Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
Re: [Full-disclosure] bypassing Windows Domain Group Policy Objects
From: Exibar (exibarthelair.com)
Date: Thu Apr 27 2006 - 09:42:20 CDT
----- Original Message -----
From: "Michael Holstein" <michael.holsteincsuohio.edu>
Sent: Thursday, April 27, 2006 10:37 AM
Subject: Re: [Full-disclosure] bypassing Windows Domain Group Policy Objects
>> System Key:
>> Value Name: DisableGPO
>> Data Type: REG_DWORD (DWORD Value)
>> Value Data: (0 = default, 1 = disable group policy)
> strike that .. production releases ignore this.
> Other possible solution, cripple gpupdate.exe (XP) or secedit.exe (2K)
> through permissions (eg: remove 'localsystem:execute'). Deleting them will
> just trigger WFP to replace.
Hmmmm..... sounds like a good plan :-) I'll test that out! thanks!
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/