Site icon WinCert

Microsoft calls for changes after major IT outage

<p>After what many call the &&num;8220&semi;worst IT outage in history&comma;&&num;8221&semi; caused by a faulty CrowdStrike update that hit 8&period;5 million PCs&comma; Microsoft is considering changes to make Windows more resilient and limiting security vendors&&num;8217&semi; access to the Windows kernel&period;<&sol;p>&NewLine;<p><img class&equals;"alignnone size-full wp-image-3282" src&equals;"https&colon;&sol;&sol;www&period;wincert&period;net&sol;wp-content&sol;uploads&sol;2019&sol;09&sol;man&lowbar;computer&period;jpg" alt&equals;"Windows 10 update KB4512941" width&equals;"640" height&equals;"480" &sol;><&sol;p>&NewLine;<p>In a recent incident report&comma; Microsoft suggests that vendors should use kernel mode less and that customers should take full advantage of Windows&&num;8217&semi; built-in security features to avoid similar problems in the future&period;<&sol;p>&NewLine;<p>The outage happened because of a bad update to CrowdStrike’s CSagent&period;sys driver&comma; which led to memory access errors and constant system reboots&period; Microsoft&&num;8217&semi;s investigation agrees with CrowdStrike’s findings&comma; noting that kernel-mode drivers offer important system control and protection but can cause big problems if something goes wrong&period;<&sol;p>&NewLine;<p>To prevent future issues&comma; Microsoft plans to limit third-party access to the Windows kernel&comma; which is the core part of the operating system&period; They already tried something similar with Windows Vista back in 2006&comma; but it was stopped due to complaints from cybersecurity vendors and EU regulators&period;<&sol;p>&NewLine;<p>Microsoft advises businesses to have strong business continuity and incident response plans&comma; back up data regularly&comma; restore devices quickly&comma; follow safe update practices&comma; and consider using cloud management solutions&period;<&sol;p>&NewLine;<p>The company also plans to add advanced security features like Virtualization-Based Security &lpar;VBS&rpar; and zero-trust approaches soon&period;<&sol;p>&NewLine;

Exit mobile version