security
5364 Topicshelp with windir and system32 in quality enviroment
about a month ago i reinstalled windows 11 ( home) and so far not got older updates as i try to reset the windows updater i discover in one step ( after the rename of softwaredistribution and catroot steps) has windir and system 32 shown below cd /d %windir%\system32 than has abunch of regsvr32 dll to register anyway a error shows in red ( command prompt) saying cant be located or found in summary) so find how to fix it and no problems until after its fixed! when i apply this fix ( all profiles tab in box and add) the command prompt ( cmd) is gone cant open nor is windows key and x to bring up that list ( task manager commpand prompt, device manager etc...) and defrag is not able to run either to open the cmd ( command prompt ) i have to use windows key and r for box and than gives message im not administrator or words to that affect find fix for that but rather strange anyway ( not the other missing things) how do i go and fix this issue ? note i had to delete the fix above to get normal working functions again i cant find anything that mentions this or a fix i dont understand how a "fix " can affect or disable things this is link to show the step i mentioned i.e step 5 https://learn.microsoft.com/en-us/troubleshoot/windows-client/installing-updates-features-roles/additional-resources-for-windows-update53Views0likes2CommentsI have Administrator rights but can't turn on location services...HELP! ;-)
My account shows that I have administrator rights, but Location Services is greyed out. How can I get that working? I'm not tech-savvy, so I'm not very good at searching, or at least finding the right words for the question. Thanks!10Views0likes0CommentsData Security Posture Management for AI
A special thanks to Chris Jeffrey for his contributions as a peer reviewer to this blog post. Microsoft Purview Data Security Posture Management (DSPM) for AI provides a unified location to monitor how AI Applications (Microsoft Copilot, AI systems created in Azure AI Foundry, AI Agents, and AI applications using 3 rd party Large Language Models). This Blog Post aims to provide the reader with a holistic understanding of achieving Data Security and Governance using Purview Data Security and Governance for AI offering. Purview DSPM is not to be confused with Defender Cloud Security Posture Management (CSPM) which is covered in the Blog Post Demystifying Cloud Security Posture Management for AI. Benefits When an organization adopts Microsoft Purview Data Security Posture Management (DSPM), it unlocks a powerful suite of AI-focused security benefits that helps them have a more secure AI adoption journey. Unified Visibility into AI Activities & Agents DSPM centralizes visibility across both Microsoft Copilots and third-party AI tools—capturing prompt-level interactions, identifying AI agents in use, and detecting shadow AI deployments across the enterprise. One‑Click AI Security & Data Loss Prevention Policies Prebuilt policies simplify deployment with a single click, including: Automatic detection and blocking of sensitive data in AI prompts, Controls to prevent data leakage to third-party LLMs, and Endpoint-level DLP enforcement across browsers (Edge, Chrome, Firefox) for third-party AI site usage. Sensitive Data Risk Assessments & Risky Usage Alerts DSPM runs regular automated and on-demand scans of top-priority SharePoint/E3 sites, AI interactions, and agent behavior to identify high-risk data exposures. This helps in detecting oversharing of confidential content, highlight compliance gaps and misconfigurations, and provides actionable remediation guidance. Actionable Insights & Prioritized Remediation The DSPM for AI overview dashboard offers actionable insights, including: Real-time analytics, usage trends, and risk scoring for AI interactions, and Integration with Security Copilot to guide investigations and remediation during AI-driven incidents. Features and Coverage Data Security Posture Management for AI (DSPM-AI) helps you gain insights into AI usage within the organization, the starting point is activating the recommended preconfigured policies using single-click activations. The default behavior for DSPM-AI is to run weekly data risk assessments for the top 100 SharePoint sites (based on usage) and provide data security admins with relevant insights. Organizations get an overview of how data is being accessed and used by AI tools. Data Security administrators can use on-demand classifiers as well to ensure that all contents are properly classified or scan items that were not scanned to identify whether they contain any sensitive information or not. AI access to data in SharePoint site can be controlled by the Data Security administrator using DSPM-AI. The admin can specify restrictions based on data labels or can apply a blanket restriction to all data in a specific site. Organizations can further expand the risks assessments with their own custom data risk assessments, a feature that is currently in preview. Thanks to its recommendations section, DSPM-AI helps data security administrators achieve faster time to value. Below is a sample of the policy to “Capture interactions for enterprise AI apps” that can be created using recommendations. More details about the recommendations that a Data Security Administrator can expect can be found at the DSPM-AI Documentation, these recommendations might be different in the environment based on what is relevant to each organization. Following customers’ feedback, Microsoft have announced during Ignite 2025 (18-21 Nov 2025, San Francisco – California) the inclusion of these recommendations in the Data Security Posture Management (DSPM) recommendations section, this helps Data Security Administrators view all relevant data security recommendations in the same place whether they apply to human interactions, tools interactions, or AI interactions of the data. More details about the new Microsoft Purview Data Security Posture Management (DSPM) experience are published in the Purview Technical Blog site under the article Beyond Visibility: The new Microsoft Purview Data Security Posture Management (DSPM) experience. After creating/enabling the Data Security Policies, Data Security Administrators can view reports that show AI usage patterns in the organization, in these reports Data Security Administrators will have visibility into interaction activities. Including the ability to dig into details. In the same reports view, Data Security Administrators will also be able to view reports regarding AI interactions with data including sensitive interactions and unethical interactions. And similar to activities, the Data Security Administrator can dig into Data interactions. Under reports, Data Security Administrators will also have visibility regarding risky user interaction patterns with the ability to drill down into details. Adaption This section provides an overview of the requirements to enable Data Security Posture Management for AI in an organization’s tenant. License Requirements The license requirements for Data Security Posture Management for AI depends on what features the organization needs and what AI workloads they expect to cover. To cover Interaction, Prompts, and Response in DSPM for AI, the organization needs to have a Microsoft 365 E5 license, this will cover activities from: Microsoft 365 Copilot, Microsoft 365 Copilot Chat, Security Copilot, Copilot in Fabric for Power BI only, Custom Copilot Studio Agents, Entra-registered AI Applications, ChatGPT enterprise, Azure AI Services, Purview browser extension, Browser Data Security, and Network Data Security. Information regarding licensing in this article is provided for guidance purposes only and doesn’t provide any contractual commitment. This list and license requirements are subject to change without any prior notice and readers are encouraged to consult with their Account Executive to get up-to-date information regarding license requirements and coverage. User Access Rights requirements To be able to view, create, and edit in Data Security Posture Management for AI, the user should have a role or role group: Microsoft Entra Compliance Administrator role Microsoft Entra Global Administrator role Microsoft Purview Compliance Administrator role group To have a view-only access to Data Security Posture Management for AI, the user should have a role or role group: Microsoft Purview Security Reader role group Purview Data Security AI Viewer role AI Administrator role from Entra Purview Data Security AI Content Viewer role for AI interactions only Purview Data Security Content Explorer Content Viewer role for AI interactions and file details for data risk assessments only For more details, including permissions needed per activity, please refer to the Permissions for Data Security Posture Management for AI documentation page. Technical Requirements To start using Data Security Posture Management for AI, a set of technical requirements need to be met to achieve the desired visibility, these include: Activating Microsoft Purview Audit: Microsoft Purview Audit is an integrated solution that help organizations effectively respond to security events, forensic investigations, internal investigations, and compliance obligations. Enterprise version of Microsoft Purview data governance: Needed to support the required APIs to cover Copilot in Fabric and Security Copilot. Installing Microsoft Purview browser extension: The Microsoft Purview Compliance Extension for Edge, Chrome, and Firefox collects signals that help you detect sharing sensitive data with AI websites and risky user activity activities on AI websites. Onboard devices to Microsoft Purview: Onboarding user devices to Microsoft Purview allows activity monitoring and enforcement of data protection policies when users are interacting with AI apps. Entra-registered AI Applications: Should be integrated with the Microsoft Purview SDK. More details regarding consideration for deploying Data Security Posture Management for AI can be found in the Data Security Posture Management for AI considerations documentation page. Conclusion Data Security Posture Management for AI helps Data Security Administrators gain more visibility regarding how AI Applications (Systems, Agents, Copilot, etc.) are interacting with their data. Based on the license entitlements an organization has under its agreement with Microsoft, the organization might already have access to these capabilities and can immediately start leveraging them to reduce the potential impact of any data-associated risks originating from its AI systems.105Views0likes0CommentsSecure Boot Certificate Updates via InTune Policy
We are currently having issues applying the settings required to install secure boot cert updates using the InTune policy method. A brief overview to quickly explain : We are a reasonably large company managing a mix of over 10,000 Windows and iOS devices. Our Windows devices come from the supplier with the Professional edition of Windows pre-installed, this is then changed via an Enterprise key as part of our Autopilot enrolment process and activated via our users subscription license. To all sense and purposes Windows looks and feels like the Enterprise edition, indeed if you check using winver, system settings and activation status for example then Windows tells us that it is the Enterprise edition. However, if you check the licensing using slmgr /dli it shows that the licensing has been reverted back to the OEM Professional edition as pre-installed by the supplier on purchase. This may have always been the case but until very recently has gone unnoticed. Whilst testing the rollout of an InTune policy to allow secure boot cert updates as detailed here : Microsoft Intune method of Secure Boot for Windows devices with IT-managed updates - Microsoft Support , this is failing because the policy is rejected by licensing error : MDM PolicyManager: Policy is rejected by licensing, Policy: (ConfigureMicrosoftUpdateManagedOptIn), Area: (SecureBoot), Result:(0x82B00006) Unknown Win32 Error code: 0x82b00006 InTune reporting directly on the policy shows this as error 65000 We are able to change the key by using slmgr and a combination of MAK\KMS\OEM but whatever keys are applied this always reverts to being the OEM Professional key after the device has been restarted. I have seen that there is a group policy method for setting the required settings for the secure boot cert updates to work, this however seems a very backward approach by Microsoft in an area where they are trying to promote a cloud-first policy. Indeed since we rolled out Windows 11, we as an organisation have been moving anything that we can to cloud in readiness for retirement of our on-prem estate. Microsoft's response to my recent support request was that this is expected behaviour, which to all sense and purposes is not what i would class as a solution. Has anyone else had the same issues when using the InTune policy method, and was a solution found or did you have to return to the dark ages and resort to group policy? There seem to be lots of posts online referring to access to specific registry keys being blocked going as far back as 2024, the suggested script to resolve these permissions and suggested KB articles have not resolved the issue.10Views0likes0CommentsCentral Forms repository
Hi, I want to create forms to be used company wide. We have locked Forms licensing down so that all staff cannot create forms, we want all data to be stored centrally and this way we know where all data is. If I create a Form, it creates it under my account. I if leave the organisation, this may be lost. What is the best way to create corporately used forms centrally?, i.e. not under an individual user account Thank you for your time, Ollie9Views0likes0CommentsMy microsoft account got hacked: Need actual support (Not copy and pasted ones)
My account got hacked, i dont know how but im sure 2fa is turned on and hackers still got in. I dont understand why there wasnt any emails about it going through my email that someone logged in in my microsoft account. I had things connected to that account such as school and some game like minecraft. Currently my java minecraft is non existence and is deleted from minecraft forever because i cant find it in namemc, but my xbox gamer tag is still alive so it also confirms that it indeed had an association with my account before. The hacker changed the email of my account that cause my email to be non-existence in the microsoft system. (This is very huge flaw of microsoft, i hope before we do any changes in the account, it is first confirmed in the email address if this email should really be added to that microsoft account) But i do have evidence that it was indeed associated with it before the hacker change the email and its even confirmed by microsoft website, i also got the full email of the hackers email that was used on my account. I tried everything from contacting support to the account recovery form. But nothing works, i tried cursing the fake email of the hacker that was currently occupying my account, but recieved no response. I am in dilema on what to do now, this account has been with me ever since my email was created. I just hoped that i get it back, i could provide evidences. But its been getting ignored apparently.1.9KViews0likes5CommentsAccount Hacked
Hello Community, My account has been hacked, copied and/or duplicated with some other account as I was originally Sids1 with this email for more than 6 months now and this has changed somehow. It's very concerning to me since I also found some other person named Siddhartha when I was logging into my account. I reported that to the Microsoft Account Team but have not received any replies yet. Please suggest anything that can be done to catch this hacker who is stealing my identity to and fro. Best Regards Siddhartha SharmaSolved1.1KViews1like4CommentsMicrosoft 365 Purview Logs not showing Export List Events
We recently conducted an audit on our system - as we are part of a regulated industry - and had to clarify exactly which user events are captured in the Unified Audit Log. We did the usual confirmations and provided evidence of events where users add, update, delete items in SharePoint Lists and Libraries, however, we were asked specifically if events for exporting List Items to CSV or Excel were captured in the Log. We performed the usual test and waited for the events to appear in Purview, but to our suprise, there was nothing in the Log to indicate a user exporting to CSV or Excel. Can anyone confirm whether Export to CSV or Excel from a SharePoint List should be captured and is reportable in the Audit Log? This seems to be a massive oversight if these events are not auditable?54Views0likes1CommentUnable to boot from my SSD, Windows 11 installation
Please help me! I've been there for 13 hours! I want to install Windows 11 on my second m2 SSD because I need uefi and secure boot, I switched it to gpt, after installing Windows 11, I am sent back to the BIOS because my SSD does not is not boot and is not recognized as a boot sequence, it is only when I activate the CSM and inherited that it wants boot, I don't understand where the problem is coming from, I can't take it anymore...13Views0likes0CommentsSwitching to W11, but UEFI or CSM?
The fateful date is fast approaching, my question is how to switch to W11 knowing that I am currently in CSM startup and this is what is blocking this passage in Windows Update. this mode has already bothered me a lot after each update of the bios (twice) of my CM. the PC no longer wants to start, it goes into uefi originally after update and even after putting csm back on it doesn't want to go away, and suddenly it wants to boot.... I have an MSI pro Z690-p ddr4 with a 12600KF, and a P3 nvme 1To SSD.12Views0likes0Comments