Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Windows Operating Systems Software Microsoft

Longhorn Will Have Ability to Ban External Storage Devices 721

slashdotbs writes "CNET is reporting that Microsoft will allow IT managers to block devices such as USB memory keys and - shockingly! - iPods. The article refers to 'the threat posed by digital storage devices'."
This discussion has been archived. No new comments can be posted.

Longhorn Will Have Ability to Ban External Storage Devices

Comments Filter:
  • ban in sp2 (Score:5, Informative)

    by Davak ( 526912 ) on Thursday September 09, 2004 @01:55PM (#10203043) Homepage
    Block access to USB keys?

    Hell, we can do that now! [tech-recipes.com]

    Remember that SP2 has several new longhorn "features" that were rushed into the service pack in the name of security.

    Davak
    • Re:ban in sp2 (Score:3, Informative)

      by badriram ( 699489 )
      Sort of that only prevents writing to the disks, but does not prevent a usb storage device being pluged in. But this setting alone should be more than adequate for most people.
      • Re:ban in sp2 (Score:5, Interesting)

        by AlexTheBeast ( 809587 ) on Thursday September 09, 2004 @02:06PM (#10203256)
        Of course, it doesn't prevent it from being plugged in...

        Super-glue over the USB port would help with that.

        In our hospital our computer people actually cut/disconnected the cables from all the usb ports and cd-roms to increase security.

        Of course, the shmucks left IE installed... now they spend a zillion more hours removing spyware than they ever would by me booting to a CDR or USB key.
      • Re:ban in sp2 (Score:3, Insightful)

        by Pharmboy ( 216950 )
        Actually, we don't use any USB devices on our network, all resources are TCP/IP over ethernet, so if I was concerned, I could just disable USB in the BIOS, and set a password to enter BIOS setup.

        Of course, they can still pop in a Knoppix CD, mount the hard drive as RW, then copy files from another CD to the hard drive. Or just mount the hard drive as RO and then copy the companies files to any website via sftp, or burn them to disk.

        For that matter, you CAN boot into DOS and read/write to a NTFS partition
    • Re:ban in sp2 (Score:5, Informative)

      by kikta ( 200092 ) * on Thursday September 09, 2004 @02:06PM (#10203262)
      From the article:

      Microsoft did include a workaround in Windows XP Service Pack 2 that lets users change an internal Windows setting to prevent data from being written to USB devices. But the features planned for Longhorn will be more comprehensive.

      Reading is fun. ;-)
    • by MyDixieWrecked ( 548719 ) on Thursday September 09, 2004 @02:15PM (#10203417) Homepage Journal
      A workaround for longhorn's external device blocker was found. By simply coloring your device black with a marker and holding it, you will be able to mount your drives.
  • by garcia ( 6573 ) * on Thursday September 09, 2004 @01:55PM (#10203045)
    and - shockingly! - iPods.

    Shockingly, michael, people use iPods to backup data! Companies don't want their employees leaving the premises with this data and checking through tens of thousands of bags is time consuming and expensive. Perhaps this would be different if iPods weren't easily able to be used for backing up data but that's just not the case.

    According to the article this feature is available in XP SP2. See here [microsoft.com] for more information.

    No, it's not some Microsoft conspiracy to end iTMS and the iPod.
  • by Compholio ( 770966 ) on Thursday September 09, 2004 @01:56PM (#10203048)
    They need to give IT people the ability to block IE, it's more dangerous than any removable storage device.
  • by winkydink ( 650484 ) * <sv.dude@gmail.com> on Thursday September 09, 2004 @01:56PM (#10203057) Homepage Journal
    Companies struggle with protecting their confidential and proprietary information. Being able to to do this at a policy level will be a big help to a lot of security folks.
    • by Cromac ( 610264 )
      It would help some, but unless they also ban using laptops and allowing people to bring them in and out of the office it's not going to stop someone from taking confidential and proprietary information out of the office.
  • We're sorry (Score:5, Funny)

    by Rubberpants.net ( 804718 ) on Thursday September 09, 2004 @01:56PM (#10203061) Homepage
    The device you've attached to your computer is not Microsoft Certified and is therefore potentially dangerous. Please visit microsoft.com to purchase an approved device.
  • Whats so shocking? (Score:3, Informative)

    by badriram ( 699489 ) on Thursday September 09, 2004 @01:56PM (#10203062)
    iPod acts just like any other USB storage device on Windows. It is still a security issue.
  • Comment removed (Score:5, Insightful)

    by account_deleted ( 4530225 ) on Thursday September 09, 2004 @01:57PM (#10203075)
    Comment removed based on user account deletion
    • by Anonymous Coward
      OMG! There's this tech company with whom I correspond, and ALL of their emails come from Outlook! They're in bed with Microsoft! OMG!!!
    • by shawnce ( 146129 ) on Thursday September 09, 2004 @02:12PM (#10203363) Homepage
      The referenced item from Intego was about a theoretical Trojan horse that no one appears to have actually taken advantage of to do evil (symantec's take on it [symantec.com]. Also a detailed look at the "security alert" can be found here [daringfireball.net].

      Anyway yes any storage device could have a Trojan, etc. dropped onto it. Yet in the case of the iPod and other storage devices (at least under Mac OS X) just because such a beasts exists on the storage device doesn't mean that once connected it spreads (no auto-run of code on mounted devices is supported on Mac OS X without third-party tools).

      Not much can protect one from a Trojan if the victim cannot recognize it for what it is (sure virus scanners may hit on it if it is a known trojan).

      Anyway the real issue is mostly about users dropping company data onto their iPod, etc. (likely unencrypted) and then walking out the door and possibly losing it...
  • It's about time. (Score:2, Insightful)

    For many people, it's currently easier to walk out with a USB device full of files than it is to connect to yahoo mail and send them as attachments. (Proxies, transfer size limitations, etc.) This is a logical step, like removing floppy drives in the 1990s and then limiting their use with software with Microsoft security policies.
  • by Dark Paladin ( 116525 ) * <jhummel.johnhummel@net> on Thursday September 09, 2004 @01:57PM (#10203091) Homepage
    I was talking to the CIO of a major health organization who had commissioned his engineers to find a solution to the problem of people bringing in their USB flash drives. Since he's worried about patient privacy, there's the fear that somebody would be inside, stick in a USB drive, copy data and walk out.

    I know - "but what if they use a notepad, dummy". Yes, there is that problem - but last time I checked, you can steal a ton more data via a USB drive than a piece of paper.

    The engineers answer? Epoxy glue in the USB slots. Not the best choice.

    So for places that have to deal with security, this is good for two reasons. First, it prevents people from taking data through alternate methods (USB/Firewire drives). Second, it lets people with those devices bring them into the lab.

    Take the iPod example. If you're working in one of my secure labs, I might tell you "sorry - leave it outside". But with this technology, I can say "Sure - bring it in and listen to your tunes" with a reasonable level of surety that they're not to go copy data they shouldn't.

    So from my mind, this is a Good Thing, and I'd like to see it on my OS X/Linux machines as well.
    • So from my mind, this is a Good Thing, and I'd like to see it on my OS X/Linux machines as well.

      This is easy for Linux (and I assume something similar would need to be done on OSX since it is unix based). Linux has been able to do this for many many years. :-)

      Edit /etc/fstab

      Put this in your etc fstab and it ought to do the trick:
      dev/sda1 /mnt/media/usb-storage vfat ro,noexec,noauto,users 0 0

      All users can mount and read the usb drive (ipods etc) but not write to it, nor can they execute anything from t
  • by bloggins02 ( 468782 ) on Thursday September 09, 2004 @01:57PM (#10203092)
    Seriously,

    Just because you give IT administrators the power to lock down the computer doesn't mean that Aunt Sallie isn't going to be able to use her iPod.

    Imagine you administer a huge corporate network and you've standardized on Longhorn. Now imaging that the single biggest threats your network has seen in the past have originated from customer service reps bringing files from home on their iPods and Thumbdrives. If I were an administrator, I would have no problem locking down those machines to eliminate that threat.

  • by Blastrogath ( 579992 ) on Thursday September 09, 2004 @01:57PM (#10203093)
    Oh no! You mean people can stop me from attaching devices to computers they own and administrate?? Will microsoft's villany never end?!?
  • by kidventus ( 649548 ) * on Thursday September 09, 2004 @01:58PM (#10203097) Homepage Journal

    Microsoft since 2000 has always had Group Policy definitions to restrict CD burning and Floppy use on certain PCs, why is this such a big deal? Because it has the word "iPod" in the article?
    It's not like every IT department is going to start locking down USB keys.. it takes one employee complaining to their manager they can't take their uber-important files home to work on at night to get things like this reversed anyway.
    Nail biters don't bother.. it's just a slow news day for Slashdot :-)
  • by stevel ( 64802 ) * on Thursday September 09, 2004 @01:58PM (#10203098) Homepage

    Windows XP SP2 already has this [microsoft.com]. The referenced article describes a larger new feature that would include this as a subset, but "the future is today" regarding IT admins being able to lock out USB storage devices.

  • This will also be useful at trade shows and at computer stores. Keep sneaky people from plugging in devices and pulling stuff off the computer while no one is looking! Or loading stuff onto it as well..
  • substitute iPod with samsung, sony, dell..

    And the point is that MS is not the one who makes the decision about what devices to ban. It is the office manager. Who knows if the office manager himself might have an iPod?
  • by TheRealMindChild ( 743925 ) on Thursday September 09, 2004 @01:58PM (#10203109) Homepage Journal
    While I personally believe this is a good thing, often these things can be circumvented easily by... booting a knoppix CD. Of course a modern BIOS will allow you to restrict booting from a floppy (yes I know... I am the only person who still uses these), or a CDRom, but all can be undone with 30 seconds and enough balls to open your case. Even then, Im sure there is some trick to purge the CMOS without ever cracking the case.
    • but all can be undone with 30 seconds and enough balls to open your case.

      The average user wouldn't know where to start. Sure, you or I could open the case and reset the CMOS but would you really consider doing that at work? My job is more important than listening to music or taking data home. Security, physical and electronic, are not foolproof. Any system has a weakness.
    • by pknoll ( 215959 ) on Thursday September 09, 2004 @02:23PM (#10203552)
      Many workstation-class machines have intrusion detection.

      Any company that needs to worry about file copying to the extent that they will lock out USB storage devices should already have mechanisms in place to prevent or restrict alternate O/S booting - and more importantly, the policies to fire your rogue ass should you choose to circumvent them.

    • Case locks will prevent that, My $1000 eMachines Desktop has a loop to lock the case on with a padlock, and if someone is willing to break out a hack saw to steal data the best bet is probably going to be calling security and having them physically removed from the building.
  • Part of being able to manage corporate computers is being able to secure them. Before everyone panics, note that this is a feature that they will make available to administrators, not something that will be enabled by default.

    If I were a network admin, I'd definately want this power. There are situations where this type of inconvenience is definately warranted. Take a look at what happened at Sandia labs, for example, they documented plenty of examples of various workers transfering data between secured
  • Shockingly? (Score:5, Insightful)

    by rde ( 17364 ) * on Thursday September 09, 2004 @01:59PM (#10203129)
    I don't own an iPod, but I imagine it's just a plain ol' USB storage device when plugged in. As such, it's as much of a security risk as any other, similar device.

    We've all been slagging off MS for years now for their attitude to security; no point in whining now when they get it right, just cos you can't play music through your desktop speakers.

    BTW: cool link on that page. Well, not cool, but I like the headline: Allchin: Don't call it 'Shorthorn' [com.com]
  • by acomj ( 20611 ) on Thursday September 09, 2004 @02:00PM (#10203147) Homepage
    Our IT folks have locked down our Unix Workstations from mounting most media. These devices especially mp3 player that act like drives cause our semi-technical security to freak.

    It will help windows make inroads into classified environments.

    (some feel that store bought "music" media should labeled to its security level, except cd burners can't burn store bought music cds.)
  • HIPAA (Score:5, Informative)

    by charnov ( 183495 ) on Thursday September 09, 2004 @02:02PM (#10203188) Homepage Journal
    I worked on a project where we had to remove every USB, firewire, CDROM, and floppy drive along with sheathing all the plugs and sealing all the connections on hundreds of computers to satisfy some of the more stringent controls required in HIPAA (HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996) that no unauthorised persons be able to access restricted documents. It was cheaper than using control software (trusted computing platforms and certification is wicked expensive).
  • by dheltzel ( 558802 ) on Thursday September 09, 2004 @02:05PM (#10203230)
    . . that only honest people are smart enough to put the data into an encrypted zip file and email it to their Hotmail account.

    I feel much safer knowing MS is looking out for us, can't you just feel that invigorating "innovation" starting to pulsate through your O/S?

    Excuse me - i'm getting woozy . . .

  • by mocm ( 141920 ) on Thursday September 09, 2004 @02:07PM (#10203278)
    $ mount /dev/sda1 /mnt
    mount: only root can do that
  • Very Necessary (Score:5, Informative)

    by SrJsignal ( 753163 ) on Thursday September 09, 2004 @02:09PM (#10203314)
    I see a lot of comments talking about "anal sysadmins" and such. In a commercial environment that may be true. But there's an area where it is even MORE important to be able to lock these devices out: The government / sensitive info computers of the world. Think about all of the work that goes on in these places and the number of computers, many of which are on Solaris and Windows (some Linux is approved, but not much) They have to implement these features to keep national-security type information from walking out on someones keychain. (course those items cannot be in secured areas anyway, but I digress).
  • Boot virus? (Score:4, Interesting)

    by Skiron ( 735617 ) on Thursday September 09, 2004 @02:11PM (#10203348)
    As an aside, I wonder how long it will be before we see the first 'boot type virus' (or perhaps a FAT FS virus) on these things like the good old days of floppies?
  • by TheKubrix ( 585297 ) on Thursday September 09, 2004 @02:12PM (#10203365) Homepage
    Everyone seems to agree that the ability to disable USB is a good idea, but this has been around for quite a while........not just WinXP. Most BIOS's have the ability to disable USB. Just set this, add a password, and physically lock it down.
    • Re:USB (Score:3, Insightful)

      by Greyfox ( 87712 )
      My system doesn't have legacy keyboard and mouse connectors, just USB (You insensitive clod!)

      People act like they will no longer be able to use their iPod at work, but all you need to do is load it up with a few gigs of mp3 at home and plug it into the power connector under the desk or use the battery. Anyone listening to music through speakers at work will quickly be beaten to death by their co-workers anyway (Hell, you'll be beaten for just enabling system sounds 'round here...)

  • by ChipMonk ( 711367 ) on Thursday September 09, 2004 @02:14PM (#10203410) Journal
    Just blob it into the USB ports on the motherboard and be done with it. It stops "boot Knoppix and save it to your USB key" approaches, too.
  • by xutopia ( 469129 ) on Thursday September 09, 2004 @02:15PM (#10203414) Homepage
    and in Linux nothing stops you from doing something even smarter. Make the portable storage read-only so people can listen to their mp3's if they so desire but cannot copy sensitive information to their devices.

    I believe the /etc/fstab entry would be something like this :

    /dev/sda1 /mnt/usb1 auto noauto,user,ro 0 0

  • by mingrassia ( 49175 ) on Thursday September 09, 2004 @02:15PM (#10203418)
    This is not a big deal folks. My spouse works for a financial institution and they block access to Internet based email (e.g. GMail, Yahoo, etc). My current employer blocks ftp access to the outside world. My last employer didn't allow us to bring our cell phones or pagers into the secure computer labs. The computer you use at work is not yours and you can't do with it as you wish. This may be frustrating for us techies but it is the truth. Remember folks that this is intended to be used by corporate users and NOT for home users. This is just a natural progression of companies wanting to make sure that employees don't run off with data that they are not supposed to. Anyone else remember this fiasco [sfgate.com]?

  • by AtariDatacenter ( 31657 ) on Thursday September 09, 2004 @02:17PM (#10203459)
    Now... if only I could figure out _how_ to get my users classified as a storage device...
  • Bootable USB (Score:5, Interesting)

    by Marc_Hawke ( 130338 ) on Thursday September 09, 2004 @02:21PM (#10203525)
    I just bought a 1GB usb key with the ability to be 'bootable.'

    So, no only do they have to prevent external storage, but they also have to turn off USB booting, and password the BIOS. I don't know if those are standard practices or not.

    And, with this ability to turn of external drives, does that retain the ability to use other USB devices? Wouldn't there be some sort of 'spoofing' that could happen? (don't ask my what...I haven't figured that out yet. :) )
  • by i_r_sensitive ( 697893 ) on Thursday September 09, 2004 @02:23PM (#10203569)
    This not about corporate information security. This isn't about wether *admins should have the right to do this or not. Those are issues every company has to answer for themselves.

    What this *is* about is just one more "feature" that M$ is putting into their offering that UNIX/Linux/Et. AL. have had forever.

    When you start diluting the issue talking about the conspiracy mumbo-jumbo, and fascist *admins, and what have you, you really are helping M$ along...

    The only rational answer to an announcement like this is:

    That's not news, that's not a feature, that's integral to any well designed OS.
  • by pavera ( 320634 ) on Thursday September 09, 2004 @02:24PM (#10203586) Homepage Journal
    Microsoft in the name of security has done alot more silly things... like the fact that you can't send word/excel docs as attachments using outlook anymore. Instead of fixing their security holes they just disable whatever might cause viruses to spread...

    Pretty soon MS will disable double clicking .exe files because that is the only way they can stop people from getting viruses.
  • by nurb432 ( 527695 ) on Thursday September 09, 2004 @02:40PM (#10203841) Homepage Journal
    With proper management of GPO policy you can disable such external beasts today..

    You can even disable things such as floppy drives...

    Could even do that with NT 4...
  • This isn't new (Score:3, Informative)

    by OrangeTide ( 124937 ) on Thursday September 09, 2004 @02:42PM (#10203865) Homepage Journal
    There have been third party products that allowed you to lock out external media (cd-rom, floppy, etc) for quite some time. Unless you were logged in as domain administrator of course. Also you need a password to boot from a floppy and flash the BIOS on most secured networks.

    The idea that an IT admin is given tools necessary to prevent outside data from getting into the network and to prevent data from getting out of the network is neither new nor is it a bad idea.

    Of course one can still just zip up a bunch of secret document and mail them to an anonymous account like gmail. That does leave a pretty nasty paper trail though.
  • by smartin ( 942 ) on Thursday September 09, 2004 @02:54PM (#10204056)
    If you want to steal a file this is no more difficult than doing an https POST to a web server. Pretty hard to block and pretty hard to detect.
  • by geomon ( 78680 ) on Thursday September 09, 2004 @03:28PM (#10204547) Homepage Journal
    Do not order computers with external device access.

    Alternatively:

    1)Remove USB ports at the motherboard.
    2)Do not install floppy or zip drives.
    3)Do not install CDR/DVRs.
    4)Remove all legacy serial and parallel ports.

    Now just how you will get any work done is another matter.

  • by buckhead_buddy ( 186384 ) on Thursday September 09, 2004 @03:30PM (#10204565)
    I don't think the feature itself is at all controversial. It is a matter of security to be able to block external devices to unauthorized users on your machine. There are ways to do this today in current versions of Windows with third party products.

    Two things come to mind however:

    1. Who will actually implement this feature? We're talking about something that really digs into the hardware/firmware/low-level-OS hooks of a system. For all practical purposes MS could simply shove most of the hard work off to the hardware makers saying that it provides a standard configuration panel in Windows and an API to unify the diverse hardware standards for features like this. Of course, it'd be up to the headaches of the hardware makers to make sure that things like firmware upgrades / hard resets / external booting are available but respect the settings of this API.

    2. Is this something that software programmers will encourage? Before it became popular to mount USB cameras as FAT partitions on your desktop, digital cameras had to use a serial cable and follow an elaborate, non-standard syncing APIs and mechanisms. The simplicity from the programmer perspective of having a simple data repository that acts like a file system device lets them spend their time on many other things rather than handshaking and querying acrobatics. Unless MS is also implementing an extensible sync architecture which will allow them to properly screen out the "true" hardware storage devices but allow things like cameras and PDA's to be read into the computer, then I forsee most users turning off this security feature as the first or second step in the instruction manuals of most devices (just as turning off the MS firewall appears to be the first step of many Internet enabled programs).
  • by meowsqueak ( 599208 ) on Thursday September 09, 2004 @04:09PM (#10205138)
    This isn't so bad - it might mean companies don't have to ban these devices outright if they have a way of preventing them from interfacing with their network. Implementation issues aside, I'd rather listen to music at work with my DAP, even if I can't hook it up to my workstation, than have to sit all day listening to the hum of fans blowing, the beeps from detected bit errors, inane colleague conversation and random cellphone activity.
  • by nusratt ( 751548 ) on Thursday September 09, 2004 @08:05PM (#10207832) Journal
    If *I* really wanted to steal something, the only way you could stop me is to disable access to ***ALL*** i/o --
    including sealing the serial / parallel /audio ports,
    AND hard-wiring the mouse, keyboard, ethernet, and monitor connections -- at BOTH ends.

    Leave ANY of those open, and I'll be able to write to magnetic media,
    UNDETECTABLY to anyone who isn't standing next to me at the moment when I'm connecting my evil capture device.

    And even after you do all that, I can STILL transmit data -- encoded (e.g., barcode) in high frame-rate video -- from one tiny innocent-looking window, to a button-hole video lens in my shirt.

    Then there's EM emissions recording.

    IOW, if you don't strip-search me, your data is "gone in 60 seconds".

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (5) All right, who's the wiseguy who stuck this trigraph stuff in here?

Working...