{"id":18867,"date":"2021-07-23T16:01:29","date_gmt":"2021-07-23T16:01:29","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=18867"},"modified":"2021-07-23T17:21:45","modified_gmt":"2021-07-23T17:21:45","slug":"microsoft-security-under-scrutiny-after-recent-incidents","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/","title":{"rendered":"Microsoft Security Under Scrutiny After Recent Incidents"},"content":{"rendered":"<p>Microsoft is struggling through a rough July for security issues even as the company continues to add more cybersecurity capabilities through acquisitions.<\/p>\n<p>The software giant earlier this month issued an emergency update in Windows after researchers at cybersecurity vendor Sangfor published a blog about a security flaw dubbed \u201cPrintNightmare.\u201d Sangfor had published the exploit code, which could help bad actors understand how to use it to break into systems running all versions of the operating system.<\/p>\n<p>That problem was followed later in the month by another vulnerability in the Windows Print Spooler service in Windows, this one that could allow for local privilege execution at the SYSTEM level. Microsoft issued a workaround for this issue while it developed a patch. The service essentially is the go-between for Windows and printers.<\/p>\n<p>Most recently, another escalation privilege bug affecting Windows 10, called SeriousSAM and impacting the Security Accounts Manager (SAM) database in all versions of Windows 10, could enable attackers to reach the SYSTEM level to data on a system and create accounts. Another workaround was suggested by the company.<\/p>\n<p>And Microsoft Exchange vulnerabilities were at the center of <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2021\/07\/19\/the-united-states-joined-by-allies-and-partners-attributes-malicious-cyber-activity-and-irresponsible-state-behavior-to-the-peoples-republic-of-china\/\" target=\"_blank\" rel=\"noopener\">U.S. hacking allegations against China<\/a>.<\/p>\n<h2>Microsoft and Security<\/h2>\n<p>The bad luck streak harkens back to the days a decade or more ago when Microsoft was seen as a company that was more concerned with the features it could add to its dominant operating systems than with the security of the OS. But that would be an unfair assessment, according to Chris Gonsalves, vice president of research at Channelnomics, adding that Microsoft is better at security now than at any other point in its history.<\/p>\n<p>Gonsalves noted that Microsoft\u2019s actions around both the Print Spooler and SeriousSAM vulnerabilities have been good, both in the company\u2019s mitigation responses and its interactions with the researchers in the industry.<\/p>\n<p>\u201cIf you get hit with three things in a month, it&#8217;s kind of kismet,\u201d he told <em>eSecurity Planet<\/em>. \u201cIt is a critical mass of those things and it seems overwhelming. It seems like things are really bad. The other part of it is a lot of people are banging around the edges of Microsoft right now because Windows 11 is on the horizon. At least in a couple of cases here, these research programs began as folks looking at beta code for Windows 11 and discovering things that ultimately retrograded back to Windows 10. But they were essentially looking for things in Windows 11 and that activity on the cusp of what&#8217;s going to be a very high-profile rollout of the most popular operating system on the planet is also a part of this.&#8221;<\/p>\n<p>One piece of evidence that Microsoft is taking security seriously is how well its free Defender software has performed in <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-protection-tests-endpoint-security\/\">MITRE ATT&amp;CK testing<\/a>, which measures the effectiveness of <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">endpoint security products<\/a> against aggressive threat actors.<\/p>\n<h2>Security Buying Spree<\/h2>\n<p>At the same time that its security is under renewed scrutiny, Microsoft has made several acquisitions in recent months to bulk up its security capabilities, including in the cloud, where it is the second-largest public cloud provider with Azure, behind Amazon Web Services (AWS). The company this week announced the acquisition of CloudKnox Security, a player in the cloud infrastructure entitlement management (CIEM) space that brings with it a platform to help monitor and manage identities and resources in multicloud and hybrid cloud environments.<\/p>\n<p>That news came less than two weeks after Microsoft unveiled its acquisition of startup RiskIQ and its <a href=\"https:\/\/www.esecurityplanet.com\/products\/threat-intelligence-platforms\/\">threat intelligence<\/a> services for more than $500 million, and three weeks after announcing it was buying ReFirm Labs to strengthen its <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/iot-device-risk-to-enterprises\/\">Internet of Things (IoT) security<\/a> capabilities.<\/p>\n<p>\u201cOur acquisition of CloudKnox, like our recent acquisition announcements on RiskIQ and ReFirm Labs, shows our focus and execution in acquiring, integrating and expanding the strongest defenses for our customers \u2013 from chip to cloud \u2013 backed by more than 3,500 defenders at Microsoft and the more than 8 trillion security signals we process every day,\u201d Joy Chik, corporate vice president of Microsoft Identity, wrote in a <a href=\"https:\/\/blogs.microsoft.com\/blog\/2021\/07\/21\/microsoft-acquires-cloudknox-security-to-offer-unified-privileged-access-and-cloud-entitlement-management\/\" target=\"_blank\" rel=\"noopener\">blog post<\/a>.<\/p>\n<h2>The Flaws in Windows<\/h2>\n<p>With the SeriousSAM flaw \u2013 CVE-2021-36934 \u2013 the SAM feature in Windows is designed to hold user accounts, credentials and domain information. An attacker would need remote or local access to a Windows 10 system, but once in, could access the SAM database. They then could take the hashed credentials offline, decrypt them and use them to get by the OS user access controls.<\/p>\n<p>In an <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36934\" target=\"_blank\" rel=\"noopener\">advisory<\/a>, Microsoft said that the \u201celevation of privilege vulnerability exists because of overly permissive Access Control Lists (ACLs) on multiple system files, including the Security Accounts Manager (SAM) database. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\u201d<\/p>\n<p>Like SeriousSAM, the Print Spooler vulnerability found mid-month (CVE-2021-34481) also allows for local privilege escalation. According to a Microsoft <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34481\" target=\"_blank\" rel=\"noopener\">advisory<\/a>, this flaw \u201cexists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\u201d<\/p>\n<p>To leverage the flaw, the bad actor would need to be able to execute code on a compromised system. As a workaround, the vendor recommended stopping and disabling the Print Spooler service.<\/p>\n<p>PrintNightmare is a remote code execution vulnerability \u2013 <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34527\" target=\"_blank\" rel=\"noopener\">CVE-2021-34527<\/a> \u2013 also within the Windows Print Spooler service. It caught the attention of U.S. agencies like the Cybersecurity and Infrastructure Security Agency (CISA) and CERT Coordination Center, which highly recommended agencies disable the service.<\/p>\n<p>The vulnerability enables an authenticated user to get system-level access on compromised systems and to Active Directory administrative servers and domain controllers. Through this access, cybercriminals can insert <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> and run arbitrary code, allowing them to create new user accounts or change, view or delete data. Microsoft delivered a patch for the vulnerability.<\/p>\n<h2>User Experience at Issue<\/h2>\n<p>Channelnomics\u2019 Gonsalves said the flaws are serious but it\u2019s doubtful that there will be a rush among bad actors to take advantage of them, at least in the short term.<\/p>\n<p>\u201cThere are exploits in the wild now, but these are the products of what you would expect to see from a robust research community banging away at stuff and dutifully notifying,\u201d he said. \u201cWe hear more about this than the hoi-polloi of cybercriminals, who continue to leverage things that are older than you and me.\u201d<\/p>\n<p>Some of these vulnerabilities were the result of Microsoft trying to improve the user experience in Windows.<\/p>\n<p>\u201cPart of the issue with something like PrintSpooler is that it was not a great program,\u201d Gonsalves said. \u201cThe same with SeriousSAM. Fundamental errors were made and if you take apart the motivations for those programming errors, it was really an effort to make things easier for users.\u201d<\/p>\n<p>With Print Spooler, \u201cyou want somebody who doesn&#8217;t have admin rights to at least be able to choose a printer and install a printer driver to get their work done,\u201d he said. \u201cWhat you didn&#8217;t think through is that if you do that and [an attacker is] able to copy the envelope where the drivers live and spoof the drivers and run other kinds of unauthorized code, you have a privilege escalation problem on your hands. They didn&#8217;t think that through. So it&#8217;s not great programing, but they were trying to make life easier for the users.&#8221;<\/p>\n\n\n<div id=\"ta-campaign-widget-66d6ee9f71e0a-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ee9f71e0a\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ee9f71e0a\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ee9f71e0a\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ee9f71e0a\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ee9f71e0a\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ee9f71e0a\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft is struggling through a rough July for security issues even as the company continues to add more cybersecurity capabilities through acquisitions. The software giant earlier this month issued an emergency update in Windows after researchers at cybersecurity vendor Sangfor published a blog about a security flaw dubbed \u201cPrintNightmare.\u201d Sangfor had published the exploit code, [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":18834,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[19],"tags":[532,31077],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[378],"class_list":["post-18867","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-endpoint","tag-microsoft","tag-windows-security","b2b_audience-awareness-and-consideration","b2b_product-endpoint-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsoft Security Under Scrutiny After Recent Incidents | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Microsoft has had a rough month for security issues even as it works to improve. Here are the flaws - and how to fix them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Security Under Scrutiny After Recent Incidents | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Microsoft has had a rough month for security issues even as it works to improve. Here are the flaws - and how to fix them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-23T16:01:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-23T17:21:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/ESP.Microsoft-e1627055971278.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"Microsoft Security Under Scrutiny After Recent Incidents\",\"datePublished\":\"2021-07-23T16:01:29+00:00\",\"dateModified\":\"2021-07-23T17:21:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/\"},\"wordCount\":1256,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/ESP.Microsoft-e1627055971278.png\",\"keywords\":[\"Microsoft\",\"Windows security\"],\"articleSection\":[\"Endpoint\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/\",\"name\":\"Microsoft Security Under Scrutiny After Recent Incidents | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/ESP.Microsoft-e1627055971278.png\",\"datePublished\":\"2021-07-23T16:01:29+00:00\",\"dateModified\":\"2021-07-23T17:21:45+00:00\",\"description\":\"Microsoft has had a rough month for security issues even as it works to improve. Here are the flaws - and how to fix them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/ESP.Microsoft-e1627055971278.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/ESP.Microsoft-e1627055971278.png\",\"width\":1200,\"height\":600,\"caption\":\"microsoft security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Security Under Scrutiny After Recent Incidents\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Security Under Scrutiny After Recent Incidents | eSecurity Planet","description":"Microsoft has had a rough month for security issues even as it works to improve. Here are the flaws - and how to fix them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Security Under Scrutiny After Recent Incidents | eSecurity Planet","og_description":"Microsoft has had a rough month for security issues even as it works to improve. Here are the flaws - and how to fix them.","og_url":"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/","og_site_name":"eSecurity Planet","article_published_time":"2021-07-23T16:01:29+00:00","article_modified_time":"2021-07-23T17:21:45+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/ESP.Microsoft-e1627055971278.png","type":"image\/png"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"Microsoft Security Under Scrutiny After Recent Incidents","datePublished":"2021-07-23T16:01:29+00:00","dateModified":"2021-07-23T17:21:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/"},"wordCount":1256,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/ESP.Microsoft-e1627055971278.png","keywords":["Microsoft","Windows security"],"articleSection":["Endpoint"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/","url":"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/","name":"Microsoft Security Under Scrutiny After Recent Incidents | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/ESP.Microsoft-e1627055971278.png","datePublished":"2021-07-23T16:01:29+00:00","dateModified":"2021-07-23T17:21:45+00:00","description":"Microsoft has had a rough month for security issues even as it works to improve. Here are the flaws - and how to fix them.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/ESP.Microsoft-e1627055971278.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/ESP.Microsoft-e1627055971278.png","width":1200,"height":600,"caption":"microsoft security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Microsoft Security Under Scrutiny After Recent Incidents"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18867"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=18867"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18867\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/18834"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=18867"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=18867"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=18867"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=18867"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=18867"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=18867"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}