How to patch the Zerologon vulnerability in Windows Netlogon Remote Protocol

How to patch the Zerologon vulnerability in Windows Netlogon Remote Protocol

Assessment

Interactive Video

Architecture, Information Technology (IT)

University

Hard

Created by

Quizizz Content

FREE Resource

The video discusses the Netlogon vulnerability (CVE-2020-1472), also known as 0 logon, which allows attackers to elevate privileges by exploiting a secure channel connection to a domain controller. The patch for this vulnerability is unusual, requiring a two-part update process, with the first part released in August and the second in February. Immediate updates are crucial due to the availability of exploit code online. The patch enforces secure RPC usage and introduces a new group policy for non-compliant devices. Monitoring event logs and preparing for February's mandatory enforcement is essential, especially for legacy systems.

Read more

5 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What is the significance of the netlogon vulnerability mentioned in the text?

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

3 mins • 1 pt

Describe the two-part nature of the patch for the netlogon vulnerability.

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

3 mins • 1 pt

Why is it important to apply the updates related to the netlogon vulnerability as soon as possible?

Evaluate responses using AI:

OFF

4.

OPEN ENDED QUESTION

3 mins • 1 pt

What are the potential risks if a domain controller is not patched against the netlogon vulnerability?

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

3 mins • 1 pt

What steps should be taken to prepare for the mandatory enforcement of the patch in February?

Evaluate responses using AI:

OFF