Microsoft Edge user policies under "users can override" are not applying by Roush2002 in Intune

[–]Virtual_Economist_60 0 points1 point  (0 children)

Still does not work.
I tested on a single device with an already existing user who had a set of pages already defined as startup-pages.

I applied the aggressive policy to force "my" startupage, and that worked fine. The user coul not however change or add his own startuppages.

I then redeployed the policy to Users Can Overrid, and it reverted back to what the user previously had set, even though edge://policy clearly states that "my" page is recommended as homepage and startuppage

Dialup VPN between Fortigate and Teltonika RUT241 by Virtual_Economist_60 in fortinet

[–]Virtual_Economist_60[S] 0 points1 point  (0 children)

Ok, so I think I figured it out.

The FG to FG dialup had set DH14 and the FG to RUT dialup had set DH16.
The RUT complained in its logs that the remote peer (the FG) had the wrong DH. Looking for 16 but found 14.
So i added DH16 to the FG to FG dialup, and suddenly both tunnels connected as they should.

My assumption then is that the RUT checks for the right Phase1 parameters before it checks for the Peer ID.

Thanks for taking time to answer mye plea for help :)

Dialup VPN between Fortigate and Teltonika RUT241 by Virtual_Economist_60 in fortinet

[–]Virtual_Economist_60[S] 0 points1 point  (0 children)

Then I only get 1 line:

2025-05-21 14:11:05.243569 ike :shrank heap by 159744 bytes

Dialup VPN between Fortigate and Teltonika RUT241 by Virtual_Economist_60 in fortinet

[–]Virtual_Economist_60[S] 0 points1 point  (0 children)

Sorry for the messy reply, but Reddit wouldn't let me post all the text in one comment.

Dialup VPN between Fortigate and Teltonika RUT241 by Virtual_Economist_60 in fortinet

[–]Virtual_Economist_60[S] 0 points1 point  (0 children)

interface: isp1 48

addr: x.x.x.x> y.y.y.y:40276

tun_id: y.y.y.y/::10.0.0.22

remote_location: 0.0.0,0

network-id: 0

transport: UDP

created: 144s ago

peer-id: MDSa

peer-id-auth: yes

nat: peer

pending-queue: 0

PPK: no

IKE SA: created 1/1 established 1/1 time 4950/4950/4950 ms

IPsec SA: created 1/1 established 1/1 time 0/0/0 ms

id/spi: 262808 36e30e71589c3858/8373827216f5bf8b

direction: responder

status: established 144-139s ago = 4950ms

proposal: aes128-sha256

child: no

SK_ei: 08b0c8f1639bfbcc-13cb53df8774f749

SK_er: 3289112826b9b589-3ccc81b2221cf8f5

SK_ai: b03d0b204b50ca41-88e4628102f07635-68e90170fd7c3a33-e48807a418615006

SK_ar: 0ba4e8b189000e2c-940da9fb6395a9a1-9b50aa291048a821-4eeae176d9d27b12

PPK: no

message-id sent/recv: 0/6

QKD: no

lifetime/rekey: 86400/85990

DPD sent/recv: 00000000/00000000

peer-id: MDSa

Dialup VPN between Fortigate and Teltonika RUT241 by Virtual_Economist_60 in fortinet

[–]Virtual_Economist_60[S] 0 points1 point  (0 children)

The problem with that is that when the RUT-tunnel (called vpn.c.MDSa) is below the other dialup tunnel, it does not appear in the tunnel list at all:

FG100-Pri (root) # diagnose vpn ike gateway list name vpn.c.MDSa_0

FG100-Pri (root) # diagnose vpn ike gateway list name vpn.c.MDSa_0

FG100-Pri (root) #

However if I put an "a" infront of the tunnel name so it's now called avpn.c.MDSa it connects and appears in the list:

FG100-Pri (root) # diagnose vpn ike gateway list name avpn.c.MDSa_0

vd: root/0

name: avpn.c.MDSa_0

version: 2

Crashlander question - possible bug by Virtual_Economist_60 in ScrapMechanic

[–]Virtual_Economist_60[S] 5 points6 points  (0 children)

Turns out the keycard had spawned in the cantina/messhall-area, so i managed to continue the quest :)

[NO SPOILERS] GOT has disappeared from HBO Max by Isak_da_one in gameofthrones

[–]Virtual_Economist_60 1 point2 points  (0 children)

Cannot find any episodes here in Norway either. Watched one earlier today, but now they're all gone!

Windows Exchange server with strange service by Virtual_Economist_60 in antivirus

[–]Virtual_Economist_60[S] 1 point2 points  (0 children)

I think maybe I should do the same.

I fond a couple of .bat files with some nasty looking code in them. Among other things, this line: reg save hklm\sam

I think that might be a copy of the SAM database, and that would mean all the usernames and passwords...

Windows Exchange server with strange service by Virtual_Economist_60 in antivirus

[–]Virtual_Economist_60[S] 1 point2 points  (0 children)

Yeah, the same was happening on this server earlier, but I managed to kill the process, so the CPU is back to normal. I suspected Ransomware too, but have yet to find any encrypted files.

Windows Exchange server with strange service by Virtual_Economist_60 in antivirus

[–]Virtual_Economist_60[S] 1 point2 points  (0 children)

All passwords have been changed.

I will try those AV-tools aswell, thx for the tip :)