<i>In order to increase resilience against this threat while large networks patch and upgrade, there are additional measures that can be taken</i><p>I'd say those are the <i>first</i> things that should be done, regardless of the presence of exploits; exposing a port/listening service to the Internet you don't need, especially one that can remotely give complete control to an attacker, is always a bad idea. Fortunately the majority of computers out there are probably behind a NAT, which helps greatly to keep them from being hacked remotely.<p><i>Disable remote Desktop Services if they are not required. Disabling unused and unneeded services helps reduce exposure to security vulnerabilities overall and is a best practice even without the BlueKeep threat.</i><p>Very good advice --- too bad latest Windows versions have not-so-clearly-described tons of services running by default, many of which phone home in some way, and some of which are nearly impossible to disable...
I know we should always assume good faith.<p>From all the vulnerabilities they know, they chose to publish one that's known and only concerns outdated software. Maybe I'm too skeptical but when the NSA starts leaking fixes for zero day exploits, I'll take them more seriously.
The advisory links to <a href="https://www.nsa.gov/Portals/70/documents/what-we-do/cybersecurity/professional-resources/csa-bluekeep_20190604.pdf?ver=2019-06-04-123329-617" rel="nofollow">https://www.nsa.gov/Portals/70/documents/what-we-do/cybersec...</a> (PDF)<p>I really wonder what the utility for that distribution form is, are there people printing these out? Or is there some requirement for them to generate a document ID that they could not get for plain web/HTML documents?
Who has the fear of visiting a URL owned by a three letter agency known for nefarious spying activities?<p>I do!<p>So here is a third party report for anyone else that views three letter agency URLs as having all the appeal of a trip to a virtual leper colony:<p><a href="https://www.zdnet.com/article/even-the-nsa-is-urging-windows-users-to-patch-bluekeep-cve-2019-0708/" rel="nofollow">https://www.zdnet.com/article/even-the-nsa-is-urging-windows...</a>