newsletter banner

ISSUE 21.31.F • 2024-07-29 • Text Alerts!Gift Certificates
You’re reading the FREE newsletter

Plus Membership

You’ll immediately gain access to the longer, better version of the newsletter when you make a donation and become a Plus Member. You’ll receive all the articles shown in the table of contents below, plus access to all our premium content for the next 12 months. And you’ll have access to our complete newsletter archive!

Upgrade to Plus membership today and enjoy all the Plus benefits!

In this issue

ON SECURITY: Lessons learned from CrowdStrike

Additional articles in the PLUS issue

MICROSOFT 365: What cheeses me off: Microsoft Office edition

WINDOWS 11: Microsoft PowerToys aren’t just for power users

FREEWARE SPOTLIGHT: DefenderUI — Windows Defender is great, when turned on fully


ADVERTISEMENT
The Nokbox

The Nokbox

Estate Planning & Organization

If something were to happen to you tomorrow, would your next of kin be prepared to manage all of your assets, finances, and wishes?

They will if you have a Nokbox: a Next of Kin box.


www.thenokbox.com


ON SECURITY

Lessons learned from CrowdStrike

Susan Bradley

By Susan Bradley Comment about this article

It’s been over a week since the technology meltdown that impacted airlines, some banks, and even my sister’s Starbucks order through Uber Eats on Friday morning.

Despite the carnage, only a very small segment of computer systems was impacted. In the Official Microsoft Blog, the post Helping our customers through the CrowdStrike outage pointed out that less than one percent of all Windows machines were affected.

So why was this so impactful? More important, what lessons have we learned from this event? Is there anything we can do better next time?

Understanding the nature of the incident is important in this case. Microsoft was not the culprit — this was not a bug or something induced by an update. It was not caused by a black-hat hacker or a dark Web attacker. It appears to be the result of carelessness and poor testing on the part of CrowdStrike.

Nonetheless, it serves as a reminder to all of us that the businesses we rely on are not taking proper steps to secure our technology. Whether an issue is caused by a bug, an attack, or an accident, the end result is the same — our systems can become bricks and leave us confounded as to why.

Consumer actions to counter risks

If you’ve ever had your personal information stolen, you know that one of the credit agencies will offer to provide services to monitor your credit history. I’m not convinced these services work. If you are like me, you probably have had several of these offers sent to you over the course of a year.

One simple thing you can do is use credit cards instead of debit cards. Credit cards have greater protections; you are more likely to get refunds for fraudulent usage faster and more easily. But even with credit cards, I recommend that you review your credit history. Lock the account so that scammers can’t apply for loans or credit cards under your name. (You may also want to consider locking your debit card.)

My sister always insists that she doesn’t have a debit card because she cut it up and never activated it. But there is still a debit card number tied to her bank account. Not having the card in hand can make it more difficult when you visit the bank for whatever reason; for many banks, your debit card is your ID.

The best thing you can do to thwart an attacker is to not respond to lures, texts, emails, and phishing scams. Don’t blindly click links. Don’t blindly open email attachments. Add two-factor authentication to as many Web logins as possible. Never hesitate to get in touch with a bank if you find something that doesn’t feel right — banks are as eager as you to stop fraud as soon as possible.

Just recently, I was informed that my phone calls (but not the details of the calls) and the numbers I’ve texted were shared to a third-party vendor by ATT. Then that vendor was attacked and lost the data. Although there was little I could do about this after the fact, it does emphasize my point about being aware of the types of threats present, especially with those texts.

When the problem is a bug triggered by software, as with the CrowdStrike problem, just be patient and let the company’s technology teams work through the issues to develop a solution. For example, Starbucks and Uber Eats were operational one day later. And keep your eye on your inbox — two days after the CrowdStrike catastrophe, we published one of our special Plus Alerts about the problem, including remediation steps.

Unfortunately, airline travelers were not so lucky. A huge number of flights were canceled, and many passengers were told that it might take days before they could be accommodated. It reminded me of the movie Planes, Trains and Automobiles. The best advice I can offer travelers is to prepare for the unexpected by putting your medications and other necessities in a carry-on, perhaps with a change of underwear. I learned that lesson the hard way when traveling coast-to-coast for technology conferences. Sometimes I missed connection in Denver or Las Vegas, but somehow my luggage made it. Having the basics at hand took the edge off the inconvenience.

Recommendations for businesses in dealing with vendor issues

A key CrowdStrike lesson is that businesses must do more testing of all third-party software used by their organizations. I already recommend delaying installation of Microsoft patches until they can be tested thoroughly. But what about updates to security software, such as CrowdStrike? Can you limit the risk of those updates?

In a word, yes. As an example, consider Microsoft Defender. You can segregate your users into groups. Some will get definition updates as soon as possible, and others will get them later. These Defender updating rings can be controlled with Group policy or with Intune. Other antivirus and security software should offer similar testing-ring options.

Even though CrowdStrike is an endpoint detection solution — meaning it is more than just an antivirus scanner and will react to unusual actions occurring on the operating system — the same rules apply. You need to check with the vendor to review your options. Microsoft has come out with automated boot media documentation to assist in the recovery process. If you are wondering why vendors are allowed to code into the kernel like this and thus trigger a BSOD, Microsoft’s Frank Shaw explains on social media:

A Microsoft spokesman said it cannot legally wall off its operating system in the same way Apple does because of an understanding it reached with the European Commission following a complaint. In 2009, Microsoft agreed it would give makers of security software the same level of access to Windows that Microsoft gets.

Next, identify which resources you were lacking during an incident. Was it people? Was it information? Was it vendor resources? Perform this analysis so you will be prepared the next time this happens. There will be a next time.

An issue that came up during the CrowdStrike incident was the difficulty some had in recovering because BitLocker was enabled. Finding the recover keys was a process that had not been documented. As I noted in the alert:

BitLocker once again rears its head as a potential obstacle to recovery. I’ve discussed this many times before, and the “key” is having a record of all the BitLocker recovery keys for all the systems you manage.

I also mentioned this from X poster @LetheForgot:

What we did was use the advanced restart options to launch the command prompt, skip the bitlocker key ask which then brought us to drive X and ran bcdedit /set {default} safeboot minimal, which let us boot into safemode and delete the sys file causing the bsod. Don’t forget to renable normal booting afterwards by doing the same but running bcdedit /deletevalue {default} safeboot.

BitLocker recommendations for businesses

If you get no other takeaway from this event, take the time to document and understand the impact of drive encryption. Drive encryption protects systems at rest, not systems in use. Thus it will protect that laptop if someone steals it from you — by preventing attackers from reading the data. But if you are using that laptop, encryption will not stop attackers from phishing your users, obtaining passwords, and gaining entry. Think of BitLocker as a check box on an insurance form, not an actual protection. Thus when booting issues occur and BitLocker asks you for a recovery key, you must have a process to recover that key, then get it into the hands of users or IT staff that need it. You must replace that BitLocker key you just handed out with a new one. Don’t forget that last step.

You may have implemented BitLocker, but did you consider that someday you might need to change those keys? If you use tools such as Intune, you can use policies to enable rotation. If you’ve just sent an email or a text to someone — one that included information about how to get into that drive offline and possibly also shared local administrator usernames and passwords — so be sure you’ve rotated that information to be secure again.

BitLocker recommendations for consumers

For consumers, my advice is simpler. Ask yourself whether you need the stress of finding a BitLocker recovery key, especially in an unexpected event. We already know that Windows will often ask for a recovery key after installing patches that impact secure boot patches. CVE-2024-26184 and CVE-2024-28899 are included in the July updates. On some machines, they triggered the request for a BitLocker recovery key.

You must consider whether you really need drive encryption. Home computers are protected by a yappy dog or protective cat, so the risk that someone will gain physical access to your computer in order to steal it is probably low. But human nature sometimes gets in the way of best intentions. If you use drive encryption and then forget where you’ve stored the recovery key, your risk is higher.

To turn off BitLocker or drive encryption in the GUI, follow the steps in this AskWoody KB article. To turn off BitLocker or drive encryption via command line, follow the steps in this AskWoody KB article.

We even have a script to verify BitLocker’s status. Once BitLocker or drive encryption has been disabled, I have not seen it re-enabled with an update. However, Microsoft will be enabling drive encryption by default in 24H2 and later. Be aware.

I’m all for ensuring that things are secure. But I once had to scramble to find recovery keys on an important server in the office, and the key wasn’t where I thought it was. I found it. But if I hadn’t, I would have been up late, rebuilding that computer or restoring it from a backup. (You do have a backup, right?)

Even though my dad wanted BitLocker on his home computer, which contains sensitive information, because he is often away from the house. We know the risks and thus have backups of the recovery key. I just don’t recommend BitLocker or other drive encryption unless you are positive you know the risks, know where the recovery key is, and know the recovery key process.

Microsoft is being reckless by pushing BitLocker so hard for consumer machines, yet not making users more aware of the risks. Use it when and where appropriate. It is not always appropriate. Can you tell I’m on my soapbox?

Better security shouldn’t lock you out of your own device.

Talk Bubbles Post comment button Contribute your thoughts
in this article’s forum!

Susan Bradley is the publisher of the AskWoody newsletters.


ADVERTISEMENT
NameCheap


Here are the other stories in this week’s Plus Newsletter

MICROSOFT 365

Peter Deegan

What cheeses me off: Microsoft Office edition

By Peter Deegan

Having endured and written about Microsoft Office for more than two decades, I offer my list of annoyances and timewasters in Microsoft Office, especially Word.

I came up with my top ten annoyances without breaking a sweat. Some are deliberate choices made by Microsoft to advance its own agenda or save money. Others have appeared over time as Microsoft has ignored the changing reality for its customers.

ONENOTE

Author

Microsoft PowerToys aren’t just for power users

By Mary Branscombe

Microsoft keeps adding useful tools to the free PowerToys set and improving what’s already there.

Back in the Windows 95 days, system tweaking and cleaning utilities were so common — and so likely to change system settings that stopped Windows features from working properly — that the Windows shell and kernel teams came out with their own tools, known as PowerToys.

These were refreshed for Windows XP. A few other Microsoft teams joined in. Engineers on the OneNote development team created multiple power toys, including one that eventually became the Onetastic add-on.

There were so many changes in Windows Vista and Windows 7 that many PowerToys stopped working. Microsoft didn’t update them. And some just turned into Windows features. It wasn’t until 2019 that PowerToys returned for Windows 10, and with a slightly different approach.

FREEWARE SPOTLIGHT

Deanna McElveen

DefenderUI — Windows Defender is great, when turned on fully

By Deanna McElveen

Microsoft’s first attempt at antivirus software was Microsoft Security Essentials (MSE), released in 2009 to Windows XP and later to Windows Vista and Windows 7.

Then it was replaced by Windows Defender.

MSE was not great. It updated just three times a day. Although its 2009 certification from AV-TEST was a big win for Microsoft, the certification was lost in 2012. That’s probably because it tagged Google Chrome as a virus in 2011, a memorable day at our computer shop. To make things even worse, in 2013 it received the lowest score possible for an antivirus product. It wasn’t until 2018 that MSE was able to win a top score, with an 80% detection rate from AV-TEST.


Know anyone who would benefit from this information? Please share!
Forward the email and encourage them to sign up via the online form — our public newsletter is free!


Enjoying the newsletter?

Become a PLUS member and get it all!

Plus membership

Don’t miss any of our great content about Windows, Microsoft, Office, 365, PCs, hardware, software, privacy, security, safety, useful and safe freeware, important news, analysis, and Susan Bradley’s popular and sought-after patch advice.

PLUS, these exclusive benefits:

  • Every article, delivered to your inbox
  • Four bonus issues per year, with original content
  • MS-DEFCON Alerts, delivered to your inbox
  • MS-DEFCON Alerts available via TEXT message
  • Special Plus Alerts, delivered to your inbox
  • Access to the complete archive of nearly two decades of newsletters
  • Identification as a Plus member in our popular forums
  • No ads

We’re supported by donations — choose any amount of $6 or more for a one-year membership.

Join Today buttonGift Certificate button

The AskWoody Newsletters are published by AskWoody Tech LLC, Fresno, CA USA.

Your subscription:

Microsoft and Windows are registered trademarks of Microsoft Corporation. AskWoody, AskWoody.com, Windows Secrets Newsletter, WindowsSecrets.com, WinFind, Windows Gizmos, Security Baseline, Perimeter Scan, Wacky Web Week, the Windows Secrets Logo Design (W, S or road, and Star), and the slogan Everything Microsoft Forgot to Mention all are trademarks and service marks of AskWoody Tech LLC. All other marks are the trademarks or service marks of their respective owners.

Copyright ©2024 AskWoody Tech LLC. All rights reserved.