Windows Defender Fix For Windows 10: Enable Network Scanning

Ruben Fields
March 24, 2020

The vulnerabilities affect most of the now supported versions of Windows desktop and server and Microsoft has rated the bigs as critical for all of the affected releases. Attackers may exploit the vulnerabilities by getting their targets to open booby-trapped documents or view them in the Windows preview pane.

There is now no patch available to fix the flaw, although Microsoft's advisory notes that updates to address security vulnerabilities are generally released as part of Update Tuesday, generally scheduled for the second Tuesday of each month. Earlier this month, Patch Tuesday resulted in a new vulnerability found in the Microsoft Server Message Block (SMB) protocol being leaked.

Microsoft's inventory fell US$1.37 (1 p.c) to US$135.98 in buying and selling Monday, after which tumbled a further US$0.58 (0.43 p.c) to US$135.40 throughout after-hours buying and selling.

Microsoft recommended several mitigations Windows users can take, including disabling the Preview Pane and Details Pane in Windows Explorer, disabling the WebClient service and renaming atmfd.dll. Users claim that Windows Defender skips certain files during quick and full scans, as if they configured exclusions on their devices.

Coronavirus pandemic: ATF price slashed by 12%; petrol,diesel prices unchanged
The amendment gives powers to the government to raise the duty by up to Rs 8 per litre in petrol and diesel at any time it wishes. There were, however, cuts of Rs 2 per litre twice on both petrol and diesel in October 2017 and again in October 2018.

All Windows systems are potentially subject to the flaw, including the unsupported Windows 7 and Windows Server 2008 operating systems, which lost support in January.

"Microsoft is conscious of this vulnerability and is engaged on a fix", the corporate wrote in a safety advisory printed Monday.

The company explained how it could be attacked with this vulnerability in Windows: "There are many ways an attacker can exploit the vulnerability". However, Microsoft said users will be prompted for confirmation before opening arbitrary programs from the Internet.

After applying this workaround, Microsoft said it's still possible for remote attackers who successfully exploit this vulnerability to cause the system to run programs located on the targeted user's computer or the Local Area Network (LAN). But Microsoft hasn't acknowledged the problem, so what's causing the error and whether its being worked on is unknown. Third-party applications that install OpenType fonts natively could be affected by this change, according to Microsoft.

Other reports by

Discuss This Article

FOLLOW OUR NEWSPAPER