Microsoft Outlook hit by worldwide ’email visibility issues’

Posted on
office365

Microsoft said that Outlook is suffering “email visibility issues”, with widespread reports of text disappearing after being entered into a new message, and of existing messages having no body text at all.

IT administrators said they were rolling back a recent Office update that appears to be the root cause; both desktop and 365 users are reporting issues.

“We’re investigating an issue with email message visibility in Outlook. Outlook on the web appears to be unaffected,” Microsoft said in a brief status advisory.

Users worldwide reported a variety of text input and visibility problems. There were confirmed reports of the issues impacting Australian and New Zealand users.

“If you hit ‘new message’ and type in the body no text appears. But If you send it the text shows up for the recipient,” one user wrote.

“We have several users that cannot see the text in emails in their mailboxes,” Seth Kamins tweeted.

“If you reply you still cannot see this unless you backspace.  Very odd. 

“OWA unaffected as we have Exchange on Prem.  Same thing happens when turning off Cache.”

One user screenshotted the experience, with the body of a new email disappearing every time a new line was entered.

Administrators reported that disabling autoupdate and rolling back to a previous version worked; Outlook Web Access (OWA) and access via phone-based client also appeared to be unaffected.

“Users with access to alternate protocols like Outlook on the web or Outlook mobile can use those as a potential workaround in the interim,” Microsoft later officially advised.

However, not even some of these workarounds were foolproof.

Update, 9.18am: Microsoft advised it had “identified the root cause and are applying a fix, which will reach affected users over the next three to four hours.

“Users will need to restart the Outlook client to apply the fix after it’s received. We expect to restore service to affected users by May 12, 2021, at 3:00 AM UTC [1pm AEST].”

How ransomeware works and why you need OnGuard Remote Backup

Posted on

Ransomware attacks can

DESTROY your business!

Attacks do not happen all in one go.

Imagine a computer network is like an enemy fortress. If you want to capture it, you do not just lob a grenade over the wall and hope the soldiers are all killed. You start by infiltrating your best guy.

You smuggle him past the defenses and leave him to sneak around inside for a while. Get the lay of the land. Draw maps for when your main forces arrive. Find out where all the good stuff is hidden. See if there are any traps to avoid.

In our case, for traps substitute ‘backups.’ Backups are kryptonite to ransomware. There is no point in locking a bunch of data if your intended victim has a clean copy. They would just laugh in your face. That is a big problem because some of these groups are in the game for prestige as much as they are for cash.

So, if they find a backup—which are usually only connected briefly to capture a snapshot of any recent changes and then get taken off-line or even off-site for safekeeping—they immediately deploy a special kind of program. A particularly sneaky kind.

We call it a trident because it does three things all at once. One, it destroys all the data that has already been backed up. It is either wiped clean or replaced with porn or taunting messages, or things like that. Two, it prevents any new backups getting saved. And three, it sends spoof signals to the organization’s management system saying that everything is working OK. That way it avoids alerting anyone to what is happening and adds to the blow when the main systems lock up and the ransom demand is posted.

If you do not protect your data and are attacked by ransomware – you will be shut down!

Onguard Remote Backup keeps your data protected and give you the ability to recover from a data disaster fast!

Can you afford to lose your documents, accounting data, spreadsheets and pictures?

Protect your business data with OnGuard Remote Backup

Your business does not need a PAUSE button.

Call us to setup our OnGuard Remote Backup and protect your business!

718-921-6159

sales@bulldogtechinc.com

What happened to delivery reports?

Posted on
exchange 2016

You may have noticed you’re no longer getting delivery or read receipts. this feature has been discontinued from Microsoft:

Delivery reports in Microsoft 365 and Office 365 allowed users and administrators to discover and view delivery information about mail messages. Delivery reports for users have been discontinued and there is currently no direct replacement. Delivery reports for administrators have been replaced by the Message Trace feature.

For more information, see these topics:

Microsoft Patches “annoying” password prompts and other security fixes

Posted on

Today is Patch Tuesday, meaning that it’s the second Tuesday of the month and that it’s time for Microsoft to push out a ton of updates. Indeed, every supported version of Windows 10 is getting a cumulative update, and for consumers, that includes versions 1909 and above.

If you’re on one of the newest two versions, 20H2 or 2004, you’re going to get KB5001330, bringing the build number to 19042.928 or 19041.928, respectively. You can manually download it here, and these are the highlights:

  • Updates to improve security when Windows performs basic operations.
  • Updates to improve security when using input devices such as a mouse, keyboard, or pen.

Here’s the full changelog:

  • Addresses an issue in which a principal in a trusted MIT realm fails to obtain a Kerberos service ticket from Active Directory domain controllers (DC). This occurs on devices that installed Windows Updates that contain CVE-2020-17049 protections and configured PerfromTicketSignature to 1 or higher. These updates were released between November 10, 2020 and December 8, 2020. Ticket acquisition also fails with the error, “KRB_GENERIC_ERROR”, if callers submit a PAC-less Ticket Granting Ticket (TGT) as an evidence ticket without providing the USER_NO_AUTH_DATA_REQUIRED flag.
  • Addresses an issue with security vulnerabilities identified by a security researcher. Because of these security vulnerabilities, this and all future Windows updates will no longer contain the RemoteFX vGPU feature. For more information about the vulnerability and its removal, see CVE-2020-1036 and KB4570006. Secure vGPU alternatives are available using Discrete Device Assignment (DDA) in Windows Server LTSC releases (Windows Server 2016 and Windows Server 2019) and Windows Server SAC releases (Windows Server, version 1803 and later versions).
  • Addresses a potential elevation of privilege vulnerability in the way Azure Active Directory web sign-in allows arbitrary browsing from the third-party endpoints used for federated authentication. For more information, see CVE-2021-27092 and Policy CSP – Authentication.
  • Security updates to Windows App Platform and Frameworks, Windows Apps, Windows Input and Composition, Windows Office Media, Windows Fundamentals, Windows Cryptography, the Windows AI Platform, Windows Kernel, Windows Virtualization, and Windows Media.

If you’re still on Windows 10 version 1909, which is only supported for another month, you’ll get KB5001337, bringing the build number to 18363.1500. You can manually download it here, and these are the highlights:

  • Updates to improve security when Windows performs basic operations.
  • Updates to improve security when using input devices such as a mouse, keyboard, or pen.

Here’s the full list of fixes:

  • Addresses an issue in which a principal in a trusted MIT realm fails to obtain a Kerberos service ticket from Active Directory domain controllers (DC). This occurs on devices that installed Windows Updates that contain CVE-2020-17049 protections and configured PerfromTicketSignature to 1 or higher. These updates were released between November 10, 2020 and December 8, 2020. Ticket acquisition also fails with the error, “KRB_GENERIC_ERROR”, if callers submit a PAC-less Ticket Granting Ticket (TGT) as an evidence ticket without providing the USER_NO_AUTH_DATA_REQUIRED flag.
  • Addresses an issue with security vulnerabilities identified by a security researcher. Because of these security vulnerabilities, this and all future Windows updates will no longer contain the RemoteFX vGPU feature. For more information about the vulnerability and its removal, see CVE-2020-1036 and KB4570006. Secure vGPU alternatives are available using Discrete Device Assignment (DDA) in Windows Server LTSC releases (Windows Server 2016 and Windows Server 2019) and Windows Server SAC releases (Windows Server, version 1803 and later versions).
  • Addresses a potential elevation of privilege vulnerability in the way Azure Active Directory web sign-in allows arbitrary browsing from the third-party endpoints used for federated authentication. For more information, see CVE-2021-27092 and Policy CSP – Authentication.
  • Security updates to Windows App Platform and Frameworks, Windows Apps, Windows Input and Composition, Windows Office Media, Windows Fundamentals, Windows Cryptography, the Windows AI Platform, Windows Hybrid Cloud Networking, the Windows Kernel, Windows Virtualization, and Windows Media.

Finally, there are a bunch of versions of Windows 10 that are no longer supported for consumers, but are still supported for other use cases. Those got updates too.