Category: Microsoft
Category Archives: Microsoft
Adding security layers to Azure Kubernetes Service: 8 you can use from Rancher and NeuVector by SUSE
In this guest blog post, Tracy Walker, Senior Security Engineer for NeuVector by SUSE, explores how to implement additional security layers for Azure Kubernetes Service using SUSE’s Rancher Prime and NeuVector Prime.
Experienced users of Microsoft Azure or other public cloud services are likely familiar with the shared-responsibility model and the anxiety of determining where “shared responsibility” stops and “It’s my responsibility” starts. Add an unexpected security event, and you can find yourself searching for additional layers that work with your existing security and let you maintain independent control. In this brief blog, let’s detail exactly how you can quickly add additional security layers to Azure Kubernetes Service (AKS) using SUSE’s Rancher Prime and NeuVector Prime.
Understanding the threats to containerized environments
Before we get into the details of security layers for AKS clusters, let’s address two common questions that will help us get straight to the point:
1. How can you presume my existing security is not good enough for container security? You have no idea what I’m doing for container security.
Simply, let’s say you are not using SUSE NeuVector or NeuVector Prime but are using an eBPF-centric solution or virtual machine security. You do not have complete network visibility east-west inside your Kubernetes cluster. Allow me to explain: The trade-off from gaining Kubernetes automated networking is losing full visibility of network payload and protocol east-west within the cluster, specifically layers 5-7 of the network OSI model (session layer, presentation layer, and application layer). VM security tools or kernel-centric tools that use popular eBPF technology can identify only layer 3 network and layer 4 transport protocols and cannot “see” network payloads potentially carrying live attacks. Your cluster network remains an entry point to zero-day exploits, remote privilege escalation, or code executions that cannot be mitigated by common vulnerabilities and exposures (CVE) remediation or eBPF system call filtering.
NeuVector detects your workload’s unique network traffic to define security policies specific to your unique workload network behavior, creating Zero Trust microsegmentation that allows only known network traffic and can alert or block any traffic unknown to your workload. Unlike eBPF, NeuVector can identify threats in network traffic earlier in the kill chain, and before they reach the kernel.
In other words, neither virtual machines nor eBPF security layers can inspect full network traffic through layer 7 inside Kubernetes. This creates a security blind spot. NeuVector uses patented open-source technology to add multiple network-centric security layers to mitigate this blind spot.
2. Isn’t AKS already protecting me?
Azure’s shared-responsibility model makes clear that users of AKS PaaS are responsible for network controls, application security, and identity management. SUSE recommends security layers, such as Microsoft Defender for Containers, as well as adding security layers provided by Rancher and NeuVector for security threats not mitigated by your cloud provider. For example, NeuVector provides network threat detection and layer 7 protocol identification and validation for all network traffic where Microsoft Defender does not have such visibility.
As an independent source of truth for network activity, NeuVector complements Microsoft Defender for Containers by creating security policies directly from the unique workload network patterns that NeuVector detects, and it can then alert or block any anomalous behavior at runtime — including zero-day attacks — as well as automatically packet-capture the attack for post-event forensics. One example of how multiple security layers from NeuVector could be used against the recent XZ Backdoor attack is detailed here in this blog.
2 Rancher security layers
Rancher simplifies the management of Kubernetes clusters by providing a centralized platform for deploying, scaling, and monitoring containerized applications. With Rancher, you can easily provision AKS clusters on Azure and automate day-to-day operations such as upgrades and maintenance tasks.
For security, Rancher provides two foundational security layers for role-based access control (RBAC) and network policy enforcement. Users can deploy both of these layers to control access to clusters and prevent unauthorized actions.
Configure 6 NeuVector security layers in under 15 minutes
NeuVector complements Kubernetes and AKS security with up to eight security layers that include real-time network threat detection, Zero Trust security policies for both network traffic and container/node processes, scanning for vulnerabilities and security misconfigurations, and data leak prevention. Because NeuVector is Kubernetes-native, you can deploy using a HELM chart, directly using Rancher, or automatically from the Azure Marketplace.
Enable the following NeuVector security layers for your AKS cluster to mitigate specific threats with very little time or effort:
Layers 1 and 2: Automated CVE and security configuration scanning: Enabling NeuVector’s Auto Scan will immediately inspect and report on all nodes, your orchestrator platform, and containers to detect both known CVE exploits and security misconfigurations as compared to recommended CIS Benchmarks for Kubernetes and Docker.
Configuration time: 10 seconds.
Layers 3 and 4: Zero Trust runtime network and process security: Achieve full network and process microsegmentation. Because NeuVector defaults to Discover Mode upon installation, your workload network and process behaviors are automatically “learned” and defined as security policies to allow those behaviors in a Zero Trust cluster. Configure the Service Group Mode Automation in NeuVector’s settings to automatically enable Monitor or Protect enforcement modes, thus enabling Zero Trust segmentation between known and unknown network or process behaviors for all pods and nodes. NeuVector’s runtime layers are effective detecting any anomalous behavior, zero-day attack, internal actor, or attempted exploit of unpatched CVE because it derives the security policies directly from workload behavior. Bonus: Both network and process runtime policies can be exported as security-policy-as-code YAML, so your security can automatically be deployed to any cluster with your workloads.
Configuration time: 20 seconds.
Layer 5: Live network threat detection: The only security layer that is 100 percent automatic and requires no setup or configuration. NeuVector uses its patented Deep Packet Inspection to detect and block more than 24 known network threats as they occur, and also perform an automatic packet capture of what triggered the violation.
Configuration time: Automatic (zero seconds).
Layer 6: NeuVector admission controller: NeuVector’s admission controller gives you 31 prebuilt policies that are CVE- and compliance-aware when using registry scanning.
Configuration time: Two minutes per rule.
Extra: Layers 7 and 8: Data leak prevention (DLP) and ingress WAF sensors: These advanced security layers focus on egress or ingress traffic, but are a little more advanced in their setup and use. DLP and WAF sensors can be completely customized to your specific environment, so SUSE recommends using these security layers after the other six layers are in place, perhaps in conjunction with NeuVector Prime support.
Configuration time: Varies: See NeuVector Prime.
Conclusion
Securing Azure Kubernetes Service necessitates multiple security layers using tools like Rancher and NeuVector by SUSE to eliminate blind spots. By deploying these tools and implementing the security layers recommended, you can rapidly mature your security posture and mitigate known or unknown risks associated with your AKS environments.
Securing any Kubernetes cluster should always be understood as an ongoing process that requires vigilance and reviews to identify new or unmitigated threats. With SUSE tools and security best practices in place, you can confidently secure any Kubernetes cluster using multiple automated security layers while minimizing management overhead.
Microsoft Tech Community – Latest Blogs –Read More
Icons Missing in Personal Folder After Latest Update
After upgrading to the most recent public Cumulative update, I observed that the yellow folders within my User directory no longer display icons within them, regardless of their size. Interestingly, the icons remain visible in the Details column on the right-hand side. My operating system is Windows 11 Pro 22H2 Build 22621.2715.
Has anyone else experienced this issue?
After upgrading to the most recent public Cumulative update, I observed that the yellow folders within my User directory no longer display icons within them, regardless of their size. Interestingly, the icons remain visible in the Details column on the right-hand side. My operating system is Windows 11 Pro 22H2 Build 22621.2715. Has anyone else experienced this issue? Read More
How to Modify the Windows Registry.
Hello. Recently, I successfully made my first Windows registry modification to resolve an annoyance. To ensure I don’t create any issues in the future, I’m seeking guidance. Currently, we have three PCs in use. One of them has only one Local Admin Account without a Standard User Account. Following a tutorial, I made a modification to the HKEY_CURRENT_USER key, and it worked smoothly.
On the other hand, our other two PCs, operating on Windows 11 22H2, have both a Local non-Microsoft Admin Account and a Standard Local User Account. The registry keys displayed in regedit are the typical ones: HKEY_CLASSES_ROOT, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, HKEY_USERS, and HKEY_CURRENT_CONFIG.
If I wish to implement a change in the registry that applies to both the Admin and Standard User accounts, should I make modifications within the HKEY_LOCAL_MACHINE key instead of CURRENT_USER, as I did with the PC that only has one account? Additionally, I want to mention that I created a backup of the Registry before proceeding with any modifications.
I would appreciate any advice to ensure I’m following the correct approach. Thank you.
Hello. Recently, I successfully made my first Windows registry modification to resolve an annoyance. To ensure I don’t create any issues in the future, I’m seeking guidance. Currently, we have three PCs in use. One of them has only one Local Admin Account without a Standard User Account. Following a tutorial, I made a modification to the HKEY_CURRENT_USER key, and it worked smoothly. On the other hand, our other two PCs, operating on Windows 11 22H2, have both a Local non-Microsoft Admin Account and a Standard Local User Account. The registry keys displayed in regedit are the typical ones: HKEY_CLASSES_ROOT, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, HKEY_USERS, and HKEY_CURRENT_CONFIG. If I wish to implement a change in the registry that applies to both the Admin and Standard User accounts, should I make modifications within the HKEY_LOCAL_MACHINE key instead of CURRENT_USER, as I did with the PC that only has one account? Additionally, I want to mention that I created a backup of the Registry before proceeding with any modifications. I would appreciate any advice to ensure I’m following the correct approach. Thank you. Read More
Copilot working for word but not for any other programs
Hi There,
Co pilot is working on word but not on any other app like outlook or excel.
Can anyone help
Hi There, Co pilot is working on word but not on any other app like outlook or excel. Can anyone help Read More
Troubleshooting Slow Cold Boot and Driver Loading Issues
Hi there,
I recently utilized AMD’s “auto-update” tool to update all AMD-related drivers on my 5900HX laptop. Unfortunately, when attempting to download the latest Adrenaline drivers, I encountered compatibility issues as it no longer supported GCN/Vega. Without realizing this, I opted to update using the auto-update tool.
Since the update, the cold boot time has significantly increased to about 2 minutes compared to the previous 20 seconds (loading animation screen). Upon enabling boot logging, I noticed Windows repeatedly trying to load the same drivers without success, resulting in numerous BOOTLOG_NOT_LOADED entries (see screenshot). Seeking a solution, I turned to Windows’ verifier tool, but after selecting all drivers for verification and restarting, I began experiencing “system_thread_exception_not_handled” BSODs consistently. To regain access to Windows, I had to reset verifier and deactivate driver verification.
I am unsure how to proceed from here and would prefer to avoid a fresh Windows installation if possible. Any guidance on resolving this issue would be greatly appreciated.
Thank you.
Hi there, I recently utilized AMD’s “auto-update” tool to update all AMD-related drivers on my 5900HX laptop. Unfortunately, when attempting to download the latest Adrenaline drivers, I encountered compatibility issues as it no longer supported GCN/Vega. Without realizing this, I opted to update using the auto-update tool. Since the update, the cold boot time has significantly increased to about 2 minutes compared to the previous 20 seconds (loading animation screen). Upon enabling boot logging, I noticed Windows repeatedly trying to load the same drivers without success, resulting in numerous BOOTLOG_NOT_LOADED entries (see screenshot). Seeking a solution, I turned to Windows’ verifier tool, but after selecting all drivers for verification and restarting, I began experiencing “system_thread_exception_not_handled” BSODs consistently. To regain access to Windows, I had to reset verifier and deactivate driver verification. I am unsure how to proceed from here and would prefer to avoid a fresh Windows installation if possible. Any guidance on resolving this issue would be greatly appreciated. Thank you. Read More
Bi-nance: Empfehlungscode “C15HJGN1” – Empfehlungs ID
Was ist der Bi-nance Empfehlungscode?
Bi-nance-Empfehlungscode: Er wird als “C15HJGN1“ verwendet. Er ist der am häufigsten verwendete, lebenslang gültige Bi-nance-Empfehlungscode mit dem höchsten Rabatt der Welt. Wenn Sie sich bei der Kryptowährungsbörse Bi-nance registrieren, schreiben Sie “C15HJGN1” anstelle von “Empfehlungs-ID“. Der Transaktionsgebührenrabatt, den Sie erhalten, beträgt 30 %.
Kurzfassung
Maximieren Sie Ihre Ersparnisse mit einem verifizierten Bi-nance-Empfehlungscode (C15HJGN1) für einen lebenslangen Rabatt von 20 % auf Transaktionsgebühren und einen Registrierungsbonus von 600 $.
Erhöhen Sie Ihre Provisionsrate auf 40 %, indem Sie Transaktionsgebühren mit BNB-Coins bezahlen!
Um das Bi-nance-Benutzererlebnis auf die nächste Stufe zu heben, zahlen Sie nach der Durchführung des Identitätsüberprüfungsprozesses Geld ein und profitieren Sie von Kryptowährungs-Kauf-/Verkaufstransaktionen, dem Eröffnen von Futures-Positionen, Verdienen, Launchpad und Launchpool-Tools!
Was ist der Bi-nance Empfehlungscode?Bi-nance-Empfehlungscode: Er wird als “C15HJGN1“ verwendet. Er ist der am häufigsten verwendete, lebenslang gültige Bi-nance-Empfehlungscode mit dem höchsten Rabatt der Welt. Wenn Sie sich bei der Kryptowährungsbörse Bi-nance registrieren, schreiben Sie “C15HJGN1” anstelle von “Empfehlungs-ID“. Der Transaktionsgebührenrabatt, den Sie erhalten, beträgt 30 %.KurzfassungMaximieren Sie Ihre Ersparnisse mit einem verifizierten Bi-nance-Empfehlungscode (C15HJGN1) für einen lebenslangen Rabatt von 20 % auf Transaktionsgebühren und einen Registrierungsbonus von 600 $.Erhöhen Sie Ihre Provisionsrate auf 40 %, indem Sie Transaktionsgebühren mit BNB-Coins bezahlen!Um das Bi-nance-Benutzererlebnis auf die nächste Stufe zu heben, zahlen Sie nach der Durchführung des Identitätsüberprüfungsprozesses Geld ein und profitieren Sie von Kryptowährungs-Kauf-/Verkaufstransaktionen, dem Eröffnen von Futures-Positionen, Verdienen, Launchpad und Launchpool-Tools! Read More
Compliance Manager Default Alert Policy
Hi everyone,
I just got a notification that a medium-severity alert has been triggered.
I’ve never encountered this before, can anyone tell me more about it and whether I should take any actions?
Compliance Manager Default Alert Policy
Hi everyone,I just got a notification that a medium-severity alert has been triggered. I’ve never encountered this before, can anyone tell me more about it and whether I should take any actions? Compliance Manager Default Alert Policy Read More
People search results excluding external/guest users
I would like to exclude/hide external/guest users in the people search in our SharePoint intranet site. In SharePoint admin centre created a new search “local people search2” which excludes external users using –AccountName:“#ext#”
Than in the “People-Directory.aspx” and “peopleresults.aspx” pages, I have edited the pages and webpart section and changed the query using “change query” section where I changed from the default “local people search” to “local people search2” see below. I saved and published the changes but it keeps defaulting back to “local people search” instead on “local people search2”, where am I going wrong, why does it keep defaulting back? When I test the query in the edit webpart it does what I need it to do, but it does not save the change from “local people search” instead on “local people search2”
I would like to exclude/hide external/guest users in the people search in our SharePoint intranet site. In SharePoint admin centre created a new search “local people search2″ which excludes external users using -AccountName:”#ext#” Than in the “People-Directory.aspx” and “peopleresults.aspx” pages, I have edited the pages and webpart section and changed the query using “change query” section where I changed from the default “local people search” to “local people search2” see below. I saved and published the changes but it keeps defaulting back to “local people search” instead on “local people search2”, where am I going wrong, why does it keep defaulting back? When I test the query in the edit webpart it does what I need it to do, but it does not save the change from “local people search” instead on “local people search2” Read More
Creating Default Save Folders on Your PC for Seamless Synchronization with OneDrive Cloud
Is it possible for me to automatically back up all folders and files to my PC while selecting specific folders to sync with Onedrive cloud as a backup? Currently, all autosaves are directed to Onedrive Personal. Will I still be able to access them without an internet connection?
Is it possible for me to automatically back up all folders and files to my PC while selecting specific folders to sync with Onedrive cloud as a backup? Currently, all autosaves are directed to Onedrive Personal. Will I still be able to access them without an internet connection? Read More
Increased Vertical Spacing for Jump List
Hello everyone,
I’m regretting my recent upgrade to Win11! However, I guess it was bound to happen sooner or later.
One issue I’m facing is the excessive line spacing in the jump list, which makes it difficult to view a good number of items easily. How can I decrease the line spacing in jump lists?
(The jump list refers to the list of currently open items that appears when you hover over an application on the taskbar. If there are too many items to display horizontally, they appear in a vertical list.)
Hello everyone,I’m regretting my recent upgrade to Win11! However, I guess it was bound to happen sooner or later. One issue I’m facing is the excessive line spacing in the jump list, which makes it difficult to view a good number of items easily. How can I decrease the line spacing in jump lists?(The jump list refers to the list of currently open items that appears when you hover over an application on the taskbar. If there are too many items to display horizontally, they appear in a vertical list.) Read More
Error 25 in VolSnap
Greetings! Here are the details of the primary computer setup:
– Intel Core i9-13900K processor running at stock settings
– 32 GB of G.SKILL DDR5 6800 RAM (2 x 16 GB)
– Gigabyte Gaming RTX 4090 graphics card
– Aorus Elite Z790 AX motherboard
– 2TB Kingston SSD
– Seasonic 1300W PX ATX 3.0 PCIE 5 power supply
– Operating system: Windows 11
When using this system for gaming, I periodically check the event logs for any issues. On a recent check, I encountered the VolSnap 25 Error message indicating that the shadow copies of volume C: were deleted due to insufficient shadow copy storage growth time. To address this, it is advisable to lessen the input/output (IO) load on the system or designate a different shadow copy storage volume that is not currently being shadow copied.
While this error may cause concern, it is generally recommended to take necessary action to prevent data loss. Therefore, it would be wise to investigate and potentially resolve the issue rather than ignoring it.
Greetings! Here are the details of the primary computer setup:- Intel Core i9-13900K processor running at stock settings- 32 GB of G.SKILL DDR5 6800 RAM (2 x 16 GB)- Gigabyte Gaming RTX 4090 graphics card- Aorus Elite Z790 AX motherboard- 2TB Kingston SSD- Seasonic 1300W PX ATX 3.0 PCIE 5 power supply- Operating system: Windows 11 When using this system for gaming, I periodically check the event logs for any issues. On a recent check, I encountered the VolSnap 25 Error message indicating that the shadow copies of volume C: were deleted due to insufficient shadow copy storage growth time. To address this, it is advisable to lessen the input/output (IO) load on the system or designate a different shadow copy storage volume that is not currently being shadow copied. While this error may cause concern, it is generally recommended to take necessary action to prevent data loss. Therefore, it would be wise to investigate and potentially resolve the issue rather than ignoring it. Read More
Azure Demo Lab
Hi All,
I have tried the Sentinel Training lab from “content hub” and now I want to create a small demo lab for Sentinel with certain Azure VMs.
One of the use cases is – alerting when a someone has logged in from different geolocations than where the VM is situated. How can I achieve getting logs of someone trying to connect from different geolocations to the same VM. I can create alerts based on that in Sentinel.
Thanks all !
Hi All,I have tried the Sentinel Training lab from “content hub” and now I want to create a small demo lab for Sentinel with certain Azure VMs.One of the use cases is – alerting when a someone has logged in from different geolocations than where the VM is situated. How can I achieve getting logs of someone trying to connect from different geolocations to the same VM. I can create alerts based on that in Sentinel.Thanks all ! Read More
|| Challenge for Team ||
Dear Team
This mail is offering a challenge to your team; So, the challenge is: – Suppose an Employee Muster Roll (A sheet that shows employee status daily wise whether he/she is present or not) is there and my requirement is one wants to find out how many employees are there who are present continuously for 10 days or more, how to find this.
I am attaching a file for more details
Mr. XPPPPPPPPPPPPPPPPPPPPPPWOWOPPPPPPMr. APPPPPPPPWOWOPPPPPPPPPPWOWOPPPPPPMr. BPPPPPPPPWOWOPPPPPPPPPPWOWOPPPPPP
Dear Team This mail is offering a challenge to your team; So, the challenge is: – Suppose an Employee Muster Roll (A sheet that shows employee status daily wise whether he/she is present or not) is there and my requirement is one wants to find out how many employees are there who are present continuously for 10 days or more, how to find this. I am attaching a file for more details Mr. XPPPPPPPPPPPPPPPPPPPPPPWOWOPPPPPPMr. APPPPPPPPWOWOPPPPPPPPPPWOWOPPPPPPMr. BPPPPPPPPWOWOPPPPPPPPPPWOWOPPPPPP Read More
Paperclip icon is missing
Why do I not have a paperclip icon as part of Copilot Pro?
Why do I not have a paperclip icon as part of Copilot Pro? Read More
E-mails sent by me go to SPAM folder or are not received at all
Hello!
The e-mails I send are not being received or being sent directly to the Spam folder in other domains.
I checked all the information related to how avoid that situation, but nothing works (like not using Caps Lock in the Subject, for instance).
What can I do to avoid this problem? Is this a shared problem or just related to e-mail?
My domain is outlook.pt
Thank you very much in advance.
Hello! The e-mails I send are not being received or being sent directly to the Spam folder in other domains.I checked all the information related to how avoid that situation, but nothing works (like not using Caps Lock in the Subject, for instance). What can I do to avoid this problem? Is this a shared problem or just related to e-mail? My domain is outlook.pt Thank you very much in advance. Read More
Company portal – Mac os APP is stuck on Pending
Using Intune to install a .pkg app on macOS. After installation, the status is ‘Pending’ in the Company Portal. I manually uninstalled the app, but the status remains ‘Pending’. The goal is to test it before making the app available to all users, but it seems that the macOS Company Portal is failing.
Any ideas how to fix status update?
Using Intune to install a .pkg app on macOS. After installation, the status is ‘Pending’ in the Company Portal. I manually uninstalled the app, but the status remains ‘Pending’. The goal is to test it before making the app available to all users, but it seems that the macOS Company Portal is failing. Any ideas how to fix status update? Read More
Report all existing Sharing Links in all SharePoints
Hello,
We are planning a complete cross-tenant migration, and need to somehow get a list of all existing Sharing Links in all of our (over 150) SharePoint sites, and which people (emails) are those links shared with, to replicate those accesses post-migration.
I have been investigating a lot about this but have been unable to find any solution for this case, even though it sounds like a pretty normal thing to me.
I know there are reports from SharePoint admin that will show the last 30-days activity in creation of Sharing Links (which is not enough).
There also is the possibility to manually access the Site Usage of any site and run a report that will be stored in a folder inside the same site. The report generated this way is almost what we need. Only problem is that the Sharing Links created to “SharePoint Groups” instead of specific users contain no info about what group was it actually shared with.
I know I could manually go to the file and check the groups that have access to it in “Manage Access” section, but that is exactly the thing we want to avoid by automating this.
I also had a PnP script shared with me by a Microsoft Engineer that have been throwing many different errors after every of the several attempts to make it work and fixing it, normally related to: “command was found in the module ‘SharePointPnPPowerShellOnline’, but the module could not be loaded due to the following error: [Could not load type ‘Microsoft.SharePoint.Client.ClientAuthenticationMode’ from assembly ‘Microsoft.SharePoint.Client.Runtime“
Some other times the error was referring to access denied.
I have been trying to find a way to do this for over a month now and I’m starting to despair a bit.
Anyone here knows a way to get this information?
Thank you in advance,
Alejandro.
Hello,We are planning a complete cross-tenant migration, and need to somehow get a list of all existing Sharing Links in all of our (over 150) SharePoint sites, and which people (emails) are those links shared with, to replicate those accesses post-migration.I have been investigating a lot about this but have been unable to find any solution for this case, even though it sounds like a pretty normal thing to me.I know there are reports from SharePoint admin that will show the last 30-days activity in creation of Sharing Links (which is not enough). There also is the possibility to manually access the Site Usage of any site and run a report that will be stored in a folder inside the same site. The report generated this way is almost what we need. Only problem is that the Sharing Links created to “SharePoint Groups” instead of specific users contain no info about what group was it actually shared with.I know I could manually go to the file and check the groups that have access to it in “Manage Access” section, but that is exactly the thing we want to avoid by automating this. I also had a PnP script shared with me by a Microsoft Engineer that have been throwing many different errors after every of the several attempts to make it work and fixing it, normally related to: “command was found in the module ‘SharePointPnPPowerShellOnline’, but the module could not be loaded due to the following error: [Could not load type ‘Microsoft.SharePoint.Client.ClientAuthenticationMode’ from assembly ‘Microsoft.SharePoint.Client.Runtime”Some other times the error was referring to access denied. I have been trying to find a way to do this for over a month now and I’m starting to despair a bit.Anyone here knows a way to get this information?Thank you in advance,Alejandro. Read More
The Best YouTube Shorts Downloader that Works on Windows PC?
I’ve recently started a new project that involves curating and sharing short video content for educational purposes. YouTube Shorts has become a fantastic resource for finding quick, engaging videos that perfectly fit my needs. However, I’m facing a challenge in downloading these YouTube Shorts videos to my Windows PC for offline use and editing.
I’ve tried a few online youtube shorts downloaders, but they either don’t support YouTube Shorts specifically or come with limitations and security concerns. Can anyone recommend the best YouTube Shorts Downloader for Windows? I’m looking for a reliable, safe, and easy-to-use solutio that can handle downloading YouTube Shorts videos directly to my Windows PC without compromising quality.
Thanks in advance for your support and suggestions!
I’ve recently started a new project that involves curating and sharing short video content for educational purposes. YouTube Shorts has become a fantastic resource for finding quick, engaging videos that perfectly fit my needs. However, I’m facing a challenge in downloading these YouTube Shorts videos to my Windows PC for offline use and editing. I’ve tried a few online youtube shorts downloaders, but they either don’t support YouTube Shorts specifically or come with limitations and security concerns. Can anyone recommend the best YouTube Shorts Downloader for Windows? I’m looking for a reliable, safe, and easy-to-use solutio that can handle downloading YouTube Shorts videos directly to my Windows PC without compromising quality. Thanks in advance for your support and suggestions! Read More
RD Gateway issue after update (Windows Server 2019)
I have pinpointed this to an issue with the aaedge.dll in System32 which has been updated in the latest update
Faulting application name: svchost.exe_TSGateway, version: 10.0.17763.3346, time stamp: 0xb6a0daab
Faulting module name: aaedge.dll, version: 10.0.17763.6054, time stamp: 0xce1c5805
Exception code: 0xc0000005
Fault offset: 0x000000000005abe2
Faulting process id: 0x480
Faulting application start time: 0x01dae7de27a0f719
Faulting application path: C:Windowssystem32svchost.exe
Faulting module path: c:windowssystem32aaedge.dll
Report Id: 9df5f2de-f650-4f30-846e-872e6ca7e583
Faulting package full name:
Faulting package-relative application ID:
I am not sure if anyone has found this also or has a fix?
It only appears to be with this new version as I have an RD Gateway machine that hasn’t been updated yet that works perfectly fine.
I have pinpointed this to an issue with the aaedge.dll in System32 which has been updated in the latest update Faulting application name: svchost.exe_TSGateway, version: 10.0.17763.3346, time stamp: 0xb6a0daab
Faulting module name: aaedge.dll, version: 10.0.17763.6054, time stamp: 0xce1c5805
Exception code: 0xc0000005
Fault offset: 0x000000000005abe2
Faulting process id: 0x480
Faulting application start time: 0x01dae7de27a0f719
Faulting application path: C:Windowssystem32svchost.exe
Faulting module path: c:windowssystem32aaedge.dll
Report Id: 9df5f2de-f650-4f30-846e-872e6ca7e583
Faulting package full name:
Faulting package-relative application ID: I am not sure if anyone has found this also or has a fix? It only appears to be with this new version as I have an RD Gateway machine that hasn’t been updated yet that works perfectly fine. Read More
Api Management v2 – Still only for the most wealthy
Good day,
I have been waiting for about 6 years for an affordable version of api management with network capability. The 2000USD a MONTH jump from standard to premium just to satisfy security with networking was unreasonable. Now I cannot explain the geek excitement with the announcement of standard v2 with networking for a fraction of the cost. I started planning for a bright future. But then…..
Basic v2 cannot be used as the development tier for Standard v2 production. It does not have the same features, especially the ones you would need to test networking.
So we would need 3x standard tier for dev, stg and production to continue with our IoC pipelines.
That will be an additional 1400USD a month. Ok, this is not 2000USD, but it could have been a $30000 it would have made no difference, it is still un justly expensive.
Microsoft response to me so far, we don’t understand why you would need to test in development, best to have everything in production and wait for future workspaces. Then you can safely redesign your whole networking and infrastructure architecture and test everything against your production instance to cater for this mmm, shortcoming or sneaky business tactic (I am making stuff up in my head as I do not get proper feedback).
Please can Microsoft explain this to me so I can understand. Maybe I am over re-acting and most company’s can afford this with a smile.
Good day, I have been waiting for about 6 years for an affordable version of api management with network capability. The 2000USD a MONTH jump from standard to premium just to satisfy security with networking was unreasonable. Now I cannot explain the geek excitement with the announcement of standard v2 with networking for a fraction of the cost. I started planning for a bright future. But then…..Basic v2 cannot be used as the development tier for Standard v2 production. It does not have the same features, especially the ones you would need to test networking.So we would need 3x standard tier for dev, stg and production to continue with our IoC pipelines.That will be an additional 1400USD a month. Ok, this is not 2000USD, but it could have been a $30000 it would have made no difference, it is still un justly expensive.Microsoft response to me so far, we don’t understand why you would need to test in development, best to have everything in production and wait for future workspaces. Then you can safely redesign your whole networking and infrastructure architecture and test everything against your production instance to cater for this mmm, shortcoming or sneaky business tactic (I am making stuff up in my head as I do not get proper feedback). Please can Microsoft explain this to me so I can understand. Maybe I am over re-acting and most company’s can afford this with a smile. Read More