Security News > 2024 > July > Post-CrowdStrike, Microsoft to discourage use of kernel drivers by security tools

Microsoft has admitted that its estimate of 8.5 million machines crashed by CrowdStrike's faulty software update was almost certainly too low, and vowed to reduce infosec vendors' reliance on the kernel drivers at the heart of the issue.
Redmond posted an incident response blog on Saturday - titled "Windows Security best practices for integrating and managing security tools" - in which veep for enterprise and OS security David Weston explained how Microsoft measured the impact of the incident: by accessing crash reports shared by customers.
Weston also reminded readers that Redmond runs an industry forum called the Microsoft Virus Initiative in which security vendors and the OS giant work together to "Define reliable extension points and platform improvements, as well as share information about how to best protect our customers."
The Microsoft veep listed the many security-related enhancements Microsoft has made over the years, and revealed the software megalith now plans "To work with the anti-malware ecosystem to take advantage of these integrated features to modernize their approach, helping to support and even increase security along with reliability."
Providing safe rollout guidance, best practices, and technologies to make it safer to perform updates to security products; Reducing the need for kernel drivers to access important security data; Providing enhanced isolation and anti-tampering capabilities with technologies like recently announced VBS enclaves; Enabling zero trust approaches like high integrity attestation which provides a method to determine the security state of the machine based on the health of Windows native security features.
Microsoft and Windows have a long and inglorious history of security snafus.
News URL
Related news
- After Detecting 30B Phishing Attempts, Microsoft Adds Even More AI to Its Security Copilot (source)
- New Security Flaws Found in VMware Tools and CrushFTP — High Risk, PoC Released (source)
- Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection (source)
- Week in review: Chrome sandbox escape 0-day fixed, Microsoft adds new AI agents to Security Copilot (source)
- GitHub expands security tools after 39 million secrets leaked in 2024 (source)
- April 2025 Patch Tuesday forecast: More AI security introduced by Microsoft (source)
- What native cloud security tools won’t catch (source)
- Fake Microsoft Office add-in tools push malware via SourceForge (source)
- Google's got a hot cloud infosec startup, a new unified platform — and its eye on Microsoft's $20B+ security biz (source)
- Microsoft: Windows 'inetpub' folder created by security fix, don’t delete (source)