User Profile
ittech
Copper Contributor
Joined 7 years ago
User Widgets
Recent Discussions
Patch notes for Office 365 16.0.12527.21096
Hi All, A vendor has mentioned to a user of mine that there's a particular bug fix included in Office 365 ProPlus aka Microsoft 365 Apps version 16.0.12527.21096, and so I would like to see the patch notes for that version. I've searched for them but can't find any notes for that specific version. The closest I've come is looking on https://docs.microsoft.com/en-us/officeupdates/current-channel and finding that version looks like it was released somewhere between March 10 and March 25 on the current channel, or, looking on https://docs.microsoft.com/en-us/officeupdates/semi-annual-enterprise-channel and seeing it was released sometime between August 11 and September 8 on the semi-annual channel. Is anyone able to locate the patch notes for 12527.21096 and post a link for me? Thanks!2.7KViews0likes0CommentsRe: Windows Defender Firewall occasionally becoming enabled despite group policy disabling it
I found some potentially interesting information using the "Get-NetFirewallProfile -PolicyStore <store>" powershell cmdlet. On a system where the firewall is active, the ActiveStore's Enabled property is true and on a system where the firewall is inactive, the ActiveStore's Enabled property is false. This store gets its settings from multiple other stores which I will list the results of here: Computer With Firewall Enabled: Get-NetFirewallProfile -Profile Domain -PolicyStore ActiveStore * Enabled: True Get-NetFirewallProfile -Profile Domain -PolicyStore PersistentStore * Enabled: True Get-NetFirewallProfile -Profile Domain -PolicyStore RSOP * Enabled: False Get-NetFirewallProfile -Profile Domain -PolicyStore localhost * Enabled: False Computer With Firewall Disabled: Get-NetFirewallProfile -Profile Domain -PolicyStore ActiveStore * Enabled: False Get-NetFirewallProfile -Profile Domain -PolicyStore PersistentStore * Enabled: True Get-NetFirewallProfile -Profile Domain -PolicyStore RSOP * Enabled: False Get-NetFirewallProfile -Profile Domain -PolicyStore localhost * Enabled: False So that shows the group policy's RSOP is evaluating that Enabled setting to be False in both cases. The PersistentStore having the Enabled setting being True in both cases seems to indicate that a local setting or program is trying to set the firewall to enabled. In the first case with the firewall enabled, the PersistentStore seems to be taking precedence over the RSOP (GPO) setting, but in the second case with the firewall disabled it is not taking precedence. I looked for a log file or event log entries to explain why this would behave differently but I came up empty.6.4KViews0likes2CommentsWindows Defender Firewall occasionally becoming enabled despite group policy disabling it
Hello, I have some workstations which will occasionally enable the Windows Defender Firewall despite having group policy disable it. This is happening both on Windows 10 1803 and Windows 10 1909. Here's some settings from one workstation in particular that I'm troubleshooting in detail this morning: The group policy is taking effect in the registry: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile - EnableFirewall = 0 HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile - EnableFirewall = 0 And I can see the policy in a gpresult: (copy/pasted from a gpresult /h html file) Windows Defender Firewall: Protect all network connections Disabled So as you can see, the firewall is definitely configured to be Disabled. Most of the time, the firewall is indeed disabled and things like RDP work just fine. However sometimes the firewall becomes enabled and the user can't RDP to their PC. I'm guessing when the PC boots up it sometimes ignores the registry setting and the firewall becomes enabled anyways. I've verified that the firewall is running and active/enabled by two different methods: First, a powershell command "Get-NetFirewallProfile -PolicyStore ActiveStore" reports for each of the profiles Domain, Private and Public, that the property "Enabled" is "True". Second, I enabled firewall logging on a workstation using a remote command: netsh advfirewall set allprofiles logging droppedconnections enable Then I checked the log and found my dropped RDP packets to TCP port 3389: Get-Content '\\pcname\c$\windows\system32\LogFiles\Firewall\pfirewall.log' 2020-11-12 <time> DROP TCP <source IP> <destination IP> <source port> 3389 52 S 2774183116 0 64240 - - - RECEIVE If the firewall was disabled as intended then it would not be dropping any packets, contrary to what's shown above. When I reboot the PC, it will act normally and disable the firewall... for a while. The user will report it again in a number of days. This is happening on numerous PCs in the domain and intermittently prevents users from working remotely until someone onsite locates and reboots their workstation. Does anyone have any ideas why the Windows Defender Firewall becomes enabled/active despite group policy being configured to disable it? Is it a bug in the firewall code, resulting in it occasionally ignoring the group policy setting? Thanks!7.2KViews0likes5CommentsLGPO - SECEDIT.EXE exited with exit code 1
Hi, when I run this command: .\LGPO.exe /g "\\server\folder1\folder2\LGPO" /v I get this error as part of my output: Apply security template: \\server\folder1\folder2\LGPO\DefaultPolicy_Backup\DomainSysvol\GPO\Machine\microsoft\windows nt\SecEdit\GptTmpl.inf [[[ Security template log file output follows: C:\Users\Username\AppData\Local\Temp\GPTA2AC.tmp ]]] Access is denied. The task has completed with an error. SECEDIT.EXE exited with exit code 1 Any ideas what is going on? Thanks, JoshSolved11KViews1like4Comments
Recent Blog Articles
No content to show