Jump to content

Microsoft Support & Discussions

Microsoft Windows, Windows Server software, Microsoft 365, Microsoft Azure or any other Microsoft product discussions and help.

  1. Guest swiat
    Started by Guest swiat,

    The Microsoft Security Response Center (MSRC) works to assess vulnerabilities that are externally reported to us as quickly as possible, but time can be lost if we have to confirm details of the repro steps or environment with the researcher to reproduce the vulnerability. Microsoft has made our “Time Travel Debugging” (TTD) tool publicly available … Time travel debugging: It’s a blast! (from the past) Read More » Continue reading...

    • 0 replies
    • 1 view
  2. This is the third and last in a series of posts that looks at how Microsoft responds to elevated threats to customers through the Microsoft Security Response Center’s (MSRC) Software and Services Incident Response Plan (SSIRP). Our previous posts discussed how Microsoft protects customers against elevated threats and the anatomy of a SSIRP incident.

    • 0 replies
    • 1 view
  3. This is the second in a series of blog posts that shares how the MSRC responds to elevated threats to customers through the Software and Services Incident Response Plan (SSIRP). In ourlast blog post, we looked at the history of the Microsoft Security Response Center and SSIRP, and how Microsoft takes a holistic view to helping to protect and defend customers.

    • 0 replies
    • 1 view
  4. The Microsoft Security Response Center (MSRC) is an integral part of Microsoft’s Cyber Defense Operations Center (CDOC) that brings together security response experts from across the company to help protect, detect, and respond to threats in real-time. Staffed with dedicated teams 24x7, the CDOC has direct access to thousands of security professionals, data scientists, and product engineers throughout Microsoft to ensure rapid response and resolution to security threats.

    • 0 replies
    • 1 view
  5. Guest MSRC Team

    This week, MSRC confirmed the presence of an active Linux worm leveraging a critical Remote Code Execution (RCE) vulnerability, CVE-2019-10149, in Linux Exim email servers running Exim version 4.87 to 4.91. Azure customers running VMs with Exim 4.92 are not affected by this vulnerability. Azure has controls in place to help limit the spread of this worm from work we’ve already done to combat SPAM, but customers using the vulnerable software would still be susceptible to infection. Customers using Azure virtual machines (VMs) are responsible for updating the operating systems running on their VMs. As this vulnerability is being actively exploited by worm activity, …

    • 0 replies
    • 2 views
  6. This week, MSRC confirmed the presence of an active Linux worm leveraging a critical Remote Code Execution (RCE) vulnerability, CVE-2019-10149, in Linux Exim email servers running Exim version 4.87 to 4.91. Microsoft Azure infrastructure and Services are not affected; only customer’s Linux IaaS instances running a vulnerable version of Exim are affected.

    • 0 replies
    • 12 views
  7. Guest MSRC Team
    Started by Guest MSRC Team,

    Today, we released security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to turn on automatic updates. More information about this month’s security updates can be found on the Security Update Guide. Continue reading...

    • 0 replies
    • 2 views
  8. Today, we released security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to turn on automatic updates. More information about this month’s security updates can be found on the Security Update Guide.

  9. Guest Microsoft Windows Server Team
    Started by Guest Microsoft Windows Server Team,

    This blog post was authored by Dianna Marks, Product Marketing Manager, Windows Server Marketing. At the Windows Server Summit in May, Cosmos Darwin and Greg Cusanza from the Windows Server team presented a lightning round all about hyperconverged infrastructure (HCI) powered by Windows Server. If you havent had a chance to watch the event, check out the recording of the live stream and deep dive sessions by registering online. Its quick and free. Here are the 25 things they presented in the lightning round: 1. Azure Stack HCI Catalog Available for purchase right now, there are over 75 Azure Stack HCI solutions from over 15 partners. Check out the Azure …

    • 0 replies
    • 2 views
  10. Started by Kick,

    Hi, My 'Patch Tuesday' updates for May downloaded and installed with no issues. However, the latest issue of a computer mageazine to which I subscribe included a small article on a security issue for which Microsoft had released updates. Both the article and information I found on-line was unclear as to whether or not I need to do anything. My system is Windows 7 SP1 64bit. Microsoft have released two updates concerning the potential security issue: they are KB4499164 which is the monthly roll-up and which was included in the 'Patch Tuesday' updates so is already on my system and KB4499175 described as 'Security only' and is not on my system. What I am unsure a…

    • 2 replies
    • 719 views
  11. Guest MSRC Team

    Earlier this week BlueHat Shanghai brought together security researchers and hundreds of cybersecurity professionals from China and across Asia to explore the latest topics in cybersecurity research. Including presentations from Qihoo 360, Baidu, Alibaba and the Chinese Academy of Sciences, BlueHat Shanghai highlighted incredibly talented Chinese researchers and focused on cutting edge topics including container and IoT security. In the conference kick off, Eric Doerr (General Manager, MSRC) shared how researchers in China have helped protect Microsoft customers over the last year by reporting high impact vulnerabilities under Coordinated Vulnerability Disclosure. M…

    • 0 replies
    • 2 views
  12. Hi, As I propose not to move on to Windows 10 next January when Microsoft support for Windows 7 but to disable the internet in Windows 7 and rely on Lubuntu 18.04 (which I have dual booting with Windows 7), I am concerned about the position of my One Drive and Outlook.com accounts. I have posted a query on the Microsoft Community Forum but have had no replies. I access my Outlook email account via the Thunderbird email client and this works well in Lubuntu and Windows 7 - if I need to I can also access the account directly on the web. My One Drive account synchronises with a folder in my Windows 7 system - I realise that this synchronisation is not normally possib…

      • Like
    • 2 replies
    • 615 views
  13. Earlier this week BlueHat Shanghai brought together security researchers and hundreds of cybersecurity professionals from China and across Asia to explore the latest topics in cybersecurity research. Including presentations from Qihoo 360, Baidu, Alibaba and the Chinese Academy of Sciences, BlueHat Shanghai highlighted incredibly talented Chinese researchers and focused on cutting edge topics including container and IoT security.

  14. On May 14, Microsoft released fixes for a critical Remote Code Execution vulnerability, CVE-2019-0708, in Remote Desktop Services – formerly known as Terminal Services – that affects some older versions of Windows. In our previous blog post on this topic we warned that the vulnerability is ‘wormable’, and that future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017.

  15. On May 14, Microsoft released fixes for a critical Remote Code Execution vulnerability, CVE-2019-0708, in Remote Desktop Services – formerly known as Terminal Services – that affects some older versions of Windows. In our previous blog post on this topic we warned that the vulnerability is ‘wormable’, and that future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017. Microsoft is confident that an exploit exists for this vulnerability, and if recent reports are accurate, nearly one million computers connected directly to the internet are sti…

    • 0 replies
    • 524 views
  16. Guest MSRC Team
    Started by Guest MSRC Team,

    There are many dedicated people and organizations who contribute to the protection and security of our common customers. For years, Microsoft has recognized security researchers for helping protect the ecosystem. Now, we’re announcing the launch of a new program to better recognize and thank Microsoft Active Protections Program (MAPP) partners for all they do to protect our customers, including awards and evangelism based on their contributions. MAPP provides better protections for customers through: Early access to monthly security release information, allowing partners to proactively apply protections prior to the release date Sharing of threat indicators Repor…

    • 0 replies
    • 2 views
  17. There are many dedicated people and organizations who contribute to the protection and security of our common customers. For years, Microsoft has recognized security researchers for helping protect the ecosystem. Now, we’re announcing the launch of a new program to better recognize and thank Microsoft Active Protections Program (MAPP) partners for all they do to protect our customers, including awards and evangelism based on their contributions.

  18. The Microsoft Security Response Center (MSRC) works to assess vulnerabilities that are externally reported to us as quickly as possible, but time can be lost if we have to confirm details of the repro steps or environment with the researcher to reproduce the vulnerability. Microsoft has made our “Time Travel Debugging” (TTD) tool publicly available to make it easy for security researchers to provide full repro, shortening investigations and potentially contributing to higher bounties (see “Report quality definitions for Microsoft’s Bug Bounty programs”).

  19. Guest Microsoft Windows Server Team
    Started by Guest Microsoft Windows Server Team,

    This blog post was authored by Dianna Marks, Product Marketing Manager, Windows Server Product Marketing. Windows Server Summit 2019 is just two days away and we already have over 8,500 registered to attend. Thats a record in Windows Server Summit virtual event registrations to date! Register now and tell your friends and colleagues about it because you dont want to miss it. Weve spent hundreds of hours creating never-before-seen Windows Server demos and content that will be delivered to you by our rock star presenters. What do we have in store for you? These demo-rich sessions will be jam-packed with all the latest and greatest in Windows Server of course! That in…

    • 0 replies
    • 1 view
  20. Guest MSRC Team

    Today Microsoft released fixes for a critical Remote Code Execution vulnerability, CVE-2019-0708, in Remote Desktop Services – formerly known as Terminal Services – that affects some older versions of Windows. The Remote Desktop Protocol (RDP) itself is not vulnerable. This vulnerability is pre-authentication and requires no user interaction. In other words, the vulnerability is ‘wormable’, meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017. While we have observed no exploitation of this vulnerability, it is highly likely t…

    • 0 replies
    • 3 views
  21. Guest MSRC Team
    Started by Guest MSRC Team,

    Today, we released security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to turn on automatic updates. More information about this month’s security updates can be found on the Security Update Guide. Continue reading...

    • 0 replies
    • 3 views
  22. Today Microsoft released fixes for a critical Remote Code Execution vulnerability, CVE-2019-0708, in Remote Desktop Services – formerly known as Terminal Services – that affects some older versions of Windows. The Remote Desktop Protocol (RDP) itself is not vulnerable. This vulnerability is pre-authentication and requires no user interaction. In other words, the vulnerability is ‘wormable’, meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017.

  23. Today, we released security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to turn on automatic updates. More information about this month’s security updates can be found on the Security Update Guide.

  24. Guest Microsoft Windows Server Team
    Started by Guest Microsoft Windows Server Team,

    This blog post was authored by Dianna Marks, Product Marketing Manager, Windows Server Marketing. HCI is all the buzz nowadays! What exactly is HCI? Spelled out its hyperconverged infrastructure, also referred to as the software defined data center (SDDC). It allows companies to run their storage, networking, and compute with lowered capital expenditure (CAPEX) and operating expenses (OPEX) since storage and networking are software-defined and dont require the same amount of hardware and level of management. HCI offers centralized management, which is great for many types of environments including development and product workloads. Also, now that there is no storage …

    • 0 replies
    • 1 view
  25. Source: Update Regarding Add-ons in Firefox

    • 0 replies
    • 519 views