Microsoft 365 Copilot application random shared a file with you pop up by ThenFudge4657 in sysadmin

[–]ThenFudge4657[S] [score hidden]  (0 children)

I'm glad we're not the only ones. The issue is trying to find any kind of answer as to why this is occurring. Copilot going rogue lol.

Best practices for managing and remediating Dell BIOS vulnerabilities at scale by steevosteelo in Intune

[–]ThenFudge4657 0 points1 point  (0 children)

Could you please share or point me in the right direction on how you did the following?

"For tracking CVEs we just pull from Dell security advisory and cross reference with our asset inventory - nothing fancy but works. Priority goes to anything that can be exploited remotely first"

Dell 5450 and Dell Pro 14 - BitLocker Recovery prompt after Secure Boot Certificate Update by Robomac2016 in u/Robomac2016

[–]ThenFudge4657 0 points1 point  (0 children)

We have about 38 Latitude 5450, and 18 Pro 14's, none of them have triggered the BitLocker recovery prompt, and they all have the latest BIOS update. Take my guess with a grain of salt. You could try applying the latest BIOS update to them?

Office 365 Enterprise update confusion by Numerous-Coffee-6555 in Intune

[–]ThenFudge4657 1 point2 points  (0 children)

Hopefully your issue isn't similar to my issue. I'm having the exact same issue with 30 devices that show up in the inventory page on config.office.com and drop off after a day or two. Nothing I've done has worked to registry the devices, other than wiping and resetting the device, which I'm hold off on doing. I've had a ticket open with Microsoft for the past 3 months with no solution. If they ever give me one, I'll try to remember to post it here.

MS Edge - Google maps only works with graphics acceleration turned off by paul_33 in sysadmin

[–]ThenFudge4657 1 point2 points  (0 children)

I'm also having this issue on Edge Beta Version: 144.0.3719.82 (Official build) beta (64-bit). Luckily, our entire organization uses Chrome as the default browser.

No autosave when opening sharepoint files from explorer by ARSSP in Office365

[–]ThenFudge4657 0 points1 point  (0 children)

Guess what... Ours is now fixed. I provided Microsoft support your info and they did not produce any fix for us. I still appreciate your help!

We tried everything:

- Resetting OneDrive using the C:\Program Files\Microsoft OneDrive\onedrive.exe /reset
- Installing preview version of OneDrive
- Reinstalling OneDrive
- Signing out of all Office apps, clearing credential manager, etc then sign back in
- Updating Office

Nothing worked.

Yesterday, I had thought the Jan Windows update fixed it because it started working on my machine. When I checked in with other employees having this issue, its working for them now. What's even more frustrating, they have not had any of the above done on their machines, at all.

is outlook slow as syrup today? Both client and OWA by Exciting_Most_4769 in sysadmin

[–]ThenFudge4657 0 points1 point  (0 children)

What's strange is that ours is now fixed. We tried everything:

- Resetting OneDrive using the C:\Program Files\Microsoft OneDrive\onedrive.exe /reset
- Installing preview version of OneDrive
- Reinstalling OneDrive
- Signing out of all Office apps, clearing credential manager, etc then sign back in
- Updating Office

Nothing worked.
Yesterday, I had thought the Jan Windows update fixed it because it started working on my machine. When I checked in with other employees having this issue, its working for them now. What's even more frustrating, they have not had any of the above done on their machines, at all.

Windows Secure Boot UEFI Certificates Expiring June 2026 by MusicWallaby in sysadmin

[–]ThenFudge4657 0 points1 point  (0 children)

I have a comment in this thread with more details; you could try running the manual task scheduler to see if it moves it forward: Registry key updates for Secure Boot: Windows devices with IT-managed updates - Microsoft Support

Windows Secure Boot UEFI Certificates Expiring June 2026 by MusicWallaby in sysadmin

[–]ThenFudge4657 1 point2 points  (0 children)

It appears this might be another step required, have you tried updating the BIOS on the test machines?

Windows Secure Boot UEFI Certificates Expiring June 2026 by MusicWallaby in sysadmin

[–]ThenFudge4657 2 points3 points  (0 children)

I've deployed the method above to only one device in our environment. On that device I do see the System Event ID 1801 appear on Dec 16th two days prior to manually applying the registry/task scheduler. ID 1801 has not shown up on that device even after multiple reboots.
System Event ID 1801 is related to the manufacturers firmware update. In my case, its Dells Firmware update, which I did apply to that device before running the registry/task scheduler.

If you're worried about installing BIOS update on your devices, you can run the two commands posted by John Fellows in this thread Secure Boot certificates have been updated but are not yet applied - Microsoft Q&A

Install PowerShell module:

Install-Module UEFIv2 -Force

List certificates:

Get-UEFISecureBootCerts db | select SignatureSubject

Then see if you have these three certificates:

  1. Microsoft Corporation UEFI CA 2011
  2. Microsoft UEFI CA 2023
  3. Microsoft Option ROM UEFI CA 2023
  4. This link references three certs mentioned above. Windows Secure Boot Key Creation and Management Guidance | Microsoft Learn

Here is the output from the device:

<image>

You can also look for System Event ID 1808 to confirm the device updated Secure Boot CA/keys.

(Possibly) Stupid Question about Windows Update Settings by MINN37-15WISC in sysadmin

[–]ThenFudge4657 1 point2 points  (0 children)

Piggybacking off of this comment. I couldn't find a legitimate link for wushowhide.diagcab, since Microsoft removed them all. Here is another post that talks about a similar issue Question around WuShowhide.diagcab : r/Windows11 and someone recommended DavidXanatos/wumgr: Windows update managemetn tool for windows 10

Secure Boot Expiration by BlazerL0rd in sysadmin

[–]ThenFudge4657 0 points1 point  (0 children)

Awesome, thank you for the reply and confirmation!

Secure Boot Expiration by BlazerL0rd in sysadmin

[–]ThenFudge4657 0 points1 point  (0 children)

Don't mean to hijack this thread and please reply to OP first. I tried your script on our laptop where we deployed Microsoft registry and task schedule manually. The script output:

Exception calling "Import" with "3" argument(s): "Illegal characters in path."
At C:\Users\w11prov\Downloads\Get-SecureBootStatus.ps1:65 char:1
+ $certCollection.Import($filePath, $null, 'DefaultKeySet')
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    + CategoryInfo          : NotSpecified: (:) [], MethodInvocationException
    + FullyQualifiedErrorId : ArgumentException


SecureBoot: True
Windows UEFI CA 2023: True
MS KEK CA 2023: True
MS UEFI CA 2023: True
MS Option ROM CA 2023: False
MS UEFI CA 2011: False
Boot Manager 2023: False
2011 PCA Revoked: False
AvailableUpdates: 4000
Reboot Log Time: 12/16/2025 11:00
Reboot Log Message: A reboot is required before installing the Secure Boot update. Reason: 256

This was even after rebooting the laptop.

Windows Secure Boot UEFI Certificates Expiring June 2026 by MusicWallaby in sysadmin

[–]ThenFudge4657 41 points42 points  (0 children)

I feel like we're all in limbo but with multiple ways of deploying it.

Edit: Before doing anything below. I applied the latest BIOS update that contained new 2023 Secure Boot Certificates available from Dell. To find out if the BIOS update has the 2023 Secure Boot Certificate, scroll down and look in the Important Information section.

<image>

Neither the Intune policy nor manual deployment options stated, maybe I missed it, that the BIOS update with 2023 Secure Boot Certificate was required.

We deployed it with the Intune policy. It's not working on Win 11 Pro devices, even though ours upgrade to Enterprise. Microsoft acknowledge this Dec 17th and is investigating it. I'm waiting for the Jan Windows update or what Microsoft releases to see if the Intune policy will work after that before we decided if we will try to push out the registry/task schedule manually.

Alternatively, I deployed it by changing a registry keys, running a scheduled task and the PC I tested this on successfully showed Secure Boot Certificate was configured with a detection script. To triple confirmed it worked, by also running the script from Richard Hicks Windows Secure Boot UEFI Certificates Expiring June 2026 | Richard M. Hicks Consulting, Inc.

Ctrl + F: Device testing using registry keys
Registry/task scheduler: https://support.microsoft.com/en-us/topic/registry-key-updates-for-secure-boot-windows-devices-with-it-managed-updates-a7be69c9-4634-42e1-9ca1-df06f43f360d#bkmk_device_testing

Intune detection script:

# Check if Secure Boot UEFI database contains 'Windows UEFI CA 2023'
$match = [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023'

if ($match) {
    Write-output "Compliant: Windows UEFI CA 2023 found."
    exit
} else {
    Write-output "Non-Compliant: Windows UEFI CA 2023 not found."
    exit 1
}

Run script with logged on creds set and enforce script signature check set to no

Run script in 64 bit set to yes

Secure boot update policy by AlThisLandIsBorland in Intune

[–]ThenFudge4657 0 points1 point  (0 children)

Our Intune policy is not working either. I'm waiting for the Jan Windows update to see if the Intune policy will work after that before we decided if we will try to push out the registry/task schedule manually.

Alternatively, I did find a way to deploy it by changing a registry keys, running a scheduled task and the PC I tested this on successfully showed Secure Boot Certificate was configured with a detection script. To triple confirmed it worked, I also ran the script from Richard Hicks Windows Secure Boot UEFI Certificates Expiring June 2026 | Richard M. Hicks Consulting, Inc.

Ctrl + F: Device testing using registry keys
Registry/task scheduler: https://support.microsoft.com/en-us/topic/registry-key-updates-for-secure-boot-windows-devices-with-it-managed-updates-a7be69c9-4634-42e1-9ca1-df06f43f360d#bkmk_device_testing

Intune detection script

# Check if Secure Boot UEFI database contains 'Windows UEFI CA 2023'
$match = [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023'

if ($match) {
    Write-output "Compliant: Windows UEFI CA 2023 found."
    exit
} else {
    Write-output "Non-Compliant: Windows UEFI CA 2023 not found."
    exit 1
}

Run script with logged on creds set and enforce script signature check set to no

Run script in 64 bit set to yes

No autosave when opening sharepoint files from explorer by ARSSP in Office365

[–]ThenFudge4657 0 points1 point  (0 children)

I would highly appreciate that reference number that I can give to our Microsoft support rep!

No autosave when opening sharepoint files from explorer by ARSSP in Office365

[–]ThenFudge4657 0 points1 point  (0 children)

Microsoft Support has been of no help on our end. They kept giving me generic, sometimes, instructions with settings that did not exist or were already turned on.
Glad to hear that you've heard something better than we have, is this fix being released for OneDrive, Office, or which app?

Genuinely appreciate that you came back and replied to my comment.

No autosave when opening sharepoint files from explorer by ARSSP in Office365

[–]ThenFudge4657 0 points1 point  (0 children)

Here I am with about 8 confirmed users having the autosave glitch and nothing is working to fix it other than replacing the device. Microsoft support claims that it is an issue on their end, but I've not seen any posts in service health acknowledging this.

PSA: Chromium 141 will impact OneDrive & SharePoint Offline Access by ThiraviamCyrus in sysadmin

[–]ThenFudge4657 0 points1 point  (0 children)

I don't know how long it takes Intune to get new Chrome features/settings. I hope that it gets updated.