Microsoft will meet with CrowdStrike and other security companies at its campus in Redmond, Washington, on Sept. 10 to discuss how to prevent similar issues in the future, a Microsoft executive told CNBC in an interview. The person requested anonymity because they didn’t have approval to discuss internal matters publicly.
The executive said participants at the Windows Endpoint Security Ecosystem Summit will explore the possibility of having applications rely more on a part of Windows called user mode instead of the more privileged kernel mode.
Software from CrowdStrike Check PointMicrosoft will meet with CrowdStrike and other security companies at its campus in Redmond, Washington, on Sept. 10 to discuss how to prevent similar issues in the future, a Microsoft executive told CNBC in an interview. The person requested anonymity because they didn’t have approval to discuss internal matters publicly.
The executive said participants at the Windows Endpoint Security Ecosystem Summit will explore the possibility of having applications rely more on a part of Windows called user mode instead of the more privileged kernel mode.
Software from CrowdStrike Check Point, SentinelOne
and others in the endpoint-protection market currently depend on kernel mode. Such access helps SentinelOne “monitor and stop bad behavior and prevent malware from turning off security software,” a spokesperson said.
Applications in user mode are isolated, meaning that if one crashes, it won’t bring down others. But an application in kernel mode that fails can cause all of Windows to crash. On July 19, CrowdStrike released a buggy content configuration update for its Falcon sensor for Windows computers, with the intent to gather data on new attacks, prompting crashes at the operating system level. IT administrators rebooted PCs that received the update displaying a “blue screen of death” screen, one by one.
The Microsoft executive said removing kernel access in Windows would only solve a small percentage of potential problems.
Apple in recent years has limited kernel access in macOS and the company discourages developers from using kernel extensions.
Attendees at Microsoft’s Sept. 10 event will also discuss the adoption of eBPF technology, which checks if programs will run without triggering system crashes, and memory-safe programming languages such as Rust, the executive said.
Last year Microsoft donated $1 million to the nonprofit Rust Foundation, which pays stipends to people working on the language.
Microsoft competes with CrowdStrike with its Defender for Endpoint product. That team will attend like any other cybersecurity company and won’t receive preferential treatment, the executive said.
“We will share further updates on these conversations following the event,” Microsoft Corporate Vice President Aidan Marcuss wrote in a blog post.
Comments
Post a Comment