For individuals who have machines again up and recovered post-CrowdStrike, there are specific objects it’s best to overview. First is take into account reissuing Bitlocker restoration keys. If you happen to handed out the restoration key manually, take into account reissuing and rotating keys.
In case you are contemplating modifications to your infrastructure, relatively than ripping out your expertise and changing it with a distinct working system, take into account the choice of adjusting the way you deploy software program and limit what software program is allowed to run on these special-purpose machines. We use antivirus as a result of we don’t have a restrict on what we permit to run on our programs. If we spent the time and assets limiting what’s allowed to run, machines could be safer.
After all, you do have to rethink what working system is used for what function. We’ve seen too many social media posts of bluescreens on what are merely overgrown notification screens. Do you really want a full working system to merely present info? Or are there alternative routes which you could present that very same info?