Month: October 2024
‘Fleisnam’ malware was detected (Agentless) – false alarm?
Hi experts,
I have started to see this alert some time ago on a VM sitting in Azure. Tried to troubleshoot it, made some research and turned out this is triggered by Defender reporting it’s own log files as malicious. At least that’s what I’ve found on several blogs.
It will identify a “log” file looks like every time I run defender full scan. An example of the file and location is below:
Last few days, few more devices started to report the same… and I start to be a bit “nervous” about it. Is it a real malware? Is it really a defender bug?
Anyone experiencing the same issue?
Thank you.
Hi experts, I have started to see this alert some time ago on a VM sitting in Azure. Tried to troubleshoot it, made some research and turned out this is triggered by Defender reporting it’s own log files as malicious. At least that’s what I’ve found on several blogs. It will identify a “log” file looks like every time I run defender full scan. An example of the file and location is below: Last few days, few more devices started to report the same… and I start to be a bit “nervous” about it. Is it a real malware? Is it really a defender bug? Anyone experiencing the same issue? Thank you. Read More
Why so many MS Edge entries in Open with menu on macOS
Hi everyone.
I would like to know why we get so many entries in the Open With menu on macOS?
I included a screenshot of my right click – Open With menu. It looks like every new version creates an entry in that menu. This, I think, shouldn’t be like that.
I tried to removed the entries with lregister in command line, but it came back after rebooting.
Any suggestion?
Hi everyone.I would like to know why we get so many entries in the Open With menu on macOS? I included a screenshot of my right click – Open With menu. It looks like every new version creates an entry in that menu. This, I think, shouldn’t be like that. I tried to removed the entries with lregister in command line, but it came back after rebooting. Any suggestion? Read More
Trying to link my Learning ProfileMCP ID to new employer
Not sure if this is right area to post but having issues linking my Learning Profile to my new employer.
1. I logon with my new company email address to https://partner.microsoft.com
2. I go to https://partner.microsoft.com/dashboard/v2/membership/workspace
3. Select Learning Profile
4. Click “Link Microsoft Learn Profile”
5. When prompted I logon with the email address linked with my MCP IDLearning profile.
6. After a few seconds it takes me back to step 2 and step 4 still says “Link Microsoft Learn Profile”.
Has it worked? How do I know or confirm it worked? It looks like I’m still unlinked
Not sure if this is right area to post but having issues linking my Learning Profile to my new employer. 1. I logon with my new company email address to https://partner.microsoft.com2. I go to https://partner.microsoft.com/dashboard/v2/membership/workspace3. Select Learning Profile4. Click “Link Microsoft Learn Profile”5. When prompted I logon with the email address linked with my MCP IDLearning profile.6. After a few seconds it takes me back to step 2 and step 4 still says “Link Microsoft Learn Profile”. Has it worked? How do I know or confirm it worked? It looks like I’m still unlinked Read More
Sum operation under many conditions
Hi
I need to do sum operation based on following conditions:
1.Each name in table 2 should be compared with names in table 1, if it is compatible or equal then moves to the second conditions.
2. check the names of subjects in table 2 with names of shubjects in table 1. If it is equal then I need to sum all values under each subject in front of each name.
Please see the attached file , I need to get results as in table 2
Thanks
HiI need to do sum operation based on following conditions:1.Each name in table 2 should be compared with names in table 1, if it is compatible or equal then moves to the second conditions.2. check the names of subjects in table 2 with names of shubjects in table 1. If it is equal then I need to sum all values under each subject in front of each name.Please see the attached file , I need to get results as in table 2Thanks Read More
Esportazione Mail
Buongiorno,
quando sarà possibile l’esportazione delle email in file di tipo .pst o altri per avere un backup delle mail? (ho più account mail, uno hotmail e altri Gmail o altro).
Buongiorno,quando sarà possibile l’esportazione delle email in file di tipo .pst o altri per avere un backup delle mail? (ho più account mail, uno hotmail e altri Gmail o altro). Read More
SASSA Grant Status Check
How has the SASSA grants Agency influenced social welfare in South Africa? Share insights, opinions, and analysis in this forum discussion.
How has the SASSA grants Agency influenced social welfare in South Africa? Share insights, opinions, and analysis in this forum discussion. Read More
Phish, Click, Breach: Hunting for a Sophisticated Cyber Attack
Authors: Krithika Ramakrishnan, Gourav Khandelwal, Akash Chaudhuri, Matthew Mesa, Sagar Patil, and Uri Oren
Introduction
Since April 2024, we have observed a significant increase in Teams phishing attacks, which have led to endpoint-related incidents, particularly through the abuse of Remote Monitoring and Management (RMM) tools such as Quick Assist (Ref : Threat actors misusing Quick Assist in social engineering attacks leading to ransomware | Microsoft Security Blog), and other tools such as Any Desk, and Team Viewer.
Initially, the attack began with a spam flood, followed by the attacker impersonating the Help Desk on Teams. The attacker would contact the user via Teams, send a malicious link to start the RMM session, and deliver the harmful payload during the session. This would lead to hands-on keyboard activity, data exfiltration, and ultimately result in ransomware attacks.
Over time, the attack method evolved. The attackers now directly reach out to users on Teams, impersonating the service desk. Once the user accepts the Teams invite, the attacker provides a SharePoint link containing malicious payloads, which could lead to critical security breaches. Recent trends in social engineering attacks highlight this adaptability, with attackers varying their tactics based on the target. For instance, they might use a SharePoint link for one victim while opting for a different hosting platform for another on the same day. Moreover, attackers are moving beyond traditional link-based strategies by persuading users to install remote access software like AnyDesk and TeamViewer or convincing them to initiate connections via Microsoft’s Quick Assist, which is installed by default in the Windows Operating System.
Microsoft continues to aggressively combat threats, such as halting notorious DarkGate, which is a very capable malware. Since December 2023, Microsoft Threat Intelligence has been tracking Storm-1674 attacker group misusing App Installers with Teams Phishing as the initial access vector (Ref : Intel Article – Microsoft Defender). In this scenario, the attacker convinces the user that they are interacting with the service desk, allowing the attacker to perform malicious activities on the device through Remote Monitoring and Management (RMM) tools. What makes this attack unique is that each attack kill chain is different, as every payload varies.
The activity is attributed to Storm-1811 and Storm-1674 by Microsoft Threat Intelligence.
In this blog, we will walk through one of the observed scenarios and discuss hunting approaches for detecting such attacks.
Attack Flow
Teams Phishing
In the majority of the attacks observed, impersonation of the IT desk in a one-on-one Teams conversation from attacker owned tenants. Attackers also call the users on Teams, create meetings and send chat messages that contain malicious URLs or attachments to through the meeting’s chat feature.
The tenants were usually newly created in a span of less than 7 days. In a few scenarios, the Teams Phishing was preceded by a spam flood with more than 1000+ emails every hour. This was used to set the context for the attacker to call the user impersonating the help desk under the pretext of fixing the spam flood.
The attacks were highly targeted, with attackers focusing on at least three users per tenant through Teams phishing. By aggregating the number of users targeted by an external user from a tenant every hour, we can identify these attacks more effectively.
Hunting for Compromises
Hunt for spam flood attack
EmailEvents
| where Timestamp > ago(1d)
| where EmailDirection == “Inbound”
| make-series Emailcount = count()
on Timestamp step 1h by RecipientObjectId
| extend (Anomalies, AnomalyScore, ExpectedEmails) = series_decompose_anomalies(Emailcount)
| mv-expand Emailcount, Anomalies, AnomalyScore, ExpectedEmails to typeof(double), Timestamp
| where Anomalies != 0
| where AnomalyScore >= 10
Hunt for Suspicious External Teams messages
CloudAppEvents
where Timestamp > ago(1d)
|where ApplicationId == 28375
// This action type is recorded when a new chat is created with the user
| where ActionType == “ChatCreated”
// This field records the sender’s Account Object ID, since the sender is a third party, the field is expected to be empty
| where isempty(AccountObjectId)
// Validation for the message being sent from a Foreign tenant
| where tobool(RawEventData.ParticipantInfo.HasForeignTenantUsers) == true
| where RawEventData.CommunicationType == “OneOnOne”
// Validation that the conversation is not initiated from a guest tenant
| where tobool(RawEventData.ParticipantInfo.HasGuestUsers) == false
| where tobool(RawEventData.ParticipantInfo.HasOtherGuestUsers) == false
// Validation that the sender is not recognized. If the sender is not recognized, only the email address is populated here
| where AccountId has “@”
This query can also be appended with aggregation by sender tenant to identify targeted attempts:
| extend TargetUserUPN = tolower(tostring(RawEventData.Members[1].UPN))
| extend TargetTenant = tostring(RawEventData.OrganizationId)
| extend AttackerTenant = tostring(RawEventData.Members[0].OrganizationId)
| extend AttackerUPN = tostring(RawEventData.Members[0].UPN)
| extend AttackerName = tostring(RawEventData.Members[0].DisplayName)
|summarize summarize UsersTargeted = dcount(TargetUserUPN ) by AttackerTenant, AttackerUPN, bin(Timestamp, 1h)
|where UsersTargeted >= 2
RMM Tools Abuse
In cases involving spam floods, the attacker will often call the user via Teams and persuade them to open the Quick Assist application (one of the most targeted RMM applications) and provide the access code. Once the user shares the code, the attacker gains access to the device. If the user also approves the “Request control” prompt, the attacker gains full control over the device.
Hunting for Compromises
Hunt for Teams Activity followed by suspicious RMM:
let interestingUsers = DeviceProcessEvents
| where Timestamp > ago(1h)
| where isnotempty(InitiatingProcessAccountObjectId)
|where FileName has_any (“quickassist.exe”, “anydesk.exe”, “teamviewer_service.exe”) // Multiple RMM tools can be abused here
| project InitiatingProcessAccountUpn;
CloudAppEvents
| where Timestamp > ago(1d)
| where Application == “Microsoft Teams”
| where ActionType == “ChatCreated”
| where isempty(AccountObjectId)
| where RawEventData.ParticipantInfo.HasForeignTenantUsers == true
| where RawEventData.CommunicationType == “OneOnOne”
| where RawEventData.ParticipantInfo.HasGuestUsers == false
| where RawEventData.ParticipantInfo.HasOtherGuestUsers == false
| where AccountId has “@”
| extend TargetUPN = tolower(tostring(RawEventData.Members[1].UPN))
| where TargetUPN in (interestingUsers )
| extend VictimTenant = tostring(RawEventData.OrganizationId)
| extend AttackerTenant = RawEventData.Members[0].OrganizationId
| extend AttackerUPN = RawEventData.Members[0].UPN
| extend AttackerName = RawEventData.Members[0].DisplayName
Initial Access
The Storm-1811 actor calls users on Teams, then abuses RMM tools to deploy payloads and initiate credential theft for initial access. And, the Storm-1674 actor either calls users or uses Teams chat to deliver malicious payloads via phishing links hosted on file-sharing services usually like SharePoint.
Hunting for Compromises
In addition to the Teams phishing activities recorded in CloudAppEvents telemetry, clicks on SharePoint URLs are logged in the UrlClickEvents table. Correlating suspicious signals on devices with UrlClickEvents table can help identify and highlight this activity.
Correlating URL click events on alerted devices
let alertedDevices = AlertEvidence
| where Timestamp > ago(1h)
| where isnotempty(DeviceId)
|distinct DeviceId;
let interestedUsers = DeviceProcessEvents
| where Timestamp > ago(1h)
| where DeviceId in (alertedDevices)
| where isnotempty(InitiatingProcessAccountUpn)
| distinct InitiatingProcessAccountUpn;
UrlClickEvents
| where Timestamp > ago(1d)
| where ActionType == “ClickAllowed” or IsClickedThrough !=”0″
| where Workload has “Teams”
| where AccountUpn in (interestedUsers)
Credential Access
After taking control of the target user’s device through RMM, the attacker executes a script under the pretext of fixing the spam flood activity. The name of the script also justifies the intent to convince the user for the next steps (Eg : Spam Filter Update). When the script is executed, it prompts the target user to provide the credentials, persuaded by the attacker.
In a few other scenarios, the attacker also redirects the user to an AiTM phishing page to complete the sign-in with MFA to compromise the session token.
Hunting for Compromises
These compromises can be identified by correlating risky sign-in attempts with Teams phishing from external tenants. The below query can be used to identify identity compromises (Adversary-in-the-middle attack) through Teams messages with malicious links/attachments as well:
let usersWithRiskySignIn = AADSignInEventsBeta
|where Timestamp > ago(1h)
|where RiskLevelDuringSignIn == 100
|project AccountUpn;
CloudAppEvents
| where Timestamp > ago(1d)
| where Application == “Microsoft Teams”
| where ActionType == “ChatCreated”
| where isempty(AccountObjectId)
| where RawEventData.ParticipantInfo.HasForeignTenantUsers == true
| where RawEventData.CommunicationType == “OneOnOne”
| where RawEventData.ParticipantInfo.HasGuestUsers == false
| where RawEventData.ParticipantInfo.HasOtherGuestUsers == false
| where AccountId has “@”
| extend TargetUPN = tolower(tostring(RawEventData.Members[1].UPN))
| where TargetUPN in (interestingUsers )
| extend TargetTenant = tostring(RawEventData.OrganizationId)
| extend AttackerTenant = RawEventData.Members[0].OrganizationId
|where TargetTenant != AttackerTenant
| extend AttackerUPN = RawEventData.Members[0].UPN
| extend AttackerName = RawEventData.Members[0].DisplayName
|project project-reorder Timestamp, AttackerTenant, AttackerUPN, AttackerName, TargetUPN
Execution
Using a scripted cURL command, the attacker downloads additional payloads in an RMM session, or shares a SharePoint link on Microsoft Teams with payloads and tools (like NetSupport RAT). In a few scenarios, an SSH connection was also setup with the attacker’s machine.
In conjunction with RMM tools, attackers use various command-line utilities to manipulate Active Directory (AD) environments. One such utility is Csvde, a command-line tool that imports and exports data from Active Directory Domain Services (AD DS). Csvde can be exploited by threat actors to extract sensitive AD information or to introduce malicious entries into the directory, further compromising the security of the environment.
Detect suspicious file downloads
DeviceNetworkEvents
| where InitiatingProcessFileName in~ (“curl.exe”, “powershell.exe”, “certutil.exe”, “bitsadmin.exe”)
| where RemoteIPType == “Public”
| where RemoteUrl endswith “.exe” or RemoteUrl endswith “.dll” or RemoteUrl endswith “.zip”
| project Timestamp, DeviceId, InitiatingProcessFileName, RemoteIP, RemoteUrl
| extend AlertType = “Suspicious file download from unknown IP address”
Detection of csvde.exe Download and AD Enumeration
// Detect curl downloading csvde.exe
let csvde_download = DeviceProcessEvents
| where InitiatingProcessFileName =~”cmd.exe”
| where ProcessCommandLine has_all (“curl”,”-o”,”csvde.exe”,”http:”)
| project DeviceId,Timestamp,CurlCommandLine=ProcessCommandLine, CurlProcessId = ProcessId;
// Detect execution of csvde.exe with specific parameters
let csvde_execution =
DeviceProcessEvents
| where FileName =~ “csvde.exe”
| where ProcessCommandLine has_all (“-r”,”objectClass=Computer”)
and ProcessCommandLine has_all (“-l”,”samAccountName”,”description”,”info”,”operatingSystem”)
and ProcessCommandLine contains “-f”
| project DeviceId,Timestamp, CsvdeCommandLine= ProcessCommandLine,CsvdeProcessId = ProcessId;
Join the two events and look for them occurring within 5 minutes
csvde_download
| join kind=inner (
csvde_execution
) on DeviceId
| where Timestamp between (Timestamp1 .. Timestamp1 + 5m)
| extend AlertType = “Potential Active Directory Enumeration”, Details = strcat(“curl.exe was used to download csvde.exe, which was then executed to enumerate AD computers. “)
// Detect potential data compression and exfiltration
let compress_exfil = DeviceProcessEvents
| where FileName =~ “7z.exe”
| where ProcessCommandLine contains “x -p”
| project Timestamp, DeviceId, FileName, ProcessCommandLine, ProcessId
| join kind=inner (
DeviceNetworkEvents
| where InitiatingProcessId != 0
) on $left.ProcessId == $right.InitiatingProcessId
| project Timestamp, DeviceId, FileName, ProcessCommandLine, RemoteIP, RemotePort
| extend AlertType = “Potential data compression and exfiltration”;
Reconnaissance
This attack specifically involved high number of reconnaissance commands including ipconfig, systeminfo, geo location scans, user recons, EDR protection status. In a typical attack, this information is exfiltrated to an external C2 server. However, in these attacks, the attacker could have probably taken a screenshot through the RMM.
Persistence
The payloads downloaded by the attacker was used to create persistence either using scheduled tasks or by being added to the startup folder.
// Persistence through Startup operations
let startUpOperations = DeviceFileEvents
| where FolderPath has @”Start MenuProgramsStartup”
| where ActionType in (“FileCreated”, “FileModified”, “FileRenamed”);
// Persistence through Registry Tampering
let regOperations = DeviceRegistryEvents
| where hasAlertDevices
| where Timestamp between (startTime .. endTime)
| where DeviceId in (alertedDevices)
| where RegistryKey has_any (regKeys)
| where ActionType in (“SetValue” ,“CreateKey” , “RenameKey”);
// Persistence through Scheduled task creation
let scheduledOperations = DeviceProcessEvents
| where Timestamp between (startTime .. endTime)
| where DeviceId in (alertedDevices)
| where (InitiatingProcessCommandLine has “schtasks” and InitiatingProcessCommandLine has_any (“run”, “create” , “change”));
union startUpOperations, regOperations, scheduledOperations
| summarize arg_min(Timestamp, *) by DeviceId
Detections
Suspicious activity using Quick Assist
Possible remote access tool activity
Suspicious usage of remote management software
Suspicious location of remote management software
Possible NetSupport Manager activity
References
NOTE: The following references are available for Microsoft Defender customers.
Qakbot distributor Storm-0464 shifts to DarkGate and IcedID : Intel Article – Microsoft Defender – Shift to DarkGate and IcedID
Financially motivated threat actors misusing App Installer : Intel Article – Microsoft Defender – App Installer misuse
Threat actors misusing Quick Assist in social engineering attacks leading to ransomware : Intel Article – Microsoft Defender – Quick Assist misuse
Recommendations
Educate Microsoft Teams users to verify ‘External’ tagging on communication attempts from external entities, be cautious about what they share, and never share their account information or authorize sign-in requests over chat.
Administrators have an option to manage chats/Teams meetings with external users not managed by the Organization
Apply Microsoft’s security best practices for Microsoft Teams to safeguard Teams users.
Educate users about diligent use of RMM tools
Implement Conditional Access authentication strength to require phishing-resistant authentication for employees and external users for critical apps.
Enable investigation and remediation in full automated mode to allow Defender for Endpoint to take immediate action on alerts to resolve breaches, significantly reducing alert volume.
NOTE: The following is available for Microsoft Defender customers.
Refer to Microsoft’s human-operated ransomware overview for general hardening recommendations against ransomware attacks.
Microsoft Tech Community – Latest Blogs –Read More
PC started to stutter after the latest Windows 11 update
I reinstalled the update, tried some commands but nothing helped. When I run sfc /scannow it says that it found some corrupted files and that they would be fixed when I restart my pc but all that happens when I restart it is that I’m being told that updates are on the way and they download until 30% before my pc restarts again (this only happens when I restart after running scan now). the stuttering always randomly occurs every few mins and it s only a quick freezing of my pc
I reinstalled the update, tried some commands but nothing helped. When I run sfc /scannow it says that it found some corrupted files and that they would be fixed when I restart my pc but all that happens when I restart it is that I’m being told that updates are on the way and they download until 30% before my pc restarts again (this only happens when I restart after running scan now). the stuttering always randomly occurs every few mins and it s only a quick freezing of my pc Read More
la connexion au serveur entrant IMAP a été supprimée
Bonjour
la connexion au serveur entrant IMAP a été supprimée vérifiez les paramètres et re essayez
impossible j ai tout essayé et on me dit que les emails que l’on m’envoie reviennent…
j’ai fait réparer, désinstallé office et réinstallé
aidez moi s’il vous plait
Bonjourla connexion au serveur entrant IMAP a été supprimée vérifiez les paramètres et re essayez impossible j ai tout essayé et on me dit que les emails que l’on m’envoie reviennent… j’ai fait réparer, désinstallé office et réinstallé aidez moi s’il vous plait Read More
Question: Controlling User Access to Views in a Page Library
I’m looking for a way to control access on views within a page library. Specifically, we are using the page library to store news posts, but some of these posts contain sensitive data. Ideally, these posts should only be visible to users once they are published and approved.
One approach I’m considering is creating a view where users can only see the pages they have created. I believe this could help meet the requirements for restricting access during the approval process.
Has anyone implemented something similar or know if this is possible? Any advice or alternative suggestions would be appreciated!
I’m looking for a way to control access on views within a page library. Specifically, we are using the page library to store news posts, but some of these posts contain sensitive data. Ideally, these posts should only be visible to users once they are published and approved.One approach I’m considering is creating a view where users can only see the pages they have created. I believe this could help meet the requirements for restricting access during the approval process.Has anyone implemented something similar or know if this is possible? Any advice or alternative suggestions would be appreciated! Read More
Image size in Word on 24H2
When inserting images in to Word (desktop) on Windows 24H2, the image size appears to be ignored and it puts the image full width across the page. Doing the same thing with the same version of Word on Windows 23H2 it inserts as per the actual image size. Is this a bug or has something changed and is there therefore a setting somewhere to set it back to the 23H2 way?
When inserting images in to Word (desktop) on Windows 24H2, the image size appears to be ignored and it puts the image full width across the page. Doing the same thing with the same version of Word on Windows 23H2 it inserts as per the actual image size. Is this a bug or has something changed and is there therefore a setting somewhere to set it back to the 23H2 way? Read More
SCCM Server fails Windows 11 24H2 upgrade package download
SCCM Server 2403 fails Windows 11 24H2 upgrade package download (both 2024-09B and 2024-10B).
Running MP, DP, Site and WSUS database, several other roles on the same Windows Server 2022 VM. Running SUP/Wsus on another dedicated VM in the same subnet.
When running ADR, GUI shows error message: 0x87d20417 ADR rule download failedWhen downloading the updates manually to new deployment package, error message: Failed to download content id 666666666 Cannot create a file when that file already existsHere is a sample from Patchdownloader.log file:
Downloading content for ContentID = 18696696, FileName = professional_en-us.esd. Software Updates Patch Downloader 09.10.2024 13:26:50 11808 (0x2E20)
Proxy is enabled for download, using registry settings or defaults. Software Updates Patch Downloader 09.10.2024 13:26:50 11808 (0x2E20)
Connecting – Adding file range by calling HttpAddRequestHeaders, range string = “Range: bytes=0-” Software Updates Patch Downloader 09.10.2024 13:26:50 8052 (0x1F74)
Download file size : 553783259 bytes Software Updates Patch Downloader 09.10.2024 13:26:50 8052 (0x1F74)
Download http://dl.delivery.mp.microsoft.com/filestreamingservice/files/75ac9ad5-f29b-4e95-af3f-8a321bd39b92/public/professional_en-us_98014c58afbd29a57aed4f5eb6819f5cc5bce4a4.esd in progress: 10 percent complete Software Updates Patch Downloader 09.10.2024 13:26:51 8052 (0x1F74) …….
Download http://dl.delivery.mp.microsoft.com/filestreamingservice/files/75ac9ad5-f29b-4e95-af3f-8a321bd39b92/public/professional_en-us_98014c58afbd29a57aed4f5eb6819f5cc5bce4a4.esd in progress: 90 percent complete Software Updates Patch Downloader 09.10.2024 13:27:00 8052 (0x1F74)
InternetReadFile() return true and pdwNumberOfBytesRead equals to 0, but ulTotalFileRead=553703152 still less than ulFileSize=553783259, treat it as a retriable error. Software Updates Patch Downloader 09.10.2024 13:27:01 8052 (0x1F74) InternetQueryDataAvailable return code = 183 – Can still retry for 3 times. Will retry in 10 seconds. Software Updates Patch Downloader 09.10.2024 13:27:01 8052 (0x1F74)
the same kind of error is logged for several other files related to the upgrade package, but not all.Downloading using Edge browser on the same machine directly from url “[http://dl.delivery.mp.microsoft.com/filestreamingservice/files/75ac9ad5-f29b-4e95-af3f-8a321bd39b92/public/professional_en-us_98014c58afbd29a57aed4f5eb6819f5cc5bce4a4.esd]” works fine, so it should not be a connectivity issue.
Downloading Windows 11 23H2 upgrade package works fine.
Has anybody else faced the same issue?
SCCM Server 2403 fails Windows 11 24H2 upgrade package download (both 2024-09B and 2024-10B).Running MP, DP, Site and WSUS database, several other roles on the same Windows Server 2022 VM. Running SUP/Wsus on another dedicated VM in the same subnet.When running ADR, GUI shows error message: 0x87d20417 ADR rule download failedWhen downloading the updates manually to new deployment package, error message: Failed to download content id 666666666 Cannot create a file when that file already existsHere is a sample from Patchdownloader.log file:Downloading content for ContentID = 18696696, FileName = professional_en-us.esd. Software Updates Patch Downloader 09.10.2024 13:26:50 11808 (0x2E20)Proxy is enabled for download, using registry settings or defaults. Software Updates Patch Downloader 09.10.2024 13:26:50 11808 (0x2E20)Connecting – Adding file range by calling HttpAddRequestHeaders, range string = “Range: bytes=0-” Software Updates Patch Downloader 09.10.2024 13:26:50 8052 (0x1F74)Download file size : 553783259 bytes Software Updates Patch Downloader 09.10.2024 13:26:50 8052 (0x1F74)Download http://dl.delivery.mp.microsoft.com/filestreamingservice/files/75ac9ad5-f29b-4e95-af3f-8a321bd39b92/public/professional_en-us_98014c58afbd29a57aed4f5eb6819f5cc5bce4a4.esd in progress: 10 percent complete Software Updates Patch Downloader 09.10.2024 13:26:51 8052 (0x1F74) …….Download http://dl.delivery.mp.microsoft.com/filestreamingservice/files/75ac9ad5-f29b-4e95-af3f-8a321bd39b92/public/professional_en-us_98014c58afbd29a57aed4f5eb6819f5cc5bce4a4.esd in progress: 90 percent complete Software Updates Patch Downloader 09.10.2024 13:27:00 8052 (0x1F74)InternetReadFile() return true and pdwNumberOfBytesRead equals to 0, but ulTotalFileRead=553703152 still less than ulFileSize=553783259, treat it as a retriable error. Software Updates Patch Downloader 09.10.2024 13:27:01 8052 (0x1F74) InternetQueryDataAvailable return code = 183 – Can still retry for 3 times. Will retry in 10 seconds. Software Updates Patch Downloader 09.10.2024 13:27:01 8052 (0x1F74)the same kind of error is logged for several other files related to the upgrade package, but not all.Downloading using Edge browser on the same machine directly from url “[http://dl.delivery.mp.microsoft.com/filestreamingservice/files/75ac9ad5-f29b-4e95-af3f-8a321bd39b92/public/professional_en-us_98014c58afbd29a57aed4f5eb6819f5cc5bce4a4.esd]” works fine, so it should not be a connectivity issue.Downloading Windows 11 23H2 upgrade package works fine.Has anybody else faced the same issue? Read More
Microsoft Partner Center API – 401 Unauthorized when using access token
I am attempting to retrieve the list of customers from the Microsoft Partner Center API, but I am consistently receiving a 401 Unauthorized error when using the access token obtained from the Microsoft identity platform.
Steps to Reproduce:
Requesting Access Token
I successfully obtained an access token using the following POST request:
POST https://login.microsoftonline.com/<tenant_id>/oauth2/token HTTP/1.1
Host: login.microsoftonline.com
Content-Type: application/x-www-form-urlencoded; charset=utf-8
grant_type=client_credentials
&client_id=<your_client_id>
&client_secret=<your_client_secret>
&resource= https://api.partner.microsoft.com
In response, I receive a valid access token.
Calling Partner Center API
I am then using the token in the following API request to retrieve customer information:GET https://api.partnercenter.microsoft.com/v1/customers
Authorization: Bearer <access_token>
Content-Type: application/json
Issue
The response to the above GET request is as follows:
HTTP/1.1 401 Unauthorized
Content-Length: 0
Could you please assist in identifying why I am receiving the 401 Unauthorized error and what steps can be taken to resolve this issue?
I am attempting to retrieve the list of customers from the Microsoft Partner Center API, but I am consistently receiving a 401 Unauthorized error when using the access token obtained from the Microsoft identity platform.Steps to Reproduce:Requesting Access TokenI successfully obtained an access token using the following POST request:POST https://login.microsoftonline.com/<tenant_id>/oauth2/token HTTP/1.1
Host: login.microsoftonline.com
Content-Type: application/x-www-form-urlencoded; charset=utf-8
grant_type=client_credentials
&client_id=<your_client_id>
&client_secret=<your_client_secret>
&resource= https://api.partner.microsoft.comIn response, I receive a valid access token.Calling Partner Center APII am then using the token in the following API request to retrieve customer information:GET https://api.partnercenter.microsoft.com/v1/customers
Authorization: Bearer <access_token>
Content-Type: application/jsonIssueThe response to the above GET request is as follows:HTTP/1.1 401 Unauthorized
Content-Length: 0
Could you please assist in identifying why I am receiving the 401 Unauthorized error and what steps can be taken to resolve this issue? Read More
Connect Project Online (PWA) using CSOM (C#) with MFA
Hello community, I need to work with MS Project Online (PWA) over API, CRUD projects, CRUD tasks and etc.
I can connect to Project with using CSOM as described here:
And it works fine until MFA is enabled.
Once MFA is enabled in Azure, the connection fails:
“error”: “interaction_required”,
“error_description”: “AADSTS50076:
Due to a configuration change made by your administrator, or because you moved to a new location, you must use multi-factor authentication to access
I’m searching proper and working way to pass 2-factor auth (as example it works fine with Schedule API from the box)
Package “SharePointPnPCoreOnline” that contains GetWebLoginClientContext method is deprecated (https://www.nuget.org/packages/SharePointPnPCoreOnline/3.28.2012)
Package “PnP.Framework” does not contain (I can’t see) ability to pass 2-factor auth and retrieve token (https://www.nuget.org/packages/PnP.Framework/1.17.0) and returns same error as above.
Can anyone tell me how to pass 2-factor authentication using C#, CSOM to get ProjectContext worked?
Thank you
Hello community, I need to work with MS Project Online (PWA) over API, CRUD projects, CRUD tasks and etc.I can connect to Project with using CSOM as described here:https://learn.microsoft.com/en-us/sharepoint/dev/sp-add-ins/using-csom-for-dotnet-standard?source=recommendationsAnd it works fine until MFA is enabled.Once MFA is enabled in Azure, the connection fails:”error”: “interaction_required”,”error_description”: “AADSTS50076:Due to a configuration change made by your administrator, or because you moved to a new location, you must use multi-factor authentication to access I’m searching proper and working way to pass 2-factor auth (as example it works fine with Schedule API from the box)Package “SharePointPnPCoreOnline” that contains GetWebLoginClientContext method is deprecated (https://www.nuget.org/packages/SharePointPnPCoreOnline/3.28.2012)Package “PnP.Framework” does not contain (I can’t see) ability to pass 2-factor auth and retrieve token (https://www.nuget.org/packages/PnP.Framework/1.17.0) and returns same error as above.Can anyone tell me how to pass 2-factor authentication using C#, CSOM to get ProjectContext worked?Thank you Read More
Create Azure Data Factory managed private links
Please review and approve this post.
Microsoft Tech Community – Latest Blogs –Read More
पेटीएम गलत लेनदेन शिकायत नंबर
पेटीएम गलत लेनदेन शिकायत नंबर सहायता टीम (08102↑↑611↑↑817} तक पहुंच सकते हैं और जितनी जल्दी हो सके अपनी शिकायत दर्ज कर सकते हैं।
पेटीएम गलत लेनदेन शिकायत नंबर सहायता टीम (08102↑↑611↑↑817} तक पहुंच सकते हैं और जितनी जल्दी हो सके अपनी शिकायत दर्ज कर सकते हैं। Read More
पेटीएम गलत लेनदेन शिकायत नंबर?
पेटीएम गलत लेनदेन शिकायत नंबर सहायता टीम (08102↑↑611↑↑817} तक पहुंच सकते हैं और जितनी जल्दी हो सके अपनी शिकायत दर्ज कर सकते हैं।lk
पेटीएम गलत लेनदेन शिकायत नंबर सहायता टीम (08102↑↑611↑↑817} तक पहुंच सकते हैं और जितनी जल्दी हो सके अपनी शिकायत दर्ज कर सकते हैं।lk Read More
If statement. If one cell of 5 is changed to true.
I’m new to excel and I am trying to figure out a formula.
I have 5 cells. e.g. True, True, False, False, False.
These are for Monday, Tuesday, Wednesday etc.
Every day at work we get info.
If the info for one one thing is not there then we put it through as true but when we have the info for that week then we switch it needs to switch to false.
How would I make it so that e.g. on Wednesday the data comes back as false (we get the data) then the if statement changes. At the moment all i’ve managed to do is make it so if there is any true in the statement then it comes back with “not collected” however if it is “collected” on wednesday it will still say “not collected” as Mon and Tue weren’t “collected”
If that makes any sense
Sorry its hard to explain i’m extremely new to excel.
Thank you
I’m new to excel and I am trying to figure out a formula.I have 5 cells. e.g. True, True, False, False, False.These are for Monday, Tuesday, Wednesday etc.Every day at work we get info. If the info for one one thing is not there then we put it through as true but when we have the info for that week then we switch it needs to switch to false.How would I make it so that e.g. on Wednesday the data comes back as false (we get the data) then the if statement changes. At the moment all i’ve managed to do is make it so if there is any true in the statement then it comes back with “not collected” however if it is “collected” on wednesday it will still say “not collected” as Mon and Tue weren’t “collected”If that makes any senseSorry its hard to explain i’m extremely new to excel.Thank you Read More
पेटीएम के खिलाफ शिकायत कैसे करें?
पेटीएम गलत लेनदेन शिकायत नंबर सहायता टीम (08102↑↑611↑↑817} तक पहुंच सकते हैं और जितनी जल्दी हो सके अपनी शिकायत दर्ज कर सकते हैं।
पेटीएम गलत लेनदेन शिकायत नंबर सहायता टीम (08102↑↑611↑↑817} तक पहुंच सकते हैं और जितनी जल्दी हो सके अपनी शिकायत दर्ज कर सकते हैं। Read More
पेटीएम के खिलाफ शिकायत कैसे करें
पेटीएम गलत लेनदेन शिकायत नंबर सहायता टीम (08102↑↑611↑↑817} तक पहुंच सकते हैं और जितनी जल्दी हो सके अपनी शिकायत दर्ज कर सकते हैं।
पेटीएम गलत लेनदेन शिकायत नंबर सहायता टीम (08102↑↑611↑↑817} तक पहुंच सकते हैं और जितनी जल्दी हो सके अपनी शिकायत दर्ज कर सकते हैं। Read More