In addition, Pitt IT strongly recommends that users use caution when downloading unsolicited email attachments from both Pitt and personal email accounts, as well as carefully evaluating attachments before considering disabling the protections provided by Protected View. If you have disabled Protected View, Pitt IT strongly recommends that you re-enable it. Microsoft Protected View, which is enabled by default, prevents attacks that leverage this vulnerability. Ensure that Microsoft Protected View or Application Guard for Office are enabled on your endpoints.Microsoft Defender for Endpoint detects and blocks attacks that leverage this vulnerability. Ensure your endpoints are running the most up-to-date version of Microsoft Defender for Endpoint and that they have the latest signatures.Please take the following steps to help protect your systems: Pitt IT expects attackers will use phishing attacks to attempt to exploit this vulnerability. Additional details are available in a special security advisory on Microsoft’s website that was released outside of its normal monthly cycle of security bulletins. An attacker who successful exploits the vulnerability could execute remote code on an affected system. Microsoft is investigating reports that some attackers are using specially crafted Microsoft Office documents to exploit a critical new security vulnerability in Microsoft Windows.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |