{"id":2037060,"date":"2024-11-20T12:03:14","date_gmt":"2024-11-20T17:03:14","guid":{"rendered":"https:\/\/securityboulevard.com\/?p=2037060"},"modified":"2024-11-21T11:58:18","modified_gmt":"2024-11-21T16:58:18","slug":"microsoft-ignite-2024-security-crowdstrike-richixbw","status":"publish","type":"post","link":"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/","title":{"rendered":"Microsoft Veeps Ignite Fire Under CrowdStrike"},"content":{"rendered":"<h5 style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/david-weston-microsoft-security-richixbw-130x90.png\" alt=\"David \u201cdwizzzle\u201d Weston\" width=\"130\" height=\"90\" \/><strong>Redmond business leaders line up to say what\u2019s new in Windows\u202f\u202fsecurity.<\/strong><\/h5>\n<p><strong>Microsoft vice presidents David \u201cdwizzzle\u201d Weston (pictured) and Pavan Davuluri (errm, not)<\/strong> are among the anointed ones making noise this week. They\u2019re telling all\u2014about preventing a repeat of July\u2019s CrowdStrike d\u00e9b\u00e2cle.<br \/>\n<!--br--><br \/>\n<strong>Microsoft Ignite 2024 is their nexus of (ahem) \u201clearnings.\u201d<\/strong>\u00a0In today\u2019s <a href=\"https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/\" target=\"_blank\" rel=\"noopener\">SB\u202f\u202fBlogwatch<\/a>, we hunker down in the windy city.<!--more--><br \/>\n<!--br--><br \/>\n<a title=\"Richi Jennings\" href=\"https:\/\/www.richi.uk\/\" target=\"_blank\" rel=\"noopener\">Your humble blog\u00adwatcher<\/a> curated these bloggy bits for your enter\u00adtain\u00adment. Not to mention:\u202f\u202fROS\u00c9&amp;Mars\u00ad<em>x<\/em>\u00adJ\u00ad<em>x<\/em>\u00adGrande\u00ad<em>x<\/em>\u00adMinaj.<br \/>\n<!--br--><\/p>\n<h2>BSODs Begone!<\/h2>\n<p id=\"sbbw1\"><strong>What\u2019s the craic?<\/strong> Kyle Wiggers reports: <a title=\"read the full text\" href=\"https:\/\/techcrunch.com\/2024\/11\/19\/microsoft-beefs-up-windows-security\/\" target=\"_blank\" rel=\"nofollow ugc noopener\">Microsoft beefs up Windows security with new recovery and patching features<\/a><\/p>\n<p style=\"padding-left: 40px;\"><strong>\u201c<tt>Under intense scrutiny<\/tt>\u201d<\/strong><br \/>\nIn the aftermath of the devastating CrowdStrike outage this July, Microsoft vowed to do better even though it insisted that the event was an aberration. \u2026 During Microsoft Ignite 2024, [it] shared how it\u2019s making changes to Windows to prevent similar incidents.<br \/>\n\u2026<br \/>\n<i>Quick Machine Recovery<\/i> will allow IT admins to remotely make certain software fixes even when Windows machines aren\u2019t able to boot. Microsoft says it\u2019s also testing a way to let security products like antivirus software run outside of \u201ckernel mode:\u201d\u202f\u2026\u202fsched\u00aduled to launch in private preview in July 2025, [it] addresses the root cause of <a title=\"Global Outage Outrage: CrowdStrike Security Tool Blamed\" href=\"https:\/\/securityboulevard.com\/2024\/07\/crowdstrike-azure-outage-bsod-richixbw\/\" target=\"_blank\" rel=\"noopener\">the CrowdStrike outage<\/a>.<br \/>\n\u2026<br \/>\nMicrosoft is\u202f\u2026\u202funder intense scrutiny over its handling of the CrowdStrike incident. \u2026 CEO Satya Nadella has claimed that security is now Microsoft\u2019s top priority. The equivalent of 34,000 full-time engineers are revamping the company\u2019s cybersecurity practices, the company said, and every employee is now being judged on their security contributions.<br \/>\n<!-----------------------------------------------------------------------------><\/p>\n<p id=\"sbbw2\"><strong>More detail, please?<\/strong> Sergiu Gatlan obliges: <a title=\"read the full text\" href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/windows-quick-machine-recovery-lets-admins-remotely-fix-unbootable-devices\/\" target=\"_blank\" rel=\"nofollow ugc noopener\">New Windows 11 recovery tool to let admins remotely fix unbootable devices<\/a><\/p>\n<p style=\"padding-left: 40px;\"><strong>\u201c<tt>Negative impact<\/tt>\u201d<\/strong><br \/>\n&#8220;Quick Machine Recovery&#8221;\u202f\u2026\u202fdoesn&#8217;t require hands-on access to fix Windows boot issues. [It] is part of a new Windows Resiliency Initiative launched in response to a widespread July 2024 outage caused by a buggy CrowdStrike Falcon update that rendered hundreds of thousands of Windows devices unbootable, impacting airlines, hospitals, and emergency services worldwide. Those affected said their Windows hosts got stuck in a boot loop or showed the Blue Screen of Death (BSOD)<br \/>\n\u2026<br \/>\nThe company is also working with security vendors as part of the Microsoft Virus Initiative (MVI) to add new Windows features and tools that will allow security software to run outside the Windows kernel to avoid incidents like [that]. \u2026 Kernel-level access increases the risk that a buggy driver or update could cause a device to crash and no longer boot. \u2026 Security vendors and Microsoft will adopt Safe Deployment Practices that will require all security product updates to be gradual, leverage <a title=\"CrowdStrike Admits it Doesn\u2019t \u2018Canary\u2019 Test all Updates\" href=\"https:\/\/securityboulevard.com\/2024\/07\/crowdstrike-pir-canary-bsod-richixbw\/\" target=\"_blank\" rel=\"noopener\">deployment rings<\/a>, and be monitored to ensure minimal negative impact.<br \/>\n<!-----------------------------------------------------------------------------><\/p>\n<p id=\"sbbw3\"><strong>Context?<\/strong> Ed Bott got it: <a title=\"read the full text\" href=\"https:\/\/www.zdnet.com\/article\/microsoft-to-tighten-windows-security-dramatically-in-2025-heres-how\/\" target=\"_blank\" rel=\"nofollow ugc noopener\">Microsoft to tighten Windows security dramatically<\/a><\/p>\n<p style=\"padding-left: 40px;\"><strong>\u201c<tt>Likely to be months or years<\/tt>\u201d<\/strong><br \/>\nLast summer&#8217;s CrowdStrike meltdown caused billions of dollars in damage and exposed some fundamental architectural flaws in the Windows platform. A single flawed update from one vendor was enough to crash millions of PCs and serv\u00aders. [The] Quick Machine Recov\u00adery\u202f\u2026\u202ffeat\u00adure leverages the Windows Recovery Environment and can be used to install fixes from Microsoft or from third parties.<br \/>\n\u2026<br \/>\n[But] the biggest change of all will allow developers to build security products that can operate in user mode instead of requiring kernel mode. The company says it will share a private preview with its partners in the security endpoint community in July 2025. Given the fundamental nature of that change, it&#8217;s likely to be months or years before security products leveraging those changes are widely available.<br \/>\n<!-----------------------------------------------------------------------------><\/p>\n<p id=\"sbbw4\"><strong>Horse\u2019s mouth?<\/strong> Microsoft\u2019s <a title=\"read the full text\" href=\"https:\/\/blogs.windows.com\/windowsexperience\/2024\/11\/19\/windows-security-and-resiliency-protecting-your-business\/\" target=\"_blank\" rel=\"nofollow ugc noopener\">David \u201cdwizzzle\u201d Weston<\/a> clearly did not write this without PR help:<\/p>\n<p style=\"padding-left: 40px;\">At Ignite 2024, we will highlight new Windows security innovations. \u2026 Our first step is born out of the learnings from the July inci\u00addent:\u202f\u2026\u202fQuick Machine Recov\u00adery\u202f\u2026\u202fwill enable IT administrators to execute targeted fixes from Windows Update on PCs, even when machines are unable to boot, without needing physical access to the PC. [It] will be available to the Windows Insider Program community in early 2025.<br \/>\n\u2026<br \/>\nAnd\u202f\u2026\u202fwe are adopting safer programming languages, gradually moving functionality <a title=\"Rust in Windows \u2014 it\u2019s Official \u2014 Safe and Fast\" href=\"https:\/\/securityboulevard.com\/2023\/04\/rust-microsoft-windows-richixbw\/\" target=\"_blank\" rel=\"noopener\">from C++ implementation to Rust<\/a>. \u2026 Security is a pursuit, and not a destination.<br \/>\n<!-----------------------------------------------------------------------------><\/p>\n<p id=\"sbbw5\"><strong>Are you feeling some d\u00e9j\u00e0 vu?<\/strong> <a title=\"read the full text\" href=\"https:\/\/www.axios.com\/2024\/11\/19\/microsoft-ignite-windows-resiliency-initiative\" target=\"_blank\" rel=\"nofollow ugc noopener\">Sam Sabin<\/a> is, too:<\/p>\n<p style=\"padding-left: 40px;\">Yes, but, some of these product updates were in the works <i>before<\/i> the CrowdStrike outage. \u2026 &#8220;For sure, there are learnings for us from the incident in July,&#8221;\u202f\u2026\u202fPavan Davuluri, corporate vice president of Windows and devices\u202f\u2026\u202fsaid, but he noted that much of this work also started when the company began building Windows 11.<br \/>\n<!-----------------------------------------------------------------------------><\/p>\n<p id=\"sbbw8\"><strong>I\u2019m thinking even earlier than that.<\/strong> <a title=\"read the full text\" href=\"https:\/\/www.reddit.com\/r\/microsoft\/comments\/1gv0uo1\/microsofts_new_windows_resiliency_initiative_aims\/ly2qa8u\/\" target=\"_blank\" rel=\"nofollow ugc noopener\">u\/goretsky<\/a> wrangles the Wayback machine:<\/p>\n<p style=\"padding-left: 40px;\">[In 2006] Microsoft announced to dozens of its antivirus partners\u202f\u2026\u202fthat they would be implementing kernel patch protection\u202f\u2026\u202fto improve the security of that operating system&#8217;s kernel. \u2026 Some of the partners\u202f\u2026\u202fwere upset enough about it to unleash their PR departments.<br \/>\n\u2026<br \/>\nMicrosoft had been dealing with the European Commission\u202f\u2026\u202fand one of the remedies that Microsoft itself proposed to the EC was that its partners have the same level of access to APIs that the company did, which was accepted. \u2026 To sum things up, Microsoft went ahead with its PatchGuard plans, rootkits became rarer over time, and the world did not end for AV vendors.<br \/>\n<!-----------------------------------------------------------------------------><\/p>\n<p id=\"sbbw7\"><strong>Does anyone believe this \u201c34K FTE\u201d claim?<\/strong> <a title=\"read the full text\" href=\"https:\/\/it.slashdot.org\/comments.pl?sid=23525493&amp;cid=64958391\" target=\"_blank\" rel=\"nofollow ugc noopener\">gillbates<\/a> eyerolls furiously:<\/p>\n<p style=\"padding-left: 40px;\">Can&#8217;t see the stars through the clouds. \u2026 If that&#8217;s the metric you&#8217;re using to gauge security success, you are almost certainly doing it wrong. If you can employ that many engineers on security matters, it means that you aren&#8217;t managing your attack surface properly.<br \/>\n\u2026<br \/>\nIn spite of them trying\u202f\u2026\u202fto <i>bolt on<\/i> security, [Microsoft] continue to be plagued by rather embarrassing and high profile security incidents. \u2026 The core issue is that Microsoft is not, and never has been, a secure OS vendor.\u2026 Articles like these are meant to convince Windows users that they need not switch to a secure platform.<br \/>\n\u2026<br \/>\nMicrosoft culture asks, &#8220;Why not?&#8221; \u2014 rather than, &#8220;What could possibly go wrong?!&#8221;<br \/>\n<!-----------------------------------------------------------------------------><\/p>\n<p id=\"sbbw9\"><strong>And what about these proposed Safe Deployment Practices?<\/strong> Here\u2019s <a title=\"read the full text\" href=\"https:\/\/www.theverge.com\/2024\/11\/19\/24299873\/microsoft-windows-resiliency-initiative-crowdstrike-incident?commentID=28efef18-9da5-4cbe-b2cb-af6ee1e5e87c\" target=\"_blank\" rel=\"nofollow ugc noopener\">RVS053063<\/a>\u2019s own ocular circulation:<\/p>\n<p style=\"padding-left: 40px;\">So basically, IT 101 best practices. It&#8217;s amazing that has to be spelled out for CrowdStrike.<br \/>\n<!-----------------------------------------------------------------------------><\/p>\n<p id=\"sbbw10\"><strong>Still\u2014good news, yeah?<\/strong> <a title=\"read the full text\" href=\"https:\/\/www.reddit.com\/r\/technews\/comments\/1gvlidb\/microsofts_new_windows_resiliency_initiative_aims\/ly31acn\/\" target=\"_blank\" rel=\"nofollow ugc noopener\">u\/crappydeli<\/a> sums up the announcements:<\/p>\n<p style=\"padding-left: 40px;\">The OS is turning 40. Let\u2019s focus on stability this week.<br \/>\n<!-----------------------------------------------------------------------------><\/p>\n<p id=\"sbbw6\"><strong>Meanwhile,<\/strong> <a title=\"read the full text\" href=\"https:\/\/it.slashdot.org\/comments.pl?sid=23525493&amp;cid=64958491\" target=\"_blank\" rel=\"nofollow ugc noopener\">gweihir<\/a> sounds <i>slightly<\/i> cynical:<\/p>\n<p style=\"padding-left: 40px;\">&#8220;Sweeping Changes&#8221; you say? So the situation before was utter ****? Don&#8217;t answer that\u2014we know it was. \u2026 Microsoft does not do good engineering.<br \/>\n<!-----------------------------------------------------------------------------><\/p>\n<h4 id=\"sbbwaf\">And Finally:<\/h4>\n<p><b><a title=\"And Finally\" href=\"https:\/\/www.youtube.com\/watch?v=hFUVScYIlWY&amp;list=PL9zSC5i495YMjIuJjxToNGU8Ve7Gd5Rvj\" target=\"_blank\" rel=\"noopener\">How does this only have 700 views?<\/a><\/b><script async defer src=\"https:\/\/scripts.withcabin.com\/hello.js\"><\/script><!-- zero-cookie analytics privacy: https:\/\/withcabin.com\/privacy\/securityboulevard.com --><\/p>\n<div class=\"jetpack-video-wrapper\">\n<div class=\"fitvids-video\"><iframe loading=\"lazy\" title=\"APT. X BANG BANG | ROS\u00c9, Bruno Mars, Jessie J, Ariana Grande, Nicki Minaj (Mashup)\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/hFUVScYIlWY?list=PL9zSC5i495YMjIuJjxToNGU8Ve7Gd5Rvj\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div>\n<p><a href=\"https:\/\/www.youtube.com\/playlist?list=PL9zSC5i495YMjIuJjxToNGU8Ve7Gd5Rvj\" target=\"_blank\" rel=\"noopener\">Previously in <em>And Finally<\/em><\/a><\/p>\n<hr \/>\n<p><em>You have been reading <i>SB\u202fBlogwatch<\/i> by <a href=\"https:\/\/www.richi.uk\/\" target=\"_blank\" rel=\"noopener\">Richi\u202fJennings<\/a>. Richi curates the best bloggy bits, finest forums, and weird\u00adest web\u00adsites\u2014so you don\u2019t have to. Hate mail may be directed to\u202f\u202f<a href=\"https:\/\/twitter.com\/richi\" target=\"_blank\" rel=\"nofollow ugc noopener\">@RiCHi<\/a>, <a href=\"https:\/\/threads.net\/@richij\" target=\"_blank\" rel=\"nofollow ugc noopener\">@richij<\/a>, <a href=\"https:\/\/vmst.io\/deck\/@richi\" target=\"_blank\" rel=\"nofollow ugc noopener\">@richi@vmst.io<\/a>, <a href=\"https:\/\/bsky.app\/profile\/richi.bsky.social\" target=\"_blank\" rel=\"nofollow ugc noopener\">@richi.bsky.social<\/a> or <a href=\"mailto:sbbw@richi.co.uk?subject=-sbbw-\">sbbw@richi.uk<\/a>. Ask your doctor before reading. Your mileage may vary. Past per\u00adformance is no guar\u00adantee of future results. Do not stare into laser with re\u00admaining eye. E&amp;OE. 30.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>BSODs begone! Redmond business leaders line up to say what\u2019s new in Windows security.<\/p>\n","protected":false},"author":8670,"featured_media":2037061,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[590,23406,13571,782,21858,21028,24367,20984,30691,35889,14098,35458,30205,14097,98631,99462,99461,21029,13418,21129,497],"tags":[38736,83888,103148,103361,96636,68198,199,93988,104319,11473,104318,11621,104320,57759,207,37514],"class_list":["post-2037060","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-application-security","category-blogs","category-data-security","category-endpoint","category-sb-featured","category-governance-risk-compliance","category-humor","category-incident-response","category-sb-industry-spotlight","category-most-read-this-week","category-sb-news","category-popular-post","category-security-awareness","category-sb","category-social-facebook","category-social-linkedin","category-social-x","category-social-engineering","category-sb-spotlight","category-threats-breaches","category-vulnerabilities","tag-crowdstrike","tag-crowdstrike-falcon","tag-crowdstrike-incident","tag-crowdstrike-updates","tag-david-weston","tag-ignite","tag-microsoft","tag-microsoft-security","tag-microsoft-virus-initiative","tag-microsoft-windows","tag-quick-machine-recovery","tag-rust","tag-safe-deployment-practices","tag-sb-blogwatch","tag-windows","tag-windows-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsoft Veeps Ignite Fire Under CrowdStrike - Security Boulevard<\/title>\n<meta name=\"description\" content=\"BSODs begone! Redmond business leaders line up to say what\u2019s new in Windows security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Veeps Ignite Fire Under CrowdStrike\" \/>\n<meta property=\"og:description\" content=\"BSODs begone! Redmond business leaders line up to say what\u2019s new in Windows security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/richij\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-20T17:03:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-21T16:58:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/david-weston-microsoft-security-richixbw.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Richi Jennings\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RiCHi\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/\",\"url\":\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/\",\"name\":\"Microsoft Veeps Ignite Fire Under CrowdStrike - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/david-weston-microsoft-security-richixbw.png\",\"datePublished\":\"2024-11-20T17:03:14+00:00\",\"dateModified\":\"2024-11-21T16:58:18+00:00\",\"author\":{\"@id\":\"https:\/\/securityboulevard.com\/#\/schema\/person\/c4ddb2bb099fca608cd9c783bbd00100\"},\"description\":\"BSODs begone! Redmond business leaders line up to say what\u2019s new in Windows security.\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/#primaryimage\",\"url\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/david-weston-microsoft-security-richixbw.png\",\"contentUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/david-weston-microsoft-security-richixbw.png\",\"width\":770,\"height\":300,\"caption\":\"David \u201cdwizzzle\u201d Weston\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Boulevard (Original)\",\"item\":\"https:\/\/securityboulevard.com\/category\/sb\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"News\",\"item\":\"https:\/\/securityboulevard.com\/category\/sb\/sb-news\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Microsoft Veeps Ignite Fire Under CrowdStrike\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/securityboulevard.com\/#\/schema\/person\/c4ddb2bb099fca608cd9c783bbd00100\",\"name\":\"Richi Jennings\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityboulevard.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b26f6b3c4f3ae8b2b257466976990747?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b26f6b3c4f3ae8b2b257466976990747?s=96&d=mm&r=g\",\"caption\":\"Richi Jennings\"},\"description\":\"Richi Jennings is a foolish independent industry analyst, editor, and content strategist. A former developer and marketer, he\u2019s also written or edited for Computerworld, Microsoft, Cisco, Micro Focus, HashiCorp, Ferris Research, Osterman Research, Orthogonal Thinking, Native Trust, Elgan Media, Petri, Cyren, Agari, Webroot, HP, HPE, NetApp on Forbes and CIO.com. Bizarrely, his ridiculous work has even won awards from the American Society of Business Publication Editors, ABM\/Jesse H. Neal, and B2B Magazine.\",\"sameAs\":[\"https:\/\/richi.uk\",\"https:\/\/www.facebook.com\/richij\",\"https:\/\/www.linkedin.com\/in\/richi\/\",\"https:\/\/x.com\/RiCHi\",\"https:\/\/www.youtube.com\/c\/richijennings\",\"https:\/\/en.wikipedia.org\/wiki\/User:Richi\"],\"url\":\"https:\/\/securityboulevard.com\/author\/richi\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Microsoft Veeps Ignite Fire Under CrowdStrike - Security Boulevard","description":"BSODs begone! Redmond business leaders line up to say what\u2019s new in Windows security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Veeps Ignite Fire Under CrowdStrike","og_description":"BSODs begone! Redmond business leaders line up to say what\u2019s new in Windows security.","og_url":"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_author":"https:\/\/www.facebook.com\/richij","article_published_time":"2024-11-20T17:03:14+00:00","article_modified_time":"2024-11-21T16:58:18+00:00","og_image":[{"width":770,"height":300,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/david-weston-microsoft-security-richixbw.png","type":"image\/png"}],"author":"Richi Jennings","twitter_card":"summary_large_image","twitter_creator":"@RiCHi","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/","url":"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/","name":"Microsoft Veeps Ignite Fire Under CrowdStrike - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/#primaryimage"},"image":{"@id":"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/#primaryimage"},"thumbnailUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/david-weston-microsoft-security-richixbw.png","datePublished":"2024-11-20T17:03:14+00:00","dateModified":"2024-11-21T16:58:18+00:00","author":{"@id":"https:\/\/securityboulevard.com\/#\/schema\/person\/c4ddb2bb099fca608cd9c783bbd00100"},"description":"BSODs begone! Redmond business leaders line up to say what\u2019s new in Windows security.","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/#primaryimage","url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/david-weston-microsoft-security-richixbw.png","contentUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/david-weston-microsoft-security-richixbw.png","width":770,"height":300,"caption":"David \u201cdwizzzle\u201d Weston"},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Security Boulevard (Original)","item":"https:\/\/securityboulevard.com\/category\/sb\/"},{"@type":"ListItem","position":3,"name":"News","item":"https:\/\/securityboulevard.com\/category\/sb\/sb-news\/"},{"@type":"ListItem","position":4,"name":"Microsoft Veeps Ignite Fire Under CrowdStrike"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/securityboulevard.com\/#\/schema\/person\/c4ddb2bb099fca608cd9c783bbd00100","name":"Richi Jennings","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityboulevard.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b26f6b3c4f3ae8b2b257466976990747?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b26f6b3c4f3ae8b2b257466976990747?s=96&d=mm&r=g","caption":"Richi Jennings"},"description":"Richi Jennings is a foolish independent industry analyst, editor, and content strategist. A former developer and marketer, he\u2019s also written or edited for Computerworld, Microsoft, Cisco, Micro Focus, HashiCorp, Ferris Research, Osterman Research, Orthogonal Thinking, Native Trust, Elgan Media, Petri, Cyren, Agari, Webroot, HP, HPE, NetApp on Forbes and CIO.com. Bizarrely, his ridiculous work has even won awards from the American Society of Business Publication Editors, ABM\/Jesse H. Neal, and B2B Magazine.","sameAs":["https:\/\/richi.uk","https:\/\/www.facebook.com\/richij","https:\/\/www.linkedin.com\/in\/richi\/","https:\/\/x.com\/RiCHi","https:\/\/www.youtube.com\/c\/richijennings","https:\/\/en.wikipedia.org\/wiki\/User:Richi"],"url":"https:\/\/securityboulevard.com\/author\/richi\/"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/david-weston-microsoft-security-richixbw.png","jetpack_shortlink":"https:\/\/wp.me\/p91vu9-8xVO","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts\/2037060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/8670"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=2037060"}],"version-history":[{"count":3,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts\/2037060\/revisions"}],"predecessor-version":[{"id":2037236,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts\/2037060\/revisions\/2037236"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media\/2037061"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=2037060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/categories?post=2037060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/tags?post=2037060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}