HostiFi Status
Real-time updates of HostiFi issues and outages
HostiFi status is Operational
Active Incidents
No active incidents
Recently Resolved Incidents
No recent incidents
HostiFi Outage Survival Guide
HostiFi Components
HostiFi Servers
UniFi
Omada
UISP
HostiFi Support
Phone
Live Chat
HostiFi Sites
hostifi.com
app.hostifi.com
pro.hostifi.com
support.hostifi.com
HostiFi Alternatives
BitTitan MigrationWiz
Projects in North America, Western Europe, France, and South America data centers may experience new migrations waiting in “Submitted” state for an extended period of time. We are aware of the degraded performance and are actively working to resolve the issue. Please expect an update by 3:30pm CT
BitTitan MigrationWiz DE
For customers creating new projects in the German (.de) instance of MigrationWiz, we are experiencing a user interface error where Germany is not showing on the dropdown for the regional selection list on the destination settings page. To save your project, you must select a value. This value will not impact your migration because on the performance tab, under preferred region, you will see that Germany is selected. Data will stay in the region shown on the performance tab.
Pulsant Service Threat Intelligence Alert
Pulsant Cyber Security are aware of Critical Vulnerabilities impacting VMware vCenter Server and VMware Cloud Foundation. These include a heap-overflow vulnerability (CVE-2024-38812) with a CVSSv3 score of 9.8, and a privilege escalation vulnerability (CVE-2024-38813) with a CVSSv3 score of 7.5. Exploitation of these vulnerabilities has been observed in the wild.
Impacted Products: VMware vCenter Server (versions 7.0, 8.0) VMware Cloud Foundation (versions 4.x, 5.x, 5.1.x) Vulnerability Details: Heap-overflow vulnerability in vCenter Server (CVE-2024-38812):
Severity: Critical (CVSSv3 9.8) Description: This vulnerability in the DCERPC protocol allows remote code execution when an attacker with network access sends a specially crafted packet to vCenter Server. Resolution: Immediate application of the latest patches from the "Response Documentation" is essential. Privilege escalation vulnerability in vCenter Server (CVE-2024-38813):
Severity: Important (CVSSv3 7.5) Description: This vulnerability can enable an attacker to escalate privileges to root by sending a specially crafted packet to vCenter Server. Resolution: Application of the latest patches from the "Response Documentation" is required to remediate this issue.
Response Documentation : https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968
TDC Erhverv Cloud Solutions TDC Erhverv Teams
Det kan ske, at Auto Attendants og Call Queues, som er sat op med telefoni i Teams, ikke længere fungerer.
Problemet skyldes, at der har været brugt "Teams Phone Standard"-licenser, og disse kan ikke længere bruges til ressourcekonti til Auto Attendants og Call Queues.
I bør hurtigst muligt kontrollere alle jeres servicekonti til Teams-kaldflows og rette licenserne til "Microsoft Teams Phone Resource Account".
I skal også tildele en "Microsoft Teams Phone Resource Account"-licens til de ressourcekonti, der ikke har en sådan licens i forvejen.
Bemærk: Når I udskifter licenserne, skal den gamle licens fjernes og den nye licens tildeles i samme ændring - ellers kan telefoniindstillingerne gå tabt.
Se mere her: https://learn.microsoft.com/en-us/microsoftteams/teams-add-on-licensing/virtual-user
I kan kontakte vores kundeservice på 7733 7171 eller support@sky.tdc.dk, hvis I har behov for hjælp.
TDC Erhverv Cloud Solutions Mobil
Kære kunder
Vi oplever flere mobil brugere oplever, at de bliver bedt om at indtaste en pinkode når de trykker på deres Voicemail knap på deres telefoner. Fejlen påvirker både iPhone, og Android mobil telefoner.
Den midlertidige løsning er at ringe direkte ind til Voicemail nummeret 51100303.
Vores teknikere er i gang med at undersøge fejlen.
Vi kommer retur snarest muligt