Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Video Reviews - Security and Privacy
A Microsoft Defender Follow-up
Message
<blockquote data-quote="ForgottenSeer 95367" data-source="post: 998551"><p>Microsoft Security is already aware and has been regarding this infection mechanism for years. The reason(s) they have not fixed it is known only to them, but a storyline that Microsoft is screwing over users deliberately or otherwise makes for great clickbait.</p><p></p><p></p><p>How often does the home user execute .cpl or .msi files? Microsoft cares primarily about enterprise, and with wsus and manual Windows updates via SCCM and other methods rampant in enterprise, Microsoft is not about to do something that interferes with .msi (or .msp) file installs, even if that means some infections are going to happen. Perhaps the fact that enterprise can block .msi via Group Policy or other methods is good enough for Microsoft. People forget that Microsoft develops Windows as a one-fits-all-image where considerations for enterprise always take top priority. There could be some other off-the-wall reason Microsoft won't do anything about it after all these years. So unless someone at Microsoft steps forward and gives the reason(s) for its inactions, then it is guesswork.</p></blockquote><p></p>
[QUOTE="ForgottenSeer 95367, post: 998551"] Microsoft Security is already aware and has been regarding this infection mechanism for years. The reason(s) they have not fixed it is known only to them, but a storyline that Microsoft is screwing over users deliberately or otherwise makes for great clickbait. How often does the home user execute .cpl or .msi files? Microsoft cares primarily about enterprise, and with wsus and manual Windows updates via SCCM and other methods rampant in enterprise, Microsoft is not about to do something that interferes with .msi (or .msp) file installs, even if that means some infections are going to happen. Perhaps the fact that enterprise can block .msi via Group Policy or other methods is good enough for Microsoft. People forget that Microsoft develops Windows as a one-fits-all-image where considerations for enterprise always take top priority. There could be some other off-the-wall reason Microsoft won't do anything about it after all these years. So unless someone at Microsoft steps forward and gives the reason(s) for its inactions, then it is guesswork. [/QUOTE]
Insert quotes…
Verification
Post reply
Top