{"id":374143,"date":"2024-07-23T14:00:00","date_gmt":"2024-07-23T14:40:42","guid":{"rendered":"https:\/\/xentegra.com\/resources\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\/"},"modified":"2026-01-29T10:40:30","modified_gmt":"2026-01-29T15:40:30","slug":"97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os","status":"publish","type":"post","link":"https:\/\/xentegra.com\/hi\/resources\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\/","title":{"rendered":"97: IGEL Weekly: How to recover Blue screened Windows endpoints to IGEL OS"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/www.buzzsprout.com\/1555814\/episodes\/15461255-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os?iframe=true\" scrolling=\"no\" width=\"100%\" height=\"200\" frameborder=\"0\" style=\"width: 100%;height: 200px\"><\/iframe><\/p>\n<p>IGEL helps companies to quickly recover, whenever productive work comes to a halt due to an IT outage.<\/p>\n<p>IGEL offers a secure read-only lightweight Linux Operating System allowing you to convert existing PC\u2019s to IGEL OS or boot from USB (thus not affecting the existing Operating System or data) whilst in a Disaster Recovery situation, allowing users to connect to services such as VDI, DaaS andor WEB and SaaS applications.<\/p>\n<p>In a DR scenario IGEL OS will work without the need for management infrastructure to be setup and configured, simply boot to IGEL OS, download evaluation licenses for 90 days; install any client applications you require to connect to your VDI, DaaS andor WEB and SaaS applications and get your users back up and running FAST.<\/p>\n<p>This may also have the advantage of granting the IT team breathing space whilst they continue to troubleshoot any ongoing outages.<\/p>\n<p>\u0939\u094b\u0938\u094d\u091f: \u090f\u0902\u0921\u0940 \u0935\u094d\u0939\u093e\u0907\u091f\u0938\u093e\u0907\u0921<br \/>Co-host: Chris Feeney<\/p>\n<div class=\"transcript\">\n<p><!--block-->\u0935\u0947\u092c\u0935\u0940\u091f\u0940\u091f\u0940<\/p>\n<p>1<br \/>00:00:02.310 &#8211;&gt; 00:00:28.040<br \/>Andy Whiteside: Hello, everyone! Welcome to Episode 97 of Igel Weekly. I&#8217;m your host for this one, Andy Whiteside, hopefully. Well, not hopefully. I know Barry Brown and his team are doing some of the community versions of this. But this is our more corporate version. Where we talk about the you know the blogs that Igel puts out, and we&#8217;ve got a we&#8217;ve got a very hot topic for today that Chris Feeney, who&#8217;s with me here, is gonna help me cover and we can go super deep, or we can go super wide, or we can do a little above Chris. How&#8217;s it going.<\/p>\n<p>2<br \/>00:00:28.510 &#8211;&gt; 00:00:31.587<br \/>Chris Feeney: Going. Well, Andy, it&#8217;s always a pleasure to get with you, and<\/p>\n<p>3<br \/>00:00:33.000 &#8211;&gt; 00:00:37.210<br \/>Chris Feeney: what a time to be alive. I mean.<\/p>\n<p>4<br \/>00:00:37.840 &#8211;&gt; 00:00:50.910<br \/>Chris Feeney: it&#8217;s an interesting world we live in some of those things we&#8217;ll talk about today. We&#8217;ve been talking about for quite a while, anyway. So it&#8217;s not necessarily new, but it&#8217;s new from a different angle that I don&#8217;t think any of us ever thought<\/p>\n<p>5<br \/>00:00:51.220 &#8211;&gt; 00:00:53.859<br \/>Chris Feeney: would happen. But but yeah.<\/p>\n<p>6<br \/>00:00:53.860 &#8211;&gt; 00:01:21.090<br \/>Andy Whiteside: Well, you know what, Chris, it it happens all the time, and here&#8217;s what I mean. It happens to the common user all day every day. Here&#8217;s the blog is from July 19th is from Andy Prior, I think, must be on on the igl team somewhere or somewhere in the ecosystem, and the title of this blog is, Don&#8217;t use windows unless you have to use windows. Microsoft Windows. Oh, wait a minute. That&#8217;s not the title. The title is how to recover blue screens, windows, endpoints using the Igeos. Chris.<\/p>\n<p>7<br \/>00:01:21.290 &#8211;&gt; 00:01:35.789<br \/>Andy Whiteside: I know we&#8217;re gonna talk about the thing that happened. And we&#8217;re gonna talk about your vacation, and we&#8217;re gonna talk about airline madness associated with the crowd. Strike security patch that went out roughly. 5 or 6 days ago. But Chris, true or false.<\/p>\n<p>8<br \/>00:01:36.200 &#8211;&gt; 00:01:37.260<br \/>Andy Whiteside: for the last<\/p>\n<p>9<br \/>00:01:37.300 &#8211;&gt; 00:01:44.420<br \/>Andy Whiteside: 3 or 4 years, however long you&#8217;ve been at eye. Gel, you have gone to airports and seen blue screens of death at Airport, commonly.<\/p>\n<p>10<br \/>00:01:45.720 &#8211;&gt; 00:01:48.680<br \/>Chris Feeney: Definitely, not every time, but definitely I&#8217;ve seen them. Yes.<\/p>\n<p>11<br \/>00:01:48.680 &#8211;&gt; 00:01:57.379<br \/>Andy Whiteside: So this thing we&#8217;re gonna talk about today has been happening for a long time. And people have just been okay with it until<\/p>\n<p>12<br \/>00:01:57.510 &#8211;&gt; 00:01:59.279<br \/>Andy Whiteside: it happened bad enough<\/p>\n<p>13<br \/>00:01:59.620 &#8211;&gt; 00:02:03.949<br \/>Andy Whiteside: where it&#8217;s now caused issues, and people are upset about it right now.<\/p>\n<p>14<br \/>00:02:05.400 &#8211;&gt; 00:02:07.439<br \/>Andy Whiteside: But they&#8217;ll forget about it in 3 months.<\/p>\n<p>15<br \/>00:02:07.800 &#8211;&gt; 00:02:11.209<br \/>Andy Whiteside: and we&#8217;ll be back to business as usual. Don&#8217;t forget about it in 2 weeks.<\/p>\n<p>16<br \/>00:02:11.270 &#8211;&gt; 00:02:12.850<br \/>Andy Whiteside: Business as usual.<\/p>\n<p>17<br \/>00:02:12.920 &#8211;&gt; 00:02:15.590<br \/>Andy Whiteside: but it&#8217;s going to happen again. It&#8217;s like<\/p>\n<p>18<br \/>00:02:15.610 &#8211;&gt; 00:02:16.810<br \/>Andy Whiteside: pandemics<\/p>\n<p>19<br \/>00:02:17.120 &#8211;&gt; 00:02:29.440<br \/>Andy Whiteside: once in a lifetime, I hope. But viruses are common every every winter all throughout the year, even blue screens of death happen all the time. It&#8217;s just we mitigate the impact hopefully.<\/p>\n<p>20<br \/>00:02:29.710 &#8211;&gt; 00:02:30.889<br \/>Andy Whiteside: This time we did.<\/p>\n<p>21<br \/>00:02:31.470 &#8211;&gt; 00:02:33.859<br \/>Chris Feeney: And well, I learned a thing about how this.<\/p>\n<p>22<br \/>00:02:34.190 &#8211;&gt; 00:02:37.759<br \/>Chris Feeney: how blue screen actually occurs. Research that<\/p>\n<p>23<br \/>00:02:38.341 &#8211;&gt; 00:02:44.649<br \/>Chris Feeney: coming back from vacation as I was seeing it happen, play out, live and and into the weekend. But<\/p>\n<p>24<br \/>00:02:45.020 &#8211;&gt; 00:02:46.070<br \/>Chris Feeney: but yeah.<\/p>\n<p>25<br \/>00:02:46.070 &#8211;&gt; 00:02:49.400<br \/>Andy Whiteside: Tell us about. Tell us about that, because a lot of people see blue screens<\/p>\n<p>26<br \/>00:02:49.570 &#8211;&gt; 00:02:52.909<br \/>Andy Whiteside: and they don&#8217;t associate it with what&#8217;s really happening.<\/p>\n<p>27<br \/>00:02:53.860 &#8211;&gt; 00:02:57.809<br \/>Andy Whiteside: You tell. Tell us what happens when you see a blue screen on a windows computer.<\/p>\n<p>28<br \/>00:02:58.121 &#8211;&gt; 00:03:04.979<br \/>Chris Feeney: So it really kinda understand. It&#8217;s an understanding of how an operating system works. Right? So there are. You know, there&#8217;s<\/p>\n<p>29<br \/>00:03:05.000 &#8211;&gt; 00:03:08.280<br \/>Chris Feeney: OS itself, and then the OS. Has a kernel<\/p>\n<p>30<br \/>00:03:08.390 &#8211;&gt; 00:03:10.890<br \/>Chris Feeney: which interoperates with the hardware.<\/p>\n<p>31<br \/>00:03:11.030 &#8211;&gt; 00:03:20.020<br \/>Chris Feeney: Igel is a Linux OS. We have a kernel that interoperates with the hardware. Then you have 3rd party applications that can run on the OS. And, generally speaking.<\/p>\n<p>32<br \/>00:03:20.110 &#8211;&gt; 00:03:23.850<br \/>Chris Feeney: those 3rd party apps should not have kernel access.<\/p>\n<p>33<br \/>00:03:25.280 &#8211;&gt; 00:03:28.639<br \/>Chris Feeney: and in the case of a blue screen.<\/p>\n<p>34<br \/>00:03:29.278 &#8211;&gt; 00:03:32.320<br \/>Chris Feeney: It&#8217;s windows responding to something<\/p>\n<p>35<br \/>00:03:32.380 &#8211;&gt; 00:03:40.660<br \/>Chris Feeney: that is occurring in a kernel driver or system driver. Those require elevated privileges. And it&#8217;s basically saying.<\/p>\n<p>36<br \/>00:03:40.820 &#8211;&gt; 00:03:47.759<br \/>Chris Feeney: and I, generally speaking, my, my general understanding is it was trying to call a place in memory. Yeah, reserve for this.<\/p>\n<p>37<br \/>00:03:47.940 &#8211;&gt; 00:03:54.020<br \/>Chris Feeney: you know, special privileged area and windows was like Nope, and it does what it does as a protective mechanism.<\/p>\n<p>38<br \/>00:03:54.020 &#8211;&gt; 00:04:01.149<br \/>Andy Whiteside: It&#8217;s the. It&#8217;s the old TV show from the sixties and same seventies. Danger, will Robertson. Danger, Will Robertson? Here&#8217;s a blue screen. Stop<\/p>\n<p>39<br \/>00:04:01.410 &#8211;&gt; 00:04:02.030<br \/>Andy Whiteside: right.<\/p>\n<p>40<br \/>00:04:02.030 &#8211;&gt; 00:04:15.384<br \/>Chris Feeney: And if it&#8217;s if it&#8217;s not a kernel driver, then you basically the the operating system will kill the process cause it doesn&#8217;t have that system. Level kernel driver sort of scenario.<\/p>\n<p>41<br \/>00:04:16.170 &#8211;&gt; 00:04:16.600<br \/>Andy Whiteside: It will.<\/p>\n<p>42<br \/>00:04:16.600 &#8211;&gt; 00:04:17.100<br \/>Chris Feeney: And.<\/p>\n<p>43<br \/>00:04:17.100 &#8211;&gt; 00:04:39.099<br \/>Andy Whiteside: Driver as software, whether it&#8217;s driving hardware, whether it&#8217;s software application running in this cases, maybe maybe secure security related things. And within the operating system, and and hopefully, not in the kernel. The kernel is very important and very protected. The the way I describe a kernel to someone who knows anything about biology. It&#8217;s like the hypothalamus of the human being.<\/p>\n<p>44<br \/>00:04:39.980 &#8211;&gt; 00:04:40.415<br \/>Chris Feeney: Yeah.<\/p>\n<p>45<br \/>00:04:40.970 &#8211;&gt; 00:04:49.020<br \/>Chris Feeney: And if you need to know what that is, go back to 7th grade biology and read up, just do a Google search on hypothalamus. But the point is.<\/p>\n<p>46<br \/>00:04:49.220 &#8211;&gt; 00:04:54.400<br \/>Chris Feeney: the kernel is, I mean, that&#8217;s sort of the foundational piece. That&#8217;s the that&#8217;s the stuff<\/p>\n<p>47<br \/>00:04:55.050 &#8211;&gt; 00:04:57.719<br \/>Chris Feeney: your apple iphone, your your<\/p>\n<p>48<br \/>00:04:57.770 &#8211;&gt; 00:05:04.999<br \/>Chris Feeney: you know Google Android. You know, they all have a kernel, and that interoperates with the hardware that you&#8217;re running on. And that&#8217;s that&#8217;s<\/p>\n<p>49<br \/>00:05:05.180 &#8211;&gt; 00:05:07.070<br \/>Chris Feeney: that&#8217;s just how an OS works.<\/p>\n<p>50<br \/>00:05:07.070 &#8211;&gt; 00:05:09.389<br \/>Andy Whiteside: Hey? Real quick! What is the kernel of windows? 11.<\/p>\n<p>51<br \/>00:05:09.540 &#8211;&gt; 00:05:10.380<br \/>Andy Whiteside: Cold.<\/p>\n<p>52<br \/>00:05:11.120 &#8211;&gt; 00:05:12.033<br \/>Chris Feeney: Oh, man!<\/p>\n<p>53<br \/>00:05:12.490 &#8211;&gt; 00:05:13.080<br \/>Andy Whiteside: Easy.<\/p>\n<p>54<br \/>00:05:13.770 &#8211;&gt; 00:05:17.660<br \/>Andy Whiteside: It&#8217;s it&#8217;s windows in T. It&#8217;s the same thing that&#8217;s been around since the 90 S.<\/p>\n<p>55<br \/>00:05:17.790 &#8211;&gt; 00:05:24.279<br \/>Andy Whiteside: Multi-user kernel windows. Nt versus windows. 95 and windows 98. What was the kernel for that?<\/p>\n<p>56<br \/>00:05:25.950 &#8211;&gt; 00:05:30.519<br \/>Chris Feeney: Oh, it was! Dang it! I know it cause antique was the the<\/p>\n<p>57<br \/>00:05:30.700 &#8211;&gt; 00:05:31.390<br \/>Chris Feeney: that&#8217;s what.<\/p>\n<p>58<br \/>00:05:31.390 &#8211;&gt; 00:05:32.709<br \/>Andy Whiteside: Dogs. It was dogs!<\/p>\n<p>59<br \/>00:05:32.710 &#8211;&gt; 00:05:34.480<br \/>Chris Feeney: Us. You didn&#8217;t miss us. Yeah.<\/p>\n<p>60<br \/>00:05:34.480 &#8211;&gt; 00:05:35.080<br \/>Andy Whiteside: Good.<\/p>\n<p>61<br \/>00:05:35.690 &#8211;&gt; 00:05:36.800<br \/>Chris Feeney: 32 bit<\/p>\n<p>62<br \/>00:05:37.700 &#8211;&gt; 00:05:38.469<br \/>Chris Feeney: didn&#8217;t I mean.<\/p>\n<p>63<br \/>00:05:38.470 &#8211;&gt; 00:05:40.770<br \/>Andy Whiteside: Original. What&#8217;s the original name of the Dallas operating system?<\/p>\n<p>64<br \/>00:05:41.740 &#8211;&gt; 00:05:42.340<br \/>Andy Whiteside: Toss.<\/p>\n<p>65<br \/>00:05:42.340 &#8211;&gt; 00:05:43.469<br \/>Chris Feeney: So s. 2.<\/p>\n<p>66<br \/>00:05:43.470 &#8211;&gt; 00:05:44.430<br \/>Andy Whiteside: No toss.<\/p>\n<p>67<br \/>00:05:44.870 &#8211;&gt; 00:05:45.939<br \/>Chris Feeney: Toss, interesting.<\/p>\n<p>68<br \/>00:05:45.940 &#8211;&gt; 00:05:47.510<br \/>Andy Whiteside: You know T. Stood for.<\/p>\n<p>69<br \/>00:05:47.860 &#8211;&gt; 00:05:48.520<br \/>Chris Feeney: No.<\/p>\n<p>70<br \/>00:05:48.520 &#8211;&gt; 00:05:49.300<br \/>Andy Whiteside: Trash<\/p>\n<p>71<br \/>00:05:49.640 &#8211;&gt; 00:05:51.070<br \/>Andy Whiteside: trash operating system.<\/p>\n<p>72<br \/>00:05:53.250 &#8211;&gt; 00:05:58.170<br \/>Andy Whiteside: long story there, but nonetheless dos which Microsoft got from, I think, Xerox<\/p>\n<p>73<br \/>00:05:58.700 &#8211;&gt; 00:06:00.699<br \/>Andy Whiteside: and helped Ibm with something<\/p>\n<p>74<br \/>00:06:00.910 &#8211;&gt; 00:06:10.100<br \/>Andy Whiteside: anyway. Long story there. But my, the point is the kernel. We gotta protect the kernel. Gotta protect the kernel. Our kernels today in the mainstream are 2. Linux is a kernel<\/p>\n<p>75<br \/>00:06:10.474 &#8211;&gt; 00:06:18.010<br \/>Andy Whiteside: and when and windows Nt. Is a kernel, nt. Is a kernel. Those are the 2 kernels in the x 86 world. Normally.<\/p>\n<p>76<br \/>00:06:18.810 &#8211;&gt; 00:06:19.810<br \/>Chris Feeney: Right? Yeah.<\/p>\n<p>77<br \/>00:06:20.860 &#8211;&gt; 00:06:26.060<br \/>Chris Feeney: So what&#8217;s interesting here is is obviously what was unique about<\/p>\n<p>78<br \/>00:06:26.480 &#8211;&gt; 00:06:29.830<br \/>Chris Feeney: this particular situation with Crowdstrike. And<\/p>\n<p>79<br \/>00:06:30.120 &#8211;&gt; 00:06:35.370<br \/>Chris Feeney: it&#8217;s it&#8217;s obviously a very well known company. Lots of customers<\/p>\n<p>80<br \/>00:06:35.876 &#8211;&gt; 00:06:41.353<br \/>Chris Feeney: protecting a very well entrenched operating system out there in the world.<\/p>\n<p>81<br \/>00:06:41.830 &#8211;&gt; 00:06:44.139<br \/>Chris Feeney: From the things we talk about.<\/p>\n<p>82<br \/>00:06:44.290 &#8211;&gt; 00:06:47.389<br \/>Chris Feeney: lot of these ransomware and what ransomware tries to do. And<\/p>\n<p>83<br \/>00:06:47.440 &#8211;&gt; 00:06:53.490<br \/>Chris Feeney: you know, gain kernel, access or hardware. And so this this particular software has special privileges.<\/p>\n<p>84<br \/>00:06:53.490 &#8211;&gt; 00:06:57.590<br \/>Andy Whiteside: Can we talk about that super quick? Because you kind of you&#8217;re gonna want to cover here.<\/p>\n<p>85<br \/>00:06:57.690 &#8211;&gt; 00:07:08.140<br \/>Andy Whiteside: Windows is my favorite operating system. Microsoft windows is my favorite operating system. It&#8217;s what I built my career on. It&#8217;s super super<\/p>\n<p>86<br \/>00:07:08.380 &#8211;&gt; 00:07:09.939<br \/>Andy Whiteside: by default.<\/p>\n<p>87<br \/>00:07:10.130 &#8211;&gt; 00:07:14.400<br \/>Andy Whiteside: coded to be unbelievably malleable and powerful.<\/p>\n<p>88<br \/>00:07:15.480 &#8211;&gt; 00:07:18.559<br \/>Andy Whiteside: which is what allows it to do so many great things.<\/p>\n<p>89<br \/>00:07:19.130 &#8211;&gt; 00:07:23.780<br \/>Andy Whiteside: It&#8217;s also what allows so many people to do me so many bad things.<\/p>\n<p>90<br \/>00:07:24.930 &#8211;&gt; 00:07:27.160<br \/>Chris Feeney: Oh, yeah, yeah, absolutely. Yeah.<\/p>\n<p>91<br \/>00:07:28.924 &#8211;&gt; 00:07:31.529<br \/>Chris Feeney: And we&#8217;ve talked about this before.<\/p>\n<p>92<br \/>00:07:31.910 &#8211;&gt; 00:07:32.970<br \/>Chris Feeney: you know.<\/p>\n<p>93<br \/>00:07:33.000 &#8211;&gt; 00:07:41.749<br \/>Chris Feeney: Well, I I went on, Igel&#8217;s been doing OS stuff for 20. Some odd years Linux has been around for just over 30. So<\/p>\n<p>94<br \/>00:07:42.622 &#8211;&gt; 00:07:44.640<br \/>Chris Feeney: but it was<\/p>\n<p>95<br \/>00:07:45.150 &#8211;&gt; 00:07:47.159<br \/>Chris Feeney: design from the ground up<\/p>\n<p>96<br \/>00:07:47.360 &#8211;&gt; 00:08:00.269<br \/>Chris Feeney: from a security perspective to a minimalist approach and a read only scenario that you could manage the devices as well from a from a scaling perspective. So just a a different approach to<\/p>\n<p>97<br \/>00:08:00.380 &#8211;&gt; 00:08:01.600<br \/>Chris Feeney: an OS.<\/p>\n<p>98<br \/>00:08:02.436 &#8211;&gt; 00:08:03.410<br \/>Chris Feeney: That was<\/p>\n<p>99<br \/>00:08:03.460 &#8211;&gt; 00:08:07.560<br \/>Chris Feeney: built for a specific purpose, you know. Accessing remote<\/p>\n<p>100<br \/>00:08:08.289 &#8211;&gt; 00:08:08.939<br \/>Chris Feeney: S.<\/p>\n<p>101<br \/>00:08:08.950 &#8211;&gt; 00:08:16.090<br \/>Chris Feeney: Or not necessarily remote all the time. But even even terminal emulators, you know, could be fine, whatever. But<\/p>\n<p>102<br \/>00:08:16.797 &#8211;&gt; 00:08:17.972<br \/>Chris Feeney: but yeah,<\/p>\n<p>103<br \/>00:08:19.130 &#8211;&gt; 00:08:24.880<br \/>Chris Feeney: But in this specific situation you&#8217;ve got a very powerful piece of software designed to protect<\/p>\n<p>104<br \/>00:08:24.900 &#8211;&gt; 00:08:26.799<br \/>Chris Feeney: that had a<\/p>\n<p>105<br \/>00:08:26.820 &#8211;&gt; 00:08:36.620<br \/>Chris Feeney: regular update. On that you have many updates over time. And this one particular caused an issue that unfortunately affected millions of machines.<\/p>\n<p>106<br \/>00:08:36.620 &#8211;&gt; 00:08:36.950<br \/>\u090f\u0902\u0921\u0940 \u0935\u094d\u0939\u093e\u0907\u091f\u0938\u093e\u0907\u0921: \u0924\u094b.<\/p>\n<p>107<br \/>00:08:36.950 &#8211;&gt; 00:08:37.520<br \/>Chris Feeney: Chris.<\/p>\n<p>108<br \/>00:08:37.520 &#8211;&gt; 00:08:57.979<br \/>Andy Whiteside: I wanna get back to the let&#8217;s run windows where you need to run windows and everywhere else. You don&#8217;t need to run it. Don&#8217;t run it conversation. But I do. Wanna ask you a question because cause I don&#8217;t know the answer. This, I keep meaning to listen to podcasts and try to read up on this, and I don&#8217;t know if it&#8217;s public knowledge yet. But what went wrong this time did was was there no change control? Was there no testing? Was there? You know, rogue<\/p>\n<p>109<br \/>00:08:57.980 &#8211;&gt; 00:09:08.129<br \/>Andy Whiteside: person that calls this. Do you know what the issue was here? Cause look, cross strikes a big boy company they&#8217;ve got, you know, mitigations in place to prevent this from happening. What? What went wrong.<\/p>\n<p>110<br \/>00:09:09.000 &#8211;&gt; 00:09:15.420<br \/>Chris Feeney: I haven&#8217;t seen anything. I mean, maybe something&#8217;s come out since the weekend. I haven&#8217;t seen anything yet.<\/p>\n<p>111<br \/>00:09:16.028 &#8211;&gt; 00:09:18.520<br \/>Chris Feeney: I mean, so I can&#8217;t<\/p>\n<p>112<br \/>00:09:18.580 &#8211;&gt; 00:09:25.349<br \/>Chris Feeney: definitively answer that question. It would seem that something in the Qa. Process got missed, or whatever<\/p>\n<p>113<br \/>00:09:25.746 &#8211;&gt; 00:09:34.289<br \/>Chris Feeney: somehow, where this would have been caught early before it got out the door. That would be the general operating theory, in my opinion, but I I can&#8217;t say for sure exactly.<\/p>\n<p>114<br \/>00:09:34.710 &#8211;&gt; 00:09:35.920<br \/>Chris Feeney: I&#8217;m sure.<\/p>\n<p>115<br \/>00:09:36.189 &#8211;&gt; 00:09:38.349<br \/>Andy Whiteside: You hope they have some kind of canary<\/p>\n<p>116<br \/>00:09:38.450 &#8211;&gt; 00:09:43.000<br \/>Andy Whiteside: concept where they they rolled it out to a portion of the environment.<\/p>\n<p>117<br \/>00:09:43.030 &#8211;&gt; 00:09:52.430<br \/>Andy Whiteside: and they didn&#8217;t try to roll it, and not the whole thing, and they didn&#8217;t try to roll it out to everybody, but it feels like they roll it out to everybody like somebody told somebody, hey? I don&#8217;t know. Just hit the button.<\/p>\n<p>118<br \/>00:09:53.320 &#8211;&gt; 00:09:58.109<br \/>Chris Feeney: Yeah. And I again, I I was trying to catch up on what happened. I just don&#8217;t know exactly<\/p>\n<p>119<br \/>00:09:58.990 &#8211;&gt; 00:09:59.800<br \/>Chris Feeney: what<\/p>\n<p>120<br \/>00:09:59.920 &#8211;&gt; 00:10:03.350<br \/>Chris Feeney: what happened in this particular scenario<\/p>\n<p>121<br \/>00:10:03.961 &#8211;&gt; 00:10:09.310<br \/>Chris Feeney: other than the update got out and caused the obviously a large impact<\/p>\n<p>122<br \/>00:10:09.370 &#8211;&gt; 00:10:11.150<br \/>Chris Feeney: that is still being felt.<\/p>\n<p>123<br \/>00:10:12.530 &#8211;&gt; 00:10:13.390<br \/>Chris Feeney: but.<\/p>\n<p>124<br \/>00:10:13.390 &#8211;&gt; 00:10:26.849<br \/>Andy Whiteside: Let&#8217;s try to revisit that on a future. Podcast. Once we know cause. I I want people to know what you know, how not to do this. I mean, this happens every day with inside corporations. It just doesn&#8217;t make the news because it doesn&#8217;t have as big a impact.<\/p>\n<p>125<br \/>00:10:28.680 &#8211;&gt; 00:10:30.157<br \/>Chris Feeney: Yeah, no doubt.<\/p>\n<p>126<br \/>00:10:31.140 &#8211;&gt; 00:10:41.810<br \/>Chris Feeney: So today&#8217;s topic is is really on this blog, you know, if you find yourself in a situation where the operating system. In this case, running windows.<\/p>\n<p>127<br \/>00:10:42.150 &#8211;&gt; 00:10:46.360<br \/>Chris Feeney: you have a B side, and and you somehow can&#8217;t get out of this.<\/p>\n<p>128<br \/>00:10:46.480 &#8211;&gt; 00:10:48.960<br \/>Chris Feeney: What they refer to as a boot loop essentially.<\/p>\n<p>129<br \/>00:10:49.260 &#8211;&gt; 00:10:53.040<br \/>Chris Feeney: You go to boot and bam. You hit the B side and you can&#8217;t get out of it.<\/p>\n<p>130<br \/>00:10:53.830 &#8211;&gt; 00:10:55.230<br \/>Chris Feeney: Well, the<\/p>\n<p>131<br \/>00:10:55.689 &#8211;&gt; 00:11:17.089<br \/>Chris Feeney: options that we kinda highlight are not for those that have listened to the podcast and no. I gel, it&#8217;s not something that we&#8217;re necessarily brand new with a solution the Ud pocket is certainly a a very it&#8217;s built for bypassing the local hard drive on the machine, and and then just booting to it. Now, obviously, too.<\/p>\n<p>132<br \/>00:11:17.530 &#8211;&gt; 00:11:22.890<br \/>Chris Feeney: get to that. You have to be able to allow booting to USB, so that would require<\/p>\n<p>133<br \/>00:11:23.680 &#8211;&gt; 00:11:27.249<br \/>Chris Feeney: getting into what is called the ufe or<\/p>\n<p>134<br \/>00:11:27.846 &#8211;&gt; 00:11:30.330<br \/>Chris Feeney: other people know as bios.<\/p>\n<p>135<br \/>00:11:30.600 &#8211;&gt; 00:11:32.730<br \/>Chris Feeney: and so you may require some<\/p>\n<p>136<br \/>00:11:33.181 &#8211;&gt; 00:11:41.620<br \/>Chris Feeney: depending on your hardware. HP, Lenovo, lg, whatever they all different sort of how to get into the bios or the boot menu, and then you can pick<\/p>\n<p>137<br \/>00:11:41.670 &#8211;&gt; 00:11:42.870<br \/>Chris Feeney: an alternate<\/p>\n<p>138<br \/>00:11:43.160 &#8211;&gt; 00:11:46.650<br \/>Chris Feeney: option to boot from. So that&#8217;s<\/p>\n<p>139<br \/>00:11:47.066 &#8211;&gt; 00:11:52.050<br \/>Chris Feeney: probably the easiest way to get get to that. But there are some caveats.<\/p>\n<p>140<br \/>00:11:52.300 &#8211;&gt; 00:11:53.849<br \/>Andy Whiteside: Chris, what does Bio stand for.<\/p>\n<p>141<br \/>00:11:55.070 &#8211;&gt; 00:11:56.310<br \/>Chris Feeney: Oh, man&#8217;s.<\/p>\n<p>142<br \/>00:11:56.630 &#8211;&gt; 00:11:57.310<br \/>Andy Whiteside: Base basic.<\/p>\n<p>143<br \/>00:11:57.310 &#8211;&gt; 00:12:00.690<br \/>Chris Feeney: Basic interrupt. Damn it! Sorry.<\/p>\n<p>144<br \/>00:12:00.690 &#8211;&gt; 00:12:05.296<br \/>Andy Whiteside: I think it&#8217;s basic input operating system or basic operating system.<\/p>\n<p>145<br \/>00:12:05.680 &#8211;&gt; 00:12:06.090<br \/>Chris Feeney: And on.<\/p>\n<p>146<br \/>00:12:06.090 &#8211;&gt; 00:12:08.190<br \/>Andy Whiteside: It&#8217;s machine code to get you<\/p>\n<p>147<br \/>00:12:08.300 &#8211;&gt; 00:12:12.149<br \/>Andy Whiteside: to the boot files of the operating system so that the kernel can take over.<\/p>\n<p>148<br \/>00:12:12.680 &#8211;&gt; 00:12:13.420<br \/>Andy Whiteside: Try it.<\/p>\n<p>149<br \/>00:12:13.630 &#8211;&gt; 00:12:16.469<br \/>Andy Whiteside: And what you&#8217;re talking about. The Bios configuration screens.<\/p>\n<p>150<br \/>00:12:17.050 &#8211;&gt; 00:12:20.606<br \/>Chris Feeney: Right. So I&#8217;ve got a laptop here on my left that<\/p>\n<p>151<br \/>00:12:20.960 &#8211;&gt; 00:12:23.040<br \/>Chris Feeney: I&#8217;ve got 2 different laptops, one<\/p>\n<p>152<br \/>00:12:23.909 &#8211;&gt; 00:12:28.940<br \/>Chris Feeney: I can boot directly to USB, because I&#8217;ve got it set to to do that in the in the boot order.<\/p>\n<p>153<br \/>00:12:29.459 &#8211;&gt; 00:12:35.160<br \/>Chris Feeney: The other one. I don&#8217;t. It boots directly to the hard drive. But if I want to boot to USB, I just kind of go and<\/p>\n<p>154<br \/>00:12:35.630 &#8211;&gt; 00:12:43.030<br \/>Chris Feeney: yeah hit the escape key, or or whatever F. 10. And then I get the boot menu, and I can choose to boot to a Ud pocket. So.<\/p>\n<p>155<br \/>00:12:43.460 &#8211;&gt; 00:12:48.219<br \/>Chris Feeney: But you can change that if you have bios access, and you can<\/p>\n<p>156<br \/>00:12:48.250 &#8211;&gt; 00:12:50.560<br \/>Chris Feeney: do that. So that&#8217;s 1 way you can kind of<\/p>\n<p>157<br \/>00:12:50.610 &#8211;&gt; 00:12:57.310<br \/>Chris Feeney: recover, at least get a machine operational, and then you can come back in this particular situation. The the fix<\/p>\n<p>158<br \/>00:12:57.750 &#8211;&gt; 00:12:59.590<br \/>Chris Feeney: for Bsad might be.<\/p>\n<p>159<br \/>00:13:00.070 &#8211;&gt; 00:13:06.440<br \/>Chris Feeney: you know, very specific, or who knows? It might need to be reimaged or something. But.<\/p>\n<p>160<br \/>00:13:08.010 &#8211;&gt; 00:13:14.320<br \/>Andy Whiteside: Yeah, I&#8217;m I&#8217;m curious. Maybe you know, what what did they do to fix this? Because you&#8217;re in a you&#8217;re in a situation where you can&#8217;t<\/p>\n<p>161<br \/>00:13:14.480 &#8211;&gt; 00:13:18.520<br \/>Andy Whiteside: boot. So therefore you can&#8217;t phone home. Did they have to?<\/p>\n<p>162<br \/>00:13:18.830 &#8211;&gt; 00:13:20.630<br \/>Andy Whiteside: How did they get the software patch<\/p>\n<p>163<br \/>00:13:20.920 &#8211;&gt; 00:13:26.280<br \/>Andy Whiteside: out to fix the problem? If you couldn&#8217;t actually start the car and drive it to the dealership.<\/p>\n<p>164<br \/>00:13:27.500 &#8211;&gt; 00:13:37.790<br \/>Chris Feeney: Oh, I my general understanding is in the case of of cross strike. Is that the fix is to remove what was put on there that&#8217;s causing the blue screen of death.<\/p>\n<p>165<br \/>00:13:38.396 &#8211;&gt; 00:13:41.659<br \/>Chris Feeney: But to do that you have to be able to get<\/p>\n<p>166<br \/>00:13:41.930 &#8211;&gt; 00:13:45.110<br \/>Chris Feeney: to what&#8217;s called safe mode or recovery mode<\/p>\n<p>167<br \/>00:13:45.729 &#8211;&gt; 00:13:59.979<br \/>Chris Feeney: command line essentially, and then go through and follow some instructions. But one of the other challenges that people are seeing is that if you have the bitlocker disk encryption puts. Then you have to know the bit locker key.<\/p>\n<p>168<br \/>00:14:01.050 &#8211;&gt; 00:14:04.629<br \/>Chris Feeney: And that could be different, for every machine.<\/p>\n<p>169<br \/>00:14:04.840 &#8211;&gt; 00:14:08.220<br \/>Chris Feeney: which would probably be the right best practice.<\/p>\n<p>170<br \/>00:14:08.240 &#8211;&gt; 00:14:12.569<br \/>Chris Feeney: or some corporations may have the same Bitlocker key for all their machines.<\/p>\n<p>171<br \/>00:14:12.990 &#8211;&gt; 00:14:14.720<br \/>Chris Feeney: For convenience sake<\/p>\n<p>172<br \/>00:14:14.900 &#8211;&gt; 00:14:16.210<br \/>Chris Feeney: it all depends.<\/p>\n<p>173<br \/>00:14:16.490 &#8211;&gt; 00:14:19.447<br \/>Chris Feeney: but that can throw wrinkle in it.<\/p>\n<p>174<br \/>00:14:20.130 &#8211;&gt; 00:14:23.769<br \/>Andy Whiteside: Of these machines were virtual, and they could be snapshoted back before the patch.<\/p>\n<p>175<br \/>00:14:24.370 &#8211;&gt; 00:14:37.206<br \/>Chris Feeney: Read some stuff. And certainly I know Scott. Manchester. Put out a note about Cloud, PC. And and going back and rolling back to a a snapshot, so that certainly is an approach where that could that could definitely occur.<\/p>\n<p>176<br \/>00:14:37.824 &#8211;&gt; 00:14:44.839<br \/>Andy Whiteside: Did he also put something in about? You know, non persistent vms and just rebooting them back to where they started.<\/p>\n<p>177<br \/>00:14:45.450 &#8211;&gt; 00:14:54.072<br \/>Chris Feeney: I didn&#8217;t read that necessarily. There may be others that have chimed in but certainly, you know, this kind of goes back to the persistent non persistence.<\/p>\n<p>178<br \/>00:14:54.370 &#8211;&gt; 00:15:01.690<br \/>Andy Whiteside: Yeah, what? What I&#8217;m getting at that response. Chris, is windows 365 is not the answer to everything. If you know the truth.<\/p>\n<p>179<br \/>00:15:01.710 &#8211;&gt; 00:15:06.049<br \/>Andy Whiteside: If you don&#8217;t know the truth, people can make you feel like it&#8217;s the answer to every problem.<\/p>\n<p>180<br \/>00:15:07.560 &#8211;&gt; 00:15:08.500<br \/>Chris Feeney: Yeah. Well.<\/p>\n<p>181<br \/>00:15:08.610 &#8211;&gt; 00:15:09.770<br \/>Chris Feeney: a different<\/p>\n<p>182<br \/>00:15:10.390 &#8211;&gt; 00:15:14.070<br \/>Chris Feeney: product in the cloud for Microsoft than Abd<\/p>\n<p>183<br \/>00:15:14.560 &#8211;&gt; 00:15:17.079<br \/>Chris Feeney: everything has its pros and cons.<\/p>\n<p>184<br \/>00:15:17.080 &#8211;&gt; 00:15:19.829<br \/>Andy Whiteside: My my answer to this problem is not more, Microsoft.<\/p>\n<p>185<br \/>00:15:21.830 &#8211;&gt; 00:15:23.370<br \/>Andy Whiteside: certainly not on the endpoint. That&#8217;s.<\/p>\n<p>186<br \/>00:15:23.370 &#8211;&gt; 00:15:25.390<br \/>Chris Feeney: What is your answer, Andy?<\/p>\n<p>187<br \/>00:15:25.390 &#8211;&gt; 00:15:28.879<br \/>Andy Whiteside: My answer is, don&#8217;t get in a don&#8217;t drive your car to meet the Uber.<\/p>\n<p>188<br \/>00:15:30.630 &#8211;&gt; 00:15:32.715<br \/>Chris Feeney: You&#8217;ve used that analogy before.<\/p>\n<p>189<br \/>00:15:33.550 &#8211;&gt; 00:15:39.570<br \/>Andy Whiteside: Take a bike down the street or walk, but don&#8217;t. Don&#8217;t get in your car to go meet Uber, or don&#8217;t take an uber to meet an Uber.<\/p>\n<p>190<br \/>00:15:40.700 &#8211;&gt; 00:15:44.470<br \/>Chris Feeney: Yeah, that would seem very interesting. And we&#8217;ve talked about it before. I mean.<\/p>\n<p>191<br \/>00:15:46.583 &#8211;&gt; 00:15:56.140<br \/>Chris Feeney: but yeah, so the the options that are laid out here in a Dr. Scenario, which is obviously what you&#8217;re dealing with globally and and many cases<\/p>\n<p>192<br \/>00:15:56.778 &#8211;&gt; 00:16:01.439<br \/>Chris Feeney: agile certainly has the ability to try to boot to our ud pocket.<\/p>\n<p>193<br \/>00:16:03.000 &#8211;&gt; 00:16:10.550<br \/>Chris Feeney: and the other option is highlighted. There is kind of booting and actually installing Igel on the device<\/p>\n<p>194<br \/>00:16:10.560 &#8211;&gt; 00:16:12.619<br \/>Chris Feeney: which would in theory<\/p>\n<p>195<br \/>00:16:12.830 &#8211;&gt; 00:16:16.930<br \/>Chris Feeney: blow away the operating system on the device.<\/p>\n<p>196<br \/>00:16:17.566 &#8211;&gt; 00:16:22.570<br \/>Chris Feeney: Or I think actually, now I read it more. He&#8217;s referring to<\/p>\n<p>197<br \/>00:16:24.060 &#8211;&gt; 00:16:30.319<br \/>Chris Feeney: booting to the OS Creator to then install the OS on a second USB. Stick<\/p>\n<p>198<br \/>00:16:32.140 &#8211;&gt; 00:16:34.719<br \/>Chris Feeney: kind of like a ud pocket. Now.<\/p>\n<p>199<br \/>00:16:35.120 &#8211;&gt; 00:16:38.850<br \/>Chris Feeney: that would be an extreme sort of scenario in the sense that<\/p>\n<p>200<br \/>00:16:38.940 &#8211;&gt; 00:16:51.349<br \/>Chris Feeney: if it&#8217;s not a Ud pocket, an actual unique pocket has a serial, lies number on it. That that is is very specific to be able to unplug that device and plug it into other ones.<\/p>\n<p>201<br \/>00:16:51.990 &#8211;&gt; 00:17:00.110<br \/>Chris Feeney: Creating a Ud pocket on a separate USB stick could be done. But it&#8217;s it&#8217;s only going to be isolated to that, to the 1st machine that boots up.<\/p>\n<p>202<br \/>00:17:00.450 &#8211;&gt; 00:17:04.109<br \/>Chris Feeney: And that&#8217;s it. Yeah, it&#8217;s not portable. So<\/p>\n<p>203<br \/>00:17:04.290 &#8211;&gt; 00:17:11.480<br \/>Chris Feeney: but if you&#8217;re in a tight spot, that may be your only option until you can get the original hard drive fixed, or whatever.<\/p>\n<p>204<br \/>00:17:11.480 &#8211;&gt; 00:17:13.280<br \/>Andy Whiteside: Well, let me let me say what you just said differently.<\/p>\n<p>205<br \/>00:17:13.410 &#8211;&gt; 00:17:17.850<br \/>Andy Whiteside: OS Creator, create another USB drive great! Get a ud pocket<\/p>\n<p>206<br \/>00:17:17.890 &#8211;&gt; 00:17:21.040<br \/>Andy Whiteside: that&#8217;ll get you through this gap, this space and time.<\/p>\n<p>207<br \/>00:17:21.069 &#8211;&gt; 00:17:27.790<br \/>Andy Whiteside: then come up with a strategy on how you&#8217;re going to mitigate windows, Microsoft windows which I love.<\/p>\n<p>208<br \/>00:17:28.220 &#8211;&gt; 00:17:29.869<br \/>Andy Whiteside: You&#8217;re going to mitigate it<\/p>\n<p>209<br \/>00:17:30.080 &#8211;&gt; 00:17:33.119<br \/>Andy Whiteside: where it needs to be mitigated, and use it where it needs to be used.<\/p>\n<p>210<br \/>00:17:34.990 &#8211;&gt; 00:17:38.800<br \/>Chris Feeney: Definitely. We&#8217;ve talked many times over about just endpoint strategy<\/p>\n<p>211<br \/>00:17:38.990 &#8211;&gt; 00:17:42.190<br \/>Chris Feeney: and pros and cons of<\/p>\n<p>212<br \/>00:17:44.930 &#8211;&gt; 00:17:47.259<br \/>Chris Feeney: using igl, sometimes you just<\/p>\n<p>213<br \/>00:17:47.340 &#8211;&gt; 00:17:55.979<br \/>Chris Feeney: you. You seen a browser. Sometimes you need a browser and a a desktop of sorts, a virtual desktop but from a.<\/p>\n<p>214<br \/>00:17:55.980 &#8211;&gt; 00:18:00.640<br \/>Andy Whiteside: In my dream world. You&#8217;ve got a a resilient platform like a nutanix<\/p>\n<p>215<br \/>00:18:01.146 &#8211;&gt; 00:18:29.679<br \/>Andy Whiteside: with windows vms on it desktops and app servers that boot back to a gold image that presents, not delivers, but presents it down to a Linux based endpoint and and all that is a read only read, only read only operating systems all the way up through that. And, Chris, the only thing you would need at that point is limited rights for the end users that are using the system. And some type of lightweight antivirus.<\/p>\n<p>216<br \/>00:18:29.710 &#8211;&gt; 00:18:35.690<br \/>Andy Whiteside: malware detecting software is all you would need in that scenario versus<\/p>\n<p>217<br \/>00:18:35.910 &#8211;&gt; 00:18:38.679<br \/>Andy Whiteside: a big, massive product like restaurant<\/p>\n<p>218<br \/>00:18:39.370 &#8211;&gt; 00:18:40.040<br \/>Andy Whiteside: boot.<\/p>\n<p>219<br \/>00:18:40.240 &#8211;&gt; 00:18:40.870<br \/>Chris Feeney: Yeah.<\/p>\n<p>220<br \/>00:18:43.020 &#8211;&gt; 00:18:44.890<br \/>Chris Feeney: that&#8217;s all it takes. But yeah.<\/p>\n<p>221<br \/>00:18:44.890 &#8211;&gt; 00:18:51.819<br \/>Andy Whiteside: People default to installing big, heavy, bloated, amazingly capable windows on everything.<\/p>\n<p>222<br \/>00:18:52.200 &#8211;&gt; 00:18:57.760<br \/>Andy Whiteside: because it&#8217;s the path of least resistance. And it&#8217;s the easiest thing to do, because it&#8217;s what you&#8217;ve always done.<\/p>\n<p>223<br \/>00:18:58.460 &#8211;&gt; 00:19:01.340<br \/>Andy Whiteside: But someday we&#8217;re gonna figure out<\/p>\n<p>224<br \/>00:19:01.500 &#8211;&gt; 00:19:03.350<br \/>Andy Whiteside: that we can&#8217;t keep doing that<\/p>\n<p>225<br \/>00:19:04.170 &#8211;&gt; 00:19:07.939<br \/>Andy Whiteside: because there&#8217;s too many bad actors out there, or too many incompetent<\/p>\n<p>226<br \/>00:19:08.570 &#8211;&gt; 00:19:09.969<br \/>Andy Whiteside: technology companies that have.<\/p>\n<p>227<br \/>00:19:10.356 &#8211;&gt; 00:19:11.130<br \/>Chris Feeney: Have access?<\/p>\n<p>228<br \/>00:19:11.900 &#8211;&gt; 00:19:12.520<br \/>Andy Whiteside: Here.<\/p>\n<p>229<br \/>00:19:12.890 &#8211;&gt; 00:19:13.570<br \/>Chris Feeney: Yeah.<\/p>\n<p>230<br \/>00:19:14.220 &#8211;&gt; 00:19:15.530<br \/>Chris Feeney: I will say.<\/p>\n<p>231<br \/>00:19:16.543 &#8211;&gt; 00:19:18.490<br \/>Chris Feeney: Justin, we<\/p>\n<p>232<br \/>00:19:18.810 &#8211;&gt; 00:19:25.540<br \/>Chris Feeney: to the folks that are dealing with on the front lines, I mean, I I know our our thoughts go with you, I mean is not easy.<\/p>\n<p>233<br \/>00:19:25.800 &#8211;&gt; 00:19:29.719<br \/>Chris Feeney: Given the instructions that that are there to try to recover.<\/p>\n<p>234<br \/>00:19:29.770 &#8211;&gt; 00:19:31.219<br \/>Chris Feeney: There&#8217;s there&#8217;s<\/p>\n<p>235<br \/>00:19:31.970 &#8211;&gt; 00:19:36.689<br \/>Chris Feeney: I I&#8217;ve seen some details about maybe how to automate some stuff. We&#8217;re talking about physical endpoints.<\/p>\n<p>236<br \/>00:19:37.610 &#8211;&gt; 00:19:41.040<br \/>Andy Whiteside: But but, Chris, I&#8217;m gonna pull an Andy on you.<\/p>\n<p>237<br \/>00:19:41.420 &#8211;&gt; 00:19:44.650<br \/>Andy Whiteside: Those are the same people that are protecting that turf and won&#8217;t<\/p>\n<p>238<br \/>00:19:44.670 &#8211;&gt; 00:19:47.239<br \/>Andy Whiteside: work with their companies to find smarter, better ways.<\/p>\n<p>239<br \/>00:19:48.100 &#8211;&gt; 00:19:51.500<br \/>Chris Feeney: That could be very true. I know you&#8217;ve dealt with it personally. So<\/p>\n<p>240<br \/>00:19:53.590 &#8211;&gt; 00:19:54.430<br \/>Chris Feeney: yeah.<\/p>\n<p>241<br \/>00:19:54.600 &#8211;&gt; 00:19:55.540<br \/>Chris Feeney: so.<\/p>\n<p>242<br \/>00:19:56.060 &#8211;&gt; 00:19:57.079<br \/>Chris Feeney: And they&#8217;re there.<\/p>\n<p>243<br \/>00:19:57.080 &#8211;&gt; 00:20:00.510<br \/>Andy Whiteside: Historically, there have been reasons why, from a user experience.<\/p>\n<p>244<br \/>00:20:00.520 &#8211;&gt; 00:20:02.159<br \/>Andy Whiteside: But for the most part<\/p>\n<p>245<br \/>00:20:02.360 &#8211;&gt; 00:20:03.849<br \/>Andy Whiteside: those things are gone.<\/p>\n<p>246<br \/>00:20:04.340 &#8211;&gt; 00:20:10.420<br \/>Andy Whiteside: And you really can have a good user experience, if not great user experience and mitigate windows on the endpoint.<\/p>\n<p>247<br \/>00:20:11.860 &#8211;&gt; 00:20:14.030<br \/>Chris Feeney: Yeah. And I think that&#8217;s a, we&#8217;ve talked about this.<\/p>\n<p>248<br \/>00:20:14.670 &#8211;&gt; 00:20:23.999<br \/>Chris Feeney: We&#8217;ve now on podcast. 97, I guarantee you, we&#8217;ve had this same topic conversation about user experience, running Linux on IGO Linux on the endpoint<\/p>\n<p>249<br \/>00:20:25.110 &#8211;&gt; 00:20:33.170<br \/>Chris Feeney: in 50 of those episodes easily. And so this is not necessarily a new topic for us. But it&#8217;s really<\/p>\n<p>250<br \/>00:20:33.320 &#8211;&gt; 00:20:34.130<br \/>Chris Feeney: just.<\/p>\n<p>251<br \/>00:20:34.680 &#8211;&gt; 00:20:37.909<br \/>Chris Feeney: you know, the the understanding. What&#8217;s possible.<\/p>\n<p>252<br \/>00:20:38.443 &#8211;&gt; 00:20:43.650<br \/>Chris Feeney: And what user experience, you know, can be, can I mean just<\/p>\n<p>253<br \/>00:20:43.970 &#8211;&gt; 00:20:45.790<br \/>Chris Feeney: for me? I&#8217;ve tried to.<\/p>\n<p>254<br \/>00:20:46.060 &#8211;&gt; 00:20:50.810<br \/>Chris Feeney: you know. Let me like that I&#8217;ve talked about before we presented at one of your<\/p>\n<p>255<br \/>00:20:51.160 &#8211;&gt; 00:20:57.100<br \/>Chris Feeney: kickoffs a couple years ago, and I made I wanted to make sure I did it from my agile device, and<\/p>\n<p>256<br \/>00:20:57.430 &#8211;&gt; 00:21:06.089<br \/>Chris Feeney: I just used the edge browser and logged into the browser and pulled up teams and just used that to present everything from the browser, and it worked flawlessly.<\/p>\n<p>257<br \/>00:21:06.150 &#8211;&gt; 00:21:07.179<br \/>Chris Feeney: Yeah, so<\/p>\n<p>258<br \/>00:21:07.530 &#8211;&gt; 00:21:09.340<br \/>Chris Feeney: and there.<\/p>\n<p>259<br \/>00:21:09.750 &#8211;&gt; 00:21:12.700<br \/>Chris Feeney: excellent. It was a great user experience, generally speaking.<\/p>\n<p>260<br \/>00:21:13.295 &#8211;&gt; 00:21:16.030<br \/>Chris Feeney: No, no hiccups. So it doesn&#8217;t.<\/p>\n<p>261<br \/>00:21:17.040 &#8211;&gt; 00:21:21.150<br \/>Chris Feeney: That&#8217;s, I think people understand, need to understand. And that&#8217;s what.<\/p>\n<p>262<br \/>00:21:21.150 &#8211;&gt; 00:21:33.619<br \/>Andy Whiteside: That was, that was a little bit of an extreme use case for that person that sits down at their desk, either at the Home Office, the remote office or in the headquarters every day. It&#8217;s not an extreme use case anymore. It can just work.<\/p>\n<p>263<br \/>00:21:34.510 &#8211;&gt; 00:21:35.430<br \/>Chris Feeney: Absolutely.<\/p>\n<p>264<br \/>00:21:35.880 &#8211;&gt; 00:21:36.720<br \/>Chris Feeney: so.<\/p>\n<p>265<br \/>00:21:38.810 &#8211;&gt; 00:21:42.879<br \/>Andy Whiteside: So, Chris, I think we&#8217;ve covered it here. I&#8217;ve you know, said my piece. You said your piece.<\/p>\n<p>266<br \/>00:21:43.430 &#8211;&gt; 00:21:48.339<br \/>Andy Whiteside: i i i just want the world to know that it&#8217;s it&#8217;s it&#8217;s okay to run windows on servers.<\/p>\n<p>267<br \/>00:21:49.261 &#8211;&gt; 00:22:15.949<br \/>Andy Whiteside: Ideally, you&#8217;re running server core and not full blown windows that would get rid of a lot of security risk right there run windows on endpoints makes sense when it&#8217;s the right use case. I&#8217;m I&#8217;ve got 1, 2, 3 laptops running windows around me right now, and one all, and run running, Lin Running Linux. But on any given day I&#8217;d grab one of those laptops, and I jump on airplane. I travel and go do what I do. Could I make Igel work for that? Yes. Is it the right thing for that power user? Probably not.<\/p>\n<p>268<br \/>00:22:16.199 &#8211;&gt; 00:22:23.670<br \/>Andy Whiteside: But is the one that sits on my desk all day, or the one that sits on the airline terminal counter. The right thing to run windows on? Probably not.<\/p>\n<p>269<br \/>00:22:25.370 &#8211;&gt; 00:22:27.699<br \/>Chris Feeney: I think it. You know it comes down to.<\/p>\n<p>270<br \/>00:22:27.910 &#8211;&gt; 00:22:30.519<br \/>Chris Feeney: What do you need that thing to do? And<\/p>\n<p>271<br \/>00:22:32.390 &#8211;&gt; 00:22:36.469<br \/>Chris Feeney: is that for me? Walking around the airport, seeing a lot of these display boards.<\/p>\n<p>272<br \/>00:22:36.940 &#8211;&gt; 00:22:40.789<br \/>Chris Feeney: you know. I mean, that&#8217;s that&#8217;s a very we&#8217;ve actually got a<\/p>\n<p>273<br \/>00:22:40.940 &#8211;&gt; 00:22:48.409<br \/>Chris Feeney: press release back in June with lg, talking about that specific use case display boards, you know.<\/p>\n<p>274<br \/>00:22:48.410 &#8211;&gt; 00:22:53.240<br \/>Andy Whiteside: Display boards are clearly a much older operating system that have their own set of challenges.<\/p>\n<p>275<br \/>00:22:54.190 &#8211;&gt; 00:22:56.899<br \/>Chris Feeney: Yeah, I mean, so they.<\/p>\n<p>276<br \/>00:22:57.060 &#8211;&gt; 00:22:58.130<br \/>Chris Feeney: I mean<\/p>\n<p>277<br \/>00:22:58.170 &#8211;&gt; 00:23:06.029<br \/>Chris Feeney: users, not generally interacting with the board. It&#8217;s just there. I mean, you can put whatever. So that&#8217;s just a simple scenario where<\/p>\n<p>278<br \/>00:23:06.110 &#8211;&gt; 00:23:07.140<br \/>Chris Feeney: you know.<\/p>\n<p>279<br \/>00:23:07.450 &#8211;&gt; 00:23:11.679<br \/>Chris Feeney: Obviously keep it up and running. You can put information about what&#8217;s happening<\/p>\n<p>280<br \/>00:23:12.141 &#8211;&gt; 00:23:15.960<br \/>Chris Feeney: but I mean to walk around and see these messages.<\/p>\n<p>281<br \/>00:23:16.420 &#8211;&gt; 00:23:17.730<br \/>Chris Feeney: I mean it.<\/p>\n<p>282<br \/>00:23:18.260 &#8211;&gt; 00:23:25.579<br \/>Chris Feeney: It&#8217;s and then to understand that it&#8217;s not isolated, that one particular location. It&#8217;s happening globally, really kind of think from a<\/p>\n<p>283<br \/>00:23:25.760 &#8211;&gt; 00:23:26.700<br \/>Chris Feeney: wow.<\/p>\n<p>284<br \/>00:23:27.090 &#8211;&gt; 00:23:28.390<br \/>Chris Feeney: I didn&#8217;t realize.<\/p>\n<p>285<br \/>00:23:28.450 &#8211;&gt; 00:23:32.910<br \/>Chris Feeney: you know personally how many machines were out there running windows. You know.<\/p>\n<p>286<br \/>00:23:32.910 &#8211;&gt; 00:23:40.550<br \/>Andy Whiteside: About how silly this is. But the the a bad actor could be a 14 year old kid in his basement, or could be a a foreign government could literally<\/p>\n<p>287<br \/>00:23:40.780 &#8211;&gt; 00:23:41.620<br \/>Andy Whiteside: hack<\/p>\n<p>288<br \/>00:23:42.121 &#8211;&gt; 00:23:53.030<br \/>Andy Whiteside: a company like American Airlines&#8217; kiosk terminals, running windows and just change the flight numbers around all over the country and have an economic impact on the United States or America.<\/p>\n<p>289<br \/>00:23:54.660 &#8211;&gt; 00:23:58.990<br \/>Chris Feeney: It&#8217;s that that kind of scenario could certainly play out potentially. So.<\/p>\n<p>290<br \/>00:23:58.990 &#8211;&gt; 00:24:00.269<br \/>Andy Whiteside: It&#8217;d be super easy.<\/p>\n<p>291<br \/>00:24:02.470 &#8211;&gt; 00:24:14.410<br \/>Andy Whiteside: Yeah, Chris. Thank you for the time covering this. Always good to chat about this one this one. If you&#8217;re a golfer, was teed up so high and so perfectly to talk about and guess what<\/p>\n<p>292<br \/>00:24:14.470 &#8211;&gt; 00:24:18.729<br \/>Andy Whiteside: it happens every day in some organization.<\/p>\n<p>293<br \/>00:24:19.430 &#8211;&gt; 00:24:21.939<br \/>Andy Whiteside: it&#8217;s always the right time to be having this.<\/p>\n<p>294<br \/>00:24:22.040 &#8211;&gt; 00:24:25.899<br \/>Andy Whiteside: Why are you running windows in places you don&#8217;t need to run windows, conversations.<\/p>\n<p>295<br \/>00:24:29.180 &#8211;&gt; 00:24:30.629<br \/>Chris Feeney: Awesome. Well, I appreciate.<\/p>\n<p>296<br \/>00:24:30.830 &#8211;&gt; 00:24:31.930<br \/>Andy Whiteside: Any party, thoughts.<\/p>\n<p>297<br \/>00:24:32.750 &#8211;&gt; 00:24:42.479<br \/>Chris Feeney: No, I said, not necessarily a new topic for us, but certainly a top of mind, and and we&#8217;ll see where the conversation goes from here. So.<\/p>\n<p>298<br \/>00:24:42.710 &#8211;&gt; 00:24:49.460<br \/>Andy Whiteside: It&#8217;ll be interesting to keep an eye on this one. See what happens, number one to crowd strike! I I bet they recover. I bet in in 3 years. This is.<\/p>\n<p>299<br \/>00:24:50.480 &#8211;&gt; 00:25:07.530<br \/>Andy Whiteside: you know, it&#8217;s a meme, probably a meme already, but in 3 years this is a drop in the bucket, and if you&#8217;re smart you bought Crowdstrike when it hit the bottom of the stock market value and and goes back up. It&#8217;s good company. They just made a mistake, and the the power and beauty of windows allowed it to be just, exponentially impactful.<\/p>\n<p>300<br \/>00:25:09.950 &#8211;&gt; 00:25:10.650<br \/>Chris Feeney: Green.<\/p>\n<p>301<br \/>00:25:11.470 &#8211;&gt; 00:25:15.820<br \/>Andy Whiteside: Alright, sir, I look forward to seeing you later this afternoon when you come in the office, and we&#8217;ll do this again in 2 weeks.<\/p>\n<p>302<br \/>00:25:15.820 &#8211;&gt; 00:25:17.620<br \/>Chris Feeney: Alrighty! Take care! Thanks.<\/p>\n<p><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>IGEL helps companies to quickly recover, whenever productive work comes to a halt due to an IT outage. IGEL offers a secure read-only lightweight Linux Operating System allowing you to &hellip;<\/p>","protected":false},"author":7,"featured_media":65861,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-374143","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-podcast"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IGEL Weekly: Fix Blue Screened PCs with IGEL OS<\/title>\n<meta name=\"description\" content=\"IGEL offers a secure read-only lightweight Linux Operating System allowing you to convert existing PC\u2019s to IGEL OS or boot from USB\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xentegra.com\/hi\/resources\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\/\" \/>\n<meta property=\"og:locale\" content=\"hi_IN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IGEL Weekly: Fix Blue Screened PCs with IGEL OS\" \/>\n<meta property=\"og:description\" content=\"IGEL offers a secure read-only lightweight Linux Operating System allowing you to convert existing PC\u2019s to IGEL OS or boot from USB\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xentegra.com\/hi\/resources\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\/\" \/>\n<meta property=\"og:site_name\" content=\"XenTegra\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XenTegra\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-23T14:40:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-29T15:40:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chase Newmyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xentegra\" \/>\n<meta name=\"twitter:site\" content=\"@xentegra\" \/>\n<meta name=\"twitter:label1\" content=\"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chase Newmyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f\" \/>\n\t<meta name=\"twitter:data2\" content=\"26 \u092e\u093f\u0928\u091f\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\\\/\"},\"author\":{\"name\":\"Chase Newmyer\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\"},\"headline\":\"97: IGEL Weekly: How to recover Blue screened Windows endpoints to IGEL OS\",\"datePublished\":\"2024-07-23T14:40:42+00:00\",\"dateModified\":\"2026-01-29T15:40:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\\\/\"},\"wordCount\":5670,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IGEL-WEEKLY.png\",\"articleSection\":[\"Podcast\"],\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\\\/\",\"name\":\"IGEL Weekly: Fix Blue Screened PCs with IGEL OS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IGEL-WEEKLY.png\",\"datePublished\":\"2024-07-23T14:40:42+00:00\",\"dateModified\":\"2026-01-29T15:40:30+00:00\",\"description\":\"IGEL offers a secure read-only lightweight Linux Operating System allowing you to convert existing PC\u2019s to IGEL OS or boot from USB\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\\\/#breadcrumb\"},\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IGEL-WEEKLY.png\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IGEL-WEEKLY.png\",\"width\":1100,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xentegra.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"97: IGEL Weekly: How to recover Blue screened Windows endpoints to IGEL OS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"name\":\"XenTegra\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xentegra.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hi-IN\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\",\"name\":\"XenTegra\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"width\":200,\"height\":200,\"caption\":\"XenTegra\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XenTegra\\\/\",\"https:\\\/\\\/x.com\\\/xentegra\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/xentegra-llc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\",\"name\":\"Chase Newmyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"caption\":\"Chase Newmyer\"},\"url\":\"https:\\\/\\\/xentegra.com\\\/hi\\\/resources\\\/author\\\/chasenewmyer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IGEL Weekly: Fix Blue Screened PCs with IGEL OS","description":"IGEL offers a secure read-only lightweight Linux Operating System allowing you to convert existing PC\u2019s to IGEL OS or boot from USB","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xentegra.com\/hi\/resources\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\/","og_locale":"hi_IN","og_type":"article","og_title":"IGEL Weekly: Fix Blue Screened PCs with IGEL OS","og_description":"IGEL offers a secure read-only lightweight Linux Operating System allowing you to convert existing PC\u2019s to IGEL OS or boot from USB","og_url":"https:\/\/xentegra.com\/hi\/resources\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\/","og_site_name":"XenTegra","article_publisher":"https:\/\/www.facebook.com\/XenTegra\/","article_published_time":"2024-07-23T14:40:42+00:00","article_modified_time":"2026-01-29T15:40:30+00:00","og_image":[{"width":1100,"height":600,"url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png","type":"image\/png"}],"author":"Chase Newmyer","twitter_card":"summary_large_image","twitter_creator":"@xentegra","twitter_site":"@xentegra","twitter_misc":{"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924":"Chase Newmyer","\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f":"26 \u092e\u093f\u0928\u091f"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xentegra.com\/resources\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\/#article","isPartOf":{"@id":"https:\/\/xentegra.com\/resources\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\/"},"author":{"name":"Chase Newmyer","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7"},"headline":"97: IGEL Weekly: How to recover Blue screened Windows endpoints to IGEL OS","datePublished":"2024-07-23T14:40:42+00:00","dateModified":"2026-01-29T15:40:30+00:00","mainEntityOfPage":{"@id":"https:\/\/xentegra.com\/resources\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\/"},"wordCount":5670,"commentCount":0,"publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"image":{"@id":"https:\/\/xentegra.com\/resources\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png","articleSection":["Podcast"],"inLanguage":"hi-IN","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xentegra.com\/resources\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xentegra.com\/resources\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\/","url":"https:\/\/xentegra.com\/resources\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\/","name":"IGEL Weekly: Fix Blue Screened PCs with IGEL OS","isPartOf":{"@id":"https:\/\/xentegra.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xentegra.com\/resources\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\/#primaryimage"},"image":{"@id":"https:\/\/xentegra.com\/resources\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png","datePublished":"2024-07-23T14:40:42+00:00","dateModified":"2026-01-29T15:40:30+00:00","description":"IGEL offers a secure read-only lightweight Linux Operating System allowing you to convert existing PC\u2019s to IGEL OS or boot from USB","breadcrumb":{"@id":"https:\/\/xentegra.com\/resources\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\/#breadcrumb"},"inLanguage":"hi-IN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xentegra.com\/resources\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\/"]}]},{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/resources\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\/#primaryimage","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png","width":1100,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/xentegra.com\/resources\/97-igel-weekly-how-to-recover-blue-screened-windows-endpoints-to-igel-os\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xentegra.com\/"},{"@type":"ListItem","position":2,"name":"97: IGEL Weekly: How to recover Blue screened Windows endpoints to IGEL OS"}]},{"@type":"WebSite","@id":"https:\/\/xentegra.com\/#website","url":"https:\/\/xentegra.com\/","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","description":"","publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xentegra.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hi-IN"},{"@type":"Organization","@id":"https:\/\/xentegra.com\/#organization","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","url":"https:\/\/xentegra.com\/","logo":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","width":200,"height":200,"caption":"XenTegra"},"image":{"@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XenTegra\/","https:\/\/x.com\/xentegra","https:\/\/www.linkedin.com\/company\/xentegra-llc"]},{"@type":"Person","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7","name":"Chase Newmyer","image":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","caption":"Chase Newmyer"},"url":"https:\/\/xentegra.com\/hi\/resources\/author\/chasenewmyer\/"}]}},"_links":{"self":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/374143","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/comments?post=374143"}],"version-history":[{"count":440,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/374143\/revisions"}],"predecessor-version":[{"id":716286,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/374143\/revisions\/716286"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media\/65861"}],"wp:attachment":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media?parent=374143"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/categories?post=374143"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/tags?post=374143"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}