Active Directory

Winsage
November 25, 2025
Microsoft will remove the Windows Internet Name Service (WINS) from all future Windows Server releases after November 2034. WINS was officially deprecated with Windows Server 2022 in August 2021, and Windows Server 2025 will be the last version to support it. Standard support for WINS will continue until November 2034. Organizations are encouraged to migrate to DNS-based name resolution solutions before this deadline. The removal will include the WINS server role, management console snap-in, automation APIs, and related interfaces. Microsoft recommends auditing services dependent on NetBIOS name resolution and migrating to DNS solutions. Static host files are not advised as a workaround. Organizations should begin migration planning to avoid operational disruptions.
Winsage
November 24, 2025
Microsoft has officially retired the Windows Internet Name Service (WINS) as part of the transition to modern DNS-based solutions. WINS, which resolved NetBIOS names to IP addresses, is being phased out due to its outdated nature and security vulnerabilities. It was deprecated with the release of Windows Server 2022 and will be completely removed in future releases, although support will continue until November 2034. Organizations are encouraged to transition to DNS and identify systems relying on WINS for name resolution. They should implement features like conditional forwarders and update or retire legacy applications that depend on WINS.
Tech Optimizer
November 13, 2025
Emotet is a Trojan Horse malware that emerged in 2014, impacting over 1.6 million devices and originally designed to steal banking credentials. Developed by the MealyBug criminal organization, it evolved into a modular Trojan-dropper, enabling it to download various payloads and act as Malware-as-a-Service on the dark web. Emotet spreads primarily through spam emails, often using malicious Word or Excel files, and has been disseminated via local area networks and password-protected zip folders. The malware operates through botnets categorized into epochs, with Epochs 1, 2, and 3 dismantled in 2021 by a coordinated international operation. Following this, Emotet resurfaced in November 2021 as Epochs 4 and 5, incorporating a Cobalt Strike beacon for enhanced propagation. Recommended precautions include keeping software updated, using two-factor authentication, and educating employees about email threats. Network administrators are advised to block unscannable email attachments, configure specific email filters, and maintain secure backups.
Winsage
November 12, 2025
On November 12, 2025, Microsoft released patches for 63 vulnerabilities, including four classified as Critical and 59 as Important. Notably, CVE-2025-62215, a privilege escalation flaw in the Windows Kernel with a CVSS score of 7.0, is actively exploited. This vulnerability allows an authorized attacker to elevate privileges locally through a race condition. Additionally, Microsoft patched two heap-based buffer overflow vulnerabilities (CVE-2025-60724 and CVE-2025-62220) with CVSS scores of 9.8 and 8.8, respectively, which could lead to remote code execution. Another significant vulnerability is CVE-2025-60704, a privilege escalation flaw in Windows Kerberos with a CVSS score of 7.5, enabling attackers to impersonate users and control a domain. Other vendors, including Adobe, Amazon Web Services, and Apple, also released security updates addressing various vulnerabilities.
Winsage
October 31, 2025
Counter Threat Unit™ (CTU) researchers are investigating a remote code execution vulnerability, CVE-2025-59287, in Microsoft’s Windows Server Update Service (WSUS). Microsoft released patches for affected Windows Server versions on October 14, 2025, and issued an out-of-band security update on October 23 after the emergence of proof-of-concept code. On October 24, Sophos detected exploitation of this vulnerability targeting internet-facing WSUS servers across various industries. The first recorded activity occurred at 02:53 UTC, where a threat actor executed a Base64-encoded PowerShell script to collect and exfiltrate sensitive information to Webhook.site. The script gathered data such as external IP addresses, Active Directory domain users, and network configurations, attempting to send this information via HTTP POST requests. By 11:32 UTC, the maximum limit of 100 requests was reached. Affected entities included universities and organizations in technology, manufacturing, and healthcare sectors, primarily in the United States. Censys scan data confirmed that the exploited servers had default WSUS ports 8530 and 8531 exposed publicly. CTU recommends organizations review vendor advisories, apply patches, identify exposed WSUS server interfaces, and examine logs for malicious activity. Sophos has implemented specific protections to detect related activities.
Winsage
October 27, 2025
Microsoft has introduced a new app management policy for IT administrators managing Windows 11 Enterprise and Education devices, allowing the removal of pre-installed Microsoft Store apps (in-box apps). This feature is available for devices running Windows 11 Enterprise 25H2 and Windows 11 Education 25H2 through management tools like CSP, GPO, and Microsoft Intune. The policy simplifies app management by eliminating the need for custom installation images and complex scripting, enabling administrators to efficiently select and remove apps from a predefined list. The policy is disabled by default and must be enabled by administrators. It is compatible with both Group Policy and MDM solutions, including Microsoft Intune. Implementation steps for Microsoft Intune include creating a new policy in the admin center, configuring settings to enable the removal of default Microsoft Store packages, and assigning the policy to desired device groups.
Search