Security News > 2021 > November > Microsoft Defender for Endpoint laid low. Not by malware, but by another buggy Windows patch

A sad-faced Microsoft engineer has had to reset the "Days since we last shot ourselves in the foot" counter at the company's HQ after a security update broke Microsoft Defender for Endpoint on Windows Server Core.
The latter included the LTSC editions of Windows 10 as Microsoft pointed out, only devices with a Windows Server Core installation were affected.
Microsoft Defender for Endpoint on Windows 10 will therefore still behave normally.
KB5007205 is for Windows Server 2022 and the subsequent preview patch emitted earlier this week, KB5007254, has the same problem.
Microsoft said: "We are working on a resolution and will provide an update in an upcoming release," so that's alright then.
The Register contacted Microsoft for more details, which said it had "Nothing further to share at this time." .
News URL
https://go.theregister.com/feed/www.theregister.com/2021/11/25/defender_for_endpoint_problems/
Related news
- FINALDRAFT Malware Exploits Microsoft Graph API for Espionage on Windows and Linux (source)
- Microsoft says attackers use exposed ASP.NET keys to deploy malware (source)
- Microsoft has finally fixed Date & Time bug in Windows 11 (source)
- Microsoft shares workaround for Windows security update issues (source)
- Microsoft February 2025 Patch Tuesday fixes 4 zero-days, 55 flaws (source)
- Windows 10 KB5051974 update force installs new Microsoft Outlook app (source)
- February's Patch Tuesday sees Microsoft offer just 63 fixes (source)
- Microsoft’s Patch Tuesday Fixes 63 Flaws, Including Two Under Active Exploitation (source)
- Patch Tuesday: Microsoft Patches Two Actively Exploited Zero-Day Flaws (source)
- Microsoft fixes bug causing Windows Server 2025 boot errors (source)