Category: News
Can the MATLAB Installer save its download progress?
When I downloaded MATLAB with its Installer, halfway through the download, it said I couldn’t connect to the server, and it closed. when I opened it again, I needed to start from scratch and download again.When I downloaded MATLAB with its Installer, halfway through the download, it said I couldn’t connect to the server, and it closed. when I opened it again, I needed to start from scratch and download again. When I downloaded MATLAB with its Installer, halfway through the download, it said I couldn’t connect to the server, and it closed. when I opened it again, I needed to start from scratch and download again. installation, iso image MATLAB Answers — New Questions
Which estimator is used for which greyest options?
Hello Matlab folk,
this is my first entry in this forum, if I do something wrong, don’t hesitate to tell me.
I am wondering how i can determine, whether to use a Least Squares Estimator or a Maximum Likelihood Estimator. Is it the "Focus" setting or the "OutputWeight" in greyestOptions?
In literature, estimators are often characterized in Output-, Filter-, or Equation-Error. Which setting combinations correspond to those estimators?
Thank you very much,
MariusHello Matlab folk,
this is my first entry in this forum, if I do something wrong, don’t hesitate to tell me.
I am wondering how i can determine, whether to use a Least Squares Estimator or a Maximum Likelihood Estimator. Is it the "Focus" setting or the "OutputWeight" in greyestOptions?
In literature, estimators are often characterized in Output-, Filter-, or Equation-Error. Which setting combinations correspond to those estimators?
Thank you very much,
Marius Hello Matlab folk,
this is my first entry in this forum, if I do something wrong, don’t hesitate to tell me.
I am wondering how i can determine, whether to use a Least Squares Estimator or a Maximum Likelihood Estimator. Is it the "Focus" setting or the "OutputWeight" in greyestOptions?
In literature, estimators are often characterized in Output-, Filter-, or Equation-Error. Which setting combinations correspond to those estimators?
Thank you very much,
Marius greyest, greyestoptions, estimation, estimators, system identification MATLAB Answers — New Questions
Problem with NaNs for data analysis
I have a large data set on which I am doing some processing. I need to calculate mean for section s of data , but the problem is My data is having NaN values . due to which I am facing errors. can anyone help me how to het rid of this.I have a large data set on which I am doing some processing. I need to calculate mean for section s of data , but the problem is My data is having NaN values . due to which I am facing errors. can anyone help me how to het rid of this. I have a large data set on which I am doing some processing. I need to calculate mean for section s of data , but the problem is My data is having NaN values . due to which I am facing errors. can anyone help me how to het rid of this. matlab MATLAB Answers — New Questions
Problem in solving an optimization problem
Hi, guys. This is my code for my optimization problem:
Objective=@Case;
p0 =[1,1,1,1,1,1,1];
A = [];
b = [];
Aeq = [];
beq = [];
lb=[1;1;1;1;1;1;1];
ub=[7;7;7;7;7;7;7];
C = fmincon(Objective, p0, A, b, Aeq, beq, lb, ub);
disp(C)
function E=Case(p)
moleWt=[28;56;84;112;140;168;156]; % mole weight C2,C4,…,C12,C11 [g/mol]
Woo_Datas_g = {[0.377984 0.696286 2.9244 4.43634 4.63528 4.83422 4.47613],[0.656499 1.69098 5.5504 11.1605 10.882 9.33024 10.6034],[0.69628 1.53183 4.43634 5.74934 6.78382 4.66446 6.98276],[0.497347 1.17374 2.68568 3.6008 2.9244 3.95889 4.07825],[0.497347 1.01459 1.57162 2.2878 2.88462 2.96419 2.48674]}; %Woo’s data set for C2,C4,..,C12
F_G_out_mmol = [0.354 0.207 0.169 0.0724 0.0179 0.278 0.291]; %Gas outlet for each case[mmol/s]
t_max = 18000; %Reaction duration[s]
F_G_out_mol = zeros(1,7); %Gas outlet for each case at the end of the reaction[mol]
for j=1:7
F_G_out_mol(j) = F_G_out_mmol(j)*t_max*1e-3;
end
C4_mol = zeros(1,7); %C4H8 product(mol)
C6_mol = zeros(1,7); %C6H12 product(mol)
C8_mol = zeros(1,7); %C8H16 product(mol)
C10_mol = zeros(1,7); %C10H24 product(mol)
C12_mol = zeros(1,7); %C12H224 product(mol)
C4_g = cell2mat(Woo_Datas_g(1)); %C4H8 product(mol)
C6_g = cell2mat(Woo_Datas_g(2)); %C6H12 product(mol)
C8_g = cell2mat(Woo_Datas_g(3)); %C8H16 product(mol)
C10_g = cell2mat(Woo_Datas_g(4)); %C10H20 product(mol)
C12_g = cell2mat(Woo_Datas_g(5)); %C12H24 product(mol)
for j=1:7
C4_mol(j) = C4_g(j)./moleWt(2);
C6_mol(j) = C6_g(j)./moleWt(3);
C8_mol(j) = C8_g(j)./moleWt(4);
C10_mol(j) = C10_g(j)./moleWt(5);
C12_mol(j) = C12_g(j)./moleWt(6);
end
a = p(1);
b = p(2);
c = p(3);
d = p(4);
e = p(5);
E = (F_G_out_mol(1)-(C4_mol(a)+C6_mol(b)+C8_mol(c)+C10_mol(d)+C12_mol(e)))^2;
end
As you can see I want E as my objective function. The problem is my parameters for this problem. a,b,c,d,e should be positive integers and they can’t be something like 3.5, 0.5 etc. They can only be 1,2,3,..,7. The problem is I can’t figure out how define this in fmincon(). Any suggestions for solving this issue?? I have tried to use floor() before the parameters but fmincon() gave me a weird answer (1.99 for all the parameters). I also want E to be as minimum as possible. How can I adjust the error in fmincon()??Hi, guys. This is my code for my optimization problem:
Objective=@Case;
p0 =[1,1,1,1,1,1,1];
A = [];
b = [];
Aeq = [];
beq = [];
lb=[1;1;1;1;1;1;1];
ub=[7;7;7;7;7;7;7];
C = fmincon(Objective, p0, A, b, Aeq, beq, lb, ub);
disp(C)
function E=Case(p)
moleWt=[28;56;84;112;140;168;156]; % mole weight C2,C4,…,C12,C11 [g/mol]
Woo_Datas_g = {[0.377984 0.696286 2.9244 4.43634 4.63528 4.83422 4.47613],[0.656499 1.69098 5.5504 11.1605 10.882 9.33024 10.6034],[0.69628 1.53183 4.43634 5.74934 6.78382 4.66446 6.98276],[0.497347 1.17374 2.68568 3.6008 2.9244 3.95889 4.07825],[0.497347 1.01459 1.57162 2.2878 2.88462 2.96419 2.48674]}; %Woo’s data set for C2,C4,..,C12
F_G_out_mmol = [0.354 0.207 0.169 0.0724 0.0179 0.278 0.291]; %Gas outlet for each case[mmol/s]
t_max = 18000; %Reaction duration[s]
F_G_out_mol = zeros(1,7); %Gas outlet for each case at the end of the reaction[mol]
for j=1:7
F_G_out_mol(j) = F_G_out_mmol(j)*t_max*1e-3;
end
C4_mol = zeros(1,7); %C4H8 product(mol)
C6_mol = zeros(1,7); %C6H12 product(mol)
C8_mol = zeros(1,7); %C8H16 product(mol)
C10_mol = zeros(1,7); %C10H24 product(mol)
C12_mol = zeros(1,7); %C12H224 product(mol)
C4_g = cell2mat(Woo_Datas_g(1)); %C4H8 product(mol)
C6_g = cell2mat(Woo_Datas_g(2)); %C6H12 product(mol)
C8_g = cell2mat(Woo_Datas_g(3)); %C8H16 product(mol)
C10_g = cell2mat(Woo_Datas_g(4)); %C10H20 product(mol)
C12_g = cell2mat(Woo_Datas_g(5)); %C12H24 product(mol)
for j=1:7
C4_mol(j) = C4_g(j)./moleWt(2);
C6_mol(j) = C6_g(j)./moleWt(3);
C8_mol(j) = C8_g(j)./moleWt(4);
C10_mol(j) = C10_g(j)./moleWt(5);
C12_mol(j) = C12_g(j)./moleWt(6);
end
a = p(1);
b = p(2);
c = p(3);
d = p(4);
e = p(5);
E = (F_G_out_mol(1)-(C4_mol(a)+C6_mol(b)+C8_mol(c)+C10_mol(d)+C12_mol(e)))^2;
end
As you can see I want E as my objective function. The problem is my parameters for this problem. a,b,c,d,e should be positive integers and they can’t be something like 3.5, 0.5 etc. They can only be 1,2,3,..,7. The problem is I can’t figure out how define this in fmincon(). Any suggestions for solving this issue?? I have tried to use floor() before the parameters but fmincon() gave me a weird answer (1.99 for all the parameters). I also want E to be as minimum as possible. How can I adjust the error in fmincon()?? Hi, guys. This is my code for my optimization problem:
Objective=@Case;
p0 =[1,1,1,1,1,1,1];
A = [];
b = [];
Aeq = [];
beq = [];
lb=[1;1;1;1;1;1;1];
ub=[7;7;7;7;7;7;7];
C = fmincon(Objective, p0, A, b, Aeq, beq, lb, ub);
disp(C)
function E=Case(p)
moleWt=[28;56;84;112;140;168;156]; % mole weight C2,C4,…,C12,C11 [g/mol]
Woo_Datas_g = {[0.377984 0.696286 2.9244 4.43634 4.63528 4.83422 4.47613],[0.656499 1.69098 5.5504 11.1605 10.882 9.33024 10.6034],[0.69628 1.53183 4.43634 5.74934 6.78382 4.66446 6.98276],[0.497347 1.17374 2.68568 3.6008 2.9244 3.95889 4.07825],[0.497347 1.01459 1.57162 2.2878 2.88462 2.96419 2.48674]}; %Woo’s data set for C2,C4,..,C12
F_G_out_mmol = [0.354 0.207 0.169 0.0724 0.0179 0.278 0.291]; %Gas outlet for each case[mmol/s]
t_max = 18000; %Reaction duration[s]
F_G_out_mol = zeros(1,7); %Gas outlet for each case at the end of the reaction[mol]
for j=1:7
F_G_out_mol(j) = F_G_out_mmol(j)*t_max*1e-3;
end
C4_mol = zeros(1,7); %C4H8 product(mol)
C6_mol = zeros(1,7); %C6H12 product(mol)
C8_mol = zeros(1,7); %C8H16 product(mol)
C10_mol = zeros(1,7); %C10H24 product(mol)
C12_mol = zeros(1,7); %C12H224 product(mol)
C4_g = cell2mat(Woo_Datas_g(1)); %C4H8 product(mol)
C6_g = cell2mat(Woo_Datas_g(2)); %C6H12 product(mol)
C8_g = cell2mat(Woo_Datas_g(3)); %C8H16 product(mol)
C10_g = cell2mat(Woo_Datas_g(4)); %C10H20 product(mol)
C12_g = cell2mat(Woo_Datas_g(5)); %C12H24 product(mol)
for j=1:7
C4_mol(j) = C4_g(j)./moleWt(2);
C6_mol(j) = C6_g(j)./moleWt(3);
C8_mol(j) = C8_g(j)./moleWt(4);
C10_mol(j) = C10_g(j)./moleWt(5);
C12_mol(j) = C12_g(j)./moleWt(6);
end
a = p(1);
b = p(2);
c = p(3);
d = p(4);
e = p(5);
E = (F_G_out_mol(1)-(C4_mol(a)+C6_mol(b)+C8_mol(c)+C10_mol(d)+C12_mol(e)))^2;
end
As you can see I want E as my objective function. The problem is my parameters for this problem. a,b,c,d,e should be positive integers and they can’t be something like 3.5, 0.5 etc. They can only be 1,2,3,..,7. The problem is I can’t figure out how define this in fmincon(). Any suggestions for solving this issue?? I have tried to use floor() before the parameters but fmincon() gave me a weird answer (1.99 for all the parameters). I also want E to be as minimum as possible. How can I adjust the error in fmincon()?? optimization MATLAB Answers — New Questions
Switch from hosted email to Exchange Online
Hi everyone
I have a small 365 tenant with around 20 users and currently our email is hosted with FastHosts. We use the Outlook desktop app and connect to our email using IMAP.
I have licenses for my users to use email on 365 so am going to update the relevant DNS settings to direct mail to our 365 tenant instead of FastHosts. All my users are setup in Exchange ready.
From what I understand, once the DNS changes have updated fully all mail sent to our domain will then go to 365 but I wasn’t sure what I needed to do in the Outlook app. My users are going to migrate any existing mail manually so is it easier to get them to add the 365 mailbox as a separate account in the Account Settings menu:
I wasn’t sure if I’d need to setup a completely new Outlook profile for them or whether the above would work?
Thanks in advance for any assistance.
Hi everyone I have a small 365 tenant with around 20 users and currently our email is hosted with FastHosts. We use the Outlook desktop app and connect to our email using IMAP. I have licenses for my users to use email on 365 so am going to update the relevant DNS settings to direct mail to our 365 tenant instead of FastHosts. All my users are setup in Exchange ready. From what I understand, once the DNS changes have updated fully all mail sent to our domain will then go to 365 but I wasn’t sure what I needed to do in the Outlook app. My users are going to migrate any existing mail manually so is it easier to get them to add the 365 mailbox as a separate account in the Account Settings menu: I wasn’t sure if I’d need to setup a completely new Outlook profile for them or whether the above would work? Thanks in advance for any assistance. Read More
Expressroute NAT options
I am about to get an express route connection put in from a customer network with a fixed set of IP v4 addresses, lets say 10.253.253.64/27. I need to map specific IP addresses from this range to different services in different subscriptions with their own Virtual networks.
I will have the expressroute connection in it’s own Subscription “ER” (Virtual network address space 192.168.3.0/23) and the services in other seperate subscriptions “SUB1” (Virtual network address space 192.168.100.0/23) and “SUB2” (Virtual network address space 192.168.200.0/23)
1) When configuring Azure Private peering in expressroute I would expect to get the ASN and VLAN from the provider, but do I use 2 smaller subnets of the 10.253.253.64/27 range in the Azure primary and secondary subnet or other completely different private subnets?
2) Once I have peered the Virtual networks into the ER address space they show up under peered virtual network address space in the ER Virtual network address space.
3) I can connect outbound through expressroute from VM1 (192.168.100.194) on SUB1 and VM2 (192.168.200.194) on SUB2
4) How do I NAT 10.253.253.70 inbound to VM1 192.168.100.194 and NAT 10.253.253.71 to VM2 192.168.200.194 on Port 3389.
If it needs Azure firewall to do this to I put it in the ER SUB or a firewall in each of the SUB1 and SUB2 subscriptions?
I am about to get an express route connection put in from a customer network with a fixed set of IP v4 addresses, lets say 10.253.253.64/27. I need to map specific IP addresses from this range to different services in different subscriptions with their own Virtual networks. I will have the expressroute connection in it’s own Subscription “ER” (Virtual network address space 192.168.3.0/23) and the services in other seperate subscriptions “SUB1” (Virtual network address space 192.168.100.0/23) and “SUB2” (Virtual network address space 192.168.200.0/23) 1) When configuring Azure Private peering in expressroute I would expect to get the ASN and VLAN from the provider, but do I use 2 smaller subnets of the 10.253.253.64/27 range in the Azure primary and secondary subnet or other completely different private subnets? 2) Once I have peered the Virtual networks into the ER address space they show up under peered virtual network address space in the ER Virtual network address space. 3) I can connect outbound through expressroute from VM1 (192.168.100.194) on SUB1 and VM2 (192.168.200.194) on SUB2 4) How do I NAT 10.253.253.70 inbound to VM1 192.168.100.194 and NAT 10.253.253.71 to VM2 192.168.200.194 on Port 3389. If it needs Azure firewall to do this to I put it in the ER SUB or a firewall in each of the SUB1 and SUB2 subscriptions? Read More
Announcement
Is there a way to turn a post into an announcement after it’s published?
Is there a way to turn a post into an announcement after it’s published? Read More
M365 Forms for external users
Our organisation is hosting a public event where we’d like people to vote on some ideas and guidelines for our organisation. We want to make sure everyone can vote exactly one time on each poll. We have all the email adresses in an Excel file since it was asked for registration to the event, if that helps.
Is there a M365 functionality that would help us achieve our goal? Sadly, Forms doesn’t register email adresses for external users even if we add them as guest in our Azure AD, so we can’t restrict people voting only once as far as I know. So I’m looking for a Forms-like app in M365 that has this functionality, ideally in M365, but if M365 doesn’t have this we’re willing to look for external apps.
Regards,
Our organisation is hosting a public event where we’d like people to vote on some ideas and guidelines for our organisation. We want to make sure everyone can vote exactly one time on each poll. We have all the email adresses in an Excel file since it was asked for registration to the event, if that helps. Is there a M365 functionality that would help us achieve our goal? Sadly, Forms doesn’t register email adresses for external users even if we add them as guest in our Azure AD, so we can’t restrict people voting only once as far as I know. So I’m looking for a Forms-like app in M365 that has this functionality, ideally in M365, but if M365 doesn’t have this we’re willing to look for external apps.Regards, Read More
How to use the SharePoint Brand Center to set custom fonts in SharePoint online
The new SharePoint Brand Center is here!
This centralized branding management application empowers brand managers or designated users to create and manage brand assets needed to customize SharePoint and Viva Connections.
Easily add custom fonts to SharePoint and make them available through the brand center, tenant-wide, so you can put your stamp on your Intranet.
Check out the tutorial video and start customizing now!
The new SharePoint Brand Center is here! This centralized branding management application empowers brand managers or designated users to create and manage brand assets needed to customize SharePoint and Viva Connections. Easily add custom fonts to SharePoint and make them available through the brand center, tenant-wide, so you can put your stamp on your Intranet. Check out the tutorial video and start customizing now! Read More
How to Resolve QuickBooks Payroll Error Code 6000 77?
Troubleshooting Solutions: QuickBooks Payroll Error Code 6000 77
QuickBooks Payroll Error Code 6000 77 typically occurs when the company file is stored in an improper folder or if there are issues with file permissions. Here are some troubleshooting steps to resolve this issue:
Run QuickBooks File Doctor: Begin by running the QuickBooks File Doctor tool. This built-in utility is designed to diagnose and repair common issues with QuickBooks company files, including Error Code 6000 77. Launch the tool and follow the on-screen prompts to scan and repair any detected issues.Check File Location and Permissions: Ensure that the company file is stored in the correct location and that you have the necessary permissions to access and modify the file. Verify that the file is not located on a network drive or external storage device, as this can sometimes lead to connectivity issues.Update QuickBooks to the Latest Release: Make sure you are using the latest version of QuickBooks. Intuit regularly releases updates and patches to address software bugs and improve stability. Check for updates by navigating to the Help menu within QuickBooks and selecting “Update QuickBooks Desktop.”Disable Hosting on Workstations: If multiple users are accessing QuickBooks on a network, ensure that hosting is only enabled on the server or main workstation. Hosting should be disabled on all other workstations to prevent conflicts that may trigger Error Code 6000 77.Configure Firewall and Security Software: Check your firewall and antivirus settings to ensure that QuickBooks is allowed to communicate over the network. Add QuickBooks and its associated processes to the list of trusted applications to prevent them from being blocked by security software.Use QuickBooks Database Server Manager: If you are using QuickBooks in a multi-user environment, run the QuickBooks Database Server Manager on the server or main workstation. This tool helps manage multi-user access to company files and can resolve issues related to file sharing and connectivity.Copy the Company File to a Different Location: Sometimes, simply copying the company file to a different location on your computer can resolve Error Code 6000 77. Create a new folder on your local drive and copy the company file to this location. Then, try opening the file from the new location in QuickBooks.Contact QuickBooks Support: If you have tried the above troubleshooting steps and continue to experience Error Code 6000 77, it may be necessary to contact QuickBooks support for further assistance. Intuit’s support team can provide personalized guidance and help resolve the issue efficiently.
By following these troubleshooting solutions, you should be able to resolve QuickBooks Payroll Error Code 6000 77 and resume normal payroll processing without any disruptions. Remember to always backup your company file before making any significant changes or repairs to ensure that your data remains safe and secure.
Troubleshooting Solutions: QuickBooks Payroll Error Code 6000 77QuickBooks Payroll Error Code 6000 77 typically occurs when the company file is stored in an improper folder or if there are issues with file permissions. Here are some troubleshooting steps to resolve this issue:Run QuickBooks File Doctor: Begin by running the QuickBooks File Doctor tool. This built-in utility is designed to diagnose and repair common issues with QuickBooks company files, including Error Code 6000 77. Launch the tool and follow the on-screen prompts to scan and repair any detected issues.Check File Location and Permissions: Ensure that the company file is stored in the correct location and that you have the necessary permissions to access and modify the file. Verify that the file is not located on a network drive or external storage device, as this can sometimes lead to connectivity issues.Update QuickBooks to the Latest Release: Make sure you are using the latest version of QuickBooks. Intuit regularly releases updates and patches to address software bugs and improve stability. Check for updates by navigating to the Help menu within QuickBooks and selecting “Update QuickBooks Desktop.”Disable Hosting on Workstations: If multiple users are accessing QuickBooks on a network, ensure that hosting is only enabled on the server or main workstation. Hosting should be disabled on all other workstations to prevent conflicts that may trigger Error Code 6000 77.Configure Firewall and Security Software: Check your firewall and antivirus settings to ensure that QuickBooks is allowed to communicate over the network. Add QuickBooks and its associated processes to the list of trusted applications to prevent them from being blocked by security software.Use QuickBooks Database Server Manager: If you are using QuickBooks in a multi-user environment, run the QuickBooks Database Server Manager on the server or main workstation. This tool helps manage multi-user access to company files and can resolve issues related to file sharing and connectivity.Copy the Company File to a Different Location: Sometimes, simply copying the company file to a different location on your computer can resolve Error Code 6000 77. Create a new folder on your local drive and copy the company file to this location. Then, try opening the file from the new location in QuickBooks.Contact QuickBooks Support: If you have tried the above troubleshooting steps and continue to experience Error Code 6000 77, it may be necessary to contact QuickBooks support for further assistance. Intuit’s support team can provide personalized guidance and help resolve the issue efficiently.By following these troubleshooting solutions, you should be able to resolve QuickBooks Payroll Error Code 6000 77 and resume normal payroll processing without any disruptions. Remember to always backup your company file before making any significant changes or repairs to ensure that your data remains safe and secure. Read More
VLOOKUP for different layout data
Hi,
Just looking for your help please.
You’ll find attached a sample spreadsheets with 2 tabs in it. The tab “Trailer mm April 2024” has mileage data (in column F) listed vertically. I would like to layout the mileage info to be added in the 1st tab (“Sheet 1) by matching the date (row 1) and trailer fleet number (column A) and giving the corresponding value from tab “Trailer mm April 2024”.
Your help is much appreciated (I’m running office 365)
Thanks
Vito
Hi, Just looking for your help please. You’ll find attached a sample spreadsheets with 2 tabs in it. The tab “Trailer mm April 2024” has mileage data (in column F) listed vertically. I would like to layout the mileage info to be added in the 1st tab (“Sheet 1) by matching the date (row 1) and trailer fleet number (column A) and giving the corresponding value from tab “Trailer mm April 2024”. Your help is much appreciated (I’m running office 365) ThanksVito Read More
CSM Support + Secure Boot issues
Hello!
I wanted to try out windows 11 about a year or so ago but it wouldn’t work on my computer unless I downloaded it by joining the insider programme.
After a few months of me having windows 11 I decided I wanted to play Valorant, which is a video game that uses an anti-cheat system that needs Secure Boot to be enabled in order for it to run.
I’m completely unable to turn off CSM Support, and that makes it impossible for me to turn on Secure Boot.
I’ve tried turning off CSM Support numerous times over the time period I had windows 11 but it just never works.
Any idea how I might be able to fix this?
Hello!I wanted to try out windows 11 about a year or so ago but it wouldn’t work on my computer unless I downloaded it by joining the insider programme.After a few months of me having windows 11 I decided I wanted to play Valorant, which is a video game that uses an anti-cheat system that needs Secure Boot to be enabled in order for it to run.I’m completely unable to turn off CSM Support, and that makes it impossible for me to turn on Secure Boot. I’ve tried turning off CSM Support numerous times over the time period I had windows 11 but it just never works. Any idea how I might be able to fix this? Read More
nvme disk devices and mobility agent
Hi everyone,
I’m doing some tests regarding the migration of Linux ec2 instances from AWS to Azure,
I have followed the docs for the modernized experience described here but the installation
on the ec2 vms fails because the instalelr cannot find a scsi disk
the error is for example : “AddDiskDiscoveryInfo failed: Error: no attribute found for key scsi_bus”
My undestanding is that the installer expect to find some scsi reference under the linux userspace and since it cannot find it exit with errors.
The vm I’m trying to migrate is based on suse linux 12, the disks of that vm are mapped like this :
lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
nvme0n1 259:0 0 10G 0 disk
├─nvme0n1p1 259:1 0 2M 0 part
├─nvme0n1p2 259:2 0 20M 0 part /boot/efi
└─nvme0n1p3 259:3 0 10G 0 part /
nvme1n1 259:4 0 1G 0 disk
and lsscsi does not return any output, so for modern linux kernels nvme devices and scsi devices are different things, I think that the mobility agent should consider this and have an alternate way to identify disks/partitions when nvme is found.
Hi everyone,I’m doing some tests regarding the migration of Linux ec2 instances from AWS to Azure,I have followed the docs for the modernized experience described here but the installationon the ec2 vms fails because the instalelr cannot find a scsi diskthe error is for example : “AddDiskDiscoveryInfo failed: Error: no attribute found for key scsi_bus”My undestanding is that the installer expect to find some scsi reference under the linux userspace and since it cannot find it exit with errors.The vm I’m trying to migrate is based on suse linux 12, the disks of that vm are mapped like this : lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
nvme0n1 259:0 0 10G 0 disk
├─nvme0n1p1 259:1 0 2M 0 part
├─nvme0n1p2 259:2 0 20M 0 part /boot/efi
└─nvme0n1p3 259:3 0 10G 0 part /
nvme1n1 259:4 0 1G 0 disk and lsscsi does not return any output, so for modern linux kernels nvme devices and scsi devices are different things, I think that the mobility agent should consider this and have an alternate way to identify disks/partitions when nvme is found. Read More
Highlight Duplicate values across multiple sheets
I have a spreadsheet with an exhaustive list of names (ALL NAMES).
I then have several other sheets (Silver, Gold, Top, Art, Music, Latin, Key) that have the names of various award recipients (a subset of the ALL NAMES).
I want to be able to apply conditional formatting (or something) highlighting the names on the exhaustive list that appear on each additional sheet (that way I can remove any names that are not receiving awards)
I have a spreadsheet with an exhaustive list of names (ALL NAMES). I then have several other sheets (Silver, Gold, Top, Art, Music, Latin, Key) that have the names of various award recipients (a subset of the ALL NAMES). I want to be able to apply conditional formatting (or something) highlighting the names on the exhaustive list that appear on each additional sheet (that way I can remove any names that are not receiving awards) Read More
Hunting in Azure Subscription
In the realm of cybersecurity, the ability to efficiently comprehend and utilize logs within Azure subscriptions for threat hunting is paramount. These investigations typically involve meticulous log analysis aimed at identifying the initial breach and the subsequent actions executed by the Threat Actor. This blog post delves into various strategies and methodologies designed to enhance our grasp of the scope and complexity of how threat actors’ manoeuvre within Azure subscriptions, thereby fortifying our defenses against the ever-evolving landscape of cyberattacks.
Example Azure Attack Scenario
To better understand the intricacies involved, let us consider a hypothetical attack scenario:
Figure 1: Diagram of hypothetical attack scenario
Breached Global Administrator Account: The attack commences with a “Pass the Cookie” assault on the global administrator’s identity. This type of credential theft involves an adversary stealing a user’s session cookie to gain unauthorized access to their account. With the compromised admin account, the adversary gains entry to the Azure subscription via the portal or Azure management API (application programming interfaces). For more information on “Pass the Cookie” attacks, check out Token tactics: How to prevent, detect, and respond to cloud token theft | Microsoft Security Blog
External User Invite and Privilege Elevation: Leveraging the hijacked administrator account, the adversary proceeds to extend access to external users, elevating their privileges to authoritative roles such as a Subscription Owner or Contributor. This step aims to establish a persistent presence within the tenant, providing the adversary with a reliable re-entry point and sufficient permissions to fulfil their malicious objectives.
Action on Objective: The adversary’s commonly observed action on objectives may include:
Virtual Machine Creation: Attackers often set up virtual machines or scale sets within the compromised environment, harnessing them for crypto-mining operations—a silent heist of computational resources.
File Share Mounting: By mounting file shares, they lay the groundwork for further nefarious activities, setting the stage for data manipulation or exfiltration.
File Share Encryption: A classic hallmark of ransomware, this tactic locks down file shares, holding data hostage in exchange for a ransom—a digital extortion that can bring businesses to their knees.
Replication: Through replication, attackers ensure their presence is mirrored across subscriptions, a strategy that complicates eradication and bolsters their resilience within the network.
Azure Backup Deletion: By deleting Azure backups, they aim to sever the lifelines of data recovery, pushing organizations towards the precipice of data loss.
Subscription Transfer: When an attacker gains administrative access, they then could move subscriptions from the compromised tenant to one under their control.
Forensic data
For better forensic data analysis, it is important to know where Azure logs are and how to access them. By default, Azure saves control plane logs (also called Management Plane logs) in Azure Monitor which records operations like creating, deleting, or modifying a resource. But data plane logs which are specific to each resource, such as Blob Storage Access logs, are separate and need to be turned on for each resource through Azure Diagnostics Settings in the resource configuration. In this blog, we will focus on Azure Monitor Activity logs together with Microsoft Entra ID Audit Logs, however below you can see a data flow diagram for the default and potential locations of the different types of logs which may be useful during an Azure investigation.
Figure 2: Diagram of data flow for logs relating to Azure investigations
Pre-requisites to collect data for use in M365 Defender
To collect data, Defender for Cloud Apps requires the following connectors to be enabled:
Azure connector for Azure Resources Management (ARM) events
Office 365 connector for AAD (Azure Active Directory) management events
Microsoft 365 Defender onboarded
Pre-requisites to collect data for use in Log Analytics
Create a Log Analytics workspace in an Azure Subscription
Set up Diagnostic settings in Microsoft Entra ID to configure Audit Logs to be sent to the Log Analytics workspace
Set up Diagnostic settings in Azure Activity and configure the Logs to be sent to the Log Analytics workspace
Hunting Guidance
In this section, we will delve into some key activities you can look out for to quickly identify potential security incidents. Some of these activities include:
Detecting suspicious activities on existing accounts: Keep an eye out for user accounts used to create new guest accounts with privileged roles in your tenant or any activation of the ‘Elevate Access’ operation.
Monitoring guest account privilege changes: Be vigilant about guest accounts being promoted to privileged Microsoft Entra ID roles. Sudden privilege escalations can be a red flag for malicious activities.
Tracking guest account modifications: Set up Kusto queries to monitor guest accounts involved in modification operations (create, update, or delete) on cloud resources. Any unauthorized changes should be investigated promptly.
Investigating suspicious ARM activities: Pay close attention to any unusual ARM activities, especially those that deviate from expected patterns. Anomalies in resource provisioning or configuration changes may indicate a security incident.
Identifying High-Risk sign-ins: Utilize Kusto queries to pinpoint users who have experienced ‘high risk sign-ins’ and have also been involved in creating resource groups. This correlation can help identify potentially compromised accounts or malicious actors within your environment.
Investigating using Microsoft Defender for Cloud Apps
Microsoft Defender for Cloud Apps is an advanced security solution that fortifies cloud-based applications across Microsoft 365 and additional SaaS providers. It offers a suite of investigative features that are particularly beneficial in the context of the case study mentioned above, including:
Activity Log: Keep track of all activities by external user accounts with administrative privileges by utilizing the Microsoft Defender portal “Cloud Apps” tab, then navigate to “Activity log.” Apply a filter for “Microsoft Azure” and “External Users” and select the appropriate “Action type.” These filters can also be used to create custom new policies.
Figure 3: Diagram showing a Defender for Cloud Apps filter for external users performing actions against Azure
Advanced Hunting: Another powerful tool at your disposal is Advanced Hunting, which can help you hunt for unusual activities within your Azure subscriptions. The Advanced Hunting portal will display results from historical data spanning 30 days.
By watching out for these activities using Advanced Hunting queries, you can proactively detect and respond to security threats in your Azure environment. Remember, staying ahead of potential incidents is key to maintaining a secure and resilient cloud infrastructure. Incorporate these strategies into your security operations to strengthen your defense against evolving cyber threats.
Example useful Advanced Hunting queries:
//Hunt for creation of new guest accounts
CloudAppEvents
| where Timestamp > ago(7d)
| where ActionType == “Add user.”
| where RawEventData.ResultStatus == “Success”
| where RawEventData has “guest” and RawEventData.ObjectId has “#EXT#”
| mv-expand Property = RawEventData.ModifiedProperties
| where Property.Name == “AccountEnabled” and Property.NewValue has “true”
| project Timestamp, AccountObjectId, AccountDisplayName, newGuestAccount = RawEventData.ObjectId, UserAgent
Figure 4: Screenshot of output from query
//Hunt for Azure activities from guest users
let newGuestAccounts = (
CloudAppEvents
| where Timestamp > ago(7d)
| where ActionType == “Add user.”
| where RawEventData.ResultStatus == “Success”
| where RawEventData has “guest” and RawEventData.ObjectId has “#EXT#”
| mv-expand Property = RawEventData.ModifiedProperties
| where Property.Name == “AccountEnabled” and Property.NewValue has “true”
| project newGuestAccountObjectId = tostring(RawEventData.Target[1].ID)
| distinct newGuestAccountObjectId);
CloudAppEvents
| where Timestamp > ago(7d)
| where isnotempty(toscalar(newGuestAccounts))
| where Application == “Microsoft Azure”
| where AccountObjectId in (newGuestAccounts)
//Hunt for Azure activities from high-risk users
let riskyAzureSignIns = (
AADSignInEventsBeta
| where Timestamp > ago(30d)
| where ErrorCode == 0
| where Application == “Azure Portal”
| where RiskLevelAggregated == 100 or RiskLevelDuringSignIn == 100
| project AccountObjectId, RiskySignInTimestamp = Timestamp);
let AzureActivity = (
CloudAppEvents
| where Timestamp > ago(30d)
| where Application == “Microsoft Azure”
| project AccountObjectId, ActivityTime = Timestamp);
//join the tables
riskyAzureSignIns
| join AzureActivity on AccountObjectId
| where ActivityTime between (RiskySignInTimestamp .. (RiskySignInTimestamp + 12h))
Figure 5: Screenshot of output from high risk activities in Azure queries
Detecting suspicious activity with Activity Policies: A crucial tool in cloud monitoring, Activity policies in Microsoft Defender for Cloud Apps allow you to track your organization’s cloud activities effectively. Notifications are triggered based on policy results, and users can be suspended from cloud apps as needed. An Activity policy comprises the following components:
Activity Filters: These enable the creation of precise conditions based on metadata.
Activity Match Parameters: These allow you to define thresholds for activity repetition to trigger policy matches. For instance, you can set a policy to alert when an external user creates multiple virtual machines in Azure.
Repeated Activity Settings: Here, you can configure the number of repeated activities needed and the timeframe for these to occur to trigger the policy.
Actions: The policy includes a range of governance actions that can be automatically enforced upon detecting violations.
Figure 6: Example Activity policy
Investigating using Microsoft Azure
Microsoft Azure is Microsoft’s public cloud computing platform, providing a broad range of configurable security options and the ability to control them so that they can be customized to meet unique requirements. We will take a closer look at two of these security options using the above case study:
Azure Monitor Activity Log: The Azure Monitor Activity Log is a comprehensive log within Azure that offers visibility into actions taken at the subscription level. The entries in Activity Logs include control plane changes only. It records all modification operations (create, update, or delete) on cloud resources, a good example being when a virtual machine is started or stopped. The activity logs can be filtered at the subscription level or resource-level. Activity log events are retained in Azure for 90 days and then deleted but for more functionality, the diagnostic settings can be used to increase retention based on your needs. By default, the control plane logs are collected. To collect data from the data plane, diagnostics settings need to be enabled on each resource.
Figure 7: Snippet of Azure Monitor activity log
Continuously monitor for any unusual activities and verify their legitimacy. Additionally, keep an eye on the Metrics tab for any unexpected spikes in activity. A significant increase in outbound data transfer, measured in megabytes, could signal unauthorized data exfiltration. Similarly, a series of consecutive virtual machine creations warrants further investigation.
Azure Log Analytics: Azure Log Analytics stands out as another powerful tool in your arsenal. It’s a service designed to monitor your resources and applications across both cloud and on-premises environments. This tool empowers you to perform crucial tasks such as searching, analyzing, and visualizing data using the powerful Kusto Query Language (KQL).
Setting up a log analytics workspace is the first step, acting as a virtual container to store logs efficiently. These logs can originate from diverse sources like Activity logs, ARM logs, and Microsoft Entra ID Audit Logs, boasting extended retention periods for your convenience.
Figure 8: Example showing Microsoft Entra ID logs being sent to a Log Analytics workspace
For investigating the previously described attack scenario using Azure Log Analytics, you’ll want to direct both Microsoft Entra ID Audit logs and Azure Activity logs to Log Analytics. In the Advanced Hunting feature, these logs are consolidated in the CloudAppEvents table, while Log Analytics organizes this data into the AuditLogs and AzureActivity tables respectively.
Example useful Log Analytics Queries:
//Hunt for Azure Role assignments to newly added guest user accounts
let newGuestAccounts = AuditLogs
| where OperationName == “Add user”
| mv-expand TargetResources = TargetResources
| mv-expand ModifiedProperties = TargetResources.modifiedProperties
| where ModifiedProperties.displayName == “UserType” and ModifiedProperties.newValue has “Guest”
| summarize by tostring(TargetResources.id);
AzureActivity
| where OperationNameValue == “MICROSOFT.AUTHORIZATION/ROLEASSIGNMENTS/WRITE”
| extend Properties=parse_json(Properties)
| extend requestbody = parse_json(tostring(parse_json(Properties).requestbody))
| extend PrincipalId= requestbody.Properties.PrincipalId
| extend RoleDefinitionId= requestbody.Properties.RoleDefinitionId
| extend Scope= requestbody.Properties.Scope
| extend Entity = tostring(Properties.entity)
| where PrincipalId in (newGuestAccounts)
| join kind=inner (
AzureActivity
| where OperationNameValue == “MICROSOFT.AUTHORIZATION/ROLEASSIGNMENTS/WRITE”
| where ActivityStatusValue != “Start” | extend Entity = tostring(parse_json(Properties).entity) ) on CorrelationId,Entity,OperationNameValue
| project TimeGenerated,OperationNameValue,PrincipalId,RoleDefinitionId,FinalStatus = ActivityStatusValue1, Caller, Properties
Figure 9: Screenshot of query hunting for suspicious Azure role assignments
//Hunt for Azure activity performed by newly added guest user account
let newGuestAccounts = AuditLogs
| where OperationName == “Add user”
| mv-expand TargetResources = TargetResources
| mv-expand ModifiedProperties = TargetResources.modifiedProperties
| where ModifiedProperties.displayName == “UserType” and ModifiedProperties.newValue has “Guest”
| summarize by tostring(TargetResources.id);
AzureActivity
| where Claims has_any (newGuestAccounts)
Diagnostic Settings
Setting up and customizing diagnostic settings is essential for resources that demand heightened data plane monitoring, such as Key Vaults, Storage accounts, and others. If diagnostic settings are not configured it can limit visibility into activities such as reconnaissance, credential access, data exfiltration, and other malicious behaviours. Diagnostic logs play a crucial role in identifying actions such as identifying the entity accessing a data store or a secret, logging failed API attempts towards web services or databases, and much more. Enabling Diagnostic settings incurs a cost. It is recommended to use Azure Policy to enforce Diagnostic Settings configuration on critical resources to ensure you have the proper logging enabled. You can either utilize the built-in policy definitions that Azure Policy already has for Diagnostic Settings, or you can build you own custom policy.
Conclusion
In conclusion, cloud investigation in Azure subscriptions is multi-faceted and a crucial aspect of maintaining a secure and resilient cloud environment. By understanding and utilizing logs effectively and ideally bringing them into a central location, organizations can enhance their threat hunting capabilities and proactively identify potential security threats and vulnerabilities. Azure provides robust logging and monitoring tools that can be leveraged to gain insights into system activities, detect anomalies, and respond promptly to security incidents. Integrating best practices for log management, analysis, and incident response is essential for organizations to stay ahead of evolving cyber threats and safeguard their sensitive data and assets in the cloud.
Microsoft Tech Community – Latest Blogs –Read More
Microsoft launches SharePoint eSignature integration with Adobe and Docusign
Nowadays, business is done electronically – from making and reviewing documents to approving and reusing them. One of the most common document transactions is electronic signatures. The process of signing should be simple, safe, and integrated with your business workflows.
SharePoint eSignature lets you ask for, sign, and keep signatures without interrupting your work process and while ensuring your signed documents are safe and compliant. Your content remains in Microsoft 365 during the review, signature, and record-keeping processes. This functionality is currently available in the US only.
In this era of digital change and AI, security and compliance are essential. SharePoint eSignature ensures your content stays safe within the Microsoft trust limits. eSignature makes the signing experience easier so you can keep working in your workflows without exiting the Microsoft 365 ecosystem. This leads to higher productivity and quicker completion times. To be able to scale at the pace you need, eSignature enables tracking and management of every step of the signing process, for real-time visibility and accountability.
Integration with Docusign and Adobe
In addition to eSignature, we know that many customers use other electronic signature services to sign their documents. So, it’s critical that customers have an easy way to kickstart a signature process from documents that are already in Microsoft 365 using their existing third-party eSignature provider.
We’re excited to announce integration (US only) with Adobe Acrobat Sign and Docusign as third-party eSignature providers which will be available in summer 2024. In the future, there will be potential integration with other providers.
The integration between eSignature and third-party providers allows customers to seamlessly initiate signature requests within their existing workflows and facilitate secure and automatic storage of signed documents in Microsoft 365 and across their entire business.
These third-party integrations allow customers to store their signed documents in one location, use the extra security and compliance policies that SharePoint and Microsoft 365 offer, and minimize the chances of data breaches.
Provider selection in Microsoft Admin Center
How to use SharePoint eSignature with Adobe and Docusign
To use Adobe or Docusign integration within SharePoint eSignature, an IT admin would need to activate it from the Microsoft 365 Admin Center and specify the SharePoint sites where it should be used. You can learn more about the setup here.
Initiating a 3rd party eSignature request from a document in SharePoint
Email notification received after signing is complete
Pricing
Using the third-party offering of eSignature from Microsoft is free. Pay-as-you-go billing must be set up, customers will not be charged. However, customers must ensure that they have valid licenses with Adobe or Docusign.
Configuration
Your admins can determine which eSignature providers should be available to your users and configure this in the Microsoft 365 Admin Center. eSignature is available by default to end users once Admins set up billing and accept the Terms of Service. In addition to configuring your eSignature providers, Admins can also manage which sites eSignature is enabled for.
Closing
SharePoint eSignature integration with third-party providers allows you to seamlessly initiate signature requests. allow you to store all your signed documents in one location, while ensuring your content stays safe within the Microsoft trust limits. eSignature integration will be available in summer 2024.
CTA
Watch our on-demand session for eSignature here and learn more about eSignature here.
Microsoft Tech Community – Latest Blogs –Read More
I’m trying to convert the text into binary and then i want to make the 4 bits chunks.
But the problem is that how to make the total size at the output for example: 001010101010001110101110111010110101.
its mean that i have only 1 row and 36 columns.
but i can’t do it.
please help me out!
clc;
close all;
clear alll;
% I’m trying to convert the Hello World into binary
message = (‘Hello world’);
A = dec2bin(message, 8); % Now to convert the charactors into 8 Bits using ASCI.
[r c]=size(A);
cc=struct([]);
A=convertCharsToStrings(A);
for j=1:1:r;
z=A(j,:);
cc=cat(2,cc,A(j,:));
end
disp(cc);But the problem is that how to make the total size at the output for example: 001010101010001110101110111010110101.
its mean that i have only 1 row and 36 columns.
but i can’t do it.
please help me out!
clc;
close all;
clear alll;
% I’m trying to convert the Hello World into binary
message = (‘Hello world’);
A = dec2bin(message, 8); % Now to convert the charactors into 8 Bits using ASCI.
[r c]=size(A);
cc=struct([]);
A=convertCharsToStrings(A);
for j=1:1:r;
z=A(j,:);
cc=cat(2,cc,A(j,:));
end
disp(cc); But the problem is that how to make the total size at the output for example: 001010101010001110101110111010110101.
its mean that i have only 1 row and 36 columns.
but i can’t do it.
please help me out!
clc;
close all;
clear alll;
% I’m trying to convert the Hello World into binary
message = (‘Hello world’);
A = dec2bin(message, 8); % Now to convert the charactors into 8 Bits using ASCI.
[r c]=size(A);
cc=struct([]);
A=convertCharsToStrings(A);
for j=1:1:r;
z=A(j,:);
cc=cat(2,cc,A(j,:));
end
disp(cc); matlab function, binary MATLAB Answers — New Questions
Code Generation folder for C/C++ code block
Hello,
I am using the C/C++ code block to include some custome C code in my model. I am buiilding the code by using the "Build" button pictured below:
This works fine and produces a C source file.
My issue is when I CodeGen I have to manually include this Custom Code file in the folder each time (it gets deleted otherwise).
I am curious is there a way to control where this C/C++ codeblock builds its file and how I can have that build location to be the same as CodeGeneration ? Right now the C/C++ function always builds to the root directory of my simulink project.Hello,
I am using the C/C++ code block to include some custome C code in my model. I am buiilding the code by using the "Build" button pictured below:
This works fine and produces a C source file.
My issue is when I CodeGen I have to manually include this Custom Code file in the folder each time (it gets deleted otherwise).
I am curious is there a way to control where this C/C++ codeblock builds its file and how I can have that build location to be the same as CodeGeneration ? Right now the C/C++ function always builds to the root directory of my simulink project. Hello,
I am using the C/C++ code block to include some custome C code in my model. I am buiilding the code by using the "Build" button pictured below:
This works fine and produces a C source file.
My issue is when I CodeGen I have to manually include this Custom Code file in the folder each time (it gets deleted otherwise).
I am curious is there a way to control where this C/C++ codeblock builds its file and how I can have that build location to be the same as CodeGeneration ? Right now the C/C++ function always builds to the root directory of my simulink project. c/c++ code block, build folder, code generation MATLAB Answers — New Questions
Sorting of table except first ROW
I have one table
table = uitable(fig, ‘Data’, tableData, ‘ColumnName’, columnNames, ‘ColumnEditable’, true, …
‘Position’, [17, 50, 870, 400], ‘CellSelectionCallback’, @(src, event) tableCellSelectionCallback(event), ‘SelectionType’, ‘row’, ‘RowName’, ”,’RowStriping’,’off’,’ColumnSortable’,true);
this i have "ColumnSortable = true" which provide me a sorting in my table. but i want to execlude first row of table from this sorting can i do that..?
or do we have any call back when sort button is hit on ui…?I have one table
table = uitable(fig, ‘Data’, tableData, ‘ColumnName’, columnNames, ‘ColumnEditable’, true, …
‘Position’, [17, 50, 870, 400], ‘CellSelectionCallback’, @(src, event) tableCellSelectionCallback(event), ‘SelectionType’, ‘row’, ‘RowName’, ”,’RowStriping’,’off’,’ColumnSortable’,true);
this i have "ColumnSortable = true" which provide me a sorting in my table. but i want to execlude first row of table from this sorting can i do that..?
or do we have any call back when sort button is hit on ui…? I have one table
table = uitable(fig, ‘Data’, tableData, ‘ColumnName’, columnNames, ‘ColumnEditable’, true, …
‘Position’, [17, 50, 870, 400], ‘CellSelectionCallback’, @(src, event) tableCellSelectionCallback(event), ‘SelectionType’, ‘row’, ‘RowName’, ”,’RowStriping’,’off’,’ColumnSortable’,true);
this i have "ColumnSortable = true" which provide me a sorting in my table. but i want to execlude first row of table from this sorting can i do that..?
or do we have any call back when sort button is hit on ui…? simulink, matlab, sort MATLAB Answers — New Questions
How to fix QuickBooks desktop 2024 keeps freezing after update?
Troubleshooting Solutions : QuickBooks desktop 2024 keeps freezing
Dealing with frequent QuickBooks desktop 2024 keeps freezing can be frustrating, but several troubleshooting steps can help pinpoint and resolve the underlying causes.
1. Update QuickBooks Desktop: Ensure your QuickBooks Desktop software is up to date. Developers often release updates to address performance issues and enhance stability. Navigate to the Help menu and select Update QuickBooks Desktop to download and install any available updates.
2. Check System Requirements: Verify that your computer meets the minimum system requirements for running QuickBooks Desktop 2024. Inadequate hardware or outdated software can lead to freezing issues. Visit the QuickBooks support website to review the system requirements for your version.
3. Close Background Applications: Running multiple applications simultaneously can strain your computer’s resources and cause QuickBooks Desktop to freeze. Close any unnecessary programs running in the background to free up system resources for QuickBooks. This can help improve performance and reduce freezing incidents.
4. Increase Available RAM: Insufficient RAM (Random Access Memory) can contribute to freezing issues in QuickBooks Desktop. Consider upgrading your computer’s RAM if it doesn’t meet the recommended requirements for running the software. Adding more RAM can improve overall system performance and reduce freezing incidents.
5. Check Company File Size: Large company files can strain QuickBooks Desktop’s performance and lead to freezing. Use the Condense Data utility to reduce the size of your company file by removing outdated transactions and optimizing data. Go to the File menu, select Utilities, and then Condense Data. Follow the on-screen instructions to condense your company file.
6. Reboot Your Computer: Perform a full system reboot to refresh your computer’s resources and clear temporary files that may be causing QuickBooks Desktop to freeze. Restart your computer and relaunch QuickBooks to see if the freezing issue persists.
7. Repair QuickBooks Installation: If QuickBooks Desktop freezes persistently, it may indicate a corrupted installation. Use the QuickBooks Install Diagnostic Tool to repair any installation-related issues automatically. Download and run the tool from the Intuit website, following the on-screen instructions to diagnose and repair problems.
8. Adjust Compatibility Settings: In some cases, adjusting compatibility settings for QuickBooks Desktop can resolve freezing problems. Right-click the QuickBooks Desktop shortcut icon, select Properties, and navigate to the Compatibility tab. Try running QuickBooks in compatibility mode for an earlier version of Windows and see if it improves stability.
9. Contact QuickBooks Support: If you’ve tried the above troubleshooting steps and QuickBooks Desktop continues to freeze, reach out to QuickBooks support for further assistance. They can provide personalized guidance and advanced troubleshooting to help resolve the issue effectively.
By following these troubleshooting solutions, you can address the QuickBooks desktop 2024 keeps freezing issue and ensure smooth operation of your accounting software. Identifying and resolving the underlying causes will help minimize disruptions and optimize productivity.
Troubleshooting Solutions : QuickBooks desktop 2024 keeps freezing Dealing with frequent QuickBooks desktop 2024 keeps freezing can be frustrating, but several troubleshooting steps can help pinpoint and resolve the underlying causes. 1. Update QuickBooks Desktop: Ensure your QuickBooks Desktop software is up to date. Developers often release updates to address performance issues and enhance stability. Navigate to the Help menu and select Update QuickBooks Desktop to download and install any available updates.2. Check System Requirements: Verify that your computer meets the minimum system requirements for running QuickBooks Desktop 2024. Inadequate hardware or outdated software can lead to freezing issues. Visit the QuickBooks support website to review the system requirements for your version.3. Close Background Applications: Running multiple applications simultaneously can strain your computer’s resources and cause QuickBooks Desktop to freeze. Close any unnecessary programs running in the background to free up system resources for QuickBooks. This can help improve performance and reduce freezing incidents.4. Increase Available RAM: Insufficient RAM (Random Access Memory) can contribute to freezing issues in QuickBooks Desktop. Consider upgrading your computer’s RAM if it doesn’t meet the recommended requirements for running the software. Adding more RAM can improve overall system performance and reduce freezing incidents.5. Check Company File Size: Large company files can strain QuickBooks Desktop’s performance and lead to freezing. Use the Condense Data utility to reduce the size of your company file by removing outdated transactions and optimizing data. Go to the File menu, select Utilities, and then Condense Data. Follow the on-screen instructions to condense your company file.6. Reboot Your Computer: Perform a full system reboot to refresh your computer’s resources and clear temporary files that may be causing QuickBooks Desktop to freeze. Restart your computer and relaunch QuickBooks to see if the freezing issue persists.7. Repair QuickBooks Installation: If QuickBooks Desktop freezes persistently, it may indicate a corrupted installation. Use the QuickBooks Install Diagnostic Tool to repair any installation-related issues automatically. Download and run the tool from the Intuit website, following the on-screen instructions to diagnose and repair problems.8. Adjust Compatibility Settings: In some cases, adjusting compatibility settings for QuickBooks Desktop can resolve freezing problems. Right-click the QuickBooks Desktop shortcut icon, select Properties, and navigate to the Compatibility tab. Try running QuickBooks in compatibility mode for an earlier version of Windows and see if it improves stability.9. Contact QuickBooks Support: If you’ve tried the above troubleshooting steps and QuickBooks Desktop continues to freeze, reach out to QuickBooks support for further assistance. They can provide personalized guidance and advanced troubleshooting to help resolve the issue effectively. By following these troubleshooting solutions, you can address the QuickBooks desktop 2024 keeps freezing issue and ensure smooth operation of your accounting software. Identifying and resolving the underlying causes will help minimize disruptions and optimize productivity. Read More