WSUS Windows Update error 0x80244022

Hi everyone !

Todya I wanted to share a bug you can encounter on your computer and Windows Server Update Service’s server.

This is the event id 0x80244022, and the reason is a faulting App in the IIS AppPool. You can enlarge the memory to have it work better.

I set 3G, but at 0 it’s unlimited .

There the step to do it;

Open IIS Manager

Click to show the App pools;

Click on WsusPool, stop it if not stopped.

Right click in Advanced detail, and look for those settings to change;

Active Directory – Delegate to Disable Users

Hi everyone

Today I wanted to talk a older topic, but still up to date, as I had to do it lately 🙂

If you want to delegate the control to an group / user to disable some Active Directory user you must delegate control to the user to read/write on the userAccountControl field.

That field is used there inside that windows (first pic took from there);

To be more exact, the filed control those options;

In the Active Directory User and Computer’s applet you can click to delegate;

After you click to enable the delegation only for users account;

After we click on read/write userAccountControl;

And that’s all, it should work after 🙂

For reference the field hold these values; (reference)

Property flagValue in hexadecimalValue in decimal
SCRIPT0x00011
ACCOUNTDISABLE0x00022
HOMEDIR_REQUIRED0x00088
LOCKOUT0x001016
PASSWD_NOTREQD0x002032
PASSWD_CANT_CHANGE

You can’t assign this permission by directly modifying the UserAccountControl attribute. For information about how to set the permission programmatically, see the Property flag descriptions section.
0x004064
ENCRYPTED_TEXT_PWD_ALLOWED0x0080128
TEMP_DUPLICATE_ACCOUNT0x0100256
NORMAL_ACCOUNT0x0200512
INTERDOMAIN_TRUST_ACCOUNT0x08002048
WORKSTATION_TRUST_ACCOUNT0x10004096
SERVER_TRUST_ACCOUNT0x20008192
DONT_EXPIRE_PASSWORD0x1000065536
MNS_LOGON_ACCOUNT0x20000131072
SMARTCARD_REQUIRED0x40000262144
TRUSTED_FOR_DELEGATION0x80000524288
NOT_DELEGATED0x1000001048576
USE_DES_KEY_ONLY0x2000002097152
DONT_REQ_PREAUTH0x4000004194304
PASSWORD_EXPIRED0x8000008388608
TRUSTED_TO_AUTH_FOR_DELEGATION0x100000016777216
PARTIAL_SECRETS_ACCOUNT0x0400000067108864

Migrate files server to the cloud – Hybrid GPO

Hi everyone

Today I wanted to two useful GPO if you migrate your file server to SharePoint online.

The GPO are to create automatically the OneDrive Sync to the document library, the some useful setting to push and a settings for the delay for applying the configuration.

The first GPO to apply is to create the Mount point for the selected user. I suggest to use the same security group as the mapped drive was.

It’s in HKEY_CURRENT_USER\Software\Policies\Microsoft\OneDrive\TenantAutoMount (REG_SZ)

Value Name = Text for the mount point to be created.

Value = Site URL

The site url can be obtained by navigating to the site, and click to Sync the site, it will offer an option to copy the link. The link must be un-escaped.

The link format is; tenantId=xxx&siteId=xxx&webId=xxx&listId=xxx&webUrl=httpsxxx&version=1

To un-escape use PowerShell, it’s the easiest to do;

[uri]::UnescapeDataString(“Copied String”)

To that GPO can be added one more registry setting; its tagged as it will make the change appear more fast, but it’s to test. On Reddit its a value that is tagged to be working for some, and not for other. On my side I seen a difference, maybe 10-20min and not near 8 hours, but it’s maybe just the GPO time to apply.

HKCU\Software\Microsoft\OneDrive\Accounts\Business1

“TimerAutoMount”==dword:00000001

The last option I recommand is to make sure the File On Demand is activated, so that change in a computer GPO for that one;

HKLM\SOFTWARE\Policies\Microsoft\OneDrive

“FilesOnDemandEnabled”=dword:00000001

Microsoft 365 roadmap – MFA for admin portal in November 2023

If you have Conditional Access rule inside your Entra tenant please make sure to see that roadmap;

The roadmap will force admin user to enable MFA on their account. Which is a good new to securing all the admin login out there.

Starting in November 2023, Microsoft will begin automatically protecting customers with Microsoft managed Conditional Access policies. These are policies that Microsoft creates and enables in customer tenants.

The following Conditional Access policies will be rolled out to all eligible tenants:

1. MFA for admin portals

This policy covers privileged admin roles and requires MFA when an admin signs into a Microsoft admin portal.

2. MFA for per user MFA users

This policy covers users with per-user MFA and requires MFA for all cloud apps.

3. MFA for high-risk sign-in

This policy covers all users and requires MFA and re authentication for high-risk sign-ins.

Exchange Online New requirement for SMTP Relay

Hi everyone

I wanted to warn that on 1 November 2023 a new requirement will be there for SMTP relay inside Exchange Online.

Nov 1, 2023 – New Requirements for SMTP Relay through Exchange Online 

Effective from November 1, 2023, the matching condition for the SMTP P2 sender domain will be removed. This means that relaying email through Exchange Online will require meeting the following criteria: 

  • Accepted domain: The SMTP certificate domain on the SMTP connection or the SMTP envelope sender domain in the MAIL FROM command (P1 sender domain) must be one of your organization’s accepted domains. 
  • Inbound Connector: The sending host’s IP address or certificate domain on the SMTP connection must match your organization’s Inbound Connector of on-premises type. 

Failure to meet either of these conditions after November 1, 2023, will result in the rejection of relay attempts from your on-premises environment to Exchange Online 

Solution: It is necessary to modify your Inbound Connector of the on-premises type and switch from using IP addresses to a certificate domain. Furthermore, you need to ensure that the certificate domain is included as an accepted domain of your organization.   

Ref: https://techcommunity.microsoft.com/t5/exchange-team-blog/updated-requirements-for-smtp-relay-through-exchange-online/ba-p/3851357 

Unifi Dream Machine UDM-Pro WAN IP Change

Hi everyone

Today I wanted to share a tip, as if I read reddit or ui’s forum it seem a really complex task to change a WAN IP.

After multiple error and guess I now found the correct solution for that.

First we log locally if we can.

After we need to remove the NAT’ing definition for the public IP we will change; to set none

If we have multiple network, it’s to be done for all of them, as seen below I have two to change;

If we forget that step the unifi will complaint about the IP being used in the Default network.

After we pause all Site-to-Site VPN.

If we forget that step the unifi will complain that it can’t change the gateway.

After all those steps, now we can change the public IP 🙂

Intune Map Network Drive

Hi everyone

Today I wanted to share a method to be able to map network drive from Intune / Endpoint Manager.

The method is useful if you are in a hybrid setup, where some ressource are in the cloud and some other on premise.

If you have azure ad sync with a domain controller and your cloud, the SSO will work out of the box with the mapping. A exception to the SSO, if your users use PIN with Windows HELLO you will have other integration to do.

To start please go download the drive mapping custom ADMX.

Download link from the author site | An alternative link from github

After that we need to import the ADMX into Intune.

Go into Device

Go into configuration profiles

Select the correct ADMX to be imported

After that we can now create our profile with the news settings

Create one here named Map Drive

There we set the settings we want;

We can see the settings the ADMX give us;

After that it should work correctly to map when the device is located inside the datacenter 🙂

Windows Server HHCTRL EventId 1903 Filling Event log

Hi everyone

Today I wanted to share a small tip if you got HHCTRL filling your event log like crazy.

Findind the culprit can be done, but in case it’s know and it dont impact anything you can disable the event log for the event that way with these registries key;

HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\HTMLHelp\1.x\HHRestrictions
MaxAllowedZone = 00000001 (DWORD)
EnableNonInteractiveUser = 00000001 (DWORD)
EnableFrameNavigationInSafeMode = 00000001 (DWORD)

and

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\HTMLHelp\1.x\HHRestrictions
MaxAllowedZone = 00000001 (DWORD)
EnableNonInteractiveUser = 00000001 (DWORD)
EnableFrameNavigationInSafeMode = 00000001 (DWORD)

That should do the tip to remove those entry as it can block other good information to appear easilly.

Filename in Migration To Sharepoint Online (INVALID_SHAREPOINT_NAME)

Hi everyone !

Today I wanted to share a small tip if you migrate some file share to sharepoint online as it’s a essential part to migrate full cloud.

In the migration wizard as seen here; you could hit some warning that some files use incorrect filenames.

The migration wizard got some file that it does not like, aka;

Thumb.db’s file or temporary Office’s file, ~$’s file prefix.

The command issued for your file share; Get-ChildItem -Path ‘\\server\path’ -Filter ‘~$*’ -Recurse would give you a good idea what it can find.

A dir /s like that would work too;

If you download the analyse’s log you will get log entries with that error code;

An easy fix if you don’t want to migrate those filename is to replace in batch; like that way;

Get-ChildItem -Path ‘z:\’ -Filter ‘~$*’ -Recurse | Rename-Item -NewName { $_.Name -replace ‘~$’, ‘ ‘ }

The option are too cna help in the batch migration advanced’s option;

Some good information for regex in case you have other files that need updating in batch;

https://megamorf.gitlab.io/cheat-sheets/powershell-regex/

http://regexstorm.net/tester

Thanks everyone