HP Compaq t5720 Supplementary Manual
HP Compaq t5720 Supplementary Manual

HP Compaq t5720 Supplementary Manual

Virus vulnerability analysis
Hide thumbs Also See for Compaq t5720:

Advertisement

Thin Client Virus Vulnerability Analysis
Virus vulnerabilities, encounters, and impact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Virus encounter vectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Technology vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Impact of client computing vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
HP Thin Client response to vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Diskette/removable media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
E-mail/office applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Web browser/Internet/Non-e-mail/peer-to-peer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Operating system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Instant messaging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Multimedia viewers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Thin client firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Sygate Security Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Recovery time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Locking down a thin client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Standard user rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Least privileged user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
DisableCMD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Permission changes on the Desktop folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Preventing file downloads from Internet Explorer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Preventing Disk-On-Key access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Hiding desktop items on the HP Compaq t57x0 Thin Client . . . . . . . . . . . . . . . . . . . . . . . 10
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
For more information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1

Advertisement

Table of Contents
loading

Summary of Contents for HP Compaq t5720

  • Page 1: Table Of Contents

    Preventing Disk-On-Key access ......... . . 10 Hiding desktop items on the HP Compaq t57x0 Thin Client ..... . . 10 Summary .
  • Page 2 8 out of every 10 enterprises suffered a security breach as a result of malicious code. As a result, more than half of enterprises are increasing IT security budgets. HP believes the thin cli- ent computing model is an effective solution for the security-conscious enterprise.
  • Page 3: Virus Vulnerabilities, Encounters, And Impact

    Virus vulnerabilities, encounters, and impact The following graph depicts security vulnerabilities experienced by actual enterprise customers as sur- veyed by ICSA Labs for the years 1996 through 2002. The second graph contains the most vulnerable technologies as perceived by the enterprises surveyed in 2003 by EDC. The graphs illustrate a strong cor- relation between the actual occurrence of each vulnerability and its associated technology in an enter- prise.
  • Page 4: Technology Vulnerabilities

    Technology vulnerabilities Impact of client computing vulnerabilities...
  • Page 5: Hp Thin Client Response To Vulnerabilities

    HP Thin Client response to vulnerabilities As the data in the previous section shows, the thin client computing model substantially reduces the likeli- hood that a thin client device will encounter a vulnerability as compared to a standard PC. The model also centralizes the enterprise’s most vulnerable technologies in the data center, where you can effectively...
  • Page 6: E-Mail/Office Applications

    HP XPe thin clients, the Enhanced Write Filter (EWF) prevents permanent modifications (writes) to the con- tents of the system’s flash. Finally, the Internet browser is an optional feature on select HP thin clients. Selecting models without it or optionally removing it ensures a more secure environment.
  • Page 7: Instant Messaging

    MS00-046 MS03-007 In addition to being a smaller target, the HP thin client XPe operating system contains an Enhanced Write Filter (EWF) that prevents damage to the local file system and its operating system files. The EWF protects the contents of the media by redirecting all the writes to a temporary virtual memory location. These writes are lost when the system is shutdown or restarted.
  • Page 8: Thin Client Firewall

    Recovery time In the event of a virus attack or other security issue, the HP thin client computing model offers significantly shorter recovery time when contrasted with the traditional desktop model. If a thin client’s image is com- promised or corrupted, recovery time is typically measured in minutes instead of hours. Recovery usually involves a power cycle (1 minute), patch (5 minutes), or re-image (15 minutes) of the system.
  • Page 9: Locking Down A Thin Client

    Locking down a thin client Additional security is available for the HP Compaq t57x0 thin client series. Although the default User account on the t57x0 thin client is already somewhat locked down, the account does have administrative rights and can still allow activities such as downloading and executing programs to the desktop. You can...
  • Page 10: Disablecmd

    It also removes the tray icon. This will allow the user to only double-click on the IE and/or remote desktop icons that are on the desktop. The...
  • Page 11 "Favorites"=hex:ff After modifying the hide-stuff.reg file, perform the following steps: Log onto the thin client as Administrator. Copy the attached file into c:\Documents and Settings\User\Desktop\. Log off, and then log on as User. Double-click the hide-stuff.reg file on the desktop.
  • Page 12: Summary

    © 2006 Hewlett-Packard Development Company, L.P. The information in this document is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.

This manual is also suitable for:

Compaq t5725Compaq t5730

Table of Contents