A community where customers and the community can provide feedback to make a better product for everyone! For more details on how we prioritize requests, please see:
Lots of proprietary third-party software can be licensed in many different ways. I would say the most common approaches can be one of four: Pass a license key via parameter Pass a file path to a license file via parameter Copy a license file to so...
Postponed applications fail if > 10 versions pass while postponed
When using the postponed apps feature it is possible that there are more than 10 versions released while an application is actively postponed. When this happens, a new application is created, as it is not able to 'look back' and see that a superse...
Postponed Apps do not consider additional files or folders
When a ConfigMgr application is postponed, and then later processed by the Publisher, it takes no action on configured files and folders. They are not cached in the postponed binary folder, and they are not copied from the source to the destinatio...
OWASP Threat Dragon is a modeling tool used to create threat model diagrams as part of a secure development lifecycle. Threat Dragon follows the values and principles of the threat modeling manifesto. It can be used to record possible threats and ...
The NHS England Diagnostic Tool is designed to provide an easy method for support teams to get information regarding the configuration of a device where smartcards are used to access NHS Spine Services. The tool has been enhanced to self-diagnose ...