Serious question, can you not? There isn’t an option to…like…set a review system first?
Comment on CrowdStrike broke Debian and Rocky Linux months ago, but no one noticed
quinkin@lemmy.world 3 months ago
Additionally, organizations should approach CrowdStrike updates with caution
We would if we were able to control their “deployable content”.
AlecSadler@sh.itjust.works 3 months ago
EncryptKeeper@lemmy.world 3 months ago
For antivirus definitions? No, and you wouldn’t want to.
AlecSadler@sh.itjust.works 3 months ago
But it sounds like this added files / drivers or something, not just antivirus rules?
SeeJayEmm@lemmy.procrastinati.org 3 months ago
Turns out it was a content update that caused the driver to crash but the update itself wasn’t a driver (as per their latest update.)
mox@lemmy.sdf.org 3 months ago
corsicanguppy@lemmy.ca 3 months ago
We would if we were able to control their “deployable content”.
Minimum safe distance.
ISOmorph@feddit.org 3 months ago
I read on another thread that an admin was emulating a testing environment by blocking CrowdStrike IPs on their firewall for the whole network, with the exception of a couple machines to test each update. It’s stupid that he has to do this but hey, his network was unaffected