Security News > 2021 > November > Microsoft Defender for Endpoint laid low. Not by malware, but by another buggy Windows patch
A sad-faced Microsoft engineer has had to reset the "Days since we last shot ourselves in the foot" counter at the company's HQ after a security update broke Microsoft Defender for Endpoint on Windows Server Core.
The latter included the LTSC editions of Windows 10 as Microsoft pointed out, only devices with a Windows Server Core installation were affected.
Microsoft Defender for Endpoint on Windows 10 will therefore still behave normally.
KB5007205 is for Windows Server 2022 and the subsequent preview patch emitted earlier this week, KB5007254, has the same problem.
Microsoft said: "We are working on a resolution and will provide an update in an upcoming release," so that's alright then.
The Register contacted Microsoft for more details, which said it had "Nothing further to share at this time." .
News URL
https://go.theregister.com/feed/www.theregister.com/2021/11/25/defender_for_endpoint_problems/
Related news
- Microsoft fixes two Windows zero-days exploited in malware attacks (source)
- Microsoft fixes Windows zero-day exploited in QakBot malware attacks (source)
- Patch actively exploited Microsoft SharePoint bug, CISA orders federal agencies (CVE-2023-24955) (source)
- Detecting Windows-based Malware Through Better Visibility (source)
- Microsoft fixes Windows Sysprep issue behind 0x80073cf2 errors (source)
- Recent Windows updates break Microsoft Connected Cache delivery (source)
- April 2024 Patch Tuesday forecast: New and old from Microsoft (source)
- Microsoft April 2024 Patch Tuesday fixes 150 security flaws, 67 RCEs (source)
- Microsoft Fixes 149 Flaws in Huge April Patch Release, Zero-Days Included (source)
- Microsoft now testing app ads in Windows 11's Start menu (source)