Originally posted by: Batman5177
I guess I was editing my post as you were replying to it! Thanks for being so quick on it though!
Here's what I added:
In your example of UT2004Demo folder, the user has unrestricted access. Will they be able to save and run executeables in that folder? If they put Firefoxsetup.exe in that folder and installed it in there also, would Firefox run?
If the user has write access to a folder that is also in the SRP Unrestricted list, then they could run Firefoxsetup.exe. If they
install FF to that same location, then they could run the browser
after setup.
Do your workstations have abnormal folders like the C:\UT2004Demo folder in my example? If so, make sure the Users group has no higher than Read & Execute permissions to them, so they cannot put new files into the folder. Or else don't make a Path Rule that sets them to Unrestricted. Maintain the Catch-22 situation.
You can also create a disallowed Hash Rule that targets a particular version of FF by its hash. It wouldn't be allowed to run, no matter what they named it, or where it was located. That's easily done and you could create a Hash Rule for each unwanted version. But hopefully it doesn't become necessary.
Bigger picture: document this stuff for HR.
If you happen to have VirusScan Enterprise 8.0i, I also know some tricks there. For Win2000 systems especially, that don't have SRP, VSE8.0i can do something similar via a behavior-blocking rule.