Tag Archives: microsoft
Move an existing AVD session host to a different Host Pool
Hello All,
Hoping you can help. We want to do some testing with some of our AVD’s and need to move them to a different Host Pool. I have had a look and can’t see a ‘migrate’ or ‘copy’ option.
We would be really grateful if someone might be able to point us in the right direction.
Cheers
Hello All, Hoping you can help. We want to do some testing with some of our AVD’s and need to move them to a different Host Pool. I have had a look and can’t see a ‘migrate’ or ‘copy’ option.We would be really grateful if someone might be able to point us in the right direction. Cheers Read More
Issues updating shared calendars
Hi all,
Im the admin of an organization using several M365 licenses. Thhe majority of users using Outlook Web no matter the level of subscription.
Id like some of the users to see all the main Calenda updates of an specific account. To do this:
1- Logging in to the specific account and sharing the Calendar with all the organization. This option is enabled by default
2- Logging from any of the users account and add the shared calendar through the email address to “Other Calendars”
3- When do the latter, the user can see all the Events that had been created up to that moment but not the updates nor new events
I know the same can be done through Groups but need to be done through Calendars
Any idea on whats going on here?
Hi all,Im the admin of an organization using several M365 licenses. Thhe majority of users using Outlook Web no matter the level of subscription.Id like some of the users to see all the main Calenda updates of an specific account. To do this:1- Logging in to the specific account and sharing the Calendar with all the organization. This option is enabled by default2- Logging from any of the users account and add the shared calendar through the email address to “Other Calendars”3- When do the latter, the user can see all the Events that had been created up to that moment but not the updates nor new events I know the same can be done through Groups but need to be done through Calendars Any idea on whats going on here? Read More
Microsoft Entra /Azure Connect Reinstallation and Source Anchor Change
Hello everyone,
I would like to talk about the possibility of changing the SourceAnchor in Azure Connect.
Officially, this is not supported by Microsoft, but there is still a way to do this via a few detours.
the running AD Sync must be stopped first of all.
to make the changeover, all users must first be soft-deleted. The most practical way to do this is to synchronize an OU in which there are no users.
Now the Entra objects are stored under deleted It is important to note that before restoring the users who do not have an Exchange Online mailbox, Entra P1 or 2 must be removed so that a second mailbox is not created here.
Now all users must be restored.
After this has been done, the Immutable id of the users must be removed via PowerShell.
This is possible with the following command:
Get-MsolUser -all | Set-MsolUser -ImmutableID “$Null” (If this command is required for individual users, replace -all with -userpricipalname “example@email,de”)
If the Immutable Id has been removed for all users, the status in Entra must be set to Cloud Only. If this is the case, you can start with the next steps.
It is important to note that the actions carried out above can lead to short-term failures and should therefore ideally be carried out before the weekend!
In the next step, a clean uninstallation of Azure Connect must be carried out.
Here I would recommend the article ADsync uninstallation from MSXFAQ where it is well explained.
When uninstalling, only the steps that do not hinder a new installation should be carried out, but this is well explained in the article.
after successfully uninstalling the AD Sync, there may be delays, which is why I would recommend waiting 24 hours before reinstalling.
The waiting time can be skipped, but it still worked for me.
as soon as you have installed the AD Sync with the new desired attribute, you can start the sync.
The users should now be matched with the existing cloud objects via Softmatch.
If this does not work, it is possible to delete the Immutable ID again or to correct the errors via the AD Connect error display of the Entra ID.
Under the function other errors, several errors may be displayed, this was fixed by us by fixing all duplicate attribute errors.
I hope this has helped you a little.
I am always open to feedback!
Hello everyone, I would like to talk about the possibility of changing the SourceAnchor in Azure Connect. Officially, this is not supported by Microsoft, but there is still a way to do this via a few detours. the running AD Sync must be stopped first of all. to make the changeover, all users must first be soft-deleted. The most practical way to do this is to synchronize an OU in which there are no users. Now the Entra objects are stored under deleted It is important to note that before restoring the users who do not have an Exchange Online mailbox, Entra P1 or 2 must be removed so that a second mailbox is not created here. Now all users must be restored. After this has been done, the Immutable id of the users must be removed via PowerShell. This is possible with the following command: Get-MsolUser -all | Set-MsolUser -ImmutableID “$Null” (If this command is required for individual users, replace -all with -userpricipalname “example@email,de”) If the Immutable Id has been removed for all users, the status in Entra must be set to Cloud Only. If this is the case, you can start with the next steps. It is important to note that the actions carried out above can lead to short-term failures and should therefore ideally be carried out before the weekend! In the next step, a clean uninstallation of Azure Connect must be carried out. Here I would recommend the article ADsync uninstallation from MSXFAQ where it is well explained. When uninstalling, only the steps that do not hinder a new installation should be carried out, but this is well explained in the article. after successfully uninstalling the AD Sync, there may be delays, which is why I would recommend waiting 24 hours before reinstalling. The waiting time can be skipped, but it still worked for me. as soon as you have installed the AD Sync with the new desired attribute, you can start the sync. The users should now be matched with the existing cloud objects via Softmatch. If this does not work, it is possible to delete the Immutable ID again or to correct the errors via the AD Connect error display of the Entra ID. Under the function other errors, several errors may be displayed, this was fixed by us by fixing all duplicate attribute errors. I hope this has helped you a little. I am always open to feedback! Read More
Dell PW7015L Powerbank Companion for XPS 15 9520 USB-C Laptop
I used to own a Dell XPS 15 9550, which required a barrel for charging, and I had two PW7015L barrel powerbanks that worked well with it. However, when I switched to a Dell XPS 15 9520, which uses USB-C for charging, I could no longer use the barrels powerbanks with it.
I discovered that by purchasing a Dell barrel to USB-C adapter, I could connect the old powerbanks to the XPS 9520. Unfortunately, the adapter was not available on Dell’s website at the time, so I opted to buy a Dell PW7018LC powerbank for the XPS 9520 instead, as it uses USB-C.
Now, I’m contemplating if I buy the mentioned Dell barrel to USB-C adapter, would I be able to charge the older PW7015L barrel powerbanks using the XPS 9520 laptop charger. This is crucial because I usually travel with only one powerbank, the USB-C PW7018LC, but if the adapter allows me to bring along my two old powerbanks and charge them with the XPS 9520 charger, it would be a significant advantage.
Essentially, my goal is to avoid carrying the old barrel charger for the XPS 9550 and instead rely on the USB-C charger that comes with the XPS 9520. I want to streamline my charging setup and maximize the use of both old and new powerbanks without carrying additional equipment if possible.
I used to own a Dell XPS 15 9550, which required a barrel for charging, and I had two PW7015L barrel powerbanks that worked well with it. However, when I switched to a Dell XPS 15 9520, which uses USB-C for charging, I could no longer use the barrels powerbanks with it. I discovered that by purchasing a Dell barrel to USB-C adapter, I could connect the old powerbanks to the XPS 9520. Unfortunately, the adapter was not available on Dell’s website at the time, so I opted to buy a Dell PW7018LC powerbank for the XPS 9520 instead, as it uses USB-C. Now, I’m contemplating if I buy the mentioned Dell barrel to USB-C adapter, would I be able to charge the older PW7015L barrel powerbanks using the XPS 9520 laptop charger. This is crucial because I usually travel with only one powerbank, the USB-C PW7018LC, but if the adapter allows me to bring along my two old powerbanks and charge them with the XPS 9520 charger, it would be a significant advantage. Essentially, my goal is to avoid carrying the old barrel charger for the XPS 9550 and instead rely on the USB-C charger that comes with the XPS 9520. I want to streamline my charging setup and maximize the use of both old and new powerbanks without carrying additional equipment if possible. Read More
How to Prevent a Laptop from Getting Warmer When Plugged In
Hello everyone, I’ve noticed a strange issue with my laptop – my hands feel a difference in temperature between the keyboard when it’s connected to AC compared to DC, even when the laptop is idle. Although there was a noticeable temperature variance (confirmed by HWinfo), I didn’t observe any performance differences.
Unable to find any information online, I recently decided to delve into the registry settings to investigate power configurations stored for AC (plugged in) and DC (on battery) modes. I’ve compiled a list of a few settings that I discovered and will share them here in the hopes that it may benefit others who are curious:
While the list is short, adjusting these settings has now made the temperature difference negligible without affecting the PC’s speed noticeably. By aligning the values for AC with the default DC settings, I’ve managed to resolve the warmer temperatures associated with AC power without compromising performance. It’s also possible to tweak the settings to optimize CPU response for DC usage. This behavior seems to be inherent in Windows, at least on my Dell machine.
It should be noted that these adjustments primarily impact idle or light computer usage and won’t enhance the cooling performance of the system, which becomes relevant under heavy usage scenarios.
Here are the specific registry settings I modified:
[…list of registry settings…]
Additionally, for those interested in fine-tuning CPU-related settings, the following adjustments can be made:
[…CPU-specific registry settings…]
By making these adjustments, you can potentially tailor your laptop’s power settings to better suit your usage preferences and possibly manage temperature differentials between AC and DC power sources.
Hello everyone, I’ve noticed a strange issue with my laptop – my hands feel a difference in temperature between the keyboard when it’s connected to AC compared to DC, even when the laptop is idle. Although there was a noticeable temperature variance (confirmed by HWinfo), I didn’t observe any performance differences. Unable to find any information online, I recently decided to delve into the registry settings to investigate power configurations stored for AC (plugged in) and DC (on battery) modes. I’ve compiled a list of a few settings that I discovered and will share them here in the hopes that it may benefit others who are curious: While the list is short, adjusting these settings has now made the temperature difference negligible without affecting the PC’s speed noticeably. By aligning the values for AC with the default DC settings, I’ve managed to resolve the warmer temperatures associated with AC power without compromising performance. It’s also possible to tweak the settings to optimize CPU response for DC usage. This behavior seems to be inherent in Windows, at least on my Dell machine. It should be noted that these adjustments primarily impact idle or light computer usage and won’t enhance the cooling performance of the system, which becomes relevant under heavy usage scenarios. Here are the specific registry settings I modified: […list of registry settings…]Additionally, for those interested in fine-tuning CPU-related settings, the following adjustments can be made: […CPU-specific registry settings…] By making these adjustments, you can potentially tailor your laptop’s power settings to better suit your usage preferences and possibly manage temperature differentials between AC and DC power sources. Read More
“Viewing Recent App Activity: How to Access Search History in Task Manager’s ‘Create New Task’ Funct
My task management tool keeps forgetting my command to launch the new explorer. Seriously, how frustrating is that?
My task management tool keeps forgetting my command to launch the new explorer. Seriously, how frustrating is that? Read More
“Remnants of Ghostly ‘Paste’ Feature Continue to Appear in Desktop Context Menu”
I continue to encounter a persistent issue with a ghost Paste command lingering in the context menus of my two primary Windows 11 machines. Despite multiple reboots and recent adjustments, this ghost command remains visible but inactive, appearing grayed out. It seems the only way to activate it is by copying something, such as a shortcut, which causes it to turn black and reveals its accompanying function, Paste Shortcut.
Thus far, I have been unable to find any information online that addresses this peculiar ghost command. Does anyone here have insights on how to banish this lingering ghost from my context menus?
I continue to encounter a persistent issue with a ghost Paste command lingering in the context menus of my two primary Windows 11 machines. Despite multiple reboots and recent adjustments, this ghost command remains visible but inactive, appearing grayed out. It seems the only way to activate it is by copying something, such as a shortcut, which causes it to turn black and reveals its accompanying function, Paste Shortcut. Thus far, I have been unable to find any information online that addresses this peculiar ghost command. Does anyone here have insights on how to banish this lingering ghost from my context menus? Read More
“Why Is My New Computer Showing a Black Screen?”
I had configured my new computer to enter sleep mode after 30 minutes of inactivity, so I didn’t think much of it when I saw the screen go black. The power light was still on, indicating it was operational. However, when I attempted to wake it up, nothing happened. Pressing the power button did not respond either, and even disconnecting the A/C power cord did not turn it off completely as the internal battery sustained the light.
Concerned that my new computer had become unresponsive after just two weeks, I contemplated returning it to Best Buy during the Black Friday sale. In a moment of desperation, I repeatedly pressed the power button, and to my surprise, other small lights began flashing and the computer sprang back to life.
It turned out that the computer was in the midst of an automatic software update to Windows 11, even while in sleep mode. It remained inoperable until the upgrade completed. If the computer had been awake, I might have received a notification about the upgrade.
To add to the complexity, my Chrome Browser had all its URLs removed, prompting me to re-enter each address manually. I speculate that if I had been using Microsoft Edge instead of Google Chrome, this issue might not have occurred.
I had configured my new computer to enter sleep mode after 30 minutes of inactivity, so I didn’t think much of it when I saw the screen go black. The power light was still on, indicating it was operational. However, when I attempted to wake it up, nothing happened. Pressing the power button did not respond either, and even disconnecting the A/C power cord did not turn it off completely as the internal battery sustained the light. Concerned that my new computer had become unresponsive after just two weeks, I contemplated returning it to Best Buy during the Black Friday sale. In a moment of desperation, I repeatedly pressed the power button, and to my surprise, other small lights began flashing and the computer sprang back to life. It turned out that the computer was in the midst of an automatic software update to Windows 11, even while in sleep mode. It remained inoperable until the upgrade completed. If the computer had been awake, I might have received a notification about the upgrade. To add to the complexity, my Chrome Browser had all its URLs removed, prompting me to re-enter each address manually. I speculate that if I had been using Microsoft Edge instead of Google Chrome, this issue might not have occurred. Read More
Could someone proficient in PowerShell assist with troubleshooting a complex single-line command?
I’m currently working on a command that will be integrated into a batch file. The command aims to change the MBR partition type IDs of the first two partitions on each drive, specifically based on the presence of certain files on the root of the partitions.
The initial command I have already put together successfully changes the partition type IDs. However, I am now looking to refine the command to include a check for the presence of files named VOL1_M_MEDIA.WIM and VOL2_M_MEDIA.WIM on the root of the partitions before making the type changes.
This is the improved command that I am testing, but it has not been effective thus far. Although the command completes without errors, the partition type is not updated despite the specified files being present:
“`powershell.exe -executionpolicy bypass -command “Get-Disk | Get-Partition | Where-Object { $_.PartitionNumber -eq 1 -and $_.mbrtype -eq ‘0x0c’ -and (Test-Path ‘\$($_.UniqueId)\VOL1_M_MEDIA.WIM’) } | Set-Partition -mbrtype ‘0x1c’; Get-Disk | Get-Partition | Where-Object { $_.PartitionNumber -eq 2 -and $_.mbrtype -eq ‘0x07’ -and (Test-Path ‘\$($_.UniqueId)\VOL2_M_MEDIA.WIM’) } | Set-Partition -mbrtype ‘0x17′”`
“`
Please note that the intention is for the command to dynamically find the specified files without relying on specific drive letters.
I’m currently working on a command that will be integrated into a batch file. The command aims to change the MBR partition type IDs of the first two partitions on each drive, specifically based on the presence of certain files on the root of the partitions. The initial command I have already put together successfully changes the partition type IDs. However, I am now looking to refine the command to include a check for the presence of files named VOL1_M_MEDIA.WIM and VOL2_M_MEDIA.WIM on the root of the partitions before making the type changes. This is the improved command that I am testing, but it has not been effective thus far. Although the command completes without errors, the partition type is not updated despite the specified files being present: “`powershell.exe -executionpolicy bypass -command “Get-Disk | Get-Partition | Where-Object { $_.PartitionNumber -eq 1 -and $_.mbrtype -eq ‘0x0c’ -and (Test-Path ‘\$($_.UniqueId)\VOL1_M_MEDIA.WIM’) } | Set-Partition -mbrtype ‘0x1c’; Get-Disk | Get-Partition | Where-Object { $_.PartitionNumber -eq 2 -and $_.mbrtype -eq ‘0x07’ -and (Test-Path ‘\$($_.UniqueId)\VOL2_M_MEDIA.WIM’) } | Set-Partition -mbrtype ‘0x17′”““ Please note that the intention is for the command to dynamically find the specified files without relying on specific drive letters. Read More
Character count mismatch between different word version
Hi
I just taking a character count using the word inbuild option, but I found different character count for the same document as listed below
Word 2010 — 416116 character count
word O365 — 405392 character count
Word web — 404756 character count
I tested the same word file in the above 3 version it showing different character count. Any one have face this kind of issue. please let us know
Thanks
Ganesh.R
Hi I just taking a character count using the word inbuild option, but I found different character count for the same document as listed below Word 2010 — 416116 character countword O365 — 405392 character countWord web — 404756 character count I tested the same word file in the above 3 version it showing different character count. Any one have face this kind of issue. please let us know ThanksGanesh.R Read More
EdgeSidebarAppUrlHostBlockList policy is not available in Edge Management Service
This (group) policy is available from Edge version 127 but is not available in the new Edge Management Service (it is there in Group Policy).
Anyone knows why ?
Manage the sidebar in Microsoft Edge | Microsoft Learn
This (group) policy is available from Edge version 127 but is not available in the new Edge Management Service (it is there in Group Policy). Anyone knows why ? Manage the sidebar in Microsoft Edge | Microsoft Learn Read More
Adding security layers to Azure Kubernetes Service: 8 you can use from Rancher and NeuVector by SUSE
In this guest blog post, Tracy Walker, Senior Security Engineer for NeuVector by SUSE, explores how to implement additional security layers for Azure Kubernetes Service using SUSE’s Rancher Prime and NeuVector Prime.
Experienced users of Microsoft Azure or other public cloud services are likely familiar with the shared-responsibility model and the anxiety of determining where “shared responsibility” stops and “It’s my responsibility” starts. Add an unexpected security event, and you can find yourself searching for additional layers that work with your existing security and let you maintain independent control. In this brief blog, let’s detail exactly how you can quickly add additional security layers to Azure Kubernetes Service (AKS) using SUSE’s Rancher Prime and NeuVector Prime.
Understanding the threats to containerized environments
Before we get into the details of security layers for AKS clusters, let’s address two common questions that will help us get straight to the point:
1. How can you presume my existing security is not good enough for container security? You have no idea what I’m doing for container security.
Simply, let’s say you are not using SUSE NeuVector or NeuVector Prime but are using an eBPF-centric solution or virtual machine security. You do not have complete network visibility east-west inside your Kubernetes cluster. Allow me to explain: The trade-off from gaining Kubernetes automated networking is losing full visibility of network payload and protocol east-west within the cluster, specifically layers 5-7 of the network OSI model (session layer, presentation layer, and application layer). VM security tools or kernel-centric tools that use popular eBPF technology can identify only layer 3 network and layer 4 transport protocols and cannot “see” network payloads potentially carrying live attacks. Your cluster network remains an entry point to zero-day exploits, remote privilege escalation, or code executions that cannot be mitigated by common vulnerabilities and exposures (CVE) remediation or eBPF system call filtering.
NeuVector detects your workload’s unique network traffic to define security policies specific to your unique workload network behavior, creating Zero Trust microsegmentation that allows only known network traffic and can alert or block any traffic unknown to your workload. Unlike eBPF, NeuVector can identify threats in network traffic earlier in the kill chain, and before they reach the kernel.
In other words, neither virtual machines nor eBPF security layers can inspect full network traffic through layer 7 inside Kubernetes. This creates a security blind spot. NeuVector uses patented open-source technology to add multiple network-centric security layers to mitigate this blind spot.
2. Isn’t AKS already protecting me?
Azure’s shared-responsibility model makes clear that users of AKS PaaS are responsible for network controls, application security, and identity management. SUSE recommends security layers, such as Microsoft Defender for Containers, as well as adding security layers provided by Rancher and NeuVector for security threats not mitigated by your cloud provider. For example, NeuVector provides network threat detection and layer 7 protocol identification and validation for all network traffic where Microsoft Defender does not have such visibility.
As an independent source of truth for network activity, NeuVector complements Microsoft Defender for Containers by creating security policies directly from the unique workload network patterns that NeuVector detects, and it can then alert or block any anomalous behavior at runtime — including zero-day attacks — as well as automatically packet-capture the attack for post-event forensics. One example of how multiple security layers from NeuVector could be used against the recent XZ Backdoor attack is detailed here in this blog.
2 Rancher security layers
Rancher simplifies the management of Kubernetes clusters by providing a centralized platform for deploying, scaling, and monitoring containerized applications. With Rancher, you can easily provision AKS clusters on Azure and automate day-to-day operations such as upgrades and maintenance tasks.
For security, Rancher provides two foundational security layers for role-based access control (RBAC) and network policy enforcement. Users can deploy both of these layers to control access to clusters and prevent unauthorized actions.
Configure 6 NeuVector security layers in under 15 minutes
NeuVector complements Kubernetes and AKS security with up to eight security layers that include real-time network threat detection, Zero Trust security policies for both network traffic and container/node processes, scanning for vulnerabilities and security misconfigurations, and data leak prevention. Because NeuVector is Kubernetes-native, you can deploy using a HELM chart, directly using Rancher, or automatically from the Azure Marketplace.
Enable the following NeuVector security layers for your AKS cluster to mitigate specific threats with very little time or effort:
Layers 1 and 2: Automated CVE and security configuration scanning: Enabling NeuVector’s Auto Scan will immediately inspect and report on all nodes, your orchestrator platform, and containers to detect both known CVE exploits and security misconfigurations as compared to recommended CIS Benchmarks for Kubernetes and Docker.
Configuration time: 10 seconds.
Layers 3 and 4: Zero Trust runtime network and process security: Achieve full network and process microsegmentation. Because NeuVector defaults to Discover Mode upon installation, your workload network and process behaviors are automatically “learned” and defined as security policies to allow those behaviors in a Zero Trust cluster. Configure the Service Group Mode Automation in NeuVector’s settings to automatically enable Monitor or Protect enforcement modes, thus enabling Zero Trust segmentation between known and unknown network or process behaviors for all pods and nodes. NeuVector’s runtime layers are effective detecting any anomalous behavior, zero-day attack, internal actor, or attempted exploit of unpatched CVE because it derives the security policies directly from workload behavior. Bonus: Both network and process runtime policies can be exported as security-policy-as-code YAML, so your security can automatically be deployed to any cluster with your workloads.
Configuration time: 20 seconds.
Layer 5: Live network threat detection: The only security layer that is 100 percent automatic and requires no setup or configuration. NeuVector uses its patented Deep Packet Inspection to detect and block more than 24 known network threats as they occur, and also perform an automatic packet capture of what triggered the violation.
Configuration time: Automatic (zero seconds).
Layer 6: NeuVector admission controller: NeuVector’s admission controller gives you 31 prebuilt policies that are CVE- and compliance-aware when using registry scanning.
Configuration time: Two minutes per rule.
Extra: Layers 7 and 8: Data leak prevention (DLP) and ingress WAF sensors: These advanced security layers focus on egress or ingress traffic, but are a little more advanced in their setup and use. DLP and WAF sensors can be completely customized to your specific environment, so SUSE recommends using these security layers after the other six layers are in place, perhaps in conjunction with NeuVector Prime support.
Configuration time: Varies: See NeuVector Prime.
Conclusion
Securing Azure Kubernetes Service necessitates multiple security layers using tools like Rancher and NeuVector by SUSE to eliminate blind spots. By deploying these tools and implementing the security layers recommended, you can rapidly mature your security posture and mitigate known or unknown risks associated with your AKS environments.
Securing any Kubernetes cluster should always be understood as an ongoing process that requires vigilance and reviews to identify new or unmitigated threats. With SUSE tools and security best practices in place, you can confidently secure any Kubernetes cluster using multiple automated security layers while minimizing management overhead.
Microsoft Tech Community – Latest Blogs –Read More
Icons Missing in Personal Folder After Latest Update
After upgrading to the most recent public Cumulative update, I observed that the yellow folders within my User directory no longer display icons within them, regardless of their size. Interestingly, the icons remain visible in the Details column on the right-hand side. My operating system is Windows 11 Pro 22H2 Build 22621.2715.
Has anyone else experienced this issue?
After upgrading to the most recent public Cumulative update, I observed that the yellow folders within my User directory no longer display icons within them, regardless of their size. Interestingly, the icons remain visible in the Details column on the right-hand side. My operating system is Windows 11 Pro 22H2 Build 22621.2715. Has anyone else experienced this issue? Read More
How to Modify the Windows Registry.
Hello. Recently, I successfully made my first Windows registry modification to resolve an annoyance. To ensure I don’t create any issues in the future, I’m seeking guidance. Currently, we have three PCs in use. One of them has only one Local Admin Account without a Standard User Account. Following a tutorial, I made a modification to the HKEY_CURRENT_USER key, and it worked smoothly.
On the other hand, our other two PCs, operating on Windows 11 22H2, have both a Local non-Microsoft Admin Account and a Standard Local User Account. The registry keys displayed in regedit are the typical ones: HKEY_CLASSES_ROOT, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, HKEY_USERS, and HKEY_CURRENT_CONFIG.
If I wish to implement a change in the registry that applies to both the Admin and Standard User accounts, should I make modifications within the HKEY_LOCAL_MACHINE key instead of CURRENT_USER, as I did with the PC that only has one account? Additionally, I want to mention that I created a backup of the Registry before proceeding with any modifications.
I would appreciate any advice to ensure I’m following the correct approach. Thank you.
Hello. Recently, I successfully made my first Windows registry modification to resolve an annoyance. To ensure I don’t create any issues in the future, I’m seeking guidance. Currently, we have three PCs in use. One of them has only one Local Admin Account without a Standard User Account. Following a tutorial, I made a modification to the HKEY_CURRENT_USER key, and it worked smoothly. On the other hand, our other two PCs, operating on Windows 11 22H2, have both a Local non-Microsoft Admin Account and a Standard Local User Account. The registry keys displayed in regedit are the typical ones: HKEY_CLASSES_ROOT, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, HKEY_USERS, and HKEY_CURRENT_CONFIG. If I wish to implement a change in the registry that applies to both the Admin and Standard User accounts, should I make modifications within the HKEY_LOCAL_MACHINE key instead of CURRENT_USER, as I did with the PC that only has one account? Additionally, I want to mention that I created a backup of the Registry before proceeding with any modifications. I would appreciate any advice to ensure I’m following the correct approach. Thank you. Read More
Copilot working for word but not for any other programs
Hi There,
Co pilot is working on word but not on any other app like outlook or excel.
Can anyone help
Hi There, Co pilot is working on word but not on any other app like outlook or excel. Can anyone help Read More
Troubleshooting Slow Cold Boot and Driver Loading Issues
Hi there,
I recently utilized AMD’s “auto-update” tool to update all AMD-related drivers on my 5900HX laptop. Unfortunately, when attempting to download the latest Adrenaline drivers, I encountered compatibility issues as it no longer supported GCN/Vega. Without realizing this, I opted to update using the auto-update tool.
Since the update, the cold boot time has significantly increased to about 2 minutes compared to the previous 20 seconds (loading animation screen). Upon enabling boot logging, I noticed Windows repeatedly trying to load the same drivers without success, resulting in numerous BOOTLOG_NOT_LOADED entries (see screenshot). Seeking a solution, I turned to Windows’ verifier tool, but after selecting all drivers for verification and restarting, I began experiencing “system_thread_exception_not_handled” BSODs consistently. To regain access to Windows, I had to reset verifier and deactivate driver verification.
I am unsure how to proceed from here and would prefer to avoid a fresh Windows installation if possible. Any guidance on resolving this issue would be greatly appreciated.
Thank you.
Hi there, I recently utilized AMD’s “auto-update” tool to update all AMD-related drivers on my 5900HX laptop. Unfortunately, when attempting to download the latest Adrenaline drivers, I encountered compatibility issues as it no longer supported GCN/Vega. Without realizing this, I opted to update using the auto-update tool. Since the update, the cold boot time has significantly increased to about 2 minutes compared to the previous 20 seconds (loading animation screen). Upon enabling boot logging, I noticed Windows repeatedly trying to load the same drivers without success, resulting in numerous BOOTLOG_NOT_LOADED entries (see screenshot). Seeking a solution, I turned to Windows’ verifier tool, but after selecting all drivers for verification and restarting, I began experiencing “system_thread_exception_not_handled” BSODs consistently. To regain access to Windows, I had to reset verifier and deactivate driver verification. I am unsure how to proceed from here and would prefer to avoid a fresh Windows installation if possible. Any guidance on resolving this issue would be greatly appreciated. Thank you. Read More
Bi-nance: Empfehlungscode “C15HJGN1” – Empfehlungs ID
Was ist der Bi-nance Empfehlungscode?
Bi-nance-Empfehlungscode: Er wird als “C15HJGN1“ verwendet. Er ist der am häufigsten verwendete, lebenslang gültige Bi-nance-Empfehlungscode mit dem höchsten Rabatt der Welt. Wenn Sie sich bei der Kryptowährungsbörse Bi-nance registrieren, schreiben Sie “C15HJGN1” anstelle von “Empfehlungs-ID“. Der Transaktionsgebührenrabatt, den Sie erhalten, beträgt 30 %.
Kurzfassung
Maximieren Sie Ihre Ersparnisse mit einem verifizierten Bi-nance-Empfehlungscode (C15HJGN1) für einen lebenslangen Rabatt von 20 % auf Transaktionsgebühren und einen Registrierungsbonus von 600 $.
Erhöhen Sie Ihre Provisionsrate auf 40 %, indem Sie Transaktionsgebühren mit BNB-Coins bezahlen!
Um das Bi-nance-Benutzererlebnis auf die nächste Stufe zu heben, zahlen Sie nach der Durchführung des Identitätsüberprüfungsprozesses Geld ein und profitieren Sie von Kryptowährungs-Kauf-/Verkaufstransaktionen, dem Eröffnen von Futures-Positionen, Verdienen, Launchpad und Launchpool-Tools!
Was ist der Bi-nance Empfehlungscode?Bi-nance-Empfehlungscode: Er wird als “C15HJGN1“ verwendet. Er ist der am häufigsten verwendete, lebenslang gültige Bi-nance-Empfehlungscode mit dem höchsten Rabatt der Welt. Wenn Sie sich bei der Kryptowährungsbörse Bi-nance registrieren, schreiben Sie “C15HJGN1” anstelle von “Empfehlungs-ID“. Der Transaktionsgebührenrabatt, den Sie erhalten, beträgt 30 %.KurzfassungMaximieren Sie Ihre Ersparnisse mit einem verifizierten Bi-nance-Empfehlungscode (C15HJGN1) für einen lebenslangen Rabatt von 20 % auf Transaktionsgebühren und einen Registrierungsbonus von 600 $.Erhöhen Sie Ihre Provisionsrate auf 40 %, indem Sie Transaktionsgebühren mit BNB-Coins bezahlen!Um das Bi-nance-Benutzererlebnis auf die nächste Stufe zu heben, zahlen Sie nach der Durchführung des Identitätsüberprüfungsprozesses Geld ein und profitieren Sie von Kryptowährungs-Kauf-/Verkaufstransaktionen, dem Eröffnen von Futures-Positionen, Verdienen, Launchpad und Launchpool-Tools! Read More
Compliance Manager Default Alert Policy
Hi everyone,
I just got a notification that a medium-severity alert has been triggered.
I’ve never encountered this before, can anyone tell me more about it and whether I should take any actions?
Compliance Manager Default Alert Policy
Hi everyone,I just got a notification that a medium-severity alert has been triggered. I’ve never encountered this before, can anyone tell me more about it and whether I should take any actions? Compliance Manager Default Alert Policy Read More
People search results excluding external/guest users
I would like to exclude/hide external/guest users in the people search in our SharePoint intranet site. In SharePoint admin centre created a new search “local people search2” which excludes external users using –AccountName:“#ext#”
Than in the “People-Directory.aspx” and “peopleresults.aspx” pages, I have edited the pages and webpart section and changed the query using “change query” section where I changed from the default “local people search” to “local people search2” see below. I saved and published the changes but it keeps defaulting back to “local people search” instead on “local people search2”, where am I going wrong, why does it keep defaulting back? When I test the query in the edit webpart it does what I need it to do, but it does not save the change from “local people search” instead on “local people search2”
I would like to exclude/hide external/guest users in the people search in our SharePoint intranet site. In SharePoint admin centre created a new search “local people search2″ which excludes external users using -AccountName:”#ext#” Than in the “People-Directory.aspx” and “peopleresults.aspx” pages, I have edited the pages and webpart section and changed the query using “change query” section where I changed from the default “local people search” to “local people search2” see below. I saved and published the changes but it keeps defaulting back to “local people search” instead on “local people search2”, where am I going wrong, why does it keep defaulting back? When I test the query in the edit webpart it does what I need it to do, but it does not save the change from “local people search” instead on “local people search2” Read More
Creating Default Save Folders on Your PC for Seamless Synchronization with OneDrive Cloud
Is it possible for me to automatically back up all folders and files to my PC while selecting specific folders to sync with Onedrive cloud as a backup? Currently, all autosaves are directed to Onedrive Personal. Will I still be able to access them without an internet connection?
Is it possible for me to automatically back up all folders and files to my PC while selecting specific folders to sync with Onedrive cloud as a backup? Currently, all autosaves are directed to Onedrive Personal. Will I still be able to access them without an internet connection? Read More