Defender for Identity detects PrintNightmare vulnerability, reducing risk for Print Spooler
According to Daniel Naim, Microsoft program manager, Defender for Identity can now detect exploits of the Print Spooler service using the PrintNightmare vulnerability (CVE-2,021-34.527) and help prevent attacks inside the networks of Microsoft servers. organization.
If successfully exploited, this critical vulnerability grants Domain Administrator elevated privileges, steals domain credentials, and distributes malware as a Domain Administrator via RCE, with SYSTEM privileges. This allows an attacker to take over the affected servers.
Microsoft Defender for Identity (formerly known as Azure Advanced Threat Protection or Azure ATP) is a cloud-based security solution that uses on-premises Active Directory signals.
This enables SecOps security operations teams to detect and investigate compromised identities, advanced threats, and malicious insider activity targeting registered organizations.
You need to subscribe to the Microsoft 365 E5 plan to use Defender for Identity. But if you haven't signed up yet, you can get a trial of Security E5 now to power this new feature.
Last week, Microsoft clarified the PrintNightmare patch guide and shared the steps needed to patch the critical vulnerability correctly after some security researchers discovered the patch could still be "barred". .
CISA also requires federal agencies to mitigate the actively exploited PrintNightmare vulnerability on their networks.
Defender for Identity was updated in November to detect the Zerologon exploit as part of on-premises attacks targeting this critical vulnerability.
Microsoft will roll out another update later this month that will allow SecOps to thwart attack attempts by locking down compromised users' Active Directory accounts.
You should read it
- Steps to fix PrintNightmare vulnerability on Windows 10
- What is 'Spooler SubSystem App' and why run on the computer?
- How to fix Print Spooler Error on the printer
- How to restart the Print Spooler service on Windows
- Fix Printer Spooler error code 0x800706b9 on Windows 10
- Discover more ways to attack the printing system in Windows
- Fix the spooler print service service not running on Windows 10, 8.1, 7
- 'Printer Catastrophe' Vulnerability Threatens All Versions of Windows
May be interested
- HelloKitty Ransomware Using Linux Variant Attacks VMware ESXi Serverthe hellokitty ransomware uses a linux variant that targets vmware's esxi virtual machine platform for maximum damage.
- Beware of BIOPASS malware hidden in Chinese online gambling sitescybersecurity researchers are warning of a new malware - biopass rat - attacking online gambling companies in china.
- Warning of dangerous vulnerabilities on WinRAR, users should uninstall or upgrade to a new versionrarlab, the developer of winrar, has just released an urgent update to patch a dangerous vulnerability in their software.
- Warning: The number of malware designed to target the M1 chipset is increasing rapidly, making it harder to detectthe success of the macbook m1 became a favorite technology product, and this also attracted the attention of hackers.
- Kaseya suffered a ransomware attack, affecting a series of other technology companiesa ransomware attack against the international information technology company kaseya appears to have infected hundreds of small businesses involved.
- 'Printer Catastrophe' Vulnerability Threatens All Versions of Windowsalthough microsoft releases patches for windows vulnerabilities on a monthly basis, there are still security issues that remain. recently, the us cybersecurity and infrastructure agency (cisa) reported a critical vulnerability in the windows print spooler system.