This is easily the worst outage that ever happened. In the long run, the July 19th, 2024 CrowdStrike disaster is a good thing, because a clear signal has been sent to CIOs and IT managers. Sysadmins need to begin testing the patches, all patches, that get deployed to their machines. No exceptions. I just hope that CrowdStrike Falcon wasn't deployed to any domain controllers. Just imagine keeping all your BitLocker recovery passwords, including the DC's, on the DC. What could you possibly do in that situation? Perform an authoritative restore of the AD database on an airgapped VM?
@techholler6 ай бұрын
Shooo scary times. We try not to push out updates instantly make sure nothing fishy is going on even on windows. It’s hard to believe this happened then turn around and it didn’t happen to Linux boxes
@50PullUps6 ай бұрын
10:17 You guys need to eject CrowdStrike's products out of your environment. The company needs to go bankrupt, and other companies need to look to CrowdStrike as a warning to not cut corners.
@techholler6 ай бұрын
They might not exist in a bit
@50PullUps6 ай бұрын
@@techholler I would like to see that myself. Not because I have anything against CrowdStrike, but to serve as a reminder to technology professionals that patch testing is ALWAYS mandatory. However, the most likely outcome is that they'll navigate this storm. Any IT manager who doesn't start to transition away from CrowdStrike's technology stack is an incompetent and a fraud.. Out of principle, and as a lesson to other developers in the EDR/XDR market, any IT department worth 2 cat turds should be launching a phase-out of all CrowdStrike products.