<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									Microsoft Windows - VHT Forum				            </title>
            <link>https://www.virtualizationhowto.com/community/microsoft-windows/</link>
            <description>Virtualization Howto Discussion Board</description>
            <language>en-US</language>
            <lastBuildDate>Wed, 22 Apr 2026 05:32:43 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>Add legacy SSL ciphers back to Windows 11 24H2</title>
                        <link>https://www.virtualizationhowto.com/community/microsoft-windows/add-legacy-ssl-ciphers-back-to-windows-11-24h2/</link>
                        <pubDate>Thu, 17 Apr 2025 16:24:57 +0000</pubDate>
                        <description><![CDATA[One issue I have found in troubleshooting a connection to a legacy SQL Server is that Windows 11 24H2 seems to have deprecated legacy ciphers even further than previous versions of Windows 1...]]></description>
                        <content:encoded><![CDATA[<p>One issue I have found in troubleshooting a connection to a legacy SQL Server is that Windows 11 24H2 seems to have deprecated legacy ciphers even further than previous versions of Windows 11. Now, the ciphers are not even there. Previously I could launch IIS Crypto and enable all the legacy ciphers, but this didn't work in 24H2. So, I set about looking to see what had changed. </p>
<p>Apparently, Windows 11 24H2 removes the following ciphers:</p>
<ul>
<li class="" data-start="181" data-end="217">
<p class="" data-start="183" data-end="217"><code data-start="186" data-end="217">TLS_RSA_WITH_3DES_EDE_CBC_SHA</code></p>
</li>
<li class="" data-start="218" data-end="249">
<p class="" data-start="220" data-end="249"><code data-start="223" data-end="249">TLS_RSA_WITH_RC4_128_SHA</code></p>
</li>
<li class="" data-start="250" data-end="281">
<p class="" data-start="252" data-end="281">T<code data-start="255" data-end="281">LS_RSA_WITH_RC4_128_MD5</code></p>
</li>
</ul>
<p>So, these have to be added back and enabled.</p>
<p>PowerShell code to add these ciphers back and enable them</p>
<p>You can use the following PowerShell code to add these ciphers back and enable them. After running, the script calls out that you need to reboot also for these changes to take effect.</p>
<pre contenteditable="false">$regPath = "HKLM:\SYSTEM\CurrentControlSet\Control\Cryptography\Configuration\Local\SSL\00010002"
$currentCiphers = (Get-ItemProperty -Path $regPath).Functions

# Legacy cipher suites for SQL 2005
$legacySuites = @(
    "TLS_RSA_WITH_3DES_EDE_CBC_SHA",
    "TLS_RSA_WITH_RC4_128_SHA",
    "TLS_RSA_WITH_RC4_128_MD5"
)

# Add missing cipher suites to the SSL Functions list
$missing = $legacySuites | Where-Object { $_ -notin $currentCiphers }
if ($missing.Count -gt 0) {
    Write-Output "Adding missing cipher suites: $($missing -join ', ')"
    $newList = $currentCiphers + $missing
    Set-ItemProperty -Path $regPath -Name "Functions" -Value $newList
} else {
    Write-Output "All required cipher suites already present."
}

# Enable legacy cipher algorithms in SCHANNEL
$cipherPaths = @(
    "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 128/128",
    "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 64/128",
    "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 56/128",
    "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 40/128",
    "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\Triple DES 168"
)

foreach ($path in $cipherPaths) {
    if (-not (Test-Path $path)) {
        New-Item -Path $path -Force | Out-Null
    }
    Set-ItemProperty -Path $path -Name "Enabled" -Value 1 -Type DWord
}

Write-Output "Legacy ciphers are now enabled. Please reboot to apply changes."
</pre>]]></content:encoded>
						                            <category domain="https://www.virtualizationhowto.com/community/microsoft-windows/">Microsoft Windows</category>                        <dc:creator>Brandon Lee</dc:creator>
                        <guid isPermaLink="true">https://www.virtualizationhowto.com/community/microsoft-windows/add-legacy-ssl-ciphers-back-to-windows-11-24h2/</guid>
                    </item>
				                    <item>
                        <title>Install and configure OpenSSH in Windows Server with Public Key Authentication</title>
                        <link>https://www.virtualizationhowto.com/community/microsoft-windows/install-and-configure-openssh-in-windows-server-with-public-key-authentication/</link>
                        <pubDate>Wed, 26 Feb 2025 04:52:43 +0000</pubDate>
                        <description><![CDATA[If you are looking for the best way to remotely manage and connect to your Windows Server, you might toss out there WinRM (probably not), RDP, or some other type of tool that you can use to ...]]></description>
                        <content:encoded><![CDATA[<p>If you are looking for the best way to remotely manage and connect to your Windows Server, you might toss out there WinRM (probably not), RDP, or some other type of tool that you can use to manage and administer your Windows Server. However, what if I told you the best way to manage your Windows Server from the command line is using OpenSSH?</p>
<p>Trust me, if you are automating your Windows estate, you likely will get frustrated with WinRM and other native ways to administer your Windows Server. OpenSSH is free, its fairly easy to install, and it allows you to run commands and copy files remotely with only a single network port needed, port 22.</p>
<p>In Windows Server, navigate to <strong>Settings &gt; Apps &gt; Optional features</strong> and search for OpenSSH. Add the <strong>OpenSSH Server</strong> option.</p>
<p><img style="margin-left: auto;margin-right: auto" src="https://www.virtualizationhowto.com/wp-content/uploads/wpforo/attachments/2/617-add-openssh-server-in-optional-features-in-windows-server.jpg" /></p>
<p>Once you have the component installed, then we need to change the configuration of the Windows service to start automatically. By default it is set to <strong>Manual</strong>. We need to set this to Automatic.</p>
<p><img style="margin-left: auto;margin-right: auto" src="https://www.virtualizationhowto.com/wp-content/uploads/wpforo/attachments/2/618-viewing-the-openssh-server-service-in-windows-server.jpg" /></p>
<p>Set the service to automatic.</p>
<p><img style="margin-left: auto;margin-right: auto" src="https://www.virtualizationhowto.com/wp-content/uploads/wpforo/attachments/2/619-set-the-startup-type-for-openssh-server-to-automatic.jpg" /></p>
<p>Setting to automatic will make sure it will start when the server starts. When you start the service, it will create and populate the following directory: <strong>C:\ProgramData\ssh</strong>.</p>
<p><img src="https://www.virtualizationhowto.com/wp-content/uploads/wpforo/attachments/2/620-viewing-the-ssh-directory-in-programdata-for-openssh.jpg" /></p>
<p><span style="font-size: 18pt">Install OpenSSH with PowerShell</span></p>
<p>You can also use PowerShell to install the Windows feature. To install OpenSSH SSH Server using PowerShell, use the following command from an admin PowerShell prompt:</p>
<pre contenteditable="false">Add-WindowsCapability -Online -Name OpenSSH.Server~~~~0.0.1.0</pre>
<p>After you install it with PowerShell, you will need to follow the same steps above to set the service to <strong>automatic</strong>. You can also do this with PowerShell as well:</p>
<pre contenteditable="false">Start-Service -Name "sshd" 

Set-Service -Name "sshd" -StartupType Automatic </pre>
<p><span style="font-size: 18pt">SSHD_config file</span></p>
<p>The sshd_config file is the heart of the solution's configuration. You can open this file up and make changes to configuration settings there. Below is an example of what your sshd_config file might look like. Below, I have enabled public key authentication and commented out the Group Administrators line as this can cause issues with public key authentication. Keep in mind if you change anything in this file, you will need to <strong>restart the OpenSSH SSH Service</strong>.</p>
<p>Note below, I have changed the <strong>SyslogFacility LOCAL0</strong> and <strong>LogLevel Debug3</strong>. Adding this configuration for logging will allow logging to be captured in the "logs" folder of the <strong>c:\programdata\ssh folder</strong>. </p>
<pre contenteditable="false"># This is the sshd server system-wide configuration file.  See
# sshd_config(5) for more information.

# The strategy used for options in the default sshd_config shipped with
# OpenSSH is to specify options with their default value where
# possible, but leave them commented.  Uncommented options override the
# default value.

#Port 22
#AddressFamily any
#ListenAddress 0.0.0.0
#ListenAddress ::

#HostKey __PROGRAMDATA__/ssh/ssh_host_rsa_key
#HostKey __PROGRAMDATA__/ssh/ssh_host_dsa_key
#HostKey __PROGRAMDATA__/ssh/ssh_host_ecdsa_key
#HostKey __PROGRAMDATA__/ssh/ssh_host_ed25519_key

# Ciphers and keying
#RekeyLimit default none

# Logging
SyslogFacility LOCAL0
LogLevel Debug3

# Authentication:

#LoginGraceTime 2m
#PermitRootLogin prohibit-password
#StrictModes yes
#MaxAuthTries 6
#MaxSessions 10

PubkeyAuthentication yes

# The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2
# but this is overridden so installations will only check .ssh/authorized_keys
AuthorizedKeysFile	.ssh/authorized_keys

#AuthorizedPrincipalsFile none

# For this to work you will also need host keys in %programData%/ssh/ssh_known_hosts
#HostbasedAuthentication no
# Change to yes if you don't trust ~/.ssh/known_hosts for
# HostbasedAuthentication
#IgnoreUserKnownHosts no
# Don't read the user's ~/.rhosts and ~/.shosts files
#IgnoreRhosts yes

# To disable tunneled clear text passwords, change to no here!
PasswordAuthentication no
#PermitEmptyPasswords no

# GSSAPI options
#GSSAPIAuthentication no

#AllowAgentForwarding yes
#AllowTcpForwarding yes
#GatewayPorts no
#PermitTTY yes
#PrintMotd yes
#PrintLastLog yes
#TCPKeepAlive yes
#UseLogin no
#PermitUserEnvironment no
#ClientAliveInterval 0
#ClientAliveCountMax 3
#UseDNS no
#PidFile /var/run/sshd.pid
#MaxStartups 10:30:100
#PermitTunnel no
#ChrootDirectory none
#VersionAddendum none

# no default banner path
#Banner none

# override default of no subsystems
Subsystem	sftp	sftp-server.exe

# Example of overriding settings on a per-user basis
#Match User anoncvs
#	AllowTcpForwarding no
#	PermitTTY no
#	ForceCommand cvs server

#Match Group administrators
#       AuthorizedKeysFile __PROGRAMDATA__/ssh/administrators_authorized_keys
</pre>
<p><span style="font-size: 18pt">Public key authentication</span></p>
<p>To get public key authentication to work, you need to perform the following steps:</p>
<ul>
<li>Generate a key pair (on the machine you will be connecting <strong>from</strong>)
<ul>
<li>To do this, you an use the <strong>ssh-keygen</strong> command. It will step you through creating the public and private key pair</li>
</ul>
</li>
<li>Copy the public side of the public/private key pair to the target server you will be connecting <strong>to</strong></li>
<li>Make sure you have firewall exceptions for port 22 on your target server and any firewalls in between your workstation and Windows Server</li>
<li>For the user you want to target to use with the public key authentication, you need to create an <strong>authorized_keys</strong> file in the path <strong>c:\users\&lt;user&gt;\.ssh</strong> folder. In this file, you will paste the contents of the public key file you generated with the ssh-keygen file. This will tie the private key and public key components together when you connect. </li>
<li>Use the user you have the public key configured with on the target server when you call the SSH command</li>
</ul>
<p><span style="font-size: 18pt">Connecting using public key authentication</span></p>
<p>To connect using public key authentication, you can call the private key with the <strong>ssh</strong> command which will pass along the private key component for authentication against the public key. You will also pass in the user that you are using on the target side:</p>
<pre contenteditable="false">ssh -i private_key administrator@&lt;ip or fqdn of windows server&gt;</pre>]]></content:encoded>
						                            <category domain="https://www.virtualizationhowto.com/community/microsoft-windows/">Microsoft Windows</category>                        <dc:creator>Brandon Lee</dc:creator>
                        <guid isPermaLink="true">https://www.virtualizationhowto.com/community/microsoft-windows/install-and-configure-openssh-in-windows-server-with-public-key-authentication/</guid>
                    </item>
				                    <item>
                        <title>Microsoft Fixes &#039;Boot Device Inaccessible&#039; Issue on Windows Server 2025 Using iSCSI</title>
                        <link>https://www.virtualizationhowto.com/community/microsoft-windows/microsoft-fixes-boot-device-inaccessible-issue-on-windows-server-2025-using-iscsi/</link>
                        <pubDate>Fri, 14 Feb 2025 15:52:00 +0000</pubDate>
                        <description><![CDATA[In case you didn&#039;t know Microsoft has fixed a known issue affecting Windows Server 2025 installations using iSCSI. This issue was causing &#039;boot device inaccessible&#039; errors during startup.
I...]]></description>
                        <content:encoded><![CDATA[<p data-start="184" data-end="364">In case you didn't know Microsoft has fixed a known issue affecting <strong>Windows Server 2025</strong> installations using <strong data-start="280" data-end="289">iSCSI</strong>. This issue was causing <strong data-start="309" data-end="339">'boot device inaccessible'</strong> errors during startup.<img src="https://www.virtualizationhowto.com/wp-content/uploads/wpforo/attachments/2/580-windows-server-2025-installation.jpg" /></p>
<h3 data-start="366" data-end="389"><strong data-start="370" data-end="387">Issue Details</strong></h3>
<p data-start="390" data-end="652">The issue is around <strong data-start="419" data-end="477">servers booting from an iSCSI LUN under NDIS Poll Mode</strong>. Microsoft first noted this the bug in late October 2024 and said it affected servers and these would encounter a boot error after completing the installation of Windows Server 2025.</p>
<p data-start="654" data-end="1064"><strong data-start="654" data-end="672">What is iSCSI?</strong><br data-start="672" data-end="675" />iSCSI or (Internet Small Computer Systems Interface) is a storage protocol that allows ones to connect to remote storage over TCP/IP. It allows it to use SCSI commands over IP networks. This allows remote storage on a storage area network (SAN) to appear as if it were a local disk. This type of storage is commonly used in virtualization, centralized storage, and data center environments.</p>
<h3 data-start="1066" data-end="1108"><strong data-start="1070" data-end="1106">Fix Released in February Updates</strong></h3>
<p data-start="1109" data-end="1221">Microsoft has resolved the issue mentioned with the <a href="https://learn.microsoft.com/en-us/windows/release-health/status-windows-server-2025" target="_blank" rel="noopener"><strong data-start="1155" data-end="1176">February 11, 2025</strong> update <strong data-start="1184" data-end="1199">(KB5051987)</strong></a>.</p>
<blockquote data-start="1223" data-end="1370">
<p data-start="1225" data-end="1370">&#x1f6e0;&#xfe0f; <strong data-start="1229" data-end="1242">Solution:</strong> Microsoft recommends installing the latest cumulative update. It will include this fix along with other improvements.</p>
</blockquote>
<p data-start="1372" data-end="1408"><strong data-start="1372" data-end="1406">Additional Fixes in KB5051987:</strong></p>
<ul data-start="1409" data-end="1512">
<li data-start="1409" data-end="1512">Resolved <strong data-start="1420" data-end="1451">USB audio and camera issues</strong> that occurred after the <strong data-start="1476" data-end="1509">January 2025 security updates</strong>.</li>
</ul>
<h3 data-start="1514" data-end="1555"><strong data-start="1518" data-end="1553">Other Windows Server 2025 Fixes</strong></h3>
<p data-start="1556" data-end="1845">There are other fixes in recent updates as well:<br />&#x2705; <strong data-start="1629" data-end="1647">November 2024:</strong> Fixed bugs causing installation, upgrade failures, and <strong data-start="1703" data-end="1712">BSODs</strong> on high-core count servers<br data-start="1740" data-end="1743" />&#x2705; <strong data-start="1745" data-end="1763">December 2024:</strong> Resolved <strong data-start="1773" data-end="1790">boot failures</strong> on <strong data-start="1794" data-end="1817">Windows Server 2022</strong> with multiple NUMA nodes</p>
<h3 data-start="1847" data-end="1889"><strong data-start="1851" data-end="1887">Windows Server 2025 Availability</strong></h3>
<p data-start="1890" data-end="2059">Windows Server 2025 <strong data-start="1910" data-end="1928">(LTSC release)</strong> became generally available in early November. You can grab a copy to of Windows Server 2025 to play around with from the Microsoft Evaluation Center. This is a really great option for home labs and other test environments.</p>
<h3 data-start="1514" data-end="1555"><strong data-start="1518" data-end="1553">Important Takeaways</strong></h3>
<p data-start="2248" data-end="2477">&#x1f4cc; If you're running <strong data-start="2269" data-end="2292">Windows Server 2025</strong> with <strong data-start="2298" data-end="2307">iSCSI</strong>, make sure to install the <strong data-start="2334" data-end="2354">KB5051987 update</strong>. This will help to make sure to prevent boot errors. Let me know if you have seen this issue? Let's discuss it.</p>]]></content:encoded>
						                            <category domain="https://www.virtualizationhowto.com/community/microsoft-windows/">Microsoft Windows</category>                        <dc:creator>Brandon Lee</dc:creator>
                        <guid isPermaLink="true">https://www.virtualizationhowto.com/community/microsoft-windows/microsoft-fixes-boot-device-inaccessible-issue-on-windows-server-2025-using-iscsi/</guid>
                    </item>
				                    <item>
                        <title>Best SSL and TLS Configuration Tool for Windows</title>
                        <link>https://www.virtualizationhowto.com/community/microsoft-windows/best-ssl-and-tls-configuration-tool-for-windows/</link>
                        <pubDate>Mon, 03 Feb 2025 14:16:38 +0000</pubDate>
                        <description><![CDATA[Why do you need to change SSL and TLS configuration?
Well, that is a good question and in a perfect world, we don’t want to have to do that. In fact, Microsoft is doing a good thing by depr...]]></description>
                        <content:encoded><![CDATA[<h2 id="why-do-you-need-to-change-ssl-and-tls-configuration" class="wp-block-heading">Why do you need to change SSL and TLS configuration?</h2>
<p>Well, that is a good question and in a perfect world, we don’t want to have to do that. In fact, Microsoft is doing a good thing by deprecating old or weak configuration settings and weak ciphers. However, unfortunately, many of us support applications or environments where legacy software and apps may still require old versions of SSL, TLS, and ciphers.</p>
<p>As an example, I recently had an issue with a developer where he was trying to connect a new Windows 11 VM he was running to an old SQL 2005 server (yeah I know SQL 2005, shaking head frustratingly). However, needs like this still exist.</p>
<p>Chasing down the registry keys needed to turn these settings back on can be frustrating as well. It can be confusing what you need to enable and which keys need to be added, etc.</p>
<h2 id="best-ssl-and-tls-configuration-tool-for-windows" class="wp-block-heading">Best SSL and TLS configuration tool for Windows</h2>
<p>There is a GUI tool that makes life much much easier for admins and<span> </span>DevOps<span> </span>engineers alike. The tool is from a company called Nartac and is called<span> </span><strong>IIS Crypto</strong>. You can download it here:<span> </span><a href="https://www.nartac.com/Products/IISCrypto">Nartac Software – IIS Crypto</a>.</p>
<p>You can download the IIS crypto GUI tool or the CLI. While the tool is developed for the use case of helping with enabling protocols and ciphers on<span> </span><strong>web servers</strong>, it can also be used to configure SSL and TLS configurations on Windows clients as well and I have used it in this way many times. Whatever your need is, it will help either way.</p>
<div class="wp-block-image">
<figure>
562
<br />
<figcaption class="wp-element-caption">download nartac iiscrypto tool</figcaption>
</figure>
</div>
<p>Here, I have downloaded the IIS Crypto tool. One thing I like about it is it is a self-contained executable. You just execute the .EXE and it won’t install anything, it will just run. Everything will look greyed out but you can click the protocols, ciphers, etc that you want.</p>
<p>And, best of all, you don’t have to edit the registry or get into the nitty gritty details of what you need to do to enable or disable protocols and ciphers.</p>
<div class="wp-block-image">
<figure>
563
<br />
<figcaption class="wp-element-caption">launching the nartac iiscrypto tool</figcaption>
</figure>
</div>
<p>One feature I really like about the program is that it has a<span> </span><strong>best practices</strong><span> </span>button that allows you with a single click of a button to enable the recommended protocols and ciphers based on security recommendations. As we will see below, the template that it works from is configurable.</p>
<div class="wp-block-image">
<figure>
564
<br />
<figcaption class="wp-element-caption">selecting the best practices button</figcaption>
</figure>
</div>
<p>When you click the<span> </span><strong>Cipher Suites</strong>, you will see the Ciphers listed that are configurable and you can simply click the ones you want.</p>
<div class="wp-block-image">
<figure>
565
<br />
<figcaption class="wp-element-caption">selecting cipher suites configured</figcaption>
</figure>
</div>
<p>If you click the<span> </span><strong>Advanced</strong><span> </span>button, you will see advanced settings like DHC Minimum Key length, FIPs algorithm settings, etc.</p>
<div class="wp-block-image">
<figure>
566
<br />
<figcaption class="wp-element-caption">advanced settings in iiscrypto</figcaption>
</figure>
</div>
<p>When you click<span> </span><strong>Templates</strong>, you will see where you can configure the best practices template that is used to show you the recommended protocols and cipher suites.</p>
<div class="wp-block-image">
<figure>
567
<br />
<figcaption class="wp-element-caption">available best practices templates in iiscrypto</figcaption>
</figure>
</div>
<p>Site scanner found in the IIS Crypto tool lets you scan a website/webserver to see which protocols and ciphers are allowed to see if these are set to best practices.</p>
<div class="wp-block-image">
<figure>
568
<br />
<figcaption class="wp-element-caption">site scanner in iiscrypto</figcaption>
</figure>
</div>
<h2 id="make-ssl-and-tls-changes-cautiously" class="wp-block-heading">Make SSL and TLS changes cautiously</h2>
<p>While taking away weaker and older protocols and ciphers may at worst cause certain clients or apps to stop working, adding old or weak SSL and TLS protocols and ciphers can give attackers what they need to compromise your web server or your network. So, make changes, especially those that add old or weak technologies very carefully and only really as a last resort to satisfy a necessary configuration.</p>]]></content:encoded>
						                            <category domain="https://www.virtualizationhowto.com/community/microsoft-windows/">Microsoft Windows</category>                        <dc:creator>Brandon Lee</dc:creator>
                        <guid isPermaLink="true">https://www.virtualizationhowto.com/community/microsoft-windows/best-ssl-and-tls-configuration-tool-for-windows/</guid>
                    </item>
				                    <item>
                        <title>Emails cannot be sent from Thunderbird connected to Exchange</title>
                        <link>https://www.virtualizationhowto.com/community/microsoft-windows/emails-cannot-be-sent-from-thunderbird-connected-to-exchange/</link>
                        <pubDate>Fri, 22 Nov 2024 14:31:41 +0000</pubDate>
                        <description><![CDATA[Hi, thank you for the explanations and screenshots on specops. We updated the 365 Admin Center setting so that the user is being asked to update the password, but still emails cannot be sent...]]></description>
                        <content:encoded><![CDATA[<p>Hi, thank you for the explanations and screenshots on specops. We updated the 365 Admin Center setting so that the user is being asked to update the password, but still emails cannot be sent from Thunderbird connected to Exchange account. The server details are correct, we know that because some users are able to send emails from TBird with Exchange account added. We used for everyone outlook.office365.com, OAuth2, SSL at incoming and STARTLS at receiving. The first prompt is: Login to server ... with username... failed. If we select enter new password it doesn't work and when we select cancel then: Unable to authenticate to Outgoing server SMPT. Please check the password and verify the Authentication Method. Thank you for any guidance.</p>]]></content:encoded>
						                            <category domain="https://www.virtualizationhowto.com/community/microsoft-windows/">Microsoft Windows</category>                        <dc:creator>Onur</dc:creator>
                        <guid isPermaLink="true">https://www.virtualizationhowto.com/community/microsoft-windows/emails-cannot-be-sent-from-thunderbird-connected-to-exchange/</guid>
                    </item>
				                    <item>
                        <title>Get Windows 11 Pro Upgrade Cheap for $20 from PCWorld</title>
                        <link>https://www.virtualizationhowto.com/community/microsoft-windows/get-windows-11-pro-upgrade-cheap-for-20-from-pcworld/</link>
                        <pubDate>Sun, 22 Sep 2024 03:47:39 +0000</pubDate>
                        <description><![CDATA[If you are looking for a super cheap upgrade of Windows 11 Pro, then you may have the perfect opportunity from PCWorld. They have a really unbelievable deal of Windows 11 Pro upgrade for $20...]]></description>
                        <content:encoded><![CDATA[<p>If you are looking for a super cheap upgrade of Windows 11 Pro, then you may have the perfect opportunity from PCWorld. They have a really unbelievable deal of <strong>Windows 11 Pro upgrade for $20</strong>! That is 89% off the retail price of $199. </p>
240
<p>This is a pretty incredible deal I think for home labbers and other enthusiasts who want the benefits of the business edition of Windows 11 Pro. There are a few things that I think make this version of Windows definitely preferable over Home edition. This includes:</p>
<ul>
<li><strong>Hyper-V</strong> - When you upgrade to Windows 11 Pro, you get access to client Hyper-V which is arguably probably one of the best desktop virtualization solutions. Where most other desktop virtualization solutions are type 2 hypervisors, Hyper-V is a Type 1 hypervisor. It instantiates your operating system as a management operating system so it actually runs the management operating system on top of Hyper-V instead of the other way around.</li>
<li><strong>BitLocker</strong> - You get BitLocker encryption when you go Windows 11 Pro version which is a great way to secure your data</li>
<li><strong>Azure AD</strong> - You can join to Azure AD with Windows 11 Pro</li>
<li><strong>Active Directory join</strong> - You can also join to legacy Active Directory Domain Services (AD DS) which is something that many are playing around with or running in home lab environments.</li>
<li><strong>Smart App Control</strong> - Ability to protect your Windows client operating system from other security threats when apps are launching</li>
<li><strong>Biometric login</strong> - You get Biometric login with Windows 11 Pro as well</li>
</ul>
<p>There are many great reasons to have Pro over Home version any day in my opinion. You can check out the offer for Windows 11 Pro upgrade for $20 here:</p>
<p><a href="https://shop.pcworld.com/sales/microsoft-windows-11-pro-6?utm_source=pcworld.com">Microsoft Windows 11 Pro | PCWorld</a></p>
<p>Let me know what you guys think about this deal.</p>]]></content:encoded>
						                            <category domain="https://www.virtualizationhowto.com/community/microsoft-windows/">Microsoft Windows</category>                        <dc:creator>Brandon Lee</dc:creator>
                        <guid isPermaLink="true">https://www.virtualizationhowto.com/community/microsoft-windows/get-windows-11-pro-upgrade-cheap-for-20-from-pcworld/</guid>
                    </item>
				                    <item>
                        <title>Windows Server Update Services (WSUS) deprecated and going away after Windows Server 2025</title>
                        <link>https://www.virtualizationhowto.com/community/microsoft-windows/windows-server-update-services-wsus-deprecated-and-going-away-after-windows-server-2025/</link>
                        <pubDate>Sat, 21 Sep 2024 18:53:11 +0000</pubDate>
                        <description><![CDATA[In case you haven&#039;t heard as of yet, Windows Server Update Services (WSUS) is a technology that Microsoft is continuing to support but is no longer going to be developed, and eventually won&#039;...]]></description>
                        <content:encoded><![CDATA[<p>In case you haven't heard as of yet, Windows Server Update Services (WSUS) is a technology that Microsoft is continuing to support but is no longer going to be developed, and eventually won't be supported any longer. The writing has been on the wall for quite some time now that Microsoft believes in cloud endpoint management across the board. We can see this with the massive development and investment in Windows Autopatch, Microsoft Intune, and Azure Update Manager.</p>
<p>It has had a long run, being introduced in 2005, it is one of those utilities that I think we all agree that we "love to hate". When it works, it works good, but sometimes it doesn't work. However, I would say by in large, it is still the primary tool that enterprise organizations have been using on-premises for decades and are only now starting to see they need to find alternative solutions for.</p>
<p><strong>Updates will continue to be published through WSUS "for now"</strong></p>
<p>Now that WSUS is deprecated, it doesn't mean Microsoft is immediately pulling the plug. Instead, it sounds like they will take a phased approach. </p>
<p>Microsoft has officially announced that Windows Server Update Services (WSUS) is now deprecated, but plans to maintain current functionality and continue publishing updates through the channel.</p>
<p>It is one of the services that it mentioned in the article:</p>
<p><a href="https://learn.microsoft.com/en-us/windows-server/get-started/removed-deprecated-features-windows-server-2025" target="_blank" rel="noopener">Features removed or no longer developed starting with Windows Server 2025 (preview</a>) that will be either removed or deprecated in Windows Server 2025 Preview. </p>
<p><strong>Writing been on the wall for it going away for quite some time</strong></p>
<p>WSUS is one of those services that we really haven't seen an update to in 3 forevers! I mean, I believe we have been on WSUS 3.1 since Windows 2008 or so (don't check me on that), but you guys get the point, it just hasn't much and hasn't really been a service that Microsoft has looked to invest in, in quite some time now.</p>
234
236
235
237
<p>Microsoft hasn't change or added anything new in quite some time and it looks like now the full plan is written in stone, complete deprecation in favor of other services:</p>
<ul>
<li><a href="https://learn.microsoft.com/windows/deployment/windows-autopatch/overview/windows-autopatch-overview" target="_blank" rel="nofollow noopener">Windows Autopatch</a></li>
<li><a href="https://learn.microsoft.com/mem/intune/fundamentals/what-is-intune" target="_blank" rel="nofollow noopener">Microsoft Intune</a></li>
<li><a href="https://azure.microsoft.com/products/azure-update-management-center" target="_blank" rel="nofollow noopener">Azure Update Manager</a></li>
</ul>
<p><strong>Will it be found in Windows Server 2025?</strong></p>
<p>Yes, it looks like it will still be included as a role in Windows Server 2025, but this looks to be the end of the road Windows Server OS for WSUS.</p>
<p>What do you guys think about this? Any readers here in the VHT forum currently managing WSUS and looking at other solutions or actively migrating to another solution?</p>]]></content:encoded>
						                            <category domain="https://www.virtualizationhowto.com/community/microsoft-windows/">Microsoft Windows</category>                        <dc:creator>Brandon Lee</dc:creator>
                        <guid isPermaLink="true">https://www.virtualizationhowto.com/community/microsoft-windows/windows-server-update-services-wsus-deprecated-and-going-away-after-windows-server-2025/</guid>
                    </item>
							        </channel>
        </rss>
		