<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Allgemein Archive - MEB-IT | Blog</title>
	<atom:link href="https://blog.meb-it.de/en/categories/allgemein/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.meb-it.de/en/categories/allgemein/</link>
	<description>Networking &#124; Security &#124; Cloud</description>
	<lastBuildDate>Sat, 21 Oct 2023 10:41:35 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>
	<item>
		<title>IKEv2 VPN with routerOS and Windows 10/11: IKE authentication credentials are unacceptable</title>
		<link>https://blog.meb-it.de/en/ikev2-vpn-with-routeros-and-windows-10-11-ike-authentication-credentials-are-unacceptable/</link>
					<comments>https://blog.meb-it.de/en/ikev2-vpn-with-routeros-and-windows-10-11-ike-authentication-credentials-are-unacceptable/#respond</comments>
		
		<dc:creator><![CDATA[Marcel]]></dc:creator>
		<pubDate>Tue, 17 Oct 2023 11:50:44 +0000</pubDate>
				<category><![CDATA[Allgemein]]></category>
		<category><![CDATA[MikroTik]]></category>
		<category><![CDATA[Powershell]]></category>
		<guid isPermaLink="false">https://blog.meb-it.de/?p=166</guid>

					<description><![CDATA[<p>If you have encountered a problem with a IKEv2 connection with Windows 10 or Windows 11 and the error message states: The error looks a little bit different from our routers side: There might be multiple certificates installed to your machine and Windows is unable to select the proper certificate for authentication (If you didn&#8217;t [&#8230;]</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/ikev2-vpn-with-routeros-and-windows-10-11-ike-authentication-credentials-are-unacceptable/">IKEv2 VPN with routerOS and Windows 10/11: IKE authentication credentials are unacceptable</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>If you have encountered a problem with a IKEv2 connection with Windows 10 or Windows 11 and the error message states:</p>



<pre class="wp-block-code"><code>IKE authentication credentials are unacceptable</code></pre>



<p>The error looks a little bit different from our routers side:</p>



<pre class="wp-block-code"><code>oct/16 10:50:55 ipsec,error identity not found for peer: DER DN: CN=1114XXXXX,C=,ST=,L=,O=,OU=,SN=1114XXXXX
</code></pre>



<p>There might be multiple certificates installed to your machine and Windows is unable to select the proper certificate for authentication (If you didn&#8217;t install any certificates in your computer the above error is most likely not related to this article. Please follow the original setup of your VPN tutorial to complete this step). But don&#8217;t worry this is easy to fix. We can pin a certificate authority (CA) that has signed a certificate to a specific VPN connection.</p>



<p>First we need to have the CA certificate as a file on the clients machine. You can either export the CA-certificate from the computers certificate store (certmgr.exe) or you can download the file from your router or the location you have created the CA-Certificate, server-certificates and user-certificates.</p>



<p>Second step is to pin the CA-certificate to our VPN connection. Open PowerShell (do not open as &#8220;Administrator&#8221; since we want to set the certificate pinning in user context) and type in the following (please make sure you replace the VPN name and path to CA-certificate):</p>



<pre class="wp-block-code"><code>Set-VpnConnection -Name "My VPN" -MachineCertificateIssuerFilter 'C:\CA-files\my-ca.cer'</code></pre>



<p>After you have completed the above steps your VPN should start working.</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/ikev2-vpn-with-routeros-and-windows-10-11-ike-authentication-credentials-are-unacceptable/">IKEv2 VPN with routerOS and Windows 10/11: IKE authentication credentials are unacceptable</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.meb-it.de/en/ikev2-vpn-with-routeros-and-windows-10-11-ike-authentication-credentials-are-unacceptable/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Howto check your M365/Exchange Online environment for messages exploiting CVE-2023-23397</title>
		<link>https://blog.meb-it.de/en/howto-check-your-m365-exchange-online-environment-for-messages-exploiting-cve-2023-23397/</link>
					<comments>https://blog.meb-it.de/en/howto-check-your-m365-exchange-online-environment-for-messages-exploiting-cve-2023-23397/#respond</comments>
		
		<dc:creator><![CDATA[Marcel]]></dc:creator>
		<pubDate>Thu, 16 Mar 2023 19:31:11 +0000</pubDate>
				<category><![CDATA[Allgemein]]></category>
		<category><![CDATA[CVE-2023-23397]]></category>
		<category><![CDATA[M365]]></category>
		<guid isPermaLink="false">https://blog.meb-it.de/?p=143</guid>

					<description><![CDATA[<p>You might have heard about CVE-2023-23397 a vulnerability targeting Microsoft Outlook. The exploit can be triggered without user interaction. The vulnerability seems easy to exploit. Fortunately, you can simply protect yourself: Update Outlook/Office Apps and you are good. But how can we make sure we have not been exploited by that vulnerability? Microsoft has released [&#8230;]</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/howto-check-your-m365-exchange-online-environment-for-messages-exploiting-cve-2023-23397/">Howto check your M365/Exchange Online environment for messages exploiting CVE-2023-23397</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>You might have heard about <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23397" target="_blank" rel="noreferrer noopener">CVE-2023-23397</a> a vulnerability targeting Microsoft Outlook. The exploit can be triggered without user interaction. The vulnerability seems easy to exploit. Fortunately, you can simply protect yourself: Update Outlook/Office Apps and you are good.</p>



<p>But how can we make sure we have not been exploited by that vulnerability? Microsoft has <a href="https://microsoft.github.io/CSS-Exchange/Security/CVE-2023-23397/" target="_blank" rel="noreferrer noopener">released a script</a> for local Exchange installations as well for Exchange Online/ Microsoft 365.</p>



<p>This blog post shows how to use the Script to identify potential malicious mails in M365.</p>



<p>First we need to start Powershell as administrator. After that we install the AzureAD module:</p>



<pre class="wp-block-code"><code>PS C:\Users\Administrator&gt; Install-Module AzureAD</code></pre>



<p>Powershell will then ask if the module should be installed from an external source. Please select Yes (Y) here.</p>



<p>Next, we need to install the Exchange Online module:</p>



<pre class="wp-block-code"><code>PS C:\Users\Administrator&gt; Install-Module -Name ExchangeOnlineManagement -RequiredVersion 3.1.0</code></pre>



<p>Powershell will then ask again if the module should be installed from an external source. Please select Yes (Y) again.</p>



<p>The script used in the following step can be downloaded <a href="https://github.com/microsoft/CSS-Exchange/releases/latest/download/CVE-2023-23397.ps1" target="_blank" rel="noreferrer noopener">from here</a>.</p>



<p>Now we need to create an AzureAD application, which is needed to check the mailboxes:</p>



<pre class="wp-block-code"><code>PS C:\Users\Administrator\Downloads&gt; .\CVE-2023-23397.ps1 -CreateAzureApplication</code></pre>



<p>Depending on the Powershell configuration, it may be necessary to confirm again that the script may be executed. You can either chose (M) or (A). I recommend chosing M.</p>



<p>A new window will open to log in to M365 as a global administrator or application administrator.</p>



<p> If your output is similar to the following creating the helper application has worked:</p>



<pre class="wp-block-code"><code>CVE-2023-23397 script version 23.03.15.2119

Prompting user for authentication, please minimize this window if you do not see an authorization prompt as it may be in the background

Adding user adminuser@yourtenant.com as owner of CVE-2023-23397Application

Setting Azure AD Permissions

Assigning Necessary Azure AD Service Roles
Application created with required permissions. Client ID: xxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx</code></pre>



<p>After this step we now can start the investigation. We need to connect to Exchange Online first:</p>



<pre class="wp-block-code"><code>PS C:\Users\Administrator\Downloads&gt; Connect-ExchangeOnline</code></pre>



<p>You might need to re-authenticate at this point to M365. (I did not need to log in again at this step)</p>



<p>And then we can start the Powershell script to search for malicious files (If you selected (M) when running the script for the first time, you must confirm execution again now):</p>



<pre class="wp-block-code"><code>PS C:\Users\Administrator\Downloads&gt; Get-Mailbox -ResultSize Unlimited | .\CVE-2023-23397.ps1 -Environment "Online"</code></pre>



<p>At this point it is mandatory to authenticate again. Output should be similar to the following:</p>



<pre class="wp-block-code"><code>CVE-2023-23397 script version 23.03.15.2119
Trying to find Microsoft.Exchange.WebServices.dll in the script folder
Microsoft.Exchange.WebServices.dll wasn't found - attempting to download it from the internet

Prompting user for authentication, please minimize this window if you do not see an authorization prompt as it may be in the background

Waiting 60 seconds for app credentials to register..

Continuing...
Scanning 1 of 16 mailboxes (currently: mailbox1@yourtenant.com)
Scanning 2 of 16 mailboxes (currently: mailbox2@yourtenant.com)
Scanning 3 of 16 mailboxes (currently: mailbox3@yourtenant.com)
Scanning 4 of 16 mailboxes (currently: mailbox4@yourtenant.com)
Scanning 5 of 16 mailboxes (currently: mailbox5@yourtenant.com)
&#91;...]
Scanning 16 of 16 mailboxes (currently: mailbox16@yourtenant.com)
<strong>No vulnerable item found</strong>

Do you have feedback regarding the script? Please email ExToolsFeedback@microsoft.com.</code></pre>



<p>I hope you will see the same output as I do. The script also supports deleting affected files. For more information please look at <a href="https://microsoft.github.io/CSS-Exchange/Security/CVE-2023-23397/" target="_blank" rel="noreferrer noopener">Microsofts script documentation</a>.</p>



<p>After checking the mailboxes, we no longer need the AzureAD Helper Application. To delete the application just run the following command:</p>



<pre class="wp-block-code"><code>PS C:\Users\Administrator\Downloads&gt; .\CVE-2023-23397.ps1 -DeleteAzureApplication</code></pre>



<p>You have probably already guessed: First you have to allow the script again and thereafter you have to authenticate to Microsoft 365 a last time <img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>



<p></p>



<p></p>



<p>I hope the explanation helped you to check your tenants. Feel free to let me know if it worked or if you had any problems with it.</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/howto-check-your-m365-exchange-online-environment-for-messages-exploiting-cve-2023-23397/">Howto check your M365/Exchange Online environment for messages exploiting CVE-2023-23397</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.meb-it.de/en/howto-check-your-m365-exchange-online-environment-for-messages-exploiting-cve-2023-23397/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Howto install extra-packages in MikroTik routerOS 7</title>
		<link>https://blog.meb-it.de/en/howto-install-extra-packages-in-mikrotik-routeros-7/</link>
					<comments>https://blog.meb-it.de/en/howto-install-extra-packages-in-mikrotik-routeros-7/#respond</comments>
		
		<dc:creator><![CDATA[Marcel]]></dc:creator>
		<pubDate>Thu, 16 Feb 2023 12:29:16 +0000</pubDate>
				<category><![CDATA[Allgemein]]></category>
		<guid isPermaLink="false">https://blog.meb-it.de/?p=124</guid>

					<description><![CDATA[<p>MikroTiks routerOS 7.xx has additional packages (e.g. wireless wifiwave2) that can be installed. This short blog post describes the process to add the packages. First you need to download the packages from MikroTiks Download page. You need to download the appropriate package for your devices architecture. In my case I am using a RB4011 running [&#8230;]</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/howto-install-extra-packages-in-mikrotik-routeros-7/">Howto install extra-packages in MikroTik routerOS 7</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>MikroTiks routerOS 7.xx has additional packages (e.g. wireless wifiwave2) that can be installed. This short blog post describes the process to add the packages.</p>



<p>First you need to download the packages from MikroTiks <a href="https://mikrotik.com/download" target="_blank" rel="noreferrer noopener">Download page</a>. You need to download the appropriate package for your devices architecture. In my case I am using a RB4011 running routerOS 7.7. In this case I need to look at column &#8216;7.7 stable&#8217; and row &#8216;ARM&#8217;.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="891" src="https://blog.meb-it.de/wp-content/uploads/2023/02/01-extra-packages-download-1024x891.png" alt="" class="wp-image-125" srcset="https://blog.meb-it.de/wp-content/uploads/2023/02/01-extra-packages-download-1024x891.png 1024w, https://blog.meb-it.de/wp-content/uploads/2023/02/01-extra-packages-download-300x261.png 300w, https://blog.meb-it.de/wp-content/uploads/2023/02/01-extra-packages-download-768x668.png 768w, https://blog.meb-it.de/wp-content/uploads/2023/02/01-extra-packages-download.png 1032w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>If you don&#8217;t know the architecture of your device, there are several ways to find out:</p>



<ul class="wp-block-list">
<li>Check &#8216;/system resource print&#8217; in Winbox or CLI and check the &#8216;cpu&#8217; field</li>



<li>Open MikroTiks <a href="https://mikrotik.com/products/matrix" target="_blank" rel="noreferrer noopener">product matrix</a> and search for your device</li>
</ul>



<p>After you have downloaded the correct file, open the zip archive and extract the package you want to install. Next, the unzipped file must be uploaded to the router. Either upload it via Winbox or CLI (e.g. scp or ftp) to your device. After the file has been uploaded, just reboot your device.</p>



<p>After the devices has been rebooted, the package is installed automatically. You can check this via &#8216;/system package print&#8217; in CLI or Winbox as well as the routers log:</p>



<pre class="wp-block-code"><code>&#91;admin@rtr-01] > /log pr
 12:27:10 system,info installed wifiwave2-7.7
 12:27:10 system,info router rebooted</code></pre>



<p>Thats all &#8211; you are done and the package has been installed!</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/howto-install-extra-packages-in-mikrotik-routeros-7/">Howto install extra-packages in MikroTik routerOS 7</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.meb-it.de/en/howto-install-extra-packages-in-mikrotik-routeros-7/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Server 2012r2 / Windows 8.1 KB5022352 error 80070570</title>
		<link>https://blog.meb-it.de/en/server-2012r2-windows-8-1-kb5022352-error-80070570/</link>
					<comments>https://blog.meb-it.de/en/server-2012r2-windows-8-1-kb5022352-error-80070570/#comments</comments>
		
		<dc:creator><![CDATA[Marcel]]></dc:creator>
		<pubDate>Sun, 15 Jan 2023 13:18:21 +0000</pubDate>
				<category><![CDATA[Allgemein]]></category>
		<category><![CDATA[kb5022352]]></category>
		<guid isPermaLink="false">https://blog.meb-it.de/?p=116</guid>

					<description><![CDATA[<p>Microsoft released the January 2022 patches and for Server 2012r2 and Windows 8.1 patch KB5022352 seems to result in errors while downloading/installing this patch. You will most likely notice this, when your Update only gets downloaded until 95% and even after waiting multiple hours nothing changes. If you stopped and restarted the download, it will [&#8230;]</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/server-2012r2-windows-8-1-kb5022352-error-80070570/">Server 2012r2 / Windows 8.1 KB5022352 error 80070570</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft released the January 2022 patches and for Server 2012r2 and Windows 8.1 patch KB5022352 seems to result in errors while downloading/installing this patch.</p>



<p>You will most likely notice this, when your Update only gets downloaded until 95% and even after waiting multiple hours nothing changes. If you stopped and restarted the download, it will directly move up to 95% and stay there.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="589" height="296" src="https://blog.meb-it.de/wp-content/uploads/2023/01/01-download-95.png" alt="" class="wp-image-110" srcset="https://blog.meb-it.de/wp-content/uploads/2023/01/01-download-95.png 589w, https://blog.meb-it.de/wp-content/uploads/2023/01/01-download-95-300x151.png 300w" sizes="(max-width: 589px) 100vw, 589px" /></figure>



<p>After rebooting the affected machine you will most likely be greeted by the errorcode 80070570.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="589" height="296" src="https://blog.meb-it.de/wp-content/uploads/2023/01/02-error-80070570.png" alt="" class="wp-image-111" srcset="https://blog.meb-it.de/wp-content/uploads/2023/01/02-error-80070570.png 589w, https://blog.meb-it.de/wp-content/uploads/2023/01/02-error-80070570-300x151.png 300w" sizes="(max-width: 589px) 100vw, 589px" /></figure>



<p>Many older posts on technet and other sources for general errors with windows update recommend deleting/renaming the windows update catalog folder. In this situation the solution is much more easy:</p>



<ul class="wp-block-list">
<li>Check your machine for SSU KB5018922. If it is already installed, move to the next step. If it is missing, please download it manually from the update catalog and install it by hand: <a href="https://www.catalog.update.microsoft.com/Search.aspx?q=KB5018922" target="_blank" rel="noreferrer noopener">https://www.catalog.update.microsoft.com/Search.aspx?q=KB5018922</a></li>



<li>Next step is to install the missing KB5022352 manually: <a href="https://www.catalog.update.microsoft.com/Search.aspx?q=KB5022352" target="_blank" rel="noreferrer noopener">https://www.catalog.update.microsoft.com/Search.aspx?q=KB5022352</a></li>
</ul>



<p>We tested the above procedure with multiple machines and it seems to solve the errorcode 80070570. Please let me know if that solved the problem for you as well.</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/server-2012r2-windows-8-1-kb5022352-error-80070570/">Server 2012r2 / Windows 8.1 KB5022352 error 80070570</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.meb-it.de/en/server-2012r2-windows-8-1-kb5022352-error-80070570/feed/</wfw:commentRss>
			<slash:comments>17</slash:comments>
		
		
			</item>
		<item>
		<title>Howto: Block Windows 11 Upgrade via GPO</title>
		<link>https://blog.meb-it.de/en/howto-block-windows-11-upgrade-via-gpo/</link>
					<comments>https://blog.meb-it.de/en/howto-block-windows-11-upgrade-via-gpo/#respond</comments>
		
		<dc:creator><![CDATA[Marcel]]></dc:creator>
		<pubDate>Fri, 27 May 2022 11:45:03 +0000</pubDate>
				<category><![CDATA[Allgemein]]></category>
		<guid isPermaLink="false">https://blog.meb-it.de/?p=78</guid>

					<description><![CDATA[<p>Microsoft seems to roll out Windows 11 Upgrades to all Users, even if they have no admin rights on their account. If we want to prevent users from upgrading by mistake, we should make use of a Group Policy Object (GPO). The Group Policy Object can be set on the following path: Computer configuration -&#62; [&#8230;]</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/howto-block-windows-11-upgrade-via-gpo/">Howto: Block Windows 11 Upgrade via GPO</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft seems to roll out Windows 11 Upgrades to all Users, even if they have no admin rights on their account. If we want to prevent users from upgrading by mistake, we should make use of a Group Policy Object (GPO).</p>



<p>The Group Policy Object can be set on the following path: <em>Computer configuration</em> -&gt; <em>Administrative Templates</em> -&gt; <em>Windows Components</em> -&gt; <em>Windows Update </em>-&gt; <em>Windows Update for Business</em>. The template is called <strong>Select the target Feature Update version</strong>.</p>



<p>Unfortunately the Group Policy is outdated on Server 2019 and 2022 and is missing the option &#8220;Which Windows product version would you like to receive feature updates for&#8221;. Since Windows 10 and Windows 11 have the same names for their Feature Updates, we need this option to make sure, we are staying on Windows 10. In Server 2016 we are missing the GPO is even missing completly.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="623" src="https://blog.meb-it.de/wp-content/uploads/2022/05/01-GPO-1024x623.png" alt="" class="wp-image-73" srcset="https://blog.meb-it.de/wp-content/uploads/2022/05/01-GPO-1024x623.png 1024w, https://blog.meb-it.de/wp-content/uploads/2022/05/01-GPO-300x183.png 300w, https://blog.meb-it.de/wp-content/uploads/2022/05/01-GPO-768x467.png 768w, https://blog.meb-it.de/wp-content/uploads/2022/05/01-GPO.png 1356w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption>GPO without updated Admx-Template</figcaption></figure>



<p>To get the full options available we need to update our Admx-Templates. You can download the newest version (as of 2022-05-27) <a href="https://www.microsoft.com/en-us/download/details.aspx?id=103667" target="_blank" rel="noreferrer noopener">from here</a>.</p>



<p>The Admx-Templates need to be extracted to a local file location. After the files have been extracted, open Explorer and navigate to the path: C<em>:\Program Files (x86)\Microsoft Group Policy\Windows 10 November 2021 Update (21H2)</em>. Copy the folder &#8220;PolicyDefinitions&#8221; and paste it to the following UNC-path: <em>\\domain.local\sysvol\domain.local\Policies</em>.</p>



<p>After the files have been copied, open the group policy editor and once again navigate to the path <em>Computer configuration</em> -&gt; <em>Administrative Templates</em> -&gt; <em>Windows Components</em> -&gt; <em>Windows Update </em>-&gt; <em>Windows Update for Business</em> and open the Template &#8220;<strong>Select the target Feature Update version</strong>&#8220;.</p>



<p>We need to enter &#8220;<strong>Windows 10</strong>&#8221; into the first box and &#8220;<strong>21H2</strong>&#8221; into the second box. </p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="687" src="https://blog.meb-it.de/wp-content/uploads/2022/05/03-GPO-1024x687.png" alt="" class="wp-image-75" srcset="https://blog.meb-it.de/wp-content/uploads/2022/05/03-GPO-1024x687.png 1024w, https://blog.meb-it.de/wp-content/uploads/2022/05/03-GPO-300x201.png 300w, https://blog.meb-it.de/wp-content/uploads/2022/05/03-GPO-768x515.png 768w, https://blog.meb-it.de/wp-content/uploads/2022/05/03-GPO.png 1048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption>GPO with updated Admx-Template</figcaption></figure>



<p>Please note: As soon as you want your PCs to upgrade to a newer Feature Update than 21H2 you need to change the value in this GPO. Otherwise the PCs will stay on 21H2.</p>



<p>After the clients have rebootet they should not show any signs of Windows 11 anymore.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><strong>Block Windows 11 Upgrade on a single computer without domain</strong></p>



<p>With help of the GPO we can even tell a single computer to not upgrade to Windows 11 (and stop showing us the Windows 11 Upgrade stuff in Windows Updates and in our Taskbar). Just open &#8220;gpedit.msc&#8221; from Windows Search and navigate to the path <em>Computer configuration</em> -&gt; <em>Administrative Templates</em> -&gt; <em>Windows Components</em> -&gt; <em>Windows Update </em>-&gt; <em>Windows Update for Business</em> and open the Template &#8220;<strong>Select the target Feature Update version</strong>&#8220;.</p>



<p>Similar to the GPO for domains we need to enter &#8220;Windows 10&#8221; in the first and &#8220;21H2&#8221; into the second box. One reboot later the Windows 11 Upgrade information should be gone.</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/howto-block-windows-11-upgrade-via-gpo/">Howto: Block Windows 11 Upgrade via GPO</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.meb-it.de/en/howto-block-windows-11-upgrade-via-gpo/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
