CrowdStrike’s Falcon software uses a special driver that allows it to run at a lower level than most apps so it can detect threats across a Windows system. Microsoft tried to restrict third parties from accessing the kernel in Windows Vista in 2006 but was met with pushback from cybersecurity vendors and EU regulators. However, Apple was able to lock down its macOS operating system in 2020 so that developers could no longer get access to the kernel.

Now, it looks like Microsoft wants to reopen the conversations around restricting kernel-level access inside Windows.

  • kubica@fedia.io
    link
    fedilink
    arrow-up
    45
    ·
    3 months ago

    Sure, “restrict” the kernel access. And the first company to be granted the requisites for kernel access, CrowdStrike.

    • r00ty@kbin.life
      link
      fedilink
      arrow-up
      12
      arrow-down
      1
      ·
      3 months ago

      Exactly. Either they’re going to make Windows Defender have the monopoly on antivirus and endpoint protection (EU will shut them down faster than a crowdstrike bluescreen), or they will need to grant the access to those providers.

      If Microsoft think they will be able to curate every single device driver and other kernel module (like antivirus etc) and catch the kind of bug that caused this error? They’re deluded.

      I’ll wait and see what they actually propose before outright ruling it out. But, I can’t see how they do this in any realistic way.

      • WldFyre
        link
        fedilink
        arrow-up
        3
        ·
        3 months ago

        Either they’re going to make Windows Defender have the monopoly on antivirus and endpoint protection (EU will shut them down faster than a crowdstrike bluescreen)

        How does Apple handle this?

        • r00ty@kbin.life
          link
          fedilink
          arrow-up
          1
          ·
          3 months ago

          How does Apple handle this?

          Really not sure if they have any kernel level antivirus products. Although the same question applies I guess to third party hardware drivers. How are they installed? What privilege level do they run in?