Microsoft Windows Changes Kernel Security Following CrowdStrike Incident

Friday, 13 September 2024, 01:34

Microsoft Windows changes focus to enhance kernel security after the recent CrowdStrike outage that impacted millions. The company aims to assist security vendors. By modifying solutions to operate outside kernel mode, Windows seeks improved resilience against security incidents while maintaining functionality.
Gadgets360
Microsoft Windows Changes Kernel Security Following CrowdStrike Incident

Enhanced Security Measures in Microsoft Windows

Microsoft on Thursday revealed plans to fortify Windows against incidents linked to security firms, inspired by the severe CrowdStrike outage earlier this year that took down millions of Windows machines for over a day. During a security summit, Microsoft committed to helping these security providers adapt their tools to function outside of Windows kernel mode, which typically grants elevated system access.

Reassessing Kernel-Level Access

At its recent Windows Endpoint Security Ecosystem Summit, Microsoft emphasized the development of new capabilities that will enable security applications to deliver enhanced features without operating within the Windows kernel. This shift aims to improve the overall security of the operating system.

  • Kernel-level security solutions have potential risks if updates are not properly configured.
  • Deprecated kernel-level access can enhance resilience against incidents like the CrowdStrike incident in July.
  • Microsoft's commitment will offer ecosystem collaboration for a more secure Windows environment.

Microsoft acknowledged the complexities of enabling security vendors to continue providing robust features while minimizing risks associated with kernel access. They will prioritize performance and protection measures in the next steps of these enhancements.


This article was prepared using information from open sources in accordance with the principles of Ethical Policy. The editorial team is not responsible for absolute accuracy, as it relies on data from the sources referenced.


Related posts


Newsletter

Subscribe to our newsletter for the most reliable and up-to-date tech news. Stay informed and elevate your tech expertise effortlessly.

Subscribe