As of 5:39am ET on July 20, 2024, CrowdStrike has been actively addressing a defect found in a content update for Windows hosts. It is important to note that Mac and Linux hosts are not affected by this issue, and it is not a result of a cyberattack.
The problem has been identified, isolated, and a fix has been implemented. Customers are urged to visit the support portal for the most recent updates, and continuous updates will be provided on the company’s blog. It is advised that organizations ensure they are in contact with CrowdStrike representatives through official channels to receive accurate information.
CrowdStrike’s team is dedicated to ensuring the security and stability of its customers during this time. While the situation is regrettable and has caused disruption, efforts are being made to assist impacted customers in restoring their systems and services promptly.
It is emphasized that CrowdStrike is functioning normally, and the Falcon platform systems remain unaffected by this issue. As long as systems are operating as usual, the protection provided by the Falcon sensor is not compromised.
In response to reports of crashes on Windows hosts related to the Falcon sensor, steps have been taken to rectify the situation. Specific details regarding the issue, symptoms, and actions to be taken have been provided to assist affected customers in resolving the issue efficiently.
CrowdStrike engineers have identified the content deployment that caused the problem and have reverted those changes. If host systems continue to crash, alternative steps have been outlined to address the issue adequately. Customers are encouraged to follow the instructions provided to mitigate any disruptions caused by the defect.
It is essential for those affected to follow the recommended procedures to resolve the issue effectively and minimize any further impact. In case of difficulties or further inquiries, additional resources and alternative options have been made available to assist in recovering from the incident.
Source link