#cybersecurity | #comptia | #info | Patching the Zoom Zero-Day Vulnerability with JumpCloud and PowerShell


As remote work becomes the new normal for many organizations, Zoom and other video chat applications are booming in popularity. Unfortunately, analysts have uncovered a zero-day vulnerability in Zoom, exposing user accounts to bad actors. Thankfully, using JumpCloud® Directory-as-a-Service® and its associated PowerShell Module, organizations can patch the Zoom vulnerability remotely on Windows® systems.

How it Works

The process for patching the Zoom zero-day using JumpCloud is fairly simple and straightforward. Note: Before you start you will need a JumpCloud account and the PowerShell Module. You can try JumpCloud for free for up to 10 users. The PowerShell Module is available for free download here.

  1. Log into the JumpCloud Admin Console and open Commands.
  2. Click + to add a command. (You can name the command whatever you wish, but we recommend something like “ZoomPatchApril2020” for ease-of-use.)
  3. Open the PowerShell Module and run the command found here.
  4. Select Command Runners and then choose which Admin account to use to run the command.
  5. Select Systems, then select all Windows systems to apply this patch, and click Save.
  6. Select the “ZoomPatchApril2020” command and click the Run Now button.
  7. Check your results in the results space at the bottom of the commands page.

That’s it! If you have any questions about the process or want to learn more about JumpCloud, please contact our expert team.



Click here to go to the original author and source to this story.

______________________________________________________________________________________________

Get your CompTIA A+, Network+ White Hat-Hacker, Certified Web Intelligence Analyst and more starting at $35 a month. Click here for more details.

.  .  .  .  .  .  . .  .  .  .  .  .  .  .  .  .   .   .   .    .    .   .   .   .   .   .  .   .   .   .  .  .   .  .

Leave a Reply