security
5391 TopicsError 0xc1900101 in Win11 Update
Hello, I'm trying (desperately ) install Windows 11 from Windows 10. On each attempt I get a blue screen (around 75-77%) with the error code 0xc1900101. my PC is Windows 11 compatible (update offered in Windows Update, secure boot activated) Motherboard: MSI X470 gaming Plus Processor: Ryzen 5 3600X Crucial M2 1Go SSD (90Go free) 16GB DDR4 I tried: 1) Driver update (checked in 2 different software) BIOS flashed /Processor /Motherboard /Graphics card /SSD OK 2) Disconnect external devices 3) Launch from a clean boot by deactivating all services at startup (excluding Microsoft) 3) Reset Windows Update components 4) Use Windows Update Repair Program 5) Repair system files with sfc/scannow and dism /online/cleanup-image /restorehealth 6) Use Windows Setup Wizard instead of Windows Update If anyone has another idea, I thank them in advance...102Views1like5CommentsNative software to allow android biometrics to unlock windows 11?
Is there ever going to be software from microsoft(for security reasons) to allow you to use a remote android computer tablet or similar to activate windows with biometrics? I have a Tab S11 ultra I want to use to unlock it for playing steam games. Will this ever be a thing. I think one of the problems with steam is it needs to be active to work via steam link. But this works if coming out of sleep mode specifically. But anything to allow this or for a seperate app to wake and remotely use the desktop would be wonderfully useful. Especially something official that is secure. I'm coming from linux and I don't use 3rd party software in general. Obviously it would be insanely insecure to use any such software that is not official. Could such software allowing a tablet to be used with other software to be a remote screen be used to not even need steamlink to play games. Unless the steamlink is better with the connection lag somehow.36Views0likes2CommentsWhy is my command not working?
I wanted to upgrade my OS to a 64-bit from a 32-bit processor. I was following the guide for that here, but when I wanted to make sure my PCU was compatible on step 6, the coreinfo command wouldn't work. It kept saying that it was unable to extract the x64 image and to run coreinfo from a writeable directory, but I don't understand.23Views0likes2CommentsIngesting Windows Security Events into Custom Datalake Tables Without Using Microsoft‑Prefixed Table
Hi everyone, I’m looking to see whether there is a supported method to ingest Windows Security Events into custom Microsoft Sentinel Data Lake–tiered tables (for example, SecurityEvents_CL) without writing to or modifying the Microsoft‑prefixed analytical tables. Essentially, I want to route these events directly into custom tables only, bypassing the default Microsoft‑managed tables entirely. Has anyone implemented this, or is there a recommended approach? Thanks in advance for any guidance. Best Regards, Prabhu Kiran114Views0likes1CommentWAF custom rule for bock others cookie and permit only a specific cookie name and value
Hello all, I need to create a custom WAF rule that only allows traffic for a specific request URI (/example-path) if it contains a particular cookie, Cookie=abc123, and blocks all other requests. Additionally, could someone clarify the difference between configuring the policy this way: RequestHeaders['Cookie'], Operator=DoesNotEqual, Values="Cookie=abc123" RequestCookie, Values="CookieName", Operator=Equal, valueOfTheCookie="abc123" I hope I explained myself clearly. Thanks in advance for your responses!334Views0likes1CommentMonitor logical disk space through Intune
Hi All, We have a requirement to monitor low disk space, particularly on devices with less than 1GB of available space. We were considering creating a custom compliance policy, but this would lead to blocking access to company resources as soon as the device becomes non-compliant. Therefore, we were wondering if there are any other automated methods we could use to monitor the logical disk space (primarily the C drive) using Intune or Microsoft Graph. Thanks in advance, Dilan245Views0likes1CommentQuestion behavior same malware
Two malware with the same detection name but on different PCs and files, do they behave differently or the same? Example: Two detections of Trojan:Win32/Wacatac.C!ml 1) It remains latent in standby mode, awaiting commands. 2) It modifies, deletes, or corrupts files.378Views0likes5Comments