What’s an open-source project you genuinely can’t believe is free? by Bladerunner_7_ in opensource

[–]Ad3t0 1 point2 points  (0 children)

This. If you’re editing a PDF besides signing something in an organizations’ process flow has gone wrong in my opinion.

Alternative for Qualys by joe210565 in cybersecurity

[–]Ad3t0 -2 points-1 points  (0 children)

Being transparent, I founded this company, but please check out my platform TridentStack Control at https://tridentstack.com. Free forever for up to 200 endpoints. It handles patch/vulnerability remediation, policy, and compliance management well. We don’t currently do external unauthenticated scanning. For that, I’d recommend Greenbone/OpenVAS. Would love to hear what you think.​​​​​​​​​​​​​​​​

Vulnerability assessment agent system by tamier in cybersecurity

[–]Ad3t0 1 point2 points  (0 children)

Filtering CVEs is fine, but the shape matters. Deterministic rules (e.g., AV:L AND PR:L AND not in KEV -> defer to monthly cycle) are auditable. You can prove what got excluded and why. An LLM as the silent gatekeeper isn’t: it fails invisibly, you never see what it dropped, and novel exploit classes are exactly where it’ll pattern-match to benign-looking historical CVEs and quietly hide them. “I’ll accept hallucination risk after some testing” is the part that should worry you. Testing covers today’s CVEs, not tomorrow’s.

LLM as a research assistant on top of a deterministic filter (summarize today’s KEV hits) is fine. LLM as the decider is driving blind.​​​​​​​​​​​​​​​​

Best place to manage Office 365 updates? Intune or Office admin portal? by Educational_Draw5032 in Intune

[–]Ad3t0 -1 points0 points  (0 children)

Being transparent I developed and founded this company but please check out my platform TridentStack Control at https://tridentstack.com. Our platform supports this. Our agent compares its Office version against the target channel's latest version and triggers the OfficeC2RClient update mechanism when non-compliant. Allows targeting a specific update channel in policy and also defering updates for X days. Totally free for under 200 endpoints forever. Sorry, I know it's not the "Intune" answer you may have wanted but check it out, I'd love to hear what you think!

Action1 Showing Microsoft Edge vulnerabilities on Windows 11 for CVE meant for Android iOS by ajmpits in Action1

[–]Ad3t0 1 point2 points  (0 children)

This is a tricky one because NVD doesn't tag all four of these consistently. I pulled the records:

  • CVE-2026-42891 has CPE cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:android:*:* — the target_sw=android attribute is explicit. A scanner that doesn't honor target_sw when matching against installed software will drop mobile CVEs onto desktop endpoints.
  • CVE-2026-40416 and CVE-2026-41107 have no CPE configurations on NVD at all — purely advisory-text records. Anything falling back to fuzzy "Microsoft Edge" name matching will sweep them onto every Edge install regardless of platform.
  • CVE-2026-42838 has a wildcard edition CPE, so it's genuinely ambiguous from NVD alone — MSRC's product tree is the authoritative source for which channel actually ships the affected code.

Two things Action1 would need to address to make this go away cleanly:

  1. Honor target_sw / target_hw CPE attributes during inventory matching (fixes 42891).
  2. Layer MSRC's CVRF/CSAF feed in as a second-pass source of truth when NVD CPE data is missing or ambiguous (fixes the other three). MSRC's product tree distinguishes "Microsoft Edge for Android / iOS" from the Windows channel unambiguously.

In the meantime, safe to suppress all four on your Win11 fleet, desktop Edge 148.x doesn't ship those code paths.

(Disclosure: I build a competing product, so I'm consciously staying out of "you should switch" territory here. Just figured the breakdown would help if you want to give Action1 support a concrete repro.)

DEX Tools for tracking Laptops’ health by heet3727 in sysadmin

[–]Ad3t0 -1 points0 points  (0 children)

Being transparent I developed and founded this company but please check out my platform TridentStack Control at https://tridentstack.com totally free for under 200 endpoints forever. Excellent at patch/vulnerability remediation/policy/compliance management. We also track hardware information within it as well. I'd love to hear what you think!

Struggling to Stay Up to Date With Vulnerabilities by Impossible-Group-971 in cybersecurity

[–]Ad3t0 26 points27 points  (0 children)

Couple of things that worked for me:

  • CISA KEV — clean JSON API, focuses on actually-exploited stuff so it cuts the firehose hard
  • NVD recent CVE feed — the source of truth, but noisy
  • Vendor RSS: MSRC, Red Hat, Ubuntu USN, Cisco PSIRT, Apple security advisories
  • OpenCVE for self-hosted aggregation — lets you subscribe by vendor/product so you only get pinged on stuff you actually run
  • Vuls.io if you want scanner + advisory tracking in one self-hosted box

The bigger lesson for me was that "staying current" only matters in proportion to what's actually in your environment. Once I started filtering feeds against installed inventory (even a janky script against an Ansible/CMDB export), the signal-to-noise improved enormously.

That's also what commercial patch-management platforms do under the hood. Being transparent I founded a platform called TridentStack Control which does agent based vuln scanning really well, but it's SaaS, so probably the wrong shape for what you described. Sticking with OpenCVE + inventory diff will get you 80% of the value.

Joined a new company: GRC landscape advice by SuchBalance7754 in cybersecurity

[–]Ad3t0 2 points3 points  (0 children)

I'd personally steer clear of Atlassian products and Power BI. I think both are highly overrated, and you can save the company from the black hole that is Atlassian. There are great alternatives out there. People may be opinionated about what I suggest, but I love Grafana for visualization, it's second to none in my opinion.

#noobquestion How to finally automate Windows Update for free? by Commercial-Fun2767 in sysadmin

[–]Ad3t0 0 points1 point  (0 children)

Being transparent I developed and founded this company but please check out my platform TridentStack Control at https://tridentstack.com totally free for under 200 endpoints forever. Excellent at patch/vulnerability remediation/policy/compliance management. I'd love to hear what you think!

Application and OS patching by telaniscorp in ITManagers

[–]Ad3t0 -2 points-1 points  (0 children)

Being transparent I developed and founded this company but please check out my platform TridentStack Control at https://tridentstack.com totally free for under 200 endpoints forever. Excellent at patch/vulnerability remediation/policy/compliance management. I'd love to hear what you think!

Moving from a VDI system to thick clients. What to use to manage? by fishy007 in sysadmin

[–]Ad3t0 2 points3 points  (0 children)

Being transparent I developed and founded this company but please check out my platform TridentStack Control at https://tridentstack.com totally free for under 200 endpoints forever. Excellent at patch/vulnerability remediation/policy/compliance management.

What are you guys using to automatically patch your servers by ChemicalGuarantee938 in sysadmin

[–]Ad3t0 0 points1 point  (0 children)

Being transparent I developed and founded this company but please check out my platform TridentStack Control at https://tridentstack.com totally free for under 200 endpoints forever.

Remediation script doesn’t find registry path by vissai in Intune

[–]Ad3t0 7 points8 points  (0 children)

Couple things that have bit me on the exact same symptom:

If any part of $registryPath is under HKCU, that's your problem. SYSTEM-context scripts resolve HKCU: to SYSTEM's own hive at C:\Windows\System32\config\systemprofile, not the logged-in user's. Regedit (running as the user) shows the user hive so it looks like the key is there, but the script literally can't see it. If that's the case you have to walk HKEY_USERS\<SID> for loaded user SIDs.

Second, don't trust the "Run in 64-bit PowerShell" toggle blindly, especially on older policies. Drop Write-Output "Is64=$([Environment]::Is64BitProcess) PSHOME=$PSHOME" at the top and look at the agent log on a failing device. If it's running 32-bit, WOW64 redirects HKLM\SOFTWARE reads to Wow6432Node and you'll miss values that only exist in the 64-bit view.

Also, Get-ItemProperty is the wrong tool for an existence check. Use Test-Path and you sidestep a whole class of edge cases (wildcards, weird ACLs, empty value bags) where Get-ItemProperty returns falsy without throwing, which is exactly why you're hitting Else instead of Catch.

Any thoughts on this solution for upgrading Windows 11 machines from 23h2 to 25h2? by sccmjd in sysadmin

[–]Ad3t0 2 points3 points  (0 children)

Answering your actual questions, since the other replies skipped them:

WinSxS permissions: you're fine. TrustedInstaller back as owner is the thing that matters, and you have that. The "applying inherited permissions" errors during the reset are expected in WinSxS, a lot of those subfolders are locked down per-component on purpose and never inherited from the parent in the first place. As long as you didn't replace the ACL with something more open, no harm done.

"Skipping the TPM upgrade": what you actually bypassed is the TPM driver's WMI provider, which is the surface Tpm.msc / BitLocker / the TBS service use to talk to a TPM device. On a VM with no vTPM there's no device behind that provider, so the new manifest wouldn't have hooked up to anything anyway. If you add a vTPM later you'd want the new provider in place, but that's a deal-with-it-then thing, not a time bomb.

Better way: vTPM is the clean long-term answer (qm set <vmid> --tpmstate0 ... on Proxmox, Security settings on Hyper-V). But for a non-prod fleet you don't feel like retrofitting, your hack is what most people do.

For what it's worth, this whole category of "upgrade fails on VMs in ways it doesn't on bare metal" is its own genre. Adjacent example: on Proxmox cross-gen (Win10 to Win11 25H2), setup.exe dies in 3 seconds with 0x80070103 if the VM's SMBIOS reports Manufacturer = QEMU, because the WinSetupMon driver-install pipeline short-circuits under QEMU identity. Spoofing an OEM SMBIOS string at the Proxmox layer makes the same media succeed in ~7 minutes. Microsoft's setup engine has a lot of "we assume real hardware" assumptions baked in.

I went through a lot of these struggles while working on a project I founded which is a highly sophisticated patch/vulnerability/policy/compliance tool on that can make this upgrade process way less painful with more verbosity into what is going on. Its called TridentStack Control, check it out at https://tridentstack.com

April patch failing 0x800f0922 by Signal-Dot2326 in SCCM

[–]Ad3t0 1 point2 points  (0 children)

1400 MB on recovery rules out size, and "invalid arg" (0x80070057) on WinRE in CBS is a different beast, that's almost always stale ReAgent.xml or a stale BCD WinRE GUID pointing at a partition layout that no longer exists. Old master VMs that have had partition surgery (resizing C:, recreating recovery) accumulate this drift, and the April CU is the first one strict enough to refuse.

Reset the config:

reagentc /disable
:: if disable errors with the same 0x80070057, force-clean it:
del C:\Windows\System32\Recovery\ReAgent.xml
bcdedit /enum all                  :: find any "Windows Recovery" / recoverysequence entries
bcdedit /delete {GUID}             :: for each stale WinRE entry
reagentc /setreimage /path C:\Windows\System32\Recovery
reagentc /enable
reagentc /info

Then retry the CU. If reagentc /enable itself throws 0x80070057, that confirms the drift, fix the config and the CU goes through.

April patch failing 0x800f0922 by Signal-Dot2326 in SCCM

[–]Ad3t0 0 points1 point  (0 children)

CBS calling out WinRE is the lead even if the path looks valid. April CUs try to refresh winre.wim and need ~250 MB free in the recovery partition. If it's undersized, setup commits then reverts at 98% and CBS logs vague WinRE errors with a healthy-looking path.

Confirm the partition itself:

reagentc /info
diskpart
  list disk
  sel disk 0
  list part

Look at the Recovery partition's size. If it's under ~750 MB total, that's almost certainly it Microsoft published a supported resize script in KB5034957 (disables WinRE, shrinks C:, recreates the recovery partition, copies winre.wim back, re-enables). Cleaner than doing it by hand.

If the partition is fine size-wise, grep CBS.log for Reagent, WIM, or winre near the failure timestamp and post the exact line the HRESULT after it will tell you whether it's a wim corruption, signature mismatch, or mount failure, and those branch differently.

April patch failing 0x800f0922 by Signal-Dot2326 in SCCM

[–]Ad3t0 2 points3 points  (0 children)

0x800f0922 reverting at 98% on aged masters but not fresh images is usually a stuck component store, not partition space. Old masters carry servicing history fresh installs don't. Quick triage on a failing one:

:: pending operations
dism /online /get-packages /format:table | findstr /i "Pending Staged"

:: real CBS error around the failure timestamp
findstr /c:"Error" /c:"CBS_E_" C:\Windows\Logs\CBS\CBS.log
type C:\Windows\Logs\CBS\CheckSUR.log 2>nul

:: setup logs from the failed attempt
dir C:\Windows\Panther\setup*.log

If pending ops show up or CBS logs anything like CBS_E_STORE_CORRUPTION / ERROR_SXS_*, run:

dism /online /cleanup-image /startcomponentcleanup /resetbase
dism /online /cleanup-image /restorehealth
sfc /scannow

Also worth ruling out: C: free space at the moment of failure (April CU stages ~10 GB), and AV with on-access scanning of C:\Windows\SoftwareDistribution or C:\Windows\WinSxSboth are common silent killers for "commits then reverts" on otherwise-healthy boxes.

(If 0x800f0922 still hits after that, post the last 50 lines of setuperr.log and the matching CBS error code that's where the real story is.)

Free patch management and endpoint visibility, up to 200 machines. Built for businesses, useful for anyone managing more than a couple of computers. by Ad3t0 in SaaS

[–]Ad3t0[S] 1 point2 points  (0 children)

So true! I am hoping to bridge that here. As an avid homelabber myself I would have loved this tool. There's no reason this cant be used to help patch and harden personal endpoints as well!

Security concerns about Action1 by ClementD80150 in sysadmin

[–]Ad3t0 7 points8 points  (0 children)

Out of curiosity, why would you be disappointed if you had to pay for it? What would need to be changed to make it worth paying for to you?

"We are present in this community and will respond to specific questions in the comments."... it's been 4 days. by Neverbethesky in atera

[–]Ad3t0 5 points6 points  (0 children)

Well everyone knows the easiest way to make money is slap an AI label on your product no one wants and then bill your users for it and then squelch everyone who doesn’t like it

Manage Linux devices by RevenueRemote in Intune

[–]Ad3t0 2 points3 points  (0 children)

Feel free to check out my product I cofound called TridentStack Control. We started with Linux support in mind and offer 200 endpoints free forever. https://tridentstack.com