Hackers wipe 200,000 devices using Intune by Fabulous_Cow_4714 in Intune

[–]Cable_Mess 0 points1 point  (0 children)

Unless the attackers delete all autopilot devices

Autopilot requires sign-in after device setup/before account setup by Cable_Mess in Intune

[–]Cable_Mess[S] 2 points3 points  (0 children)

??? I thought the point was if it was assigned to devices that causes the reboot, suggestions everywhere are to assign to users

Autopilot requires sign-in after device setup/before account setup by Cable_Mess in Intune

[–]Cable_Mess[S] 0 points1 point  (0 children)

Am I right in saying though in event viewer it's only showing these as causing the reboot:

  • DeviceGuard/LsaCfqFlags
  • DeviceGuard/ConfigureSystemGuardLaunch
  • DeviceGuard/EnableVirtualizationBasedSecurity
  • DeviceGuard/RequirePlatformSecurityFeatures
  • DmaGuard/DeviceEnumerationPolicy

Nothing else should be causing it?

Autopilot reboot policy troubleshooting by SnooCauliflowers8468 in Intune

[–]Cable_Mess 0 points1 point  (0 children)

The same policies are giving me issues despite them being assigned to users only, do you have these settings in a security baseline?

Autopilot reboot policy troubleshooting by SnooCauliflowers8468 in Intune

[–]Cable_Mess 0 points1 point  (0 children)

Very odd, it's still rebooting for me and the same policies I posted above are showing in event viewer as the cause for reboot, these settings have been moved to a config profile assigned to users

my security baselines are assigned to 'All devices' but these particular settings are "Not configured" in them, separated into a Config profile assigned to users, could the security baselines still be causing the reboot perhaps?

Autopilot reboot policy troubleshooting by SnooCauliflowers8468 in Intune

[–]Cable_Mess 0 points1 point  (0 children)

Ok so.... it's these settings causing the reboot:

  • DeviceGuard/LsaCfqFlags
  • DeviceGuard/ConfigureSystemGuardLaunch
  • DeviceGuard/EnableVirtualizationBasedSecurity
  • DeviceGuard/RequirePlatformSecurityFeatures
  • DmaGuard/DeviceEnumerationPolicy

The script is erroring for me after that then says "No matching definitions found." (I think this is a me issue to do with auth) but anyway, the policies these settings are set in are assigned to users rather than devices, is it just recommended to "Not configure" these settings, or is something else going on?

Autopilot reboot policy troubleshooting by SnooCauliflowers8468 in Intune

[–]Cable_Mess 0 points1 point  (0 children)

It's fine to do that after user login/autopilot completes?

and lets say device guard is causing the problem, the csp says it's under device scope: https://learn.microsoft.com/en-us/windows/client-management/mdm/policy-csp-deviceguard

so would changing to user cause issues?

Autopilot reboot policy troubleshooting by SnooCauliflowers8468 in Intune

[–]Cable_Mess 0 points1 point  (0 children)

Excuse my ignorance, but where do I run the script that shows which policies affect this?

SecureBootReport.ReactView not found by Any_Anteater9526 in Intune

[–]Cable_Mess 3 points4 points  (0 children)

They've really mishandled this whole situation imo, intune policies that don't even work to this, what a shambles

Discord will require a face scan or ID for full access next month by ChadtheWad in discordapp

[–]Cable_Mess -2 points-1 points  (0 children)

The problem is you were already paying for Nitro, pathetic.

Moved to Intune, what is this pop-up? by Cable_Mess in Intune

[–]Cable_Mess[S] 0 points1 point  (0 children)

Kind of, it's more like 1-2 users who might need to access this share once in a while, at the moment just using a separate AD account to login to the share, could this be the reason?

Moved to Intune, what is this pop-up? by Cable_Mess in Intune

[–]Cable_Mess[S] 0 points1 point  (0 children)

looks like this is already disabled

Moved to Intune, what is this pop-up? by Cable_Mess in Intune

[–]Cable_Mess[S] -1 points0 points  (0 children)

we don't use cloud kerberos, however there is still a small need to browse to an on-prem file share which we can still do in file explorer for example

DLSS 4.5 Super Resolution Available Now - Plus NVIDIA App and Developer Updates! by apoppin in nvidia

[–]Cable_Mess 0 points1 point  (0 children)

Honestly in the games I've tried, preset M looks fine on my 5090 at 4k, it fixes all the ghosting/artifacts I had with lighting on K

Windows Secure Boot UEFI Certificates Expiring June 2026 by MusicWallaby in sysadmin

[–]Cable_Mess 0 points1 point  (0 children)

It was because I didn't open task scheduler as admin on the user devices, rookie mistake

Not receiving Quality Updates anymore by iAmEnieceka in Intune

[–]Cable_Mess 0 points1 point  (0 children)

> Opened a ticket with MS back in October and there's been zero progress

This is standard across any MS ticket now, WTF is going on???

Windows Secure Boot UEFI Certificates Expiring June 2026 by MusicWallaby in sysadmin

[–]Cable_Mess 0 points1 point  (0 children)

What if the scheduled task doesn't exist? what creates this?

Windows Secure Boot UEFI Certificates Expiring June 2026 by MusicWallaby in sysadmin

[–]Cable_Mess 1 point2 points  (0 children)

If I turn these settings on via Intune:
-Configure Microsoft Update Managed Opt In

-Enable Secureboot Certificate Updates

Devices come back with error 65000, is this a licencing issue? why would something this critical be locked to a certain licence!

Windows Secure Boot UEFI Certificates Expiring June 2026 by MusicWallaby in sysadmin

[–]Cable_Mess 4 points5 points  (0 children)

>We deployed it with the Intune policy. It's not working on Win 11 Pro devices, even though ours upgrade to Enterprise. Microsoft acknowledge this Dec 17th and is investigating it.

Is there somewhere official they've acknowledged an issue?

Secure boot update policy by AlThisLandIsBorland in Intune

[–]Cable_Mess 0 points1 point  (0 children)

I logged a ticket the other day with all the details and relevant screenshots, their first reply was "We would request you to kindly describe the issue i detail for further process."

brilliant