tech question or issue
78 TopicsRepost: Make quick assist run as admin
Question: We need to be able to use Quick Assist in Windows 10 to do some administrative tasks, but if the end user initiates the Quick Assist session then the remote admin is limited to only what the end user has access to. Is there any way we can start Quick Assist as an administrator or elevate it to admin level during the Quick Assist session? Response: Quick Assist is my preferred application to resolve all technical issues remotely. It also allow me to Run as Administrator to install and configure hardware/software but there are few steps required as mentioned below: Run CMD at end-user's computer Type the below command: runas /user:domain\administrator cmd *domain will be any domain of your organization *administrator can be any administrator login. If domain is not available type the below command in cmd. runas /user:local_user cmd Put the admin password. Now you have successfully launched cmd in administrator mode, you can run the below tasks. x:\MicrosoftEdgeSetup.exe (for software installation, where x is any drive letter from your computer). appwiz.cpl for installing or uninstalling program. services.msc (Run or Stop a service) devmgmt.msc (Device Manager, to install/uninstall or upgrade the device driver) diskmgmt.msc (Disk Management) compmgmt.msc (Computer Management) regedit (Registry Editor) Above mentioned are just example, you can use the number of commands as per your requirement.Repost: Authenticator app isn't receiving notifications to approve log in on my laptop
Question: I have been trying to log in to my Microsoft account on my new laptop. I have previously used the 2-factor identification method on my old laptop, however, it doesn't seem to be working for my new laptop. When it says it has sent a notification to approve on the authenticator mobile app, nothing is coming up to approve on my mobile so i am making no progress. I also cannot find a code to enter on my laptop from the app. There is no QR code to scan on my laptop using the authenticator app. I don't know what to do and it is extremely frustrating because I cannot access anything, emails etc. Would be very grateful for some help. Response string: This sounds rather like a problem of the Authenticator app on the mobile it is not the laptop which stores any MFA information, the account setting at account.microsoft.com (or the security settings for the Microsoft Accounts set in there) triggers MFA, regardless from which machine you access those. Generally, when the message appears that a notification was send to the mobile device, there should be an option to use different verification method, which allows to also choose to enter a 6 digit token that is displayed for this account in the MS Authenticator app. Also it might show options to use another email address or phone number. Doing a new MFA registration in the authenticator app (showing the AR code) is only possible when you can access account.microsoft.com and log in using MFA - if you can't the dialogue usually also shows an option reset MFA, then you have to enter additional information to verify your identity. This does not sound like a problem specific to CSP Partners where this community is set up for, but more like a problem with a personal Microsoft Account outside of the scope of this forum. You can review guidance on how to set up MFA for personal accounts here: Microsoft account security info & verification codes - and at the end of the article you find links to the correct community and support options. Finally there is also an option to reset password and security information all together: Recover your account (live.com) Response: My MS Authenticator app does not show any 6 digit one-time-tokens. It shows 8 digit one time passwords. Also, my MS Authenticator does not receive any notifications. There is no help available anywhere, and there seems to be no way to "reset" this security information. Response: 8 digit one-time passwords are for personal Microsoft accounts, not work accounts, so you confirmed that your issue is not reg. CSP Partner security requirements where this community is meant for. I would suggest you contact Microsoft support directly - Contact Us - Microsoft Support - if you can't get access to a browser where you can log in to account.microsoft.com and use the available options to reset your authentication methods. Response: Have personal and work Authenticator use. Azure side(work) never sends notification to authenticator. Therefor cannot use any of my work related phone apps which is literally essential to my job. Personal use works every time. Cant text myself the verification code because the phone number is wrong and I have no idea how to change it. I have my new number on Microsoft account for 2 years now and my work have my new number saved in their system for the same period of time so I have no idea why my old number is in there. I guess i've never noticed this as the notifications have just stopped working recently. Any help would be great here also. Response: If you want to change setting for MFA for a work/school account, go to https://aka.ms/mfasetup and log in with your work account. There is both a setting on if a notification will be send or if the 6-digit code should be used (given the admin of the tenant did not disable certain methods) and an option to change the phone number.REPOST from Old community | OAuth Refresh token has expired after 90 days
PROBLEM: We have encountered an issue on our live environment: The Multi Factor Authentication does not work anymore. We try to authenticate using an OAuth Refresh Token (this authentication mechanism has been recommended by the Yammer group "Partner Center Security Guidance", which now has been closed). But since today, this authentication does not work anymore, but we get the following error message: invalid_grant: AADSTS700082: The refresh token has expired due to inactivity. The token was issued on 2019-01-02T09:19:53.5422744Z and was inactive for 90.00:00:00.: But I am absolutely sure that this refresh token has been successfully used yesterday. The Microsoft documentation https://docs.microsoft.com/en-us/graph/auth-overview says that an OAuth Refresh token should only expired if it has been inactive for 90 days. But our tokens were used. Therefore the tokens should not expire! Why do we now have a live incident? What went wrong? Please not that we are selling in 12 different markets, and therefore have 12 different partner accounts, and therefore 24 different OAuth refresh tokens (one for the live environment and one for the sandbox). Therefore it is not this easy to update the 24 OAuth refresh tokens. What can we do to avoid similar production incidents in the future? We are regularily using the refresh tokens to get new access tokens. We do this using the call "POST /{tenant}/oauth2/token grant_type=refresh_token&refresh_token=..." (see https://docs.microsoft.com/en-us/azure/active-directory/develop/v1-protocols-oauth-code). The response of this call not only contains the access token, but also a new refresh token. At the moment, we ignore the new refresh token that is returned. Should we store and use the new refresh token that is returned by this call, or would the new refresh token also expire at the same time? Does Microsoft offer a way to find out the expiry time or the issued-at-date of a refresh token? RESPONSE TO USER: Please check that you store your token(cache) also after AquireTokenSilent. You will get a new refresh token which you schould use in sequential requests. In my case I did not (correctly) store it, so I used the refresh token which I aquired the first time when I used AquireTokenInteractive. That token will expire after 90 days. There are two authentication flows: a confidentialclient which authenticates the application. The application has access to the resources of your organisation, but you have little control over who uses the software. This is, even for background processes, not workable when you develop your own software for multiple customers (you cannot guarantee that customer 1 might never access data from customer 2). In that case you develop a Public Client where you get access via a user's account via AquireTokenInteractive (that method also supports multifactor authentication and it shows any consentscreen necessary). Once you have access you can use AquireTokenSilent to renew the token. Note that AcquireTokenSilent DOES return a refresh token (valid for 90 days), and you should make sure you store this after every request. The refreshtoken is not visible if you look in the debugger, but it is visible if you use Fiddler to view the raw data (and decode the token). That was in hindside my problem: I created a daemon process for which the interactive flow does not seem logical, and since I had token issues I went for the confidential flow. But there you do not get the consent screens and it does not work with multifactor authentication. My conclusion: if you are developing 3rd party software then even for background (daemon) processes you could (should) use the publicclient flow. There is no problem with the token process: it will continue to work forever once you aquire a token. Only when your software is 'down' for more than 90 days you will need to log in again (and when access for your app is changed from the client's azure account) Relevant links: https://docs.microsoft.com/nl-nl/azure/active-directory/develop/msal-client-applications https://docs.microsoft.com/nl-nl/azure/active-directory/develop/msal-net-acquire-token-silentlyRepost: change region and language settings using group policy
Question: Please share the steps for configuring "region and language settings" using group policy. Response: Something here may help. http://dennisspan.com/configuring-regional-settings-and-windows-locales-with-group-policy/ Response: To set up the Regional settings for multiple users, use the group policy and to the following steps: Launch Group Policy Management, create a new GPO or configure the one you have. See the screenshots. Make all needed settings, and use F6 to confirm the configuration from red to green. Consider having a trustworthy Microsoft office 365 backup software from NAKIVO, as you can never predict a ransomware attack or other issues.New MCPP Subscription in Azure
Hi, Apologies if this is the wrong forum. Earlier this year I renewed my Action Pack subscription and had to link my billing profile at the same time. Once that had gone through, I noticed that I had a new Azure subscription called 'MCPP Subscription' I still also have my Microsoft Partner Network subscription which has all my resource groups etc in. My query is what is this new subscription? Should I start using it? My credits are linked to the old MPN subscription. I've not been able to find anything so far about it either on general internet searches or this community. many thanks20KViews2likes19CommentsControlling an Application’s Throughput Consumption in Cosmos DB with ThroughputControlGroup
Hi Azure Cosmos Db Team, Was referring to the below document link to limit the throughput consumption per requests. https://the9090rule.medium.com/controlling-an-applications-throughput-consumption-in-cosmos-db-with-throughputcontrolgroup-247cc0eafa92 How will the application behave in case the operations in the group exceed the set throughput? Will it get throttled? With Regards, Nitin RahimRepost: Logging for failed events shows "an account failed to log on" but for a server
Question: We have recently turned on security event loggging and see failed logon events for the servers name. How do we resolve this? Subject: Security ID: S-1-5-20 Account Name: DC-SERVERNAME-1$ Account Domain: DOMAIN NAME Logon ID: 0x3E4 Logon Type: 5 Account For Which Logon Failed: Security ID: S-1-0-0 Account Name: - Account Domain: - Failure Information: Failure Reason: An Error occured during Logon. Status: 0xC0000022 Sub Status: 0xC0000022 Process Information: Caller Process ID: 0x4fc Caller Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon request fails. It is generated on the computer where access was attempted. The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network). The Process Information fields indicate which account and process on the system requested the logon. The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested." within the policy "Failed Logon Attempts". The Virtual Machine (Microsoft Corporation) was last accessed by "null" on 2019-10-21 02:22:57.0 Response: Logon Type: 5 Looks to be a problematic service startup or logon https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4625Partner payment error
The Partner Payment Center payment page does not properly process cards. The error I am receiving does not seem to be a valid error for credit cards: Payment failed due to insufficient balance. Please check with your bank or try again with a different card. My Card is in good standing. In the MS store I have no problem, just in the Partner payment page. I've cleared the browser cache and still get the same error.Overview of pending/open transferrequests
Greetings, Since the introduction of NCE subscription transfers, we, as an Indirect provider, have observed a surge in both incoming and outgoing transfers. However, despite my understanding, there appears to be no straightforward method to obtain a comprehensive list of ALL transfer requests across all our customers, even when utilizing the API. Is there something I might be overlooking?Solved930Views2likes8Comments