Do you run your PC as Admin ??

Discussion in 'polls' started by acr1965, Apr 14, 2013.

?

Do You Run Your PC As Admin?

  1. Yes

    67 vote(s)
    69.8%
  2. No

    29 vote(s)
    30.2%
  1. The Hammer

    The Hammer Registered Member

    Joined:
    May 12, 2005
    Posts:
    5,752
    Location:
    Toronto Canada
    I was always advised against it.
     
  2. mechBgon

    mechBgon Registered Member

    Joined:
    Mar 2, 2013
    Posts:
    68
    Location:
    USA
    Biometrics make this simple and fast, so you might consider that option.
     
  3. chrisretusn

    chrisretusn Registered Member

    Joined:
    Jun 16, 2004
    Posts:
    1,672
    Location:
    Philippines
    Depends.

    Windows 2000, XP and 7? Yes.

    Linux? No.

    OS X? No
     
  4. Trooper

    Trooper Registered Member

    Joined:
    Jan 26, 2005
    Posts:
    5,507
    Yes I always run as admin.
     
  5. xxJackxx

    xxJackxx Registered Member

    Joined:
    Oct 23, 2008
    Posts:
    8,644
    Location:
    USA
    Admin, with UAC, SRP, Security suite, etc.
     
  6. TheKid7

    TheKid7 Registered Member

    Joined:
    Jul 22, 2006
    Posts:
    3,576
    On Windows XP Pro 32 bit - Admin

    On Windows 8 Standard 64 bit - Whatever the default is.
     
  7. J_L

    J_L Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    8,738
    UAC-protected Admin on Windows 7, sudo-privileged account on Linux Mint.
     
  8. Noob

    Noob Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    6,491
    I've tried using my PC with limited user rights, a PITA.
    I always install and uninstall crap so its a no-no. :)
     
  9. roger_m

    roger_m Registered Member

    Joined:
    Jan 25, 2009
    Posts:
    8,626
    I use an admin account and have UAC turned off for the same reason.

    If I wasn't continually installing and uninstalling software it wouldn't be so bad I guess.

    Edit: I guess a lot of people are happy having limited access due to the increased security and like being prompted when administrator access is required, and also like receiving UAC prompts. That's fine, but personally I absolutely hate receiving lots of prompts for action, and want any prompts asking me what to do to be kept to an absolute minimum. I want my AV software to prompt me for what action to take when a threat or possible threat is found, but other than that I want my AV software to be silent as much as possible. Yes, I know that makes me more susceptible to infections, I prefer that to being constantly interrupted with prompts.
     
    Last edited: Aug 12, 2013
  10. mattdocs12345

    mattdocs12345 Registered Member

    Joined:
    Mar 23, 2013
    Posts:
    1,892
    Location:
    US
    Admin + UAC OFF
     
  11. 0strodamus

    0strodamus Registered Member

    Joined:
    Aug 23, 2009
    Posts:
    1,058
    Location:
    United Surveillance States
  12. MisterB

    MisterB Registered Member

    Joined:
    May 31, 2013
    Posts:
    1,267
    Location:
    Southern Rocky Mountains USA
    Only to install software or change system settings, otherwise a limited account. I've been running things this way for over 10 years now on all versions of Windows since NT4 that support it. No malware or security problems since I started doing this with a fairly minimal amount of security software and a fairly lax attitude to upgrades. I also tweak the file permissions to make the user account a bit more secure. Yes it's a PITA but so is a malware infection and having an online account hacked due to one. So is having heavy security suites installed that eat up system resources.

    I don't install software that often. I usually vet it thoroughly in a VM and then a test machine before I use it on my main machines. I find it much more effective to have a minimal amount of software that I know well for what I really need it for. Apart from malware, there is a lot of software that is badly written, badly behaved or just doesn't work well in my system and most of the software I reject is for those reasons.

    Limited privilege is one of the foundations of security, computer or otherwise, and any time you use a computer in a public library or well set up corporate network, you are going to have your privileges limited for a good reason.
     
  13. FreddyFreeloader

    FreddyFreeloader Registered Member

    Joined:
    Jul 23, 2013
    Posts:
    527
    Location:
    Tejas
    Non-administrator account + UAC with password.
     
  14. lurker20

    lurker20 Registered Member

    Joined:
    Feb 20, 2012
    Posts:
    53
    Yes for xp, no for win7

    recently removed av and started using std account. Lets see how much I can tolerate :D
     
  15. Techwiz

    Techwiz Registered Member

    Joined:
    Jan 5, 2012
    Posts:
    541
    Location:
    United States
    One of the reason for running a standard or limited account is to make privilege escalation harder; however, I feel confident in my use of network groups policies and other access control methods: layered access, layered defense (software, hardware, & operating system), etc. to be sufficient to negate most of the risk. Physical access aside, against better practices, I do run admin on my own personal devices and standard accounts on other computers.

    Below is a summary of the steps (my best practices) that I've taken to mitigate my risk.

    Data Management:
    all sensitive and personal information is saved on encrypted external drives.
    all sensitive and personal information is accessed on non-networked PC.
    exception: password manager, accessed via separate portable mediums.
    all external drives are securely locked up and hidden amongst decoy drives.
    system cleaners for wiping data, shell-bags, etc.

    System Management:
    application segregation via app/task specific sandboxes.
    annual full system restore.
    sandbox: drop-my-right enabled & strict access controls
    disabled/removed unnecessary services per viper's.
    diversified & minimalistic layered approach: software, hardware, and OS.
    exploit mitigation w/tailored config (based on default EMET profile)
    network user groups and user access/control policies.
    some form of system imaging and virtualization on all computers.
    UAC max setting
    updates: check, but wait before downloading and/or installing.
    unnecessary services are disabled and/or removed.

    Browser Management:
    disabled caches, minimal extension and extensions
    virtual private network used as needed with private tunneler.
    files are rarely recovered to system. 99.99% re-uploaded/downloaded.
    portable browsing for sensitive activity. new browser/config each time.
    Policy; no banking, avoid online shopping as much as possible, etc.
    multiple methods for certificate verification are used on a site-by-site case.
    third-party DNS service and regular DNS flushing.
    sandbox is purged and securely deleted between websites.
    web-filters to help screen potentially malicious sites.

    Network Management:
    virtual router handles mobile traffic separately.
    direct hard-wired connection into router. no longer using wireless connect.

    Future Plans:
    implement additional forms such as biometrics or yubi-key as part of a layered access approach.
    running only standard account for daily use
    setting up a DMZ: secondary network behind our internet facing router/modem.
    possibly switching to counter-mail from existing (yahoo, gmail, etc. services)

    Obviously, I haven't hit on everything that I've done, but this gives a general overview. I think overall this is more than adequate to handle most system threats. In fact, many would probably say its over-kill. An opinion I can respect, but have no easy answer for. Adding additional hardware and software increases my attack surface area, while too extreme of a minimalistic approach leaves attacks vectors ill-protected. I feel confident that the steps that I have taken are an adequate balance that should handle most common security threats. With exception of course to professional cyber attacks, which residential networks and systems are generally ill-prepared against, and against internal threats due to physical access. Despite implementing proper encryption and layered physical access barriers.
     
  16. Noob

    Noob Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    6,491
    I dont have UAC off, i just dont like running with limited rights.
    UAC pop ups are not that annoying. :D
     
  17. ams963

    ams963 Registered Member

    Joined:
    May 3, 2011
    Posts:
    6,039
    Location:
    Parallel Universe
    Running as Admin. Too much trouble otherwise.
     
  18. TheKid7

    TheKid7 Registered Member

    Joined:
    Jul 22, 2006
    Posts:
    3,576
    I really like your Best Practices.
     
  19. Techwiz

    Techwiz Registered Member

    Joined:
    Jan 5, 2012
    Posts:
    541
    Location:
    United States
    We do what we can, not always what we should. :D
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.