Technical Incident Log – XPS17 Network‑Dependent Failures
Device: Dell XPS17 (Windows 11 Home)
Network Context: Issues occur only on home Wi‑Fi. All symptoms disappear when using iPhone hotspot.
Other Devices on Same Network: No issues (Windows 11 laptop, Windows 10 desktop).
User Account: Microsoft 365 Family
Security Stack: Microsoft Defender (default configuration)
Details Summarized by Copilot:
- Summary of Incident
Multiple Microsoft 365‑dependent components fail on this device only when connected to the home Wi‑Fi network. Failures include Copilot Desktop (WebView2), OneNote sync, and authentication to certain security‑sensitive websites. All components function normally when the same device uses an iPhone hotspot.
- Affected Components
2.1 Copilot Desktop
• Symptoms: Intermittent load failures, dropped sessions, incomplete responses.
• Trigger: Occurs only on home Wi‑Fi.
• Recovery: Immediate recovery when switching to hotspot.
2.2 OneNote (M365 Sync)
• Symptoms: Sync stalls, section write failures, endpoint unreachable errors.
• Trigger: Occurs only on home Wi‑Fi.
• Recovery: Sync resumes instantly on hotspot.
2.3 Security‑Sensitive Websites
• Symptoms: Login pages hang, MFA redirects fail, TLS negotiation stalls.
• Trigger: Occurs only on home Wi‑Fi.
• Recovery: Immediate success on hotspot.
- Isolation and Scope
3.1 Device‑Specific
• Only the XPS17 exhibits failures.
• Other Windows devices on same network unaffected.
• XPS17 behaves normally on external networks.
3.2 Network‑Specific
• Failures correlate strictly with home Wi‑Fi.
• Hotspot bypasses all symptoms.
Conclusion:
Issue is localized to how this device processes encrypted traffic, DNS, or endpoint negotiation on this specific network.
- Security Configuration State
4.1 Microsoft Defender
• Engine versions match other devices.
• Cloud‑delivered protection enabled.
• Reputation‑based protection enabled.
• Firewall rules consistent with other devices.
• Memory Integrity enabled.
4.2 Smart App Control
• State: OFF, controls grayed out.
• (Engineers will recognize this as expected for systems not meeting SAC trust requirements.)
4.3 Network Inspection System (NIS)
• Active.
• No explicit block events logged.
• No recent protection events correlating with failures.
- Observed Network Behavior • Failures affect components relying on:
○ HTTPS/TLS negotiation
○ Microsoft 365 authentication endpoints
○ WebView2‑based traffic
○ DNS resolution for secure endpoints
• Hotspot path resolves all issues immediately. • No router‑level filtering affecting other devices.
- Working Technical Hypothesis
Potential Root Causes (Device‑Local):
• Corrupted Winsock catalog or network stack.
• DNS resolver corruption or stale endpoint mappings.
• TLS negotiation failures specific to this device on this network.
• IPv6 misconfiguration or fallback failure.
• NIS interference with encrypted traffic (selective).
• WebView2 traffic path being impacted by local filtering.
• Cached or corrupted Microsoft 365 endpoint routing.
Common Dependency Across Failures:
Encrypted endpoint negotiation (TLS + DNS + M365 auth).
- Requested Engineering Guidance • Recommended diagnostics for isolating encrypted‑traffic failures on a single device. • Whether NIS or Defender network stack components can selectively disrupt M365 endpoints. • Whether full network stack reset (Winsock, DNS, IP stack) is advisable. • Whether Defender components can be re‑registered or repaired without OS reinstall. • Any known issues involving WebView2 traffic or M365 auth flows under NIS.