<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Safe Mode &#8211; The Redmond Cloud</title>
	<atom:link href="https://www.theredmondcloud.com/tag/safe-mode/feed" rel="self" type="application/rss+xml" />
	<link>https://www.theredmondcloud.com</link>
	<description>Windows News and Tech Updates</description>
	<lastBuildDate>Thu, 25 Jul 2024 10:42:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://www.theredmondcloud.com/wp-content/uploads/2019/12/cropped-TheRedmondCloudLogo-AMP-Logo-32x32.png</url>
	<title>Safe Mode &#8211; The Redmond Cloud</title>
	<link>https://www.theredmondcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Microsoft&#8217;s Response to CrowdStrike Bug &#8211; Recovery Guide</title>
		<link>https://www.theredmondcloud.com/microsofts-response-to-crowdstrike-bug-a-comprehensive-recovery-guide</link>
					<comments>https://www.theredmondcloud.com/microsofts-response-to-crowdstrike-bug-a-comprehensive-recovery-guide#disqus_thread</comments>
		
		<dc:creator><![CDATA[Mike Johnson]]></dc:creator>
		<pubDate>Mon, 22 Jul 2024 13:59:25 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Problems]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Bitlocker]]></category>
		<category><![CDATA[BSOD]]></category>
		<category><![CDATA[CrowdStrike]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Falcon Sensor]]></category>
		<category><![CDATA[IT recovery]]></category>
		<category><![CDATA[network outage]]></category>
		<category><![CDATA[Safe Mode]]></category>
		<category><![CDATA[WinPE]]></category>
		<guid isPermaLink="false">https://www.theredmondcloud.com/?p=200924</guid>

					<description><![CDATA[Explore Microsoft's recovery tools tackling the global CrowdStrike bug crisis affecting millions of PCs across various industries.]]></description>
										<content:encoded><![CDATA[<p>IT admins and PC users are still reeling from one of the biggest network outages in history.</p>
<p>Dubbed the &#8220;digital pandemic&#8221; by some, a CrowdStrike bug triggered the infamous Blue Screen of Death (BSoD) on millions of systems worldwide. The impact was widespread, hitting airlines, banks, emergency services, and TV stations.</p>
<p>Despite the situation, it&#8217;s important to clarify that Microsoft is not to blame. The culprit here is a faulty driver update pushed out by cybersecurity company CrowdStrike, which caused PCs everywhere to crash. While CrowdStrike is at fault, Microsoft has been proactive, rolling out tools to help fix the affected systems.</p>
<p>Last week, Microsoft <a href="https://support.microsoft.com/en-us/topic/kb5042421-crowdstrike-issue-impacting-windows-endpoints-causing-an-0x50-or-0x7e-error-message-on-a-blue-screen-b1c700e0-7317-4e95-aeee-5d67dd35b92f" target="_blank" rel="noopener">released a USB Recovery Tool</a> to tackle the CrowdStrike bug.</p>
<p>This tool aims to speed up the repair process, allowing IT admins to restore PCs to a pre-bug state. It offers two recovery options: WinPE and safe mode. Microsoft recommends using WinPE, though there are scenarios where the safe mode option is more appropriate, particularly if BitLocker is enabled.</p>
<p>The recovery key isn&#8217;t available (admin rights are needed).</p>
<p>A new Tech Community post from Microsoft details these options and their respective pros and cons:</p>
<h2>Recover from WinPE (Recommended)</h2>
<ul>
<li>Quickly and directly recovers systems.</li>
<li>Does not require local admin privileges.</li>
<li>Manually entering the BitLocker recovery key may be required if BitLocker is enabled.</li>
<li>For third-party disk encryption, refer to vendor guidelines for recovering the drive so that the remediation script can run from WinPE.</li>
</ul>
<h2>Recover from Safe Mode</h2>
<ul>
<li>It may allow recovery on BitLocker-enabled devices without entering recovery keys.</li>
<li>Requires access to an account with local administrator rights.</li>
<li>Suitable for devices using TPM-only protectors, unencrypted devices, or where the BitLocker recovery key is unknown.</li>
<li>If using TPM+PIN BitLocker protectors, the user must enter the PIN or use the recovery key.</li>
<li>If BitLocker is not enabled, just sign in with an admin account.</li>
<li>For third-party disk encryption, consult vendors to recover the drive for the remediation script to run.</li>
</ul>
<p>Microsoft also notes that while the USB tool is preferred, some devices can&#8217;t use USB connections. In such cases, a Preboot Execution Environment (PXE) option or reimaging the device might be necessary.</p>
<p>We’ll update our guide on fixing the CrowdStrike Blue Screen error on Windows 11 soon, incorporating these new methods. You can also check out Microsoft&#8217;s detailed breakdown of the process.</p>
<h3>What is the CrowdStrike Outage?</h3>
<p>Chances are, you’ve been impacted by the CrowdStrike outage somehow.</p>
<p>A vast number of companies and organizations have experienced PC crashes, and repairs are still ongoing. Even if you weren’t directly affected, the incident has been a hot topic outside tech circles.</p>
<p>Over the weekend, I overheard people at American football practices discussing the &#8220;Microsoft outage.&#8221; Friends and colleagues have reported similar conversations in hospitals, restaurants, and casual settings.</p>
<p>CrowdStrike is a cybersecurity company specializing in Internet security. Their Falcon platform provides real-time attack indicators and helps security experts protect systems. Unfortunately, a buggy update to the Falcon Sensor app wreaked havoc, affecting many organizations.</p>
<p>The fallout grounded planes, forcing some airports to issue handwritten boarding passes. Banks, emergency services, and millions of PCs were hit hard.</p>
<p>While some viewed the downtime as a welcome break, the CrowdStrike outage caused significant disruption across multiple industries. Ironically, CrowdStrike&#8217;s stock plummeted, but many could not capitalize on the dip due to the bug affecting trading services.</p>
<p>Although a fix is now available, the repercussions of the CrowdStrike outage will be felt for a while as IT admins work tirelessly to recover and repair affected systems.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.theredmondcloud.com/microsofts-response-to-crowdstrike-bug-a-comprehensive-recovery-guide/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Safe Mode bug in Windows 11 finally fixed</title>
		<link>https://www.theredmondcloud.com/safe-mode-bug-in-windows-11-finally-fixed</link>
					<comments>https://www.theredmondcloud.com/safe-mode-bug-in-windows-11-finally-fixed#disqus_thread</comments>
		
		<dc:creator><![CDATA[Fahad Ali]]></dc:creator>
		<pubDate>Wed, 04 May 2022 12:00:50 +0000</pubDate>
				<category><![CDATA[Bugs]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Windows 11]]></category>
		<category><![CDATA[Fixes]]></category>
		<category><![CDATA[Flickering]]></category>
		<category><![CDATA[Issues]]></category>
		<category><![CDATA[KIR]]></category>
		<category><![CDATA[Known Issue Rollback]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Problems]]></category>
		<category><![CDATA[Safe Mode]]></category>
		<guid isPermaLink="false">https://www.windows11news.com/?p=94280</guid>

					<description><![CDATA[Gotcha! Microsoft has confirmed that it has fixed the Safe Mode bug in Windows 11. This was a pesky and peculiar issue that caused certain windows to flicker when in the OS&#8217;s safe mode. Interestingly, the company did not turn to another update to fix this problem. Instead, it made use of a whole different [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Gotcha! Microsoft has confirmed that it has fixed the Safe Mode bug in Windows 11. This was a pesky and peculiar issue that caused certain windows to flicker when in the OS&#8217;s safe mode.</p>
<p>Interestingly, the company did not turn to another update to fix this problem.</p>
<p>Instead, it made use of a whole different solution.</p>
<p>In an advisory published on April 29, Redmond confirmed that File Explorer, Start Menu, and Task Manager were all impacted by screen flickering. The company also confirmed that a previous cumulative update shipped to Windows 11 was to blame for the whole fiasco.</p>
<p>As explained:</p>
<blockquote><p>“After installing KB5012643, devices starting in Safe Mode might show a flickering screen. Components that rely on Explorer.exe, such as File Explorer, Start Menu, and Taskbar, can be affected and appear unstable. Devices experiencing this issue can log a System error on the Windows Event Log, with Source “Winlogon” and the following description: “The shell stopped unexpectedly and explorer.exe was restarted.”</p></blockquote>
<p>Sounds serious.</p>
<p>According to the company&#8217;s information, this error affected only Windows 11 21H2. Users of other versions of the operating system need not worry.</p>
<p>Microsoft used a KIR to implement the fix for this problem:</p>
<blockquote><p>“This issue is resolved using Known Issue Rollback (KIR). Please note that it might take up to 24 hours for the resolution to propagate automatically to consumer devices and non-managed business devices. Restarting your device might help the resolution apply to your device faster. Enterprise-managed devices that have installed an affected update and encountered this issue can resolve it by installing and configuring the special Group Policy listed below.”</p></blockquote>
<p>No input is required on the user side, as the fix is implemented via the <a href="https://techcommunity.microsoft.com/t5/windows-it-pro-blog/known-issue-rollback-helping-you-keep-windows-devices-protected/ba-p/2176831" target="_blank" rel="noopener">Known Issue Rollback</a> system that the software titan has been using for quite some time now.</p>
<p>Full instructions on how to configure a special Group Policy to resolve the glitch are available <a href="https://docs.microsoft.com/en-us/windows/release-health/status-windows-11-21h2#2816msgdesc" target="_blank" rel="noopener">here</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.theredmondcloud.com/safe-mode-bug-in-windows-11-finally-fixed/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MALWARE ALERT – Windows 10 Safe Mode Isn’t Safe</title>
		<link>https://www.theredmondcloud.com/malware-alert-windows-10-safe-mode-isnt-safe</link>
					<comments>https://www.theredmondcloud.com/malware-alert-windows-10-safe-mode-isnt-safe#disqus_thread</comments>
		
		<dc:creator><![CDATA[Anne Reynolds]]></dc:creator>
		<pubDate>Thu, 12 Dec 2019 16:31:29 +0000</pubDate>
				<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[Editor's Picks]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Safe Mode]]></category>
		<category><![CDATA[Sophos]]></category>
		<category><![CDATA[windows 10 security]]></category>
		<guid isPermaLink="false">https://www.theredmondcloud.com/?p=79384</guid>

					<description><![CDATA[A team of researchers found something nasty that forces your Windows 10 C to reboot to Safe Mode and exploits it. Another day, another piece of Windows 10 that is broken. We are fast becoming accustomed to these problems with Windows 10 and this latest threat, found by a team of researchers, is particularly vicious. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>A team of researchers found something nasty that forces your Windows 10 C to reboot to Safe Mode and exploits it.</p>
<p>Another day, another piece of Windows 10 that is broken. We are fast becoming accustomed to these problems with Windows 10 and this latest threat, found by a team of researchers, is particularly vicious.</p>
<p>It’s no secret to anyone that the latest Windows 10 updates have been somewhat controversial. While they provide patches to kill off bugs from previous updates, it seems that all they do is create even more issues and now we have a brand-new problem – updates filled with fake ransomware.</p>
<p>The researchers who identified the latest bug work for <a href="https://news.sophos.com/en-us/2019/12/09/snatch-ransomware-reboots-pcs-into-safe-mode-to-bypass-protection/" target="_blank" rel="noopener">Sophos Labs</a>, one of the top security software companies. They have been constantly monitoring several Windows 10 ransomware threats that target a Safe Mode vulnerability.</p>
<p>They first identified it in mid-October and the malware, named Snatch, forces a computer to reboot to Safe Mode – here, most security software and many other vital programs are disabled.   Sophos says, &#8220;Snatch can run on most common versions of Windows, from 7 through 10, in 32- and 64-bit versions. The malware we&#8217;ve observed isn&#8217;t capable of running on platforms other than Windows. Snatch can run on most common versions of Windows, from 7 through 10, in 32- and 64-bit versions.&#8221;</p>
<p>Once a device has been successfully penetrated by the ransomware, a Bitcoin ransom demand will follow. According to the researcher&#8217;s report, at least 12 demands were made between July and October 2019, with the ransoms valued between $2,900 and $51,000 in Bitcoin.</p>
<p><strong>How to Avoid Getting Caught</strong></p>
<p>First, Sophos is recommending that organizations don’t use remote desktop access if they don’t have the proper protections in place. If needs be a VPN should be used to provide protection to the network.  And it goes without saying that MFA (multi-factor authentication) should be in place too.</p>
<p>As always, common sense goes an awfully long way – avoiding dodgy websites, links in emails, downloading unknown files and so on. Most of the time, your antivirus software will kick up an alert, sometimes even a browser will, but you shouldn’t rely on those to save you.</p>
<p>The same commonsense approach applies to consumer users too.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.theredmondcloud.com/malware-alert-windows-10-safe-mode-isnt-safe/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
