GreenPages Blog

As an IT professional, you need to stay current on all things tech; with articles from industry experts and GreenPages' staff, you get the info you need to help your organization compete and succeed!

Preparing Your Business for the End of Windows Server 2012 Support

By Josh Morganthall, GreenPages Senior Solutions Architect for Microsoft Cloud In this blog post, Josh outlines the steps that CIOs need to take to prepare for Windows Server 2012 reaching its end of support on October 10, 2023 to ensure their IT operations remain secure, productive, and running without interruption.

Replace Your Business Phone System with Microsoft Teams

Microsoft Teams Phone System is a powerful tool that can help businesses streamline their communication and improve productivity. In this blog post, GreenPages’ Director of Carrier Services Kurt Karshick outlines the various options for moving to a Microsoft Teams Phone System and why it's a smart choice for businesses of all sizes. 

New Zero-Day Vulnerability Apache Log4Shell

What We Know A new critical zero-day vulnerability has been detected, is widely distributed, and is easily exploitable, allowing attackers to gain full control over affected servers. The vulnerability was identified within Apache Log4j 2, an open-source Java package used to enable logging in many popular applications. The issue can allow remote access to your computer through public servers you access running the Apache Log4j Java-based logging library.

Patch Tuesday July 2021 Edition...PrintNightmare, Windows RCEs and More Exchange RCEs

What We Know For Patch Tuesday July 2021, Microsoft is patching the vulnerability and ongoing exploitation of PrintNightmare. You can read about CVE-2021-34527 on the Microsoft vulnerability site here. This one is really causing a lot of pain for organizations and CISA has also released Emergency Directive 21-04 that outlines what and when Federal Civilian Executive Branch agencies must do to mitigate this one.

"PrintNightmare” Microsoft Zero Day in Print Spooler

What We Know On June 29, 2021, a Proof-of-Concept (PoC) exploit code was published on GitHub for a vulnerability related to (CVE-2021-1675) in the Microsoft Print Spooler (spoolsv.exe)--the process that manages printing services. This vulnerability has been given the nickname of “PrintNightmare."  Although Microsoft released an update in early June 2021 as part of the updates in patch Tuesday, it does not look like this update protects against the PoC code. As this is PoC exploit, it appears to work and is being referred to as a Zero-Day exploit. It's important to note that the exploit does require a user login and password or a password hash to work which could be used by adversaries for use with phishing to get an elevation of privilege. No Known Fix; Recommended Workaround Because there is currently no known fix, the recommended workaround is to disable the print spooler service on Domain Controllers and systems that do not print. Yesterday CISA released a VulNote for this vulnerability.  

VMware vCenter Vulnerability with Critical RCE, CVSSv3 Score 9.8 of 10

By Randy Becker, VP & Principal Security Architect Yesterday, May 25th, VMware announced there are two new vulnerabilities in their vCenter management platform; this impacts many of the production vCenter deployments regardless of if you are using VMware Virtual SANs or not. VMware is providing a workaround and a fix for affected versions of vCenter. We recommend reading all the details on this before taking any action. Workarounds could impact functionality if you are using vSAN, so read thoroughly. Per VMware: “This needs your immediate attention if you are using vCenter Server.”

Dell High Severity 12-Year-Old Vulnerability Leaves Hundreds of Millions of Systems Exposed.

By Randy Becker, VP & Principal Security Architect On May 4, 2021, SentinelLabs posted that they had discovered five Dell security bugs collectively tracked as CVE-2021-21551. This local privilege-escalation (LPE) has a CVSS vulnerability-severity rating of 8.8 out of 10. SentinelLabs proactively reported their findings to Dell on Dec 1, 2020. These five high-severity security vulnerabilities in Dell’s firmware update driver have the potential to impact hundreds of millions of Dell desktops, laptops, notebooks, and tablets.

Patch Tuesday April 2021 Edition...Here We Go Again: More Exchange RCEs

By Randy Becker, VP & Principal Security Architect Microsoft April 2021 Patch Tuesday brings us 4 critical on-premises Exchange RCE CVEs, 2 with a base CVSS Score of 9.8 out of 10 with no privileges required, 1 with a CVSS Score of 9 with an attack vector adjacent with low privileges required, and 1 with an 8.8 and low privileges required.

Microsoft’s Gentle Nudge Towards CSP

By Rob O'Shaughnessy, Director, Software Sales & Renewals Enterprise Agreement 1000 User Minimum In an effort to streamline consumption products such as Office 365 (O365), Microsoft 365 (M365), Dynamics 365 (D365) and Azure towards consumption-based licensing programs such as its Cloud Solution Provider (CSP) program, Microsoft is making changes to the qualification of their Enterprise Agreement. In January 2021, Microsoft increased the minimum requirement for Enterprise Agreements to 1000 users—a jump from 500 users. This means that customers with fewer than 1000 seats of O365, M365, or D365 will no longer be able to purchase their licensing on an Enterprise Agreement. In addition, Microsoft increased the qualification amount for Azure to $600,000 per year.

    Related Posts