When trying to install an App on a Mac , the following error showed up with no way to continue

can’t be opened because the identity of the developer cannot be confirmed

Checking the Security of the apps showed Anywhere

Image result for can't be opened because the identity of the developer cannot be confirmed

In the end I hand to hold the control button down while opening the app and press Open , then it gave me to option to open

 

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

After deploying some sharepoint lists using Group Policy via Microsoft Outlook 2016/Account Settings/SharePoint Lists

The Lists would not add unless the user had clicked Allow to this error : 

Do you want to allow this website to open a program on your computer?

Image result for Do you want to allow this website to open a program on your computer?

From: companyweb

Program: Microsoft Outlook

Address: stssync://sts/?ver=1.1&type=tasks&cmd=add-folder&base-url=http%3A%2F%2Fcompanyweb&list-url=%2FLists%2FTasks%2F&guid=%7Bcf8bbfb4%2D575b%2D4dce%2Da800%2D5b34ac1786f1%7D&site-name=Corporate%20Intranet&list-name=Tasks

This error can stopped being displayed by deploying the below reg key : 

HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\ProtocolExecute

Add Key stssync

In that Key Create a Dword :  “WarnOnOpen=dword:00000000.”

For this to apply to All users on the machine apply to the Key’s below

HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\stssync

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\stssync

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

Just received the Generic Email from Microsoft again false positive like this : https://www.reddit.com/r/Office365/comments/8cv4iq/email_message_your_action_is_required_please/

To check you are on the latest Version :

Open Up the AAdconnect synchronisation service manager : “C:\Program Files\Microsoft Azure AD Sync\UIShell\miisclient.exe” -> choose Help and About and make sure 1.1.75

Check AAdconnect is AutoUpdate

Open Up AADconnect : “C:\Program Files\Microsoft Azure Active Directory Connect\AzureADConnect.exe” -> go to Configure and View Current Configuration

Scroll down and Check Auto Upgrade is Enabled


Dear Tenant Administrator,

You’re receiving this email because you’re currently using Azure AD Connect to sync data from on-premises directories to one of our cloud features, such as Office 365, for the tenant with id %%%%%%%%%%%%%%

We’ve found an issue with Azure AD Connect that requires your attention. The automatic upgrade feature of Azure AD Connect may be potentially disabled on this tenant. The automatic upgrade feature ensures your Azure AD Connect installations stay up to date with new improvements and important updates to the service.

Recommended action

To address this issue, please upgrade this tenant to the latest version of Azure AD Connect.

You can download the latest version of Azure AD Connect using this link. To read more about upgrading Azure AD Connect to a newer version, please use this link.

Contact us

If you have any questions about upgrading AADConnect please do not hesitate to contact us.

Thank you,

Azure Active Directory Hybrid Team

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

Recently had a user with a new Office 365 account receive the above error during downloading new email. Testing the connection it looks like the Wireless connection she was connecting to the internet with was intermittently slow.

Changing the Wifi to a hotspot or cable connection resolved this

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

I logged into https://h41111.www4.hpe.com/storage/msafirmware.html

To download the latest firmware for my 2040 , however, I needed to link my Device warranty to my HP Passport account

With only remote access to the Unit, I needed the Chasis Serial and Product Number

To get this on an MSA if you SSH into the device and do a “SHOW CONFIG”

Press Enter until you hit the SKU

Product Number for MSA 2040 is : K2R80A

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

Mimecast Guide

Azure Microsoft Guide

Create a Distribution Group in Office 365, this will be to Add the users to you want enable SSO on , add Users 

Make sure Mimecast is Synced with Office365 AD – Services -> Directory Synchronization ( Connect to 365 ) 

Perform manual sync in Mimecast to download user and group

Azure

On Azure – Got o Azure Active Directory, All Application find:  Mimecast Personal Portal

Next Single Sign-On

Sign on URL : https://au-api.mimecast.com/login/saml

Identifier : https://au-api.mimecast.com/sso/%Customer ID% per Mimecase User Guide

Reply URL : https://au-api.mimecast.com/login/saml

User Identifier : user.mail

Azure AD Properterties : User assignment  required No 

Mimecast

Configuring Mimecast-Personal-Portal for single sign-on

1.In a different web browser window, log into your Mimecast Personal Portal as an administrator.

2.Go to Services > Applications.

3.Click Authentication Profiles.

4.Click New Authentication Profile.

5.In the Authentication Profile section, perform the following steps:

a. In the Description textbox, type a name for your configuration.

b. Select Enforce SAML Authentication for Mimecast Personal

c. As Provider, select Azure Active Directory.

d. In Issuer URL textbox, paste the value of Azure AD SAML Entity ID : https://sts.windows.net/434324324342343242323442/ which you have copied from Azure portal.

e. In Login URL textbox, paste the value of Azure AD Single Sign-On Service URL : https://login.microsoftonline.com/434324324342343242323442/saml2 which you have copied from Azure portal.

f. In Logout URL textbox, paste the value of Sign-Out URL which you have copied from Azure portal.

g. Open your Downloaded Azure AD Signing Certificate (Base64 encoded) in notepad downloaded from Azure portal, copy the content of it into your clipboard, and then paste it to the Identity Provider Certificate (Metadata) textbox.

h. Select Allow Single Sign On.

i. Click Save.

Now Add a New Application Settings to Application and Link the Group you created in the first step to use this New Authentication Profile

Issues

reply address ‘https://au-api.mimecast.com/login/saml’ does not match the reply addresses configured for the application: ‘https://au-api.mimecast.com/sso/’.

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

If you are using products such as Cofense PhishMe , FriendlyPhishing or Knowbe4 as Phish testing software in your organisation then these test’s will get blocked in Mimecast. These organisations will give you a list of IP Addresses e.g for Cofense PhishMe ( 52.1.96.230, 52.5.119.169, 52.20.155.14 and 52.20.128.29 ) which you will need to whitelist through Mimecast 

Login to the portal and choose Policies then Permitted Senders

Create a new policy with the below options :

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

Recently on adding some machines and updates to a existing WSUS server that had been stable for a whole year, I was getting the server being unresponsive , and the reset server node would not work

After restarting the Windows Update Server Service , the error below would display in the event log : 

The WSUS content directory is not accessible. System.Net.WebException: The remote server returned an error: (503) Server Unavailable. at System.Net.HttpWebRequest.GetResponse() at Microsoft.UpdateServices.Internal.HealthMonitoring.HmtWebServices.CheckContentDirWebAccess(EventLoggingType type, HealthEventLogger logger)

Running IISRest in the Command prompt brought the site back online  , however clearly this was a workaround to teh crash , Turns out you need some tweaking of the Website in IIS to stop this!

  1. On your WSUS Server, launch the IIS Manager
  2. Open Application Pools
  3. Right click ‘WsusPool’ and select ‘Advanced Settings…’
  4. To support the maximum SCCM Software Update Point clients, change ‘Queue Length’ from the default 1,000 to 25,000
  5. If your server is NUMA aware, change ‘Maximum Worker Processes’ from the default 1 to 0. If you don’t know if your server is NUMA aware, leave this value default
  6. Change ‘”Service Unavailable” Response Type’ from the default HttpLevel to TcpLevel
  7. Change ‘Failure Interval (minutes) from the default 5 to 30
  8. Change ‘Maximum Failures’ from the default 5 to 60
  9. Click ‘OK’ to save the App Pool changes
  10. From an administrative command prompt, type IISRESET

This is also a good Cleanup script to schedule : 

https://community.spiceworks.com/scripts/show/2998-wsus-automated-maintenance-formerly-adamj-clean-wsus

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)