• ​​US-CERT released the alert on February 10th​
  • ​​Microsoft explained the whole deal on the same day​, providing recommendations and possible attack scenario.
  • On the same day, Amoeba Networks notified customers and began taking steps to protect its customers with Active Directory domains.
  • The vulnerability affects any customer with a Microsoft Windows Active Directory domain. Customers who are concerned about internal attack vectors should get protected as soon as possible.
  • To get protected, ensure the two patches are applied.  Then follow the Microsoft knowledge base article to apply UNC Hardened Access to SYSVOL and NETLOGON shares at minimum.  ​Contact Amoeba Networks for help.

Join my circles on G+