The new critical vulnerability found in the Microsoft Support and Diagnostic Tool (MSDT) is a serious vulnerability that you want to rememdiate in your environment. Using PowerShell, we can easily implement the registry workaround as recommended by the Microsoft Security Response Center.
They are recommending you backup the MSDT URL Protocol key, then delete the registry key, effectively disabling the attack vector. There are also other things you can do with Microsoft Defender to ensure you are protected from these types of attacks as documented here:
https://msrc-blog.microsoft.com/2022/...
Clone or Download the PowerShell workaround script here:
https://github.com/brandonleegit/auto...
Subscribe to the channel: / @virtualizationhowto
My blog: https://www.virtualizationhowto.com
_____________________________________________________
Social Media: / vspinmaster
LinkedIn: / brandon-lee-vht
Github: https://github.com/brandonleegit
Introduction - 0:00
Describing the Follina vulnerability and the workaround - 1:48
Talking about disabling the MSDT URL Protocol using the registry - 2:15
Defender settings - 2:20
Describing the PowerShell script to implement the Microsoft workaround - 2:50
Running the Follina Vulnerability workaround PowerShell script - 4:10
Concluding and wrapping up thoughts around this new Follina MSDT vulnerability - 5:00
Read the detailed write up covering the remediation of this vulnerability using PowerShell:
https://www.virtualizationhowto.com/2...
Watch video Windows Zero-day Hack Fix - Automate Follina Vulnerability Workaround using PowerShell online without registration, duration hours minute second in high quality. This video was added by user VirtualizationHowto 03 June 2022, don't forget to share it with your friends and acquaintances, it has been viewed on our site 688 once and liked it 19 people.