Microsoft Support & Discussions
Free PC Help Forum microsoft products support and discussions. If you need help with Microsoft Windows, Windows Server software, Microsoft 365, Microsoft Azure or any other Microsoft product you can post here. If you want to discuss Microsoft and their line of products you can do that here also.
84,928 topics in this forum
-
Get started with Universal Print and Windows 365 Cloud PC
by Guest Christiaan_Brinkhoff- 0 replies
- 0 views
Universal Print eliminates the need for on-premises print servers and let you easily manage and deploy printers directly to Cloud PCs with Microsoft Endpoint Manager. As businesses are shifting more and more to digital and away from paper, you could ask yourself, do we still have to print? In many cases, the answer is still "yes" and that's why it is important to simplify legacy print environments in the most efficient way possible. This is where the new Microsoft 365 service Universal Print comes into play! What is Universal Print? Universal Print is a cloud-based print solution to allow IT admins to share and manage printers through the cloud. You might re…
-
-
- FPCH Admin
- 0 replies
- 344 views
We learn a tremendous amount from your feedback and I'm excited to announce that we are now extending combined cumulative update capabilities to more versions of Windows! Servicing stack updates (SSUs) provide fixes to the servicing stack, the component that installs Windows updates. Last September, we announced that we were working to simplify the on-premises deployment of servicing stack updates. We shared a plan to ease the efforts of IT administrators by providing a single monthly update containing both the latest cumulative update (LCU) fixes as well as the latest SSU, if applicable. This single update package can be installed on a device to ensure that updates ar…
Last reply by AWS, -
-
Point and Print Default Behavior Change
by Guest MSRC Team- 0 replies
- 1 view
Our investigation into several vulnerabilities collectively referred to as “PrintNightmare” has determined that the default behavior of Point and Print does not provide customers with the level of security required to protect against potential attacks. Today, we are addressing this risk by changing the default Point and Print driver installation and update behavior to require … Point and Print Default Behavior Change Read More » Continue reading...
-
-
- FPCH Admin
- 0 replies
- 1 view
Our investigation into several vulnerabilities collectively referred to as “PrintNightmare” has determined that the default behavior of Point and Print does not provide customers with the level of security required to protect against potential attacks. Today, we are addressing this risk by changing the default Point and Print driver installation and update behavior to require administrator privileges.
Last reply by Cloaked, -
-
How to find Windows 10 language packs if your organization has Windows 10 Enterprise subscriptions
by Guest Rittwika_Rudra- 0 replies
- 0 views
If you have a Windows 10 Enterprise subscriptions (formerly called Software Assurance), we recommend that you download language pack media from the Volume Licensing Service Center (VLSC). Upon signing in, you can access the downloads by searching under Downloads and Keys for "Windows 10." How to search for downloads and product keys within the Volume Licensing Service Center To select and download multiple language packs at once, select MultiLanguage. If you only need one language pack, select the individual language pack and then select Continue. Selecting more than one language pack in the Volume Licensing Service Center The results will return the curren…
-
Congratulations to the MSRC 2021 Most Valuable Security Researchers!
by Guest Lynn Miyashita- 0 replies
- 2 views
The MSRC Researcher Recognition Program offers public thanks and acknowledgement to the researchers who help protect customers through discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure. Today, we are excited to recognize this year’s Most Valuable Security Researchers (MVRs) based on the impact, accuracy, and volume of their reports. Congratulations to each of our MSRC … Congratulations to the MSRC 2021 Most Valuable Security Researchers! Read More » Continue reading...
-
-
- FPCH Admin
- 0 replies
- 1 view
The MSRC Researcher Recognition Program offers public thanks and acknowledgement to the researchers who help protect customers through discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure. Today, we are excited to recognize this year’s Most Valuable Security Researchers (MVRs) based on the impact, accuracy,
Last reply by Cloaked, -
-
Troubleshooting hybrid Azure AD errors during Windows 365 Cloud PC provisioning
by Guest Steven DeQuincey- 0 replies
- 0 views
With Windows 365, you can automatically provision Windows virtual machines (Cloud PCs) and manage them alongside your organization’s other devices in Microsoft Endpoint Manager. A prerequisite for using Cloud PCs is that the devices must be hybrid Azure Active Directory (Azure AD) joined. Some organizations may need to configure new hybrid Azure AD environments to accommodate Cloud PCs, while others can utilize their existing hybrid Azure AD environments to connect their on-premises resources and cloud-based services. If you have an existing environment, you may need to modify your hybrid Azure AD configuration to successfully provision Cloud PCs. This article outli…
-
Get started with Windows 365 Business
by Guest Christiaan_Brinkhoff- 0 replies
- 0 views
Windows 365 Business is a version of Windows 365 made specifically for use in smaller companies (up to 300 seats). It offers an easy, streamlined way of providing Cloud PCs to your users. Users want technology that is familiar, easy to use, and always available so they can work and create fluidly across devices. Cloud PC makes this possible by combining the power and security of the cloud with the familiarity of the PC. Only Microsoft can bring together the PC and the cloud with a consistent and integrated Windows experience. What is a Cloud PC? It is your personalized desktop, apps, data, settings, and content streamed securely from the cloud directly to your devic…
-
Announcing the general availability of Windows 365
by Guest Scott Manchester- 0 replies
- 0 views
Today I am thrilled to share the general availability of Windows 365 and the resources available to help you get started with this new cloud service! Windows 365 introduces a new way to experience Windows 10 or Windows 11 (when it’s generally available later this calendar year) for all types of workers, from interns and contractors to software developers and industrial designers. Windows 365 takes the operating system to the Microsoft Cloud, securely streaming the full Windows experience—including all your apps, data, and settings—to your personal or corporate devices. This approach creates a fully new personal computing category, specifically for the hybrid world: the…
-
Windows Autopilot for HoloLens 2 general availability
by Guest Yannis_Lempidakis- 0 replies
- 0 views
Today, we are thrilled to announce the general availability of Windows Autopilot for HoloLens 2! IT administrators around the world can now use Microsoft Endpoint Manager to efficiently set up their fleet of HoloLens 2 devices and effectively deploy them to their production environments. Traditionally, IT pros spend significant hands-on time configuring and setting up devices that will later be used by end users. With Windows Autopilot for HoloLens, we are simplifying this process. IT admins can pre-configure devices with a few simple operations, and end users can set-up the devices with little to no interaction by connecting to a network and verifying credentials. …
-
Troubleshooting expedited updates
by Guest Stacey Doerr- 0 replies
- 1 view
As we work through the Public Preview of expedited updates in Microsoft Endpoint Manager, we wanted to share troubleshooting tips based on the feedback we've received to date. We are continuing to build and enhance the expedited update capabilities currently available in public preview. We investigate issues and feedback. We update documentation. We make improvements. For those eager to utilize this feature, but who may be experiencing issues, we wanted to share some information to help efficiently troubleshoot your devices independently. Most of the tips included in this post are based on the assumption that you are using Microsoft Intune to create and manage an exped…
-
Zero Trust Adoption Report: How does your organization compare?
by Guest Emma Jones- 0 replies
- 0 views
From the wide adoption of cloud-based services to the proliferation of mobile devices. From the emergence of advanced new cyberthreats to the recent sudden shift to remote work. The last decade has been full of disruptions that have required organizations to adapt and accelerate their security transformation. And as we look forward to the next major disruption—the move to hybrid work—one thing is clear: the pace of change isn’t slowing down. In the face of this rapid change, Zero Trust has risen as a guiding cybersecurity strategy for organizations around the globe. A Zero Trust security model assumes breach and explicitly verifies the security status of identity, endp…
-
Combing through the fuzz: Using fuzzy hashing and deep learning to counter malware detection evasion techniques
by Guest Eric Avena- 0 replies
- 0 views
Today’s cybersecurity threats continue to find ways to fly and stay under the radar. Cybercriminals use polymorphic malware because a slight change in the binary code or script could allow the said threats to avoid detection by traditional antivirus software. Threat actors customize their wares specific to their target organizations to increase their chances of breaking into and moving laterally through an entire corporate network, exfiltrating data, and leaving with little or no trace. The underground economy is rife with malware builders, Trojanized versions of legitimate applications, and other tools and services that allow malware operators to deploy highly evasive ma…
-
Get started with Windows 365 Enterprise
by Guest Christiaan_Brinkhoff- 0 replies
- 0 views
Today we introduced Windows 365. Find out what you need to know to jump into this new service and make it even easier for your users to connect to Windows running in the Microsoft cloud. Before I start explaining the steps required to get your environment up to speed, I’d like to start by outlining what Windows 365 is. Let’s get started! What is Windows 365? Users want technology that is familiar, easy to use and always available so they can work and create fluidly across devices. Cloud PC makes this possible by combining the power and security of the cloud with the familiarity of the PC. Only Microsoft can bring together the PC and the cloud with a consistent …
-
How to protect your CAD data files with MIP and HALOCAD
by Guest Lauren Goodwin- 0 replies
- 0 views
This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. Computer-aided design (CAD) files are used by design professionals in the manufacturing, engineering, architecture, surveying, and construction industries. These highly valuable files contain confidential information and form their core intellectual property (IP). Loss of such proprietary information to an outsider or a competitor can have disastrous effects leading to a loss in sales, market share, and reduced profit margins. However, such industries often collaborate with other design partners or vendors or they share their design parts with smaller m…
-
A guide to balancing external threats and insider risk
by Guest Emma Jones- 0 replies
- 0 views
The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with Rockwell Automation Vice President and Chief Information Security Officer Dawn Cappelli. In this blog post, Dawn talks about the importance of including insider risk in your cybersecurity plan. Natalia: What is the biggest barrier that organizations face in addressing insider risk? Dawn: The biggest barrier is drawing attention to insider risk. We heard about the ransomware group bringing down the Colonial Pipelin…
-
When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure
by Guest Eric Avena- 0 replies
- 0 views
[Note: In this two-part blog series, we expose a modern malware infrastructure and provide guidance for protecting against the wide range of threats it enables. Part 1 covers the evolution of the threat, how it spreads, and how it impacts organizations. Part 2 will be a deep dive on the attacker behavior and will provide investigation guidance.] Combating and preventing today’s threats to enterprises require comprehensive protection focused on addressing the full scope and impact of attacks. Anything that can gain access to machines—even so-called commodity malware—can bring in more dangerous threats. We’ve seen this in banking Trojans serving as entry point for ranso…
-
Microsoft acquires CloudKnox Security to offer unified privileged access and cloud entitlement management
by Guest Emma Jones- 0 replies
- 0 views
Today on the Official Microsoft Blog, Microsoft announced the acquisition of CloudKnox Security, a leader in Cloud Infrastructure Entitlement Management (CIEM). CloudKnox offers complete visibility into privileged access. It helps organizations right-size permissions and consistently enforce least-privilege principles to reduce risk, and it employs continuous analytics to help prevent security breaches and ensure compliance. The acquisition further enables Microsoft Azure Active Directory (Azure AD) customers with granular visibility, continuous monitoring, and automated remediation for hybrid and multi-cloud permissions. As the corporate network perimeter disappears, …
-
The evolution of a matrix: How ATT&CK for Containers was built
by Guest Emma Jones- 0 replies
- 0 views
Note: The content of this post is being released jointly with the Center for Threat-Informed Defense. It is co-authored with Chris Ante and Matthew Bajzek. The Center post can be found here. As containers become a major part of many organizations’ IT workloads, it becomes crucial to consider the unique security threats that target such environments when building security solutions. The first step in this process is understanding the relevant attack landscape. The MITRE ATT&CK® team has received frequent questions from the community about if or when ATT&CK would include coverage for adversary behavior in containers. Previous iterations of ATT&CK have incl…
-
Windows quality updates primer
by Guest Chris Morrissey- 0 replies
- 0 views
As we advance towards general availability of Windows 11 this holiday, we thought it was a good time for a refresher on Windows monthly quality updates. Windows monthly quality updates help you stay productive and protected. They provide consumers and IT administrators alike with the security fixes they need to protect devices before unpatched vulnerabilities can potentially be exploited. Monthly quality updates are cumulative and include all previously released fixes to guard against fragmentation of the operating system (OS), which can lead to reliability and vulnerability issues when only a subset of fixes is installed. To ensure that this information is easy to fin…
-
Security Update Validation Program: the early bird tests the worm
by Guest Dawn Thomas- 0 replies
- 0 views
The Security Update Validation Program (SUVP) is a quality assurance testing program geared toward Microsoft's monthly security update release, which occur every second Tuesday (also referred to as Update Tuesday or Patch Tuesday). SUVP partners test these security updates prior to Update Tuesday and provide us with feedback regarding usability, bug reports, test reports, etc. OK, so no worms here, but you can certainly be the early bird when it comes to testing security updates—three weeks before they go live on Update Tuesday! How? By joining the Security Update Validation Program. This post helps you familiarize you with the SUVP and offers answers to common questio…
-
Evolving the Microsoft Store for Business and Education
by Guest Joe Lurie- 0 replies
- 0 views
Today, we are announcing exciting plans that bring together the management capabilities of Microsoft Endpoint Manager, the new Microsoft Store, and the flexibility of Windows Package Manager. These plans enhance the new Microsoft Store experience that is coming soon to both Windows 11 and Windows 10. Your suggestions matter You told us you wanted a way to control which apps and games were being downloaded by the users in your organization. We created the Microsoft Store for Business and Microsoft Store for Education, enabling you to make specific apps available in your own private store. We linked the Microsoft Store for Business and Microsoft Store for Education …
-
Announcing Update Health Tools
by Guest Kay_Toma- 0 replies
- 0 views
Update Health Tools enable the Windows Update for Business deployment service feature for expediting Windows 10 security updates using Microsoft Endpoint Manager. Update Health Tools run a tiny component that receives the expedite command from the deployment service, enabling devices to start updating right away, faster than default or existing configured settings. Update Health Tools are automatically deployed to devices connected to Windows Update. You can also manually deploy Update Health Tools, which is the purpose for today's post. Before manually deploying Update Health Tools First, if Update Health Tool have not been automatically deployed to your devic…
-
Introducing Bounty Awards for Teams Mobile Applications Security Research
by Guest Lynn Miyashita- 0 replies
- 0 views
We are pleased to announce the addition of Microsoft Teams mobile applications to the Microsoft Applications Bounty Program. Through the expanded program we welcome researchers from across the globe to seek out and disclose any high impact security vulnerabilities they may find in Teams mobile applications to help secure customers. Rewards up to $30,000 USD … Introducing Bounty Awards for Teams Mobile Applications Security Research Read More » Continue reading...