Share via

Multiple Microsoft 365‑dependent components fail on this device only when connected to the home Wi‑Fi network

AtonyD 0 Reputation points
2026-03-20T15:39:46.19+00:00

Technical Incident Log – XPS17 Network‑Dependent Failures

Device: Dell XPS17 (Windows 11 Home)

Network Context: Issues occur only on home Wi‑Fi. All symptoms disappear when using iPhone hotspot.

Other Devices on Same Network: No issues (Windows 11 laptop, Windows 10 desktop).

User Account: Microsoft 365 Family

Security Stack: Microsoft Defender (default configuration)

Details Summarized by Copilot:

  1. Summary of Incident

Multiple Microsoft 365‑dependent components fail on this device only when connected to the home Wi‑Fi network. Failures include Copilot Desktop (WebView2), OneNote sync, and authentication to certain security‑sensitive websites. All components function normally when the same device uses an iPhone hotspot.

  1. Affected Components

2.1 Copilot Desktop

• Symptoms: Intermittent load failures, dropped sessions, incomplete responses.

• Trigger: Occurs only on home Wi‑Fi.

• Recovery: Immediate recovery when switching to hotspot.

2.2 OneNote (M365 Sync)

• Symptoms: Sync stalls, section write failures, endpoint unreachable errors.

• Trigger: Occurs only on home Wi‑Fi.

• Recovery: Sync resumes instantly on hotspot.

2.3 Security‑Sensitive Websites

• Symptoms: Login pages hang, MFA redirects fail, TLS negotiation stalls.

• Trigger: Occurs only on home Wi‑Fi.

• Recovery: Immediate success on hotspot.
  1. Isolation and Scope

3.1 Device‑Specific

• Only the XPS17 exhibits failures.

• Other Windows devices on same network unaffected.

• XPS17 behaves normally on external networks.

3.2 Network‑Specific

• Failures correlate strictly with home Wi‑Fi.

• Hotspot bypasses all symptoms.

Conclusion:

Issue is localized to how this device processes encrypted traffic, DNS, or endpoint negotiation on this specific network.

  1. Security Configuration State

4.1 Microsoft Defender

• Engine versions match other devices.

• Cloud‑delivered protection enabled.

• Reputation‑based protection enabled.

• Firewall rules consistent with other devices.

• Memory Integrity enabled.

4.2 Smart App Control

• State: OFF, controls grayed out.

• (Engineers will recognize this as expected for systems not meeting SAC trust requirements.)

4.3 Network Inspection System (NIS)

• Active.

• No explicit block events logged.

• No recent protection events correlating with failures.
  1. Observed Network Behavior • Failures affect components relying on:
    	○ HTTPS/TLS negotiation
    
    	○ Microsoft 365 authentication endpoints
    
    	○ WebView2‑based traffic
    
    	○ DNS resolution for secure endpoints
    
    • Hotspot path resolves all issues immediately. • No router‑level filtering affecting other devices.
  2. Working Technical Hypothesis

Potential Root Causes (Device‑Local):

• Corrupted Winsock catalog or network stack.

• DNS resolver corruption or stale endpoint mappings.

• TLS negotiation failures specific to this device on this network.

• IPv6 misconfiguration or fallback failure.

• NIS interference with encrypted traffic (selective).

• WebView2 traffic path being impacted by local filtering.

• Cached or corrupted Microsoft 365 endpoint routing.

Common Dependency Across Failures:

Encrypted endpoint negotiation (TLS + DNS + M365 auth).

  1. Requested Engineering Guidance • Recommended diagnostics for isolating encrypted‑traffic failures on a single device. • Whether NIS or Defender network stack components can selectively disrupt M365 endpoints. • Whether full network stack reset (Winsock, DNS, IP stack) is advisable. • Whether Defender components can be re‑registered or repaired without OS reinstall. • Any known issues involving WebView2 traffic or M365 auth flows under NIS.
Windows for home | Windows 11 | Internet and connectivity
0 comments No comments

2 answers

Sort by: Most helpful
  1. AtonyD 0 Reputation points
    2026-03-20T15:51:21.8366667+00:00

    Based on Microsoft’s guidance, I am requesting:

    1. Instructions for validating WSS handshake behavior on the affected device.
    2. Guidance for comparing certificate chains for Microsoft 365 endpoints between devices.
    3. Recommended steps for repairing or resetting the Windows certificate store if corruption is suspected.
    4. Guidance on isolating TLS negotiation failures that occur only on one device on a given network.
    5. Any known issues involving IPv6 path selection affecting Microsoft 365 endpoints.
    0 comments No comments

  2. Q&A Assist
    2026-03-20T15:40:15.36+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    Based on the context, Microsoft 365 connectivity issues like those described are typically caused by network path, TLS inspection, or WebSocket (WSS) problems between the device and Microsoft 365 endpoints, rather than by Microsoft Defender or NIS alone.

    Key points from the context that map to the scenario:

    1. Microsoft 365 Copilot and other M365 apps rely on specific HTTPS and WebSocket connectivity
      • Copilot and other Microsoft 365 experiences require:
        • HTTPS/TLS connectivity to key Microsoft 365 domains.
        • WebSocket (WSS) connectivity to *.cloud.microsoft and *.office.com.
      • Network tests for Microsoft 365 explicitly check:
        1. TCP 443/HTTPS connectivity to key Microsoft 365 domains.
        2. WebSocket protocol connectivity (required for Microsoft Copilot).
        3. Use of non‑Microsoft 365 certificates indicating TLS interception or decryption.
      • If WebSocket or HTTPS connectivity is impaired, Copilot and real‑time collaboration features can fail or behave intermittently.
    2. TLS interception or decryption by intermediaries is a known cause of M365 issues
      • Microsoft 365 Network Insights flags when non‑Microsoft 365 certificates are seen on connections to Microsoft 365 services, indicating TLS interception or decryption.
      • Guidance is to exempt Microsoft 365 domains from TLS interception and decryption at the network layer.
      • Microsoft does not recommend or support third‑party devices that decrypt, inspect, or modify Microsoft 365 traffic, and such devices can cause interoperability, availability, and performance issues.
    3. WebSocket‑specific failures can break Copilot and some auth flows
      • If the network perimeter blocks WSS, performs TLS inspection, or uses proxies with aggressive timeouts, Copilot scenarios can fail.
      • Required WSS connectivity from user devices must reach *.cloud.microsoft and *.office.com without being blocked or broken by intermediaries.
    4. Diagnostics and remediation direction from the context From the Microsoft 365 Copilot and Network Insights documentation, the recommended checks and actions are:
      1. Verify HTTPS and WSS connectivity to Microsoft 365 endpoints
        • Ensure that *.cloud.microsoft, *.static.microsoft, *.usercontent.microsoft, and *.office.com are reachable over HTTPS and WSS from the affected device when on home Wi‑Fi.
        • Confirm that the home router, any security gateway, or ISP device is not:
          • Blocking WebSocket (WSS) traffic.
          • Performing TLS interception or decryption on Microsoft 365 traffic.
          • Enforcing short or aggressive timeouts on long‑lived HTTPS/WSS connections.
      2. Check for TLS interception indicators
        • Compare the certificate chain for Microsoft 365 endpoints (for example, *.cloud.microsoft, *.office.com) on the affected device vs. a working device on the same network.
        • If a non‑Microsoft 365 certificate authority appears in the chain for Microsoft 365 domains, this indicates TLS break/inspect, which is unsupported and should be disabled for those domains.
      3. Follow Microsoft 365 network connectivity principles
        • Ensure that the home network configuration aligns with Microsoft 365 connectivity best practices and that the worldwide Microsoft 365 URLs and IP address ranges are allowed.
        • Avoid granular per‑FQDN filtering for Copilot scenarios; wildcards such as *.cloud.microsoft are expected and required.
      4. Avoid unsupported third‑party network devices or services that modify traffic
        • If any WAN optimization, proxy, or security appliance is present in the home network path (for example, in the router or as an ISP‑provided service) that decrypts or modifies HTTPS traffic, disable such behavior for Microsoft 365 traffic or remove the device from the path.
        • Microsoft explicitly does not support solutions that change, scrub, or block decrypted Microsoft 365 content or rely on specific internal protocol details.
    5. On the specific questions raised
      • Recommended diagnostics for isolating encrypted‑traffic failures on a single device:
        • Compare certificate chains and connectivity to *.cloud.microsoft, *.office.com, *.static.microsoft, and *.usercontent.microsoft between the affected device and a working device on the same Wi‑Fi.
        • Confirm WSS connectivity to these domains from the affected device.
        • Check for any indication that non‑Microsoft 365 certificates are being presented for Microsoft 365 domains.
      • Whether NIS or Defender network stack components can selectively disrupt M365 endpoints:
        • The provided context does not state that Microsoft Defender or NIS selectively disrupt Microsoft 365 endpoints. The documented and supported cause patterns for similar symptoms are network‑path issues, TLS interception, and WSS handling problems.
      • Whether a full network stack reset (Winsock, DNS, IP stack) is advisable:
        • The context does not explicitly recommend Winsock/DNS/IP stack reset. It focuses on network path, endpoint allow‑listing, and avoiding TLS interception. No additional guidance can be added beyond that.
      • Whether Defender components can be re‑registered or repaired without OS reinstall:
        • The context does not provide procedures for re‑registering or repairing Defender components.
      • Any known issues involving WebView2 traffic or M365 auth flows under NIS:
        • The context does not document specific issues between WebView2, NIS, and Microsoft 365 auth. It instead highlights WSS connectivity and TLS interception as primary concerns.

    Given the constraints of the context, the most aligned next steps are to:

    1. Validate that the home network fully allows HTTPS and WSS to the Microsoft 365 endpoints (*.cloud.microsoft, *.office.com, *.static.microsoft, *.usercontent.microsoft).
    2. Confirm that no TLS interception, decryption, or modification is occurring on Microsoft 365 traffic on the home network.
    3. Ensure that any third‑party network devices or services that inspect or alter encrypted traffic are disabled or bypassed for Microsoft 365.

    References:

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.