Soldato
Contractually obliged to wear them, I'm guessing.
They could blank it out and put it down as an error. I'm sure the irony wouldn't be lost on them
Contractually obliged to wear them, I'm guessing.
Are you 'guys' big CrowdStrike users? Guessing you delayed pushing out the update and waited for the 'fix'?Question is still why the likes of the NHS, or their cloud provider, are updating without clean room testing - let's see the list of hi-tech companies that weren't impacted , like ours.
Question is still why the likes of the NHS, or their cloud provider, are updating without clean room testing - let's see the list of hi-tech companies that weren't impacted , like ours.
Good luck with that.
From the Crowdstrike EULA, that your company agreed to:
"Your sole and exclusive remedy and the entire liability of CrowdStrike for its breach of this warranty will be for CrowdStrike, at its own expense to do at least one of the following: (a) use commercially reasonable efforts to provide a work-around or correct such Error; or (b) terminate your license to access and use the applicable non-conforming Product and refund the prepaid fee prorated for the unused period of the Subscription/Order Term. CrowdStrike shall have no obligation regarding Errors reported after the applicable Subscription/Order Term."
Question is why? Why this specific update? Or is it "common" practise to push updates bypassing QA testing? Again, why? Either way, a colossal boo boo.According to one source, known to me, Crowdstrike bypassed their testing and pushed it directly without going through their normal process.
This really. I recall supporting NT 3.5/4, which was an absolute nightmare, requiring additional steps to support when the kernel blew but at least provided a short-cut of "Last Known Good Configuration". BUT yes, these new third party pre-kernel security apps killing that idea begs the question the purpose and move to a "secure boot / TPM 2.0" environment. Some serious wake-up calls incoming.The fact that a software update not from MS can cripple the entire OS from even booting is just really crappy design. I don't care whether this is a server OS or a consumer one it really shouldn't happen. MS needs to make the OS far more resilient to this in the future.
Very true indeedWho'd have thought it'd be easier to roll out some software that would cripple the world than it is to cancel a NOW TV subscription.
Antivirus stuff usually has access to all.The fact that a software update not from MS can cripple the entire OS from even booting is just really crappy design. I don't care whether this is a server OS or a consumer one it really shouldn't happen. MS needs to make the OS far more resilient to this in the future.
Different trusts, different problems.I work in IT in the NHS, this might annoy some people, but it was quite a relaxing day for us. All of our systems were up, just the main clinical system provider Emis was down. Hence no one raising calls with us due to most hardware and software products needing to interface with Emis...
Not the first time.The fact that a software update not from MS can cripple the entire OS from even booting is just really crappy design. I don't care whether this is a server OS or a consumer one it really shouldn't happen. MS needs to make the OS far more resilient to this in the future.
Personally they should have blanked them off, if crowdstrike kick up a fuss, just send them this replyContractually obliged to wear them, I'm guessing.
I am surprised so many end user devices are affected; I had assumed this would have mostly servers.
What on an end user desktop uses CrowdStrike?