The new critical vulnerability found in the Microsoft Support and Diagnostic Tool (MSDT) is a serious vulnerability that you want to rememdiate in your environment. Using PowerShell, we can easily implement the registry workaround as recommended by the Microsoft Security Response Center.
They are recommending you backup the MSDT URL Protocol key, then delete the registry key, effectively disabling the attack vector. There are also other things you can do with Microsoft Defender to ensure you are protected from these types of attacks as documented here:
https://msrc-blog.microsoft.com/2022/...
Clone or Download the PowerShell workaround script here:
https://github.com/brandonleegit/auto...
Subscribe to the channel: / @virtualizationhowto
My blog: https://www.virtualizationhowto.com
_____________________________________________________
Social Media: / vspinmaster
LinkedIn: / brandon-lee-vht
Github: https://github.com/brandonleegit
Introduction - 0:00
Describing the Follina vulnerability and the workaround - 1:48
Talking about disabling the MSDT URL Protocol using the registry - 2:15
Defender settings - 2:20
Describing the PowerShell script to implement the Microsoft workaround - 2:50
Running the Follina Vulnerability workaround PowerShell script - 4:10
Concluding and wrapping up thoughts around this new Follina MSDT vulnerability - 5:00
Read the detailed write up covering the remediation of this vulnerability using PowerShell:
https://www.virtualizationhowto.com/2...
Смотрите видео Windows Zero-day Hack Fix - Automate Follina Vulnerability Workaround using PowerShell онлайн без регистрации, длительностью часов минут секунд в хорошем качестве. Это видео добавил пользователь VirtualizationHowto 03 Июнь 2022, не забудьте поделиться им ссылкой с друзьями и знакомыми, на нашем сайте его посмотрели 688 раз и оно понравилось 19 людям.