Microsoft Support & Discussions
Free PC Help Forum microsoft products support and discussions. If you need help with Microsoft Windows, Windows Server software, Microsoft 365, Microsoft Azure or any other Microsoft product you can post here. If you want to discuss Microsoft and their line of products you can do that here also.
82,445 topics in this forum
-
Inside the MSRC – Customer-centric incident response
by Guest MSRC Team- 0 replies
- 0 views
The Microsoft Security Response Center (MSRC) is an integral part of Microsoft’s Cyber Defense Operations Center (CDOC) that brings together security response experts from across the company to help protect, detect, and respond to threats in real-time. Staffed with dedicated teams 24×7, the CDOC has direct access to thousands of security professionals, data scientists, and … Inside the MSRC – Customer-centric incident response Read More » Continue reading...
-
- 0 replies
- 0 views
This week, MSRC confirmed the presence of an active Linux worm leveraging a critical Remote Code Execution (RCE) vulnerability, CVE-2019-10149, in Linux Exim email servers running Exim version 4.87 to 4.91. Microsoft Azure infrastructure and Services are not affected; only customer’s Linux IaaS instances running a vulnerable version of Exim are affected. Azure customers running VMs with Exim 4.92 are not … Prevent the impact of a Linux worm by updating Exim (CVE-2019-10149) Read More » Continue reading...
-
2019 年 6 月のセキュリティ更新プログラム (月例)
by Guest jsecteam- 0 replies
- 0 views
2019 年 6 月 12 日 (日本時間)、マイクロソフトは以下のソフトウェアのセキュリティ更新プログラムを公開しました。 Continue reading...
-
Time travel debugging: It’s a blast! (from the past)
by Guest swiat- 0 replies
- 0 views
The Microsoft Security Response Center (MSRC) works to assess vulnerabilities that are externally reported to us as quickly as possible, but time can be lost if we have to confirm details of the repro steps or environment with the researcher to reproduce the vulnerability. Microsoft has made our “Time Travel Debugging” (TTD) tool publicly available … Time travel debugging: It’s a blast! (from the past) Read More » Continue reading...
-
-
- FPCH Admin
- 0 replies
- 0 views
This is the third and last in a series of posts that looks at how Microsoft responds to elevated threats to customers through the Microsoft Security Response Center’s (MSRC) Software and Services Incident Response Plan (SSIRP). Our previous posts discussed how Microsoft protects customers against elevated threats and the anatomy of a SSIRP incident.
Last reply by Cloaked, -
-
-
- FPCH Admin
- 0 replies
- 0 views
This is the second in a series of blog posts that shares how the MSRC responds to elevated threats to customers through the Software and Services Incident Response Plan (SSIRP). In ourlast blog post, we looked at the history of the Microsoft Security Response Center and SSIRP, and how Microsoft takes a holistic view to helping to protect and defend customers.
Last reply by Cloaked, -
-
-
- FPCH Admin
- 0 replies
- 0 views
The Microsoft Security Response Center (MSRC) is an integral part of Microsoft’s Cyber Defense Operations Center (CDOC) that brings together security response experts from across the company to help protect, detect, and respond to threats in real-time. Staffed with dedicated teams 24x7, the CDOC has direct access to thousands of security professionals, data scientists, and product engineers throughout Microsoft to ensure rapid response and resolution to security threats.
Last reply by Cloaked, -
-
Prevent the impact of a Linux worm by updating Exim (CVE-2019-10149)
by Guest MSRC Team- 0 replies
- 0 views
This week, MSRC confirmed the presence of an active Linux worm leveraging a critical Remote Code Execution (RCE) vulnerability, CVE-2019-10149, in Linux Exim email servers running Exim version 4.87 to 4.91. Azure customers running VMs with Exim 4.92 are not affected by this vulnerability. Azure has controls in place to help limit the spread of this worm from work we’ve already done to combat SPAM, but customers using the vulnerable software would still be susceptible to infection. Customers using Azure virtual machines (VMs) are responsible for updating the operating systems running on their VMs. As this vulnerability is being actively exploited by worm activity, …
-
-
- FPCH Admin
- 0 replies
- 1 view
This week, MSRC confirmed the presence of an active Linux worm leveraging a critical Remote Code Execution (RCE) vulnerability, CVE-2019-10149, in Linux Exim email servers running Exim version 4.87 to 4.91. Microsoft Azure infrastructure and Services are not affected; only customer’s Linux IaaS instances running a vulnerable version of Exim are affected.
Last reply by Cloaked, -
-
June 2019 security update release
by Guest MSRC Team- 0 replies
- 0 views
Today, we released security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to turn on automatic updates. More information about this month’s security updates can be found on the Security Update Guide. Continue reading...
-
- 0 replies
- 1 view
Today, we released security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to turn on automatic updates. More information about this month’s security updates can be found on the Security Update Guide.
Last reply by PCHF Staff, -
25 reasons to choose Azure Stack HCI
by Guest Microsoft Windows Server Team- 0 replies
- 0 views
This blog post was authored by Dianna Marks, Product Marketing Manager, Windows Server Marketing. At the Windows Server Summit in May, Cosmos Darwin and Greg Cusanza from the Windows Server team presented a lightning round all about hyperconverged infrastructure (HCI) powered by Windows Server. If you havent had a chance to watch the event, check out the recording of the live stream and deep dive sessions by registering online. Its quick and free. Here are the 25 things they presented in the lightning round: 1. Azure Stack HCI Catalog Available for purchase right now, there are over 75 Azure Stack HCI solutions from over 15 partners. Check out the Azure …
-
BlueHat Shanghai 2019: Amplifying the power of defensive partnerships around the world
by Guest MSRC Team- 0 replies
- 0 views
Earlier this week BlueHat Shanghai brought together security researchers and hundreds of cybersecurity professionals from China and across Asia to explore the latest topics in cybersecurity research. Including presentations from Qihoo 360, Baidu, Alibaba and the Chinese Academy of Sciences, BlueHat Shanghai highlighted incredibly talented Chinese researchers and focused on cutting edge topics including container and IoT security. In the conference kick off, Eric Doerr (General Manager, MSRC) shared how researchers in China have helped protect Microsoft customers over the last year by reporting high impact vulnerabilities under Coordinated Vulnerability Disclosure. M…
-
Earlier this week BlueHat Shanghai brought together security researchers and hundreds of cybersecurity professionals from China and across Asia to explore the latest topics in cybersecurity research. Including presentations from Qihoo 360, Baidu, Alibaba and the Chinese Academy of Sciences, BlueHat Shanghai highlighted incredibly talented Chinese researchers and focused on cutting edge topics including container and IoT security.
Last reply by PCHF Staff, -
- 0 replies
- 1 view
On May 14, Microsoft released fixes for a critical Remote Code Execution vulnerability, CVE-2019-0708, in Remote Desktop Services – formerly known as Terminal Services – that affects some older versions of Windows. In our previous blog post on this topic we warned that the vulnerability is ‘wormable’, and that future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017.
Last reply by PCHF Staff, -
-
- FPCH Admin
- 0 replies
- 510 views
On May 14, Microsoft released fixes for a critical Remote Code Execution vulnerability, CVE-2019-0708, in Remote Desktop Services – formerly known as Terminal Services – that affects some older versions of Windows. In our previous blog post on this topic we warned that the vulnerability is ‘wormable’, and that future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017. Microsoft is confident that an exploit exists for this vulnerability, and if recent reports are accurate, nearly one million computers connected directly to the internet are sti…
Last reply by AWS, -
-
Microsoft Launches a New Recognition Program for MAPP Partners
by Guest MSRC Team- 0 replies
- 0 views
There are many dedicated people and organizations who contribute to the protection and security of our common customers. For years, Microsoft has recognized security researchers for helping protect the ecosystem. Now, we’re announcing the launch of a new program to better recognize and thank Microsoft Active Protections Program (MAPP) partners for all they do to protect our customers, including awards and evangelism based on their contributions. MAPP provides better protections for customers through: Early access to monthly security release information, allowing partners to proactively apply protections prior to the release date Sharing of threat indicators Repor…
-
- 0 replies
- 1 view
There are many dedicated people and organizations who contribute to the protection and security of our common customers. For years, Microsoft has recognized security researchers for helping protect the ecosystem. Now, we’re announcing the launch of a new program to better recognize and thank Microsoft Active Protections Program (MAPP) partners for all they do to protect our customers, including awards and evangelism based on their contributions.
Last reply by PCHF Staff, -
- 0 replies
- 0 views
The Microsoft Security Response Center (MSRC) works to assess vulnerabilities that are externally reported to us as quickly as possible, but time can be lost if we have to confirm details of the repro steps or environment with the researcher to reproduce the vulnerability. Microsoft has made our “Time Travel Debugging” (TTD) tool publicly available to make it easy for security researchers to provide full repro, shortening investigations and potentially contributing to higher bounties (see “Report quality definitions for Microsoft’s Bug Bounty programs”).
Last reply by PCHF Staff, -
We’re almost there! Join us at Windows Server Summit 2019
by Guest Microsoft Windows Server Team- 0 replies
- 0 views
This blog post was authored by Dianna Marks, Product Marketing Manager, Windows Server Product Marketing. Windows Server Summit 2019 is just two days away and we already have over 8,500 registered to attend. Thats a record in Windows Server Summit virtual event registrations to date! Register now and tell your friends and colleagues about it because you dont want to miss it. Weve spent hundreds of hours creating never-before-seen Windows Server demos and content that will be delivered to you by our rock star presenters. What do we have in store for you? These demo-rich sessions will be jam-packed with all the latest and greatest in Windows Server of course! That in…
-
Prevent a worm by updating Remote Desktop Services (CVE-2019-0708)
by Guest MSRC Team- 0 replies
- 1 view
Today Microsoft released fixes for a critical Remote Code Execution vulnerability, CVE-2019-0708, in Remote Desktop Services – formerly known as Terminal Services – that affects some older versions of Windows. The Remote Desktop Protocol (RDP) itself is not vulnerable. This vulnerability is pre-authentication and requires no user interaction. In other words, the vulnerability is ‘wormable’, meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017. While we have observed no exploitation of this vulnerability, it is highly likely t…
-
May 2019 Security Update Release
by Guest MSRC Team- 0 replies
- 1 view
Today, we released security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to turn on automatic updates. More information about this month’s security updates can be found on the Security Update Guide. Continue reading...
-
- 0 replies
- 1 view
Today Microsoft released fixes for a critical Remote Code Execution vulnerability, CVE-2019-0708, in Remote Desktop Services – formerly known as Terminal Services – that affects some older versions of Windows. The Remote Desktop Protocol (RDP) itself is not vulnerable. This vulnerability is pre-authentication and requires no user interaction. In other words, the vulnerability is ‘wormable’, meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017.
Last reply by PCHF Staff, -
- 0 replies
- 1 view
Today, we released security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to turn on automatic updates. More information about this month’s security updates can be found on the Security Update Guide.
Last reply by PCHF Staff, -
It’s all the buzz! HCI in your Windows Server environment
by Guest Microsoft Windows Server Team- 0 replies
- 1 view
This blog post was authored by Dianna Marks, Product Marketing Manager, Windows Server Marketing. HCI is all the buzz nowadays! What exactly is HCI? Spelled out its hyperconverged infrastructure, also referred to as the software defined data center (SDDC). It allows companies to run their storage, networking, and compute with lowered capital expenditure (CAPEX) and operating expenses (OPEX) since storage and networking are software-defined and dont require the same amount of hardware and level of management. HCI offers centralized management, which is great for many types of environments including development and product workloads. Also, now that there is no storage …