Existing and being necessary are two different things. Linux and MacOS are operating systems. Windows is an ad delivery system that masquerades as an operating system.
If windows were absolutely perfect with no flaws whatsoever, CrowdStrike wouldn’t be a necessity. I agree with that.
Unfortunately we live in the real world and no OS is perfect so software like CrowdStrike exists on lots of operating systems.
Btw, Crowdstrike isn’t necessary but it’s very nice to have for companies. You don’t need real time protection like that on a normal client you use at home.
It needs that kind of access to fight advanced attacks.
It would surprise me if similar EDR programs didn’t have similar access on Linux systems, for example.
Currently, cloudstrike offers two methods for Linux: a kernel driver / module and a theoretically safer alternative using epbf (you could call that “kernel level scripting”). Ironically, they triggered a kernel bug using that second option. They did not test all kernels they listed as compatible or something like that.
Do as I say, not as I do.
Microsoft didn’t cause the “disaster” though.
They just made the poor decisions that made CrowdStrike required in the first place.
It exists on OSX and Linux too, they just don’t do the thing that took down Windows so they weren’t impacted.
Existing and being necessary are two different things. Linux and MacOS are operating systems. Windows is an ad delivery system that masquerades as an operating system.
Care to specify?
If Windows had better security and update practices, software like CrowdStrike wouldn’t be a necessity.
If windows were absolutely perfect with no flaws whatsoever, CrowdStrike wouldn’t be a necessity. I agree with that.
Unfortunately we live in the real world and no OS is perfect so software like CrowdStrike exists on lots of operating systems.
Btw, Crowdstrike isn’t necessary but it’s very nice to have for companies. You don’t need real time protection like that on a normal client you use at home.
Running security products in kernel mode is precisely what caused this disaster.
It needs that kind of access to fight advanced attacks. It would surprise me if similar EDR programs didn’t have similar access on Linux systems, for example.
No, you make a management API for security products that run in user space as root, you don’t use kernel modules.
Is that the way that EDR is implemented on Linux or are you guessing?
Currently, cloudstrike offers two methods for Linux: a kernel driver / module and a theoretically safer alternative using epbf (you could call that “kernel level scripting”). Ironically, they triggered a kernel bug using that second option. They did not test all kernels they listed as compatible or something like that.