Security

CSO

Security? We've heard of it: How Microsoft plans to better defend Windows

Did we say CrowdStrike? We meant, er, The July Incident...


Ignite The sound of cyber security professionals spraying their screens with coffee could be heard this week as Microsoft claimed, "security is our top priority," as it talked up its Secure Future Initiative (SFI) once again and explained how Windows could be secured.

In a post that did not mention the word "CrowdStrike" and instead referred to "learnings from the incident we saw in July," Microsoft introduced the "Windows Resiliency Initiative" or, as administrators still in therapy after that particular July incident might describe it, "nailing jelly to a wall."

As well as taking lessons from the CrowdStrike incident, in which millions of Windows devices were left hopelessly broken by a malformed update from a security vendor, Microsoft has said areas of focus include enabling more apps and users to run without administrative privileges, stronger controls for what apps and drivers are allowed to run, and improved identity protection to prevent phishing attacks.

It's all laudable stuff, although much of it feels like it could have happened earlier. SFI is already more than a year old. In September 2024, Microsoft boasted of the 34,000 full-time engineers it had dedicated to SFI. With that many engineers are needed, the company should probably take a look at the surface area available for attack.

And then there are the incidents, such as July's, that have only highlighted architectural weaknesses. The reliance by some cybersecurity vendors on kernel-mode code has been an accident waiting to happen and lay at the heart of the CrowdStrike problem.

To help administrators recover machines unable to boot without having to get hands-on with the hardware, Microsoft has announced Quick Machine Recovery, due to roll out to Windows Insiders in the early part of 2025.

The trick is, however, not to get an enterprise's Windows devices to that stage. To that end, Microsoft repeated its vow to open up more of Windows so that vendors can run their solutions in user mode rather than dive down to the potentially riskier kernel level. The company also talked about adopting Safe Deployment Practices, "which means that all security product updates must be gradual, leverage deployment rings, as well as monitoring to ensure any negative impact from updates is kept to a minimum."

It will take until July 2025, a year after CrowdStrike's update took down a large chunk of the Windows ecosystem, before Microsoft will make a private preview of the new capabilities available.

Other changes in preview now include Administrator protection, where users have standard permissions, but temporary rights can be granted if needed, and Hotpatch in Windows, a "revolutionary" feature that allows critical security updates to be applied without requiring a restart. ®

Send us news
28 Comments

Why did the Windows 95 setup use Windows 3.1?

If MS-DOS could play Doom, surely a battleship gray button was a possibility?

Windows 7 lives! How to keep your favorite fossil running

You probably shouldn't, but if you must, you can

Microsoft trims more CPUs from Windows 11 compatibility list

OEMs blowing dust from the processor stock cupboard, beware

US Cyber Command reportedly pauses cyberattacks on Russia

PLUS: Phishing suspects used fishing gear as alibi; Apple's 'Find My' can track PCs and Androids; and more

How nice that state-of-the-art LLMs reveal their reasoning ... for miscreants to exploit

Blueprints shared for jail-breaking models that expose their chain-of-thought process

Qualcomm pledges 8 years of security updates for Android kit using its chips (YMMV)

Starting with Snapdragon 8 Elite and 'droid 15

Ivanti endpoint manager can become endpoint ravager, thanks to quartet of critical flaws

PoC exploit code shows why this is a patch priority

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling

Microsoft expands Copilot bug bounty targets, adds payouts for even moderate messes

Said bugs 'can have significant implications' – glad to hear that from Redmond

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

C++ creator calls for help to defend programming language from 'serious attacks'

Bjarne Stroustrup wants standards body to respond to memory-safety push as Rust monsters lurk at the door

China's Silver Fox spoofs medical imaging apps to hijack patients' computers

Sly like a PRC cyberattack