OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti Application Control
Shane Wescott Mark Williamson
AppSense Technology Evangelist – Aust/NZ Technical Lead (AM)
OSB140 - Want a safer network. you can remove local admin rights with
Ivanti application control
Agenda
 Who are we
 Why Ivanti for Privilege Management
 How does it work – What’s under the
hood
 Tips and Tricks
 What’s the Challenge
 Customer Success Stories
 Demo – Show me already
 Q & A
Who are we ?
What’s the
challenge ?
User-Targeted Attacks
Of
Cyberattacks Start
With A Phishing Email
PhishMe 2016 Enterprise Phishing Susceptibility and
Resiliency Report
https://phishme.com/2016-enterprise-phishing-susceptibility-report
User-Targeted Attacks
of
recipients open
phishing messages,
and 12% click on
attachments.
Verizon 2016 Data Breach Investigations Report
http://www.verizonenterprise.com/DBIR/2016/
Up from 23% and 11%, respectively, in 2015
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti Application Control
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti Application Control
Mitigate Impact
A vulnerability that when exploited allows the attacker to operate in the
context of the current user. Reducing user privileges reduces the attackers
ability to operate thereby slowing their ability to move around your
environment.
Privilege Management Reduces Impact:
0
2
4
6
8
10
12
14
16
18
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
total Priv mgmt mitigates
SANS Training Example from Dr Eric Cole
• 47 users across 47 companies
• Average required rights to data 42%
• Of total data loss, ONLY 17% would
have been lost
• Remaining 83% equated to $4.5 Million
• Roughly $100K per user breached
Australian Signals Directorate
SANS – 1st Five…
SANS “First Five”—as providing the most immediate increase in
efficient and effective reduction in risk from advanced targeted
attacks:
1) software whitelisting,
2) secure standard configurations,
3) application security patching,
4) system security patching and
5) minimization of administrative privileges.
How does it
work – What’s
under the
hood?
ivanti User Privilege Management
 Enable admin apps & features for standard users
 Allow personal apps with IT control
 Full auditing capability
Standard Elevation with Ivanti Application Control
16
AM Agent
LSASS
Amend Token?
CreateProcess
Regedit.exe
AMAppHook.Dll
NTDLL
LSA Client
Custom LSA
Auth
Package
AMMessageAssist
Regedit.exeReparent
CreateProcess -
Regedit.exe
Explorer.exe
Why Ivanti for
Privilege
Management ?
Discover Provide Insight Take Action
Our History
History and Experience
• 18 years experience Whitelisting
from AppSense
• 14 years experience Patching from
Shavlik
• 7 years experience Privilege
Management from AppSense
Control Administrative Rights
 Applications
 OS Components
 Websites
 Services
 Installs
Corporate App Store
Application Network Access Control
Control outbound
connections:
 IP
 Hostname
 URL
 UNC or Port
What Do I Need To Elevate?
Ivanti is QUICK to protect
Deploy
Audit
Review
Update
Proven Methodology
Granular, Contextual Policies
• Allows authorised users to
access “break glass”
functionality
• All based on granular,
contextual policies
• All policy based with full
auditing
85%
of Windows
intrusion threats
Organizations can prevent up to
by implementing four key disciplines
PATCH OPERATING
SYSTEMS
1
PATCH
APPLICATIONS
2
PRIVILEGE
MANAGEMENT
4
APPLICATION
WHITELISTING
3
Powered ByPowered By
Our defense-in-depth products
PATCH &
VULNERABILITY
MANAGEMENT
APPLICATION
CONTROL &
PRIVILEGE
MANAGEMENT
ENDPOINT SECURITY
SUITES
SECURE PROGRAM
MANAGEMENT
• IVANTI PATCH FOR
ENDPOINTS
• IVANTI PATCH FOR
SERVERS
• IVANTI PATCH FOR SCCM
• IVANTI APPLICATION
CONTROL FOR ENDPOINTS
• IVANTI APPLICATION
CONTROL FOR SERVERS
• IVANTI APPLICATION
CONTROL FOR SCCM
• IVANTI ENDPOINT SECURITY
• IVANTI SERVER SECURITY
• IVANTI SERVICE MANAGER
• IVANTI ASSET MANAGER
Provide Insight
Compliance and monitoring by Xtraction
Customer
Success
Stories?
Only product Customer bought off a Beta 
Hassell – Removal of Admin/App Store
Demo – Show
me already
33
Tips and
Tricks
1. Follow the advice from Experts
 SANS, CIS, ASD –do the most
important things FIRST
 Follow a proven methodology
 If you want more info on this jump into
this session
OSB310 – Whitelisting, The Good, the
Bad, the Ugly. Our Experts help you
avoid Common Pitfalls
Thursday 10:15- 11:15 Jamaica B
2. Get buy in from the Business
• It cant just be driven by the
Security Team
• Communications is the key –
user and departmental
• Make sure people understand
the business benefit
3. Do your Discovery - Don’t assume anything
What’s running on your network?
What apps need admin rights?
How quickly user behaviour can change
Xtraction can be Awesome to help get that
single page view
3. Do your Discovery - Don’t assume anything
Xtraction example:
ASD TOP 4 Single pane view
Multiple data sources
Plug for Xtraction
OSL140 - Here’s Your #$@&%*! Report! Test Drive Xtraction for
Security
Wednesday 14:15 – 15:15 MEC C1
Q + A
Thank you

More Related Content

PDF
OSB160: Trust Your Apps. See How with Ivanti Application Control
PDF
OSB120 Beat Ransomware
PDF
Stop Attacks and Mitigate Risk with Application and Device Control
PDF
Infographic-1-MainFrame BlindSpots_082015
PPTX
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
PDF
Presentazione-CyberArk-MDM-v3
PDF
Effective multi factor authentication for people soft
DOCX
OSB160: Trust Your Apps. See How with Ivanti Application Control
OSB120 Beat Ransomware
Stop Attacks and Mitigate Risk with Application and Device Control
Infographic-1-MainFrame BlindSpots_082015
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Presentazione-CyberArk-MDM-v3
Effective multi factor authentication for people soft

What's hot (20)

PPTX
Securing Your Salesforce Org: The Human Factor
PPTX
Kaspersky antivirus ppt
PDF
Managing privileged account security
PDF
Security VoIP Assessment
PPTX
Cyber ark training
PDF
Strong authentication for your organization in a cost effective cloud-based...
PPTX
3 Reasons It's Time for a New Remote Access Model
PDF
Security Operations Strategies
PDF
Web Application Security For Small and Medium Businesses
PPTX
Con8813 securing privileged accounts with an integrated idm solution - final
PPTX
Application Control - Maintenance Headache or Manageable Solution?
PPTX
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
PPTX
Stop Account Takeover Attacks, Right in their Tracks
PDF
Xamarin security talk slideshare
PPTX
CyberArk
PPTX
SIEM Alone is Not Enough
PDF
Closing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
PPSX
Waratek presentation for RANT November 2016
PPT
Panda Security2008
PDF
Simple and-smart-security-tips-for-website -design-orange949
Securing Your Salesforce Org: The Human Factor
Kaspersky antivirus ppt
Managing privileged account security
Security VoIP Assessment
Cyber ark training
Strong authentication for your organization in a cost effective cloud-based...
3 Reasons It's Time for a New Remote Access Model
Security Operations Strategies
Web Application Security For Small and Medium Businesses
Con8813 securing privileged accounts with an integrated idm solution - final
Application Control - Maintenance Headache or Manageable Solution?
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Stop Account Takeover Attacks, Right in their Tracks
Xamarin security talk slideshare
CyberArk
SIEM Alone is Not Enough
Closing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
Waratek presentation for RANT November 2016
Panda Security2008
Simple and-smart-security-tips-for-website -design-orange949
Ad

Similar to OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti Application Control (20)

PDF
OSB170: What a CISO Wants
PPTX
How to Cut Through the “Fog of More” to Achieve a Solid Security Foundation
PDF
Web Application Security Testing Guide | Secure Web Apps
PDF
What’s the State of Your Endpoint Security?
PDF
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
PPTX
What's New with Ivanti’s Enterprise Licensing Agreement?
PPTX
A Closer Look at Isolation: Hype or Next Gen Security?
ODP
Cyber Security for Financial Institutions
PPTX
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
DOCX
Demand for Penetration Testing Services.docx
PPT
Path Maker Security Presentation
PDF
AppTrana SECaaS (Security as a Service)
PDF
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
PDF
Essentials of Web Application Security: what it is, why it matters and how to...
PPT
Isms3
PPT
computer security audit ,erp audit,software systems audit
PPTX
Prevent Getting Hacked by Using a Network Vulnerability Scanner
PPT
NH Bankers 10 08 07 Kamens
PDF
Panda Security - Adaptive Defense 360
PPTX
Cyber Security protection by MultiPoint Ltd.
OSB170: What a CISO Wants
How to Cut Through the “Fog of More” to Achieve a Solid Security Foundation
Web Application Security Testing Guide | Secure Web Apps
What’s the State of Your Endpoint Security?
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
What's New with Ivanti’s Enterprise Licensing Agreement?
A Closer Look at Isolation: Hype or Next Gen Security?
Cyber Security for Financial Institutions
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
Demand for Penetration Testing Services.docx
Path Maker Security Presentation
AppTrana SECaaS (Security as a Service)
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Essentials of Web Application Security: what it is, why it matters and how to...
Isms3
computer security audit ,erp audit,software systems audit
Prevent Getting Hacked by Using a Network Vulnerability Scanner
NH Bankers 10 08 07 Kamens
Panda Security - Adaptive Defense 360
Cyber Security protection by MultiPoint Ltd.
Ad

More from Ivanti (20)

PDF
August Patch Tuesday
PDF
Français Patch Tuesday - Juillet
PDF
July Patch Tuesday
PDF
Français Patch Tuesday - Juin
PDF
June Patch Tuesday
PDF
Français Patch Tuesday - Mai
PDF
May Patch Tuesday
PDF
Français Patch Tuesday - Avril
PDF
April Patch Tuesday
PDF
Français Patch Tuesday - Mars
PDF
March Patch Tuesday
PDF
Français Patch Tuesday - Février
PDF
February Patch Tuesday
PDF
Patch Tuesday de Diciembre
PDF
Français Patch Tuesday - Décembre
PDF
Patch Tuesday Italia Dicembre
PDF
December Patch Tuesday
PDF
Patch Tuesday de Noviembre
PDF
Français Patch Tuesday - Novembre
PDF
Patch Tuesday Italia Novembre
August Patch Tuesday
Français Patch Tuesday - Juillet
July Patch Tuesday
Français Patch Tuesday - Juin
June Patch Tuesday
Français Patch Tuesday - Mai
May Patch Tuesday
Français Patch Tuesday - Avril
April Patch Tuesday
Français Patch Tuesday - Mars
March Patch Tuesday
Français Patch Tuesday - Février
February Patch Tuesday
Patch Tuesday de Diciembre
Français Patch Tuesday - Décembre
Patch Tuesday Italia Dicembre
December Patch Tuesday
Patch Tuesday de Noviembre
Français Patch Tuesday - Novembre
Patch Tuesday Italia Novembre

Recently uploaded (20)

PPTX
"Secure File Sharing Solutions on AWS".pptx
PDF
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
PDF
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
PPTX
Oracle Fusion HCM Cloud Demo for Beginners
PPTX
Monitoring Stack: Grafana, Loki & Promtail
PDF
Cost to Outsource Software Development in 2025
PDF
Website Design Services for Small Businesses.pdf
PDF
Microsoft Office 365 Crack Download Free
PPTX
Weekly report ppt - harsh dattuprasad patel.pptx
PPTX
Cybersecurity: Protecting the Digital World
PPTX
Why Generative AI is the Future of Content, Code & Creativity?
PDF
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
DNT Brochure 2025 – ISV Solutions @ D365
PDF
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
PDF
Designing Intelligence for the Shop Floor.pdf
PPTX
assetexplorer- product-overview - presentation
PPTX
Trending Python Topics for Data Visualization in 2025
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PPTX
Computer Software - Technology and Livelihood Education
"Secure File Sharing Solutions on AWS".pptx
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
Oracle Fusion HCM Cloud Demo for Beginners
Monitoring Stack: Grafana, Loki & Promtail
Cost to Outsource Software Development in 2025
Website Design Services for Small Businesses.pdf
Microsoft Office 365 Crack Download Free
Weekly report ppt - harsh dattuprasad patel.pptx
Cybersecurity: Protecting the Digital World
Why Generative AI is the Future of Content, Code & Creativity?
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
Computer Software and OS of computer science of grade 11.pptx
DNT Brochure 2025 – ISV Solutions @ D365
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
Designing Intelligence for the Shop Floor.pdf
assetexplorer- product-overview - presentation
Trending Python Topics for Data Visualization in 2025
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
Computer Software - Technology and Livelihood Education

OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti Application Control

  • 2. Shane Wescott Mark Williamson AppSense Technology Evangelist – Aust/NZ Technical Lead (AM) OSB140 - Want a safer network. you can remove local admin rights with Ivanti application control
  • 3. Agenda  Who are we  Why Ivanti for Privilege Management  How does it work – What’s under the hood  Tips and Tricks  What’s the Challenge  Customer Success Stories  Demo – Show me already  Q & A
  • 6. User-Targeted Attacks Of Cyberattacks Start With A Phishing Email PhishMe 2016 Enterprise Phishing Susceptibility and Resiliency Report https://phishme.com/2016-enterprise-phishing-susceptibility-report
  • 7. User-Targeted Attacks of recipients open phishing messages, and 12% click on attachments. Verizon 2016 Data Breach Investigations Report http://www.verizonenterprise.com/DBIR/2016/ Up from 23% and 11%, respectively, in 2015
  • 10. Mitigate Impact A vulnerability that when exploited allows the attacker to operate in the context of the current user. Reducing user privileges reduces the attackers ability to operate thereby slowing their ability to move around your environment. Privilege Management Reduces Impact: 0 2 4 6 8 10 12 14 16 18 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec total Priv mgmt mitigates
  • 11. SANS Training Example from Dr Eric Cole • 47 users across 47 companies • Average required rights to data 42% • Of total data loss, ONLY 17% would have been lost • Remaining 83% equated to $4.5 Million • Roughly $100K per user breached
  • 13. SANS – 1st Five… SANS “First Five”—as providing the most immediate increase in efficient and effective reduction in risk from advanced targeted attacks: 1) software whitelisting, 2) secure standard configurations, 3) application security patching, 4) system security patching and 5) minimization of administrative privileges.
  • 14. How does it work – What’s under the hood?
  • 15. ivanti User Privilege Management  Enable admin apps & features for standard users  Allow personal apps with IT control  Full auditing capability
  • 16. Standard Elevation with Ivanti Application Control 16 AM Agent LSASS Amend Token? CreateProcess Regedit.exe AMAppHook.Dll NTDLL LSA Client Custom LSA Auth Package AMMessageAssist Regedit.exeReparent CreateProcess - Regedit.exe Explorer.exe
  • 20. History and Experience • 18 years experience Whitelisting from AppSense • 14 years experience Patching from Shavlik • 7 years experience Privilege Management from AppSense
  • 21. Control Administrative Rights  Applications  OS Components  Websites  Services  Installs
  • 23. Application Network Access Control Control outbound connections:  IP  Hostname  URL  UNC or Port
  • 24. What Do I Need To Elevate?
  • 25. Ivanti is QUICK to protect Deploy Audit Review Update Proven Methodology
  • 26. Granular, Contextual Policies • Allows authorised users to access “break glass” functionality • All based on granular, contextual policies • All policy based with full auditing
  • 27. 85% of Windows intrusion threats Organizations can prevent up to by implementing four key disciplines PATCH OPERATING SYSTEMS 1 PATCH APPLICATIONS 2 PRIVILEGE MANAGEMENT 4 APPLICATION WHITELISTING 3 Powered ByPowered By
  • 28. Our defense-in-depth products PATCH & VULNERABILITY MANAGEMENT APPLICATION CONTROL & PRIVILEGE MANAGEMENT ENDPOINT SECURITY SUITES SECURE PROGRAM MANAGEMENT • IVANTI PATCH FOR ENDPOINTS • IVANTI PATCH FOR SERVERS • IVANTI PATCH FOR SCCM • IVANTI APPLICATION CONTROL FOR ENDPOINTS • IVANTI APPLICATION CONTROL FOR SERVERS • IVANTI APPLICATION CONTROL FOR SCCM • IVANTI ENDPOINT SECURITY • IVANTI SERVER SECURITY • IVANTI SERVICE MANAGER • IVANTI ASSET MANAGER Provide Insight Compliance and monitoring by Xtraction
  • 30. Only product Customer bought off a Beta 
  • 31. Hassell – Removal of Admin/App Store
  • 32. Demo – Show me already
  • 33. 33
  • 35. 1. Follow the advice from Experts  SANS, CIS, ASD –do the most important things FIRST  Follow a proven methodology  If you want more info on this jump into this session OSB310 – Whitelisting, The Good, the Bad, the Ugly. Our Experts help you avoid Common Pitfalls Thursday 10:15- 11:15 Jamaica B
  • 36. 2. Get buy in from the Business • It cant just be driven by the Security Team • Communications is the key – user and departmental • Make sure people understand the business benefit
  • 37. 3. Do your Discovery - Don’t assume anything What’s running on your network? What apps need admin rights? How quickly user behaviour can change Xtraction can be Awesome to help get that single page view
  • 38. 3. Do your Discovery - Don’t assume anything Xtraction example: ASD TOP 4 Single pane view Multiple data sources
  • 39. Plug for Xtraction OSL140 - Here’s Your #$@&%*! Report! Test Drive Xtraction for Security Wednesday 14:15 – 15:15 MEC C1
  • 40. Q + A Thank you