• @quinkin
    link
    English
    822 months ago

    Additionally, organizations should approach CrowdStrike updates with caution

    We would if we were able to control their “deployable content”.

    • @[email protected]
      link
      fedilink
      English
      46
      edit-2
      2 months ago

      I read on another thread that an admin was emulating a testing environment by blocking CrowdStrike IPs on their firewall for the whole network before each update, with the exception of a couple machines. It’s stupid that he has to do this but hey, his network was unaffected

    • @[email protected]
      link
      fedilink
      English
      82 months ago

      Serious question, can you not? There isn’t an option to…like…set a review system first?

      • Encrypt-Keeper
        link
        English
        162 months ago

        For antivirus definitions? No, and you wouldn’t want to.

            • @wolfylow
              link
              English
              222 months ago

              Found this post that explains what happened in detail: https://lemmy.ohaa.xyz/post/3522666

              As an application developer (rather than someone who can/does code operating systems) I was just left open-mouthed …

              Looks like they’re delivering “code as content” to get around the rigour of getting an updated driver authorised by MS. I realise they can’t wait too long for driver approval for antivirus releases but surely - surely - you have an ironclad QA process if you’re playing with fire like this.

            • @[email protected]
              link
              fedilink
              English
              22 months ago

              Do you know if the sensor update policy had been set to N-2 would this have avoided the issue?

              • @[email protected]
                link
                fedilink
                English
                72 months ago

                Setting the update policy to N-2 (or any other configuration) would not have avoided the issue. The Falcon sensor itself wasn’t updated, which is what the update policy controls. As it turns out, you cannot control the content channel updates - you simply always get the updates.

              • @quinkin
                link
                English
                22 months ago

                No it would not.

    • @[email protected]
      link
      fedilink
      English
      32 months ago

      We would if we were able to control their “deployable content”.

      Minimum safe distance.