it for anyone interested. I’m not expecting it to sway the naysayers but maybe those on the fence or new to the concept might be persuaded. I tend to think that people find computer security either really interesting or not interesting at all.
You can have a read of the report here:
BeyondTrust2009 Microsoft Vulnerability Analysis
Or just the executive summary below, truncated slightly:
Note that although it says 2009 on the report some of the security bulletins sampled are as recent as March 2010. Don't say Pwn2Own.
On the flip side understand that running as a standard user is not a cure-all; software updates and a whole range of other factors contribute to the "defense in depth" approach, of which least privilege is just one.
So there you go, no news really. At least you have some reading fodder that will send you to sleep.
I’m pretty sure I recall a previous version of this report floating around but this is the latest release and I thought I’d post it for anyone interested. I’m not expecting it to sway the naysayers but maybe those on the fence or new to the concept might be persuaded. I tend to think that people find computer security either really interesting or not interesting at all.
You can have a read of the report here:
BeyondTrust2009 Microsoft Vulnerability Analysis
Or just the executive summary below, truncated slightly:
Executive Summary
Microsoft and their partners regularly identify new security vulnerabilities in Microsoft software. In 2009 Microsoft published nearly 75 security bulletins documenting and providing patches for nearly 200 vulnerabilities. By examining all of the published Microsoft vulnerabilities in 2009 and all of the published Windows 7 vulnerabilities to date, this report quantifies the continued effectiveness of removing administrator rights at mitigating vulnerabilities in Microsoft software.
Key findings from this report show that removing administrator rights will better protect companies against the exploitation of:
• 90% of Critical Windows 7 vulnerabilities reported to date
• 100% of Microsoft Office vulnerabilities reported in 2009
• 94% of Internet Explorer and 100% of IE 8 vulnerabilities reported in 2009
• 64% of all Microsoft vulnerabilities reported in 2009
Microsoft is to be lauded for releasing patches to known vulnerabilities each month. However, vulnerabilities take time to identify and patches take time to apply. During this period, threats can damage a corporate network and gain access to sensitive information. It is important that companies follow general best practices to improve security.
Note that although it says 2009 on the report some of the security bulletins sampled are as recent as March 2010. Don't say Pwn2Own.

On the flip side understand that running as a standard user is not a cure-all; software updates and a whole range of other factors contribute to the "defense in depth" approach, of which least privilege is just one.
So there you go, no news really. At least you have some reading fodder that will send you to sleep.
