A few days after news of a serious security vulnerability threatening some 50 million users of Microsoft's new Windows 10 operating system, it was found that there was no such flaw, and that what was being circulated was misleading. In fact, it is just a marginal error when manually tuning some of the settings in the Windows 10 version of the big business, and Microsoft has included them in the normal operating and security instructions.

Forbes.com published a news report, "Microsoft issues a warning to 50 million users of Windows 10," addressing what it said was a serious security vulnerability in the operating system, and was then widely addressed. But a team of ZDNet analysts specializing in technology investigated the incident and analyzed the gap and its dimensions, stressing that there was no such gap.

Security gap

Microsoft has warned tens of millions of users of Windows 10, saying that the update "KB 4501375" in Windows 10, launched in April 2019, could lead to a security vulnerability in Windows. The program "administrator of remote access service" in the system known as «Ras man», and this can have serious implications, as it presents the security of computer and applications and operating systems at risk, and makes them exposed to attackers and infiltrators. According to news reports, "Microsoft" indicated that the problem appears only in version 1903 of the operating system «Windows 10», a version currently used by at least 50 million users.

The reality of «Ras Man»

The analysis shows that RasMan is a program that runs on Windows 10 as a service used to dial phone numbers recorded in the telephone and contact register. It is an important program because it performs stable and secure operation of the computer, especially when performing remote access, Which is a program that should not be removed or stopped. It is a file of the "EXE" type, which is executable and runable on the computer's volume. When Windows is run, the commands in RasMan are executed. The file is loaded into the electronic memory of the computer «RA And appears in the system management panel as a process of running on the system, presumably this process is safe and unlikely to cause any harm to the operating system.

Problem settings

According to Microsoft's official technical support page, update KBR 4501375 is an incremental update in version 1903 of Windows 10. It has a known problem with the difficulty and length of configuring settings for remote access management settings "Ras Man", a known problem that appears only in the version of «Windows 10» for large enterprises and companies and not individuals, or home copies, and then it is a problem affected by the number of small and small dealers of companies only, and is not classified as a gap, Problem in "non-standard client configuration settings", and occurs in two cases:

The first is that the diagnostic data level setting is configured manually on the non-default setting, such as it is intentionally set on a Windows® Home or Professional-based system, because it works only with the enterprise version, and the second is to configure the virtual private network VNB, as a permanent connection to a mode known as AVPN, a mode that embodies a specific form of access to the virtual private network, first surfaced with the Windows Server 2016 operating system.

Since the recent update in Windows 10 was launched only six weeks ago, it is expected and logical that the companies and institutions concerned will slowly move forward in the process of modernization and installation. Based on this data, the ZDNet team concluded that there is no A security vulnerability that threatens 50 million users of Windows 10, but just known complications of how to set up and operate the remote access service settings.

No warnings from «Microsoft»

According to the review and revision of Microsoft's official technical support page, the update "KB 4501375" within Windows 10 has not been issued any warnings or alerts that contain a security vulnerability of any kind, and that the Forbes report Who spoke about this alert and read it by about half a million people who had an active link that allegedly contained the official warning from Microsoft, but it turned out not to be linked to an official Microsoft article or statement documenting the breach.