for id in $(qm list | awk ‘NR>1 {print $1}’); do
qm shutdown $id
done
for id in $(pct list | awk ‘NR>1 {print $1}’); do
pct shutdown $id
done
for id in $(qm list | awk ‘NR>1 {print $1}’); do
qm shutdown $id
done
for id in $(pct list | awk ‘NR>1 {print $1}’); do
pct shutdown $id
done
1. Stop all Veeam 365 services and the NATS-server service.
2. Delete the contents of the “streams” folder located at “C:\ProgramData\Veeam\Backup365\nats\jetstream\$G\streams”.
3. Start the NATS-server service, then start the Veeam 365 services.
Install-Module Microsoft.Graph -Force
Install-Module Microsoft.Graph.Beta -AllowClobber -Force
# Connect With Hybrid Identity Administrator Account
Connect-MgGraph -scopes “Organization.ReadWrite.All,Directory.ReadWrite.All”
# Verify the current status of the DirSync Type
Get-MgOrganization | Select OnPremisesSyncEnabled
# Store the Tenant ID in a variable named organizationId
$organizationId = (Get-MgOrganization).Id
# Store the False value for the DirSyncEnabled Attribute
$params = @{
onPremisesSyncEnabled = $false
}
# Perform the update
Update-MgOrganization -OrganizationId $organizationId -BodyParameter $params
# Check that the command worked
Get-MgOrganization | Select OnPremisesSyncEnabled
Draining the motherboard power completely.
Shutdown computer.
Press and hold the power button and f6 key for 20 seconds.
Wait 5 seconds.
Start computer.
Get-EventLog -LogName system -Source user32 -Newest 1 | fl *
# Allow the domain (and its subdomains) to contain private
# addresses. local-data statements are allowed to contain private
# addresses too.
private-domain: "mydomain.net"
/etc/unbound/unbound.conf.d/pi-hole.conf
Add-MailboxPermission -Identity -User -AccessRights FullAccess -AutoMapping $false
Turns out, Aptos is Microsoft’s new Default Font in Microsoft 365, and Adobe Acrobat apparently doesn’t know what to do with it.
The fix? Go into the Printer Properties for your Adobe PDF printer, and on the Adobe PDF Settings tab, UNCHECK “Rely on system fonts only; do not use document fonts”.

apt-get install qemu-guest-agent
Go to the compliance portal and sign in using an account that can assign permissions.
In the left pane, select Roles & scopes > Permissions.
On the Permissions page, under Microsoft Purview solutions, select Roles.
On the Role groups for Microsoft Purview solutions page, select eDiscovery Manager.
On the eDiscovery Manager flyout pane, do one of the following based on the eDiscovery permissions that you want to assign.