Blogs
Links
Social networks
Awards
Sponsors
(Paypal-Donations)
Tag Archives: Windows Server
Office 365: Download fails (in ConfigMgr) after Oct. 2020 Updates
[German]Administrators (or users) who have installed the October 2020 updates (for Windows 10 and Windows Server pendants) are probably facing issues. ConfigMgr and other tools will (possibly) not be able to download files for Microsoft Office 365 updates afterwards. The … Continue reading
Posted in issue, Office, Update, Windows
Tagged issue, Office 365, Patchday 10.2020, Update, Windows 10, Windows Server
2 Comments
Microsoft specifies patching of the Netlogon vulnerability (CVE-2020-1472)
[German]Microsoft has revised and clarified its guidance on how to close the Netlogon vulnerability in Windows Server installations that act as domain controllers. This is in response to feedback from users who were confused by previous support posts.
Posted in Security, Update, Windows
Tagged CVE-2020-1472, Security, Update, Windows Server
Leave a comment
Zerologon Exploits are used in the wild, patching (Windows Server, Samba) recommended
[German]I bring up the Zerologon vulnerability issue again. Microsoft warns that attackers actively use the Windows Server Zerologon exploits for attacks. Windows Server administrators should urgently install the necessary security updates. But Samba servers are also vulnerable. Here is some … Continue reading
CISA Warning: Patch your Windows Servers against CVE-2020-1472 (Zerologon)
[German]The United States Agency for Cyber Security and Infrastructure Security (CISA) has issued an emergency order giving the U.S. government agencies a four-day deadline to implement a Windows Server patch against the Zerologon vulnerability (CVE-2020-1472).
Windows Server: Zerologon vulnerability (CVE-2020-1472) allows domain hijacking
[German]Security researchers have uncovered a vulnerability in all versions of Windows Server that allows domain transfer with a simple approach. This vulnerability, called Zerologon (CVE-2020-1472), was closed with the security updates of August 2020. Those who have not yet installed … Continue reading
Why ISL Online: Critical factors when choosing a remote desktop solution
[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...
Windows 10 und Server 2016/2019: Events with ID 650
[German]In Windows 10 cliets as well as in Windows Server 2016 and Windows Server 2019, events with ID 650 may occur in the Event Viewer. Microsoft has provided an explanation for these entries as of August 13, 2020.
Windows Server vNext Insider Preview Build 20201
Microsoft has also released the Windows Insider Preview Build 20201 for Windows Server vNext on August 26, 2020. This is the variant from the Windows Server vNext Long-Term Servicing Channel (LTSC). This release includes both the Desktop Experience and Server … Continue reading
Windows Domain Controller suddenly generate EventID 5829 warnings (August 11, 2020)
[German]Administrators of Active Directory (AD) domain controllers may notice EventID 5829 warnings in the Event Viewer since August 2020 Patchday (August 11, 2020). This is intentional, Microsoft is addressing a problem with a vulnerability (CVE-2020-1472) in Netlogon connections. Admins have … Continue reading
Windows 10/Server 2016: Security policy Inactivity limit does not work
[English]A German blog reader noticed that the local security policies for locking a user account during inactivity seem to stop working on Windows 10 and Windows Server 2016 and 2019. I'm going to put it up for discussion here, maybe … Continue reading
Critical update for SigRed Bug in Windows DNS Server
[German]There has been a bug in the code of the Windows DNS server for 17 years that leads to a critical vulnerability. The worm exploitable vulnerability could be exploited to gain domain administrator privileges and compromise the entire underlying corporate … Continue reading