security
942 TopicsWindows search bar problem - searching for updates creates a problem.
i bought a new laptop and i typed the word, up, in the search bar. i typed, up, because it auto completes usually to updates, and then i click on check for updates, and the computer opens the update panel. i found the following problem. i press up. the check for updates appears. then i press check for updates, the blue button. and then, after any updates get installed, the keyboard stops typing completely. i go in the browser, and i cannot type. the only thing i can do in that occassion, is i can go back to the search bar, and i press backspace one time. and then it auto completes the word, up. this does not work if i have typed any other word, including, update. it appears to happen, only if you search for the, check for updates, button, by typing, up, and waiting for the autocomplete. after the keyboard gets stuck, you press backscape in the search bar, in the bottom of windows, and it auto completes, up. and you cannot type, until you restart.101Views0likes4CommentsHow to disable Microsoft Defender sign-in prompt.
We're using the default Microsoft Defender in Win 11 Pro on workstations on a domain network. On this network, access to things like OneDrive are just flat out not allowed for security reasons. User's can log in to things like the MS Store, Google accounts, etc. Every time a user logs on using their domain credentials they get a popup from the Microsoft Defender icon in the systray informing them they need to sign in for "best protection". Since they're not permitted to use "any" remote sites for things like data storage there is no need for them to sign in to "ANYTHING" remote. Presently the buttons present on the popup are "Sign In" and "Dismiss". Per a GPO setup they flat out can't sign in even if they tried. But is there a way in GPO to completely eliminate this popup appearing? I've looked in GPO settings for Defender for both computer and user, but there's nothing that jumps out at me to indicate I can do this without totally and completely disabling Microsoft Defender entirely. TIA. - Carl19Views0likes2CommentsInternal RDP vs Self-Hosted RustDesk
Hi everyone, I am looking for some guidance and real-world experiences around choosing the best approach for remote access in a Windows environment. Right now, we are considering two main options: - Continue using Microsoft Remote Desktop Protocol (RDP), but strictly for internal use only (no direct exposure to the public internet). - Deploy a self-hosted instance of RustDesk as an alternative or complement to RDP for remote access and remote support. Our main concern is security. RDP has historically been a common attack vector, especially when exposed externally or misconfigured, and we want to avoid introducing unnecessary risk to our endpoints. Even if we restrict RDP to internal networks or VPN-only access, we are still cautious about potential vulnerabilities, credential theft, lateral movement, and abuse of remote access. What we are trying to understand better is: 1. In environments where RDP is used only inside the LAN or over VPN (no open RDP from the internet), what are the recommended hardening practices and controls you would consider mandatory today? Examples might include: Network Level Authentication (NLA), strong account policies, just-in-time access, firewall restrictions, RDP Gateway, MFA, monitoring/logging, etc. 2. From a security and operational perspective, is it generally considered acceptable to keep RDP enabled only for internal administrative tasks, while avoiding using RDP for end-user remote support scenarios? 3. For those who have deployed self-hosted RustDesk (or similar remote support tools) in a Windows/Active Directory environment, how has it compared to RDP in terms of: - Security model (encryption, authentication, access control, exposure to the internet) - Ease of deployment and maintenance - User experience and performance - Logging, auditing, and integration with existing security monitoring 4. Are there any best practices or architectural patterns you would recommend when combining these approaches? For example: - Keeping RDP only on jump servers / bastion hosts inside the network - Using RustDesk (self-hosted) for remote support and helpdesk use cases - Enforcing least privilege, MFA, and strong authentication for all remote access paths - Segmentation and limiting which machines are even allowed to receive RDP connections 5. Have you encountered any specific security pitfalls, misconfigurations, or "gotchas" when relying on RDP internally or when rolling out RustDesk self-hosted that we should be aware of before committing to a design? Our goal is to design a remote access strategy that: - Minimizes attack surface and reduces the likelihood of compromise via remote access. - Separates administrative access from end-user remote support where it makes sense. - Remains manageable for a small IT/security team in terms of configuration, patching, and monitoring. If you have any references to Microsoft documentation, hardening guides, or community best practices for RDP (especially internal-only scenarios), as well as any detailed write-ups or lessons learned from using RustDesk self-hosted in production, those would be extremely helpful. Thank you in advance for any guidance, recommendations, or examples you can share. Best regards, Juan91Views0likes2CommentsWindows Sandbox
I had to reinstall my computer after the NVMe drive failed and was replaced. The current version of Windows is Windows 11 Business, version 25H2 (OS build 26200.7462). I enabled Windows Sandbox. However, it fails to run with the error: “Windows Sandbox failed to initialize. The media is write-protected (0x80070013)”. I previously had this Windows optional feature enabled without any issues. I have disabled BitLocker, turned off some core isolation features, disabled other Microsoft Defender anti-virus features and in addition followed some recommended steps in Microsoft Support documentation. However, the issue persists. Any help would be greatly appreciated.599Views1like5CommentsProblem creating a subfolder or modifying the contents of a folder
A problem happens to me that I already had and which seemed to have resolved itself more or less at the time. When I want to modify the contents of a folder (add a new subfolder, modify the name of a file,...) the modification does not appear. I am forced via the explorer to come out of my folder then enter it again to see that the subfolder is indeed created or that the name of a file has been modified. This is obviously very painful to use. When this happened to me a few months ago I saw people who had had the same problem and I tested proposals without success until one morning the problem disappeared. IT'S reappeared but I no longer know what I was asked to do. Does anyone on this forum know the issue and can explain it by suggesting a way to resolve it?71Views0likes2CommentsUrgent: Stop the "Security Theater." UAC Needs Parent Process Visibility NOW.
Subject: Urgent: Stop the "Security Theater." UAC Needs Parent Process Visibility NOW. To the Windows Shell & Security Team, I am writing to demand a critical rectification in the User Account Control (UAC) design. The current implementation of UAC is not just outdated; it is fundamentally broken and fosters dangerous user habits due to a lack of transparency. The Core Problem: Context is Everything Your current design only answers "WHAT is running" (e.g., cmd.exe executing netsh winsock reset), but it deliberately hides "WHO requested it." This obfuscation renders the security prompt useless. Let me give you a simple analogy: If someone tells me to "Go home" at night, my reaction depends entirely on the speaker. If it is my father, it is an instruction of care. If it is a stranger in the shadows, it is a threat. Right now, Windows is that stranger in the dark. It throws a command in my face without identifying the source. When a generic system process requests high privileges, how is a user supposed to distinguish between a legitimate driver update and a malicious script? The "Safety" Excuse is Invalid Do not hide behind the excuse that "Parent Process ID (PPID) can be spoofed." Even a potentially spoofable path is infinitely better than a complete blindfold. By hiding the call stack, you are forcing users to play Russian Roulette with their "Yes/No" buttons. You Are Training Users to Be Vulnerable Because you refuse to provide the "Source" context, users have learned that they cannot verify the prompt. Consequently, they are conditioned to blindly click "Yes" just to make the annoying window go away. This is Security Theater at its worst. You are not protecting the user; you are confusing them. The Demand We are in 2026. The technical barrier to displaying the "Initiating Process" in the UAC dialog is non-existent. 1. Show the Parent Process: Display clearly which application triggered the UAC request (e.g., "Initiated by: Steam.exe"). 2. Show the Hierarchy: Give advanced users the option to expand the process tree right there in the dialog. Stop being lazy. Stop assuming users do not need to know. Give us the information we need to make actual security decisions. Disappointed and Expecting Change, A Windows User who refuses to click "Yes" blindly.56Views0likes3CommentsHow can I easily install pending Windows updates on my PC?
Call 1-855-535-7109. To install pending Windows updates easily on your Windows PC, follow these steps: Open Windows Settings: Press Windows + I to quickly open the Settings menu. Go to Update & Security: In the Settings window, select Update & Security. Check for Updates: Under the Windows Update section, click Check for updates. Windows will search for any pending updates. Install Updates: If updates are available, click on Install to begin the installation process. Windows will automatically download and install the updates. Restart Your Computer: After updates are installed, a restart may be required. Windows will prompt you to restart, or you can manually restart your PC. Use Windows Update Troubleshooter (if issues occur): If updates aren’t installing properly, try using the Windows Update Troubleshooter. Go to Settings > Update & Security > Troubleshoot > Additional troubleshooters, then select Windows Update and run the troubleshooter.60KViews3likes3CommentsFind desktop files in full Windows 11 crash
So I have a big Windows 11 crash. I tried everything, impossible to get into the machine whatever the method used. - restoration - modification of elements at startup - repair integrated into windows - boot on DVD, boot on key - etc Even win11 repair via installation DVD does not work. I get an error message telling me that I cannot install Windows on the dedicated partition. So I give up, I've already wasted a lot of time. I got my Windows version back in cmd and as a last resort I will do a complete reinstallation via DVD or return to factory configuration. So I entered the machine in a Linux environment by booting from a key, and I was able to save the 800GB of files from one of the partitions to external HDDs. But... The only data I can't recover is that which was on the desktop; on the OS partition therefore. So yes normally we don't save anything important on the desktop, except that for convenience I have three/four small files which are there permanently... (in .txt and in .odt) Many times I figured I'd move them and create a shortcut, but I didn't... - As the machine does not start under Windows environment, I do not access the desktop. - and on linux I follow the path where the folder is normally located, but it's not there... C: /Users/name/ I tried c:/Users/public I also tried in C:/users/name/documents He's not there either I displayed the hidden folders. Nothing. Can this file be found elsewhere? Or the fact that Windows cannot start prevents you from finding the desktop folder and its files? I did a search on the name of one of the files, and I can't find it either. I just see it appear vaguely in a list of files that Linux shows me as recently opened: but these are only traces I have the impression, I don't have a physical file behind it. It's a sort of temporary file. I don't know if you can find anything in cmd? Or if anyone has an idea to get their hands on it or tell me it's definitely dead and I won't be able to find these files without Windows booting? Thank you so much!38Views0likes2Comments