AD Ports deploys hundreds of AI agents with Azure Foundry and Copilot Studio

  • Thread Author
A futuristic port control room with a blue holographic 'Agents Directory' display overlooking cargo ships.
Title: AD Ports’ agent army — how Azure AI Foundry and Copilot Studio are being used to reshape shipping, logistics and the modern port
Byline: [Your Name], WindowsForum.com
Lead
AD Ports Group has quietly embarked on one of the more ambitious enterprise‑AI programs in logistics: a company‑wide effort to design, build and deploy hundreds of task‑specific AI agents that automate routine work, optimize vessel operations and surface actionable intelligence to people across the organization. The program pairs Microsoft’s new agent tooling — notably Azure AI Foundry and Copilot Studio — with operational data from AD Ports’ global ecosystem, and promises both hard cost savings (fuel, idle time, storage) and an organizational shift in how people do knowledge‑work at scale.
What makes the story noteworthy beyond the usual vendor PR is the scope and systems thinking: AD Ports is coupling agent engineering, a discovery/catalog platform (an internal “Agents Directory”), modern connectivity (LEO satellites for at‑sea connectivity), and human‑centered governance to operationalize agents in production fast. The result is a live, iterative pipeline of agents that the business can “hire,” test, and tune — not a one‑off proof‑of‑concept.
This feature unpacks the program: how AD Ports built it, what the early agents do, the technology stack and operational plumbing that enables them, the early outcomes the company cites, and the material caveats that IT leaders should watch for when planning similar projects.
A quick snapshot of the program (what AD Ports is saying)
  • Platform & tooling: AD Ports uses Azure AI Foundry as the secure environment for designing, testing and monitoring agents; Copilot Studio is used to assemble them quickly with low‑code effort.
  • Scale: the company says it has dozens of agents running in production (50+), and “hundreds” in the Agent Directory pipeline, with the ambition to build 100+ or many hundreds of agents across horizontal and vertical use cases.
  • Fleet & scope: agents will support AD Ports’ maritime and logistics footprint — a fleet reported at roughly 270 vessels and a network of terminals and ports the company describes as spanning dozens of sites and regions.
  • Flagship agents: examples include a Vessel Speed Optimizer (voyage/fuel optimizer), Container Balancer (proactive empty‑container repositioning and cost checks), Claim Detective (document and regulation checks), and Investment Advisor (pre‑proposal governance checks for investment teams).
  • People & workflow: AD Ports built an internal “AI Agents Directory” where employees can request agents by specifying target user, success metrics and role descriptions; the system produces a requirements blueprint and a ready‑to‑build spec.
  • Connectivity: to run real‑time, at‑sea guidance, the company is rolling out LEO satellite connectivity across vessels — enabling low‑latency data flows for recommendations that rely on weather, berth status and live telemetry.
How they built the program — teams, tooling and the creation flow
AD Ports’ approach follows a simple but effective pattern: create a focused multi‑disciplinary “AI Agents Workforce,” give them a secure, governed platform to build on, and create a low‑friction way for business users to discover and adopt agents.
1) A dedicated AI Agents Workforce
Rather than leaving agent creation to a small lab or pockets of developers, AD Ports assembled a compact team that mixes data scientists, software and infrastructure engineers, cybersecurity specialists, and domain experts (operations, procurement, finance and legal). That mix is important: agents that touch regulated documents or safety‑critical vessel routing need domain validation as well as ML rigor.
2) Azure AI Foundry — the engineering backbone
AD Ports uses Azure AI Foundry as the secure environment to design, test and monitor agents. Foundry provides tooling for agent lifecycle (design/experiment → test → monitor → retire), model governance controls, and operational telemetry. For regulated or safety‑sensitive uses (maritime routing, contractual checks), that controlled environment reduces operational risk by tightly governing data access, model versions and audit trails.
3) Copilot Studio for rapid, low‑code assembly
For many of the “simple” agents — job description generation, templated letters, routine policy scans — AD Ports used Microsoft Copilot Studio to assemble agents with little coding, relying on connector blocks, prompt templates and prebuilt flows. That allowed the business to push out new agents in a matter of hours rather than weeks of engineering effort.
4) An internal Agents Directory — discovery meets “hire”
Crucially, AD Ports built an internal platform where employees can “hire” agents. Users specify the target persona, success parameters and a role description; the directory produces a product‑requirements document and a build blueprint the Engineers can use. The directory both catalogs deployed agents and houses proposals (agents in the pipeline), enabling reuse and preventing duplication.
Why that matters: making AI discoverable and governable
One of the biggest failure modes for enterprise AI is accidental duplication and sprawl — many teams solve the same problem with different models and datasets, creating governance headaches. By fronting an internal “marketplace” with a minimal intake form and templated blueprints, AD Ports reduces friction for adoption while centralizing discoverability and governance.
Flagship agents: concrete examples and the work they do
A program like this deserves concrete examples. AD Ports highlights several agents that show how generative and agentic AI can be stitched into maritime logistics workflows.
Vessel Speed Optimizer (what it does)
  • Purpose: provide real‑time guidance to vessels on optimal speed decisions along voyage waypoints.
  • Inputs: weather forecasts, port congestion/berth status, schedule constraints, ship performance curves, fuel cost, ETA windows and other telemetry.
  • Output: waypoint‑by‑waypoint speed recommendations (e.g., slow steaming recommendations, or maintain speed) and estimated fuel savings.
  • Claimed benefits: on a single leg, following the AI’s plan can save “thousands of dirhams”; sustained adoption reduces fuel, CO₂ emissions, engine stress and idle time for crews.
Why it’s technically plausible
Speed optimisation is a well‑studied problem: a model that marries routing/traffic forecasts and weather with vessel performance curves can compute a cost‑minimizing speed profile. The differentiator here is real‑time data availability (berth forecasts, congestion, weather) and connectivity — AD Ports is deploying LEO satellite links to ensure ships can receive and update recommendations while underway.
Container Balancer (empty‑container forecasting & repositioning)
  • Purpose: predict where empty containers will be needed and recommend pre‑positioning so demand is met with lower repositioning cost.
  • Inputs: demand forecasts regionally, existing container stocks, contract terms (storage costs, lease terms), port schedules and transport costs.
  • Output: prioritized moves (which container to move, from where to where, and timing) factoring cost tradeoffs (storage vs repositioning).
  • Benefit: reduces avoidable repositioning and storage costs, and improves container availability.
Claim Detective (document/regulatory compliance)
  • Purpose: ingest incoming documentation (claims, shipping documents), check against international shipping and insurance rules, and surface compliance gaps.
  • Outputs: compliance checklist, recommended next steps, flagged items for human review.
  • Benefit: faster, regulation‑aligned customer responses — critical in claims and customer service.
Investment Advisor (pre‑proposal check)
  • Purpose: support investment teams by checking draft proposals for missing data, alignment with internal guardrails, and producing an evidence‑backed checklist for reviewers.
  • Benefit: reduces review time and unblocks decision makers to focus on judgement and strategy rather than paperwork.
The connectivity piece that makes at‑sea agents valuable
Many agent scenarios that require frequent state updates and recommendations (like the Vessel Speed Optimizer) only become possible when vessels have reliable, low‑latency connectivity. AD Ports is rolling out Low Earth Orbit (LEO) satellite connectivity across parts of its fleet to provide the continuous, resilient telemetry needed for dynamic guidance.
  • Why LEO matters: Compared with traditional GEO satcom or intermittent low‑bandwidth links, LEO constellations offer lower latency and higher throughput — enabling near‑real‑time exchange of weather, port predictions and telemetry required by agents that recommend speed changes or re‑routing.
  • Operational implication: agents that produce waypoint‑by‑waypoint guidance depend on a constant feedback loop between ship sensors and onshore systems. With LEO, that loop becomes viable.
Governance, security and the human‑in‑the‑loop model
AD Ports’ rollout shows attention to governance — a must when agents touch safety, contractual obligations or regulated documents.
  • Human final authority: AD Ports emphasizes that humans retain final decisions. Agents surface recommendations and do groundwork, but people make the call.
  • Secure, auditable pipelines: using Azure AI Foundry suggests AD Ports keeps agent development inside a controlled environment, with model/version control, access controls and monitoring. For identities and agent lifecycle, enterprise tools (like identity directories and agent IDs) are commonly used to manage agent permissions and provenance.
  • Testing & closed‑loop monitoring: agents in critical roles must be tested across edge cases (weather anomalies, berth changes, regulatory edge conditions) and monitored for drift and failures once in production.
Early impact and the numbers AD Ports cites
AD Ports quotes a mix of operational metrics, qualitative benefits and ambitions:
  • Live fleet/terminals scale: AD Ports cites a fleet of roughly 270 vessels and a network of terminals spanning multiple regions.
  • Agents in production: 50+ agents running, with “hundreds” in the Agent Directory pipeline; the company says the platform can produce a deployable simple agent in about an hour.
  • Workforce & future goals: AD Ports reports roughly 7,000 employees; leadership envisions agents eventually becoming more numerous than employees (an “agent per employee” vision) and projects aggressive targets for AI‑generated code (a stated goal that 90% of all new code will be generated by AI by year‑end in the Microsoft narrative).
A note on verification for numbers and claims
  • Fleet & terminals: AD Ports’ public materials and multiple industry outlets report the fleet and terminals numbers in the same range; the fleet figure (≈270 vessels) and a network of dozens of terminals were independently reported in AD Ports press and maritime press coverage.
  • Agents, hours to build & the pipeline: the precise metric “about an hour to develop and deploy a simple new agent” and the size of the internal pipeline are AD Ports’ internal statements (reported via the Microsoft customer story). Those are credible company disclosures but — like any vendor/partner case study — they are self‑reported metrics and not independently auditable.
  • Ambitious targets (e.g., 90% of new code generated by AI; agents outnumber people within three years): these are forward‑looking corporate goals and projections. They may reflect internal roadmaps and aspiration; readers should treat them as company plans rather than guaranteed outcomes.
Why this matters for IT leaders and port operators
If AD Ports’ strategy proves repeatable, it matters for three reasons:
1) Agents as a new unit of operational software
Rather than a monolithic application, AD Ports treats lightweight agents as modular, discoverable units aligned to specific human roles and workflows. If you can catalog and govern those agents, you make it much easier to scale automation across many teams.
2) Low‑code plus platform controls
A combination of low‑code composition tools (Copilot Studio) and a secure engineering platform (Azure AI Foundry) reduces the time‑to‑value while retaining central control — a sweet spot for enterprises that need to balance speed and safety.
3) Connectivity + AI = new at‑sea capabilities
Reliable, low‑latency connectivity enables agents to make safe, time‑sensitive recommendations to vessels. For shipping companies with disparate connectivity today, LEO and similar networks become enablers for agentic operations.
Risks, open questions and practical caveats
AD Ports’ program is promising, but not without risk. Here are the main operational and technical concerns IT leaders should weigh.
1) Data quality, provenance and model drift
Agent recommendations are only as good as the inputs. Weather forecasts, berth availability, cargo manifest accuracy, and telemetry must be reliable; poor inputs create poor recommendations. Continuous monitoring for drift, automated data quality checks, and human oversight are essential.
2) Safety & regulatory risk for navigation recommendations
Agents that influence vessel speed and route require rigorous safety engineering, formal verification of decision logic under exceptional conditions, and compliance with maritime regulations. Human‑in‑the‑loop safeguards must be clearly enforced, with failsafe modes and rollback criteria.
3) Explainability, audit trails and dispute resolution
When agents recommend actions that materially affect costs or customer commitments (fuel savings, container moves, or claims handling), organizations need clear audit trails and explainability to support both internal decisions and external disputes.
4) Governance & sprawl
A company could generate hundreds of agents quickly; without robust cataloging, access control and lifecycle policies, the result could be an unmanageable agent sprawl. The Agents Directory is the right pattern — but it needs ongoing stewardship.
5) Security posture of agent connectors
Agents often rely on connectors to downstream systems (ERP, voyage data recorders, port management systems). Each connector increases the attack surface. Identity management for agents and least‑privilege network controls are required.
Practical takeaways for enterprise teams
  • Start with horizontal, high‑value, repeatable tasks (templates, routine letters, job descriptions) to build momentum, then invest in vertical, domain‑specialized agents.
  • Pair low‑code tools with a secured engineering environment — speed without governance is dangerous.
  • Build an internal discovery/catalog (agents directory) early; it prevents duplication and accelerates adoption.
  • Invest in connectivity where real‑time recommendations matter (e.g., ships, remote facilities).
  • Treat agent deployments like software products: versioning, testing, monitoring, incident playbooks and deprecation paths.
Final analysis — is this a blueprint or a one‑off?
AD Ports’ program illustrates a practical blueprint for combining modern agent tooling, connectivity and operations. The elements are not unique — they’re increasingly available to enterprises (agent design tooling, model governance, low‑code assembly, LEO connectivity) — but AD Ports’ strength is in stitching them together across a complex, real‑time industrial environment.
The most important test will be longevity and measurable outcomes over time: sustained fuel savings across multiple voyages, reduced container repositioning costs, meaningful reductions in claims cycle time, and demonstrable safety and regulatory compliance. If AD Ports achieves sustained gains while keeping humans firmly in control and maintaining governance, this case could accelerate similar programs in other capital‑intensive logistics and transport operators.
Verification notes (sources checked)
To produce this piece I reviewed the company case study published via Microsoft’s customer stories and corroborated operational facts (fleet size, terminals, LEO connectivity rollout and press coverage) against AD Ports Group’s own public materials and industry press coverage. The vessel/terminals numbers and LEO rollout are reported in AD Ports’ communications and in multiple maritime industry outlets. The agent‑specific claims and internal metrics (time‑to‑deploy a simple agent, pipeline size, internal quotes about workforce goals) are reported by AD Ports in the Microsoft customer story and related company statements; those items are corporate disclosures and have been presented as such.
(Selected outlets and materials reviewed while reporting: Microsoft customer story on AD Ports Group and Azure AI Foundry; AD Ports Group official site and press releases; Noatum Maritime fleet page; maritime press coverage including Riviera, Container News and Safety4Sea; industry commentary on Azure AI Foundry and Copilot Studio.)
If you want this piece adapted into a shorter newsroom summary, an executive one‑pager suitable for your CIO, or a technical briefing that summarizes the exact Azure services, connectivity options, and design patterns AD Ports used (with implementation pointers for cloud architects), tell me which format you prefer and I’ll prepare it.

Source: Microsoft AD Ports Group to build 100+ AI agents with Azure AI Foundry, transforming trade operations | Microsoft Customer Stories
 

Monitor displaying Rufus and Ventoy bootable USB setup with a connected USB drive.Rufus and Ventoy, Windows 11, and Unsupported PCs — What happened and what you should do now​

By [WindowsForum] staff reporter — October 23, 2025
Summary — In brief
  • Recent tooling and installer changes have put much of the Windows 11 upgrade story into sharp relief: Microsoft’s installer tooling (Media Creation Tool and some distribution paths) experienced regressions that left many users unable to build or use bootable Windows 11 media on certain hosts, and community utilities Rufus and Ventoy remain the primary, practical alternatives for creating USB installers — including when users intentionally bypass Microsoft’s hardware checks.
  • Rufus provides an “Extended Windows 11 installation” mode (an intentional bypass of TPM / Secure Boot / some RAM checks) and is widely used to install Windows 11 on hardware Microsoft declares “incompatible.” Ventoy’s updates have aimed to fix specific Windows‑11 setup boot issues (notably a 0x80070001 class error) and to improve boot reliability for the latest Windows 11 images. Both tools carry benefits — and real, long‑term tradeoffs.
Introduction — why this matters now
When a migration wave or an update cycle collides with tooling problems, a lot of people are affected: home users trying to move off out‑of‑support Windows 10, refurbishers preparing machines for sale, and IT teams building offline media for repairs. Windows 10’s mainstream support ended earlier in October 2025 (October 14, 2025), so the pressure to create reliable Windows 11 install media is acute. In that context, community tools like Rufus and Ventoy are more than conveniences — they are often the fallback that keeps installations and repairs moving.
What actually happened (the short story)
  • In late September / early October 2025 some distribution tooling and Media Creation Tool builds were observed to misbehave on Windows 10 hosts (the community traced symptomatic failures to particular MCT metadata strings and reported silent failures). Microsoft acknowledged the problem and recommended using the direct Windows 11 ISO download as a short‑term workaround while it prepared a fix. fileciteturn0file3turn0file6
  • Independently, community tools continued to evolve: Rufus added explicit options to produce Windows 11 media that bypasses hardware checks (labelled in Rufus’ UI as “Extended Windows 11 installation” style options). Ventoy released updates to address specific Windows 11 setup boot errors (for example, fixes described in Ventoy 1.1.03 notes) and to reconcile new packaging/boot behaviour introduced by recent Windows 11 images. fileciteturn0file2turn0file14
Why Rufus and Ventoy are in the headlines
  • Rufus: Because it exposes an explicit UI to remove TPM/Secure Boot/RAM checks, many users rely on it when they want Windows 11 on older hardware. That capability is powerful and documented; it’s also explicitly unsupported by Microsoft and carries follow‑on risks. fileciteturn0file2turn0file18
  • Ventoy: Because of its multi‑ISO, copy‑and‑boot model (copy ISOs to the USB and pick at boot), Ventoy is extremely convenient — but certain Windows 11 builds introduced boot-time failures for some Ventoy configurations; Ventoy’s 1.1.03 release and similar updates aimed to fix those faults and restore a reliable Windows setup path.
The technical picture — what the tools do and what they can’t
  • Rufus: writes/creates bootable USB drives from official Windows ISOs. Its “extended” installer mode modifies how setup.exe is launched (or what checks are enforced) so the installer will proceed even on hardware that lacks TPM 2.0, Secure Boot, or meets other official minima. Important limit: Rufus cannot add missing CPU instruction support or magically create hardware features; it only removes (or avoids) the installer checks. If the CPU truly lacks required instruction sets, installs can still fail later. fileciteturn0file2turn0file18
  • Ventoy: presents ISOs from a menu and boots them without reformatting. Because of that layering, it sometimes interacts differently with Windows setup’s early boot and file‑system expectations. When a specific Windows 11 build introduced a boot‑time error (0x80070001‑style) for some Ventoy configurations, Ventoy’s maintainers updated their boot code to accommodate the changed installer behaviour.
Safety, support, and updates — the tradeoffs
The most load‑bearing, consequential facts you should accept up front:
  • Unsupported installs are unsupported. Microsoft’s position is unchanged: installing Windows 11 on machines that do not meet the official requirements is not guaranteed to be entitled to future feature updates or troubleshooting support. That matters for security and for warranty/enterprise support decisions.
  • Using Rufus to bypass checks or applying registry hacks shifts you out of the supported path. Many hobbyists and technicians accept that for one‑off builds or home use, but organizations should not rely on these bypasses for production devices. fileciteturn0file2turn0file11
  • Even when unsupported installs work for months, update behaviour is variable. Community reports show mixed outcomes — some unsupported installs continue to receive updates, others see feature updates blocked or delayed; this is inherently subject to change as Microsoft alters installer and update logic over time. Expect uncertainty. fileciteturn0file7turn0file6
Practical guidance — step‑by‑step and recommendations
For home users, refurbishers, and technicians who need working advice right now, here’s a pragmatic, risk‑aware checklist.
1) If your device is eligible for Windows 11
  • Use Windows Update, the Windows 11 Installation Assistant, or the official Media Creation Tool on a supported host. These are the supported, least‑risky paths. If Windows Update offers the upgrade, take it; it preserves apps and settings and maintains update entitlement.
2) If the Media Creation Tool is failing on your Windows 10 host (short term)
  • Download the official Windows 11 ISO from Microsoft’s Download Windows 11 page and either mount it to run setup.exe (in‑place upgrade) or write it to USB with a trusted tool. Microsoft advised the ISO fallback when MCT builds misbehaved.
3) If you must use Rufus (unsupported bypass)
  • Use only the official Microsoft ISO; do not use third‑party tweaked ISOs. Run Rufus as Administrator on a working PC, insert a blank USB (8 GB+), select the ISO, and let Rufus prepare the drive. If you choose Rufus’ “Extended Windows 11 installation” options (to remove TPM/Secure Boot/RAM checks), understand you are creating an installer that will intentionally bypass official checks. Back up everything first. fileciteturn0file2turn0file18
4) If you prefer Ventoy (multi‑ISO convenience)
  • Update Ventoy to the latest official release (verify hashes) and use it as designed: copy ISOs to the Ventoy USB and select the image at boot. If you encounter a Windows setup error on older Ventoy builds, update Ventoy (some 1.1.x releases addressed specific Windows 11 setup errors). Always verify the ISO integrity before installing.
5) For technicians and IT admins — safer practices
  • Prefer a Windows 11 host to create installation media for multiple machines (the Media Creation Tool often behaves better when run on Windows 11 itself). Maintain a canonical ISO repository and validate checksums. Avoid applying unsupported bypasses at scale; they complicate future update management and support. fileciteturn0file3turn0file6
A worked example (concise, for experienced users)
  • Download Windows 11 ISO from Microsoft. Verify SHA‑256 if available.
  • Download the latest Rufus build from its official site and run it as Admin. Insert an 8 GB+ USB (it will be erased). In Rufus: Select the ISO → let Rufus choose sensible defaults → if you need to bypass checks, select the Extended/“remove requirements” options in the Windows User Experience dialog → click Start → after Rufus completes, either run setup.exe from File Explorer on the target PC (in‑place) or boot the target from the USB for a clean install. Test on a spare machine first and keep a verified recovery image. fileciteturn0file18turn0file2
Common pitfalls and how to avoid them
  • Antivirus false positives: Updated Ventoy executables (or other updated tooling) can trigger AV heuristics. Only proceed after you have downloaded releases from the official project page and verified signatures/hashes.
  • “Silent” MCT failures: If the Media Creation Tool terminates without creating media, check logs and prefer the official ISO download route until Microsoft publishes a patched MCT.
  • Drivers and firmware: Unsupported CPUs or missing instruction sets cannot be fixed by Rufus/Ventoy; check OEM firmware updates and enable fTPM / Secure Boot where applicable before trying bypasses — sometimes firmware toggles are all that’s needed to make a device eligible.
Policy and long‑term considerations
  • For businesses and compliance‑sensitive environments: avoid unsupported installs. The short‑term convenience of bypasses is outweighed by the long‑term risks: update entitlement, driver/firmware support, and compliance/warranty exposure. If you need more time, consider Extended Security Updates for Windows 10 or accelerate hardware refresh programs.
  • For hobbyists and home users: the community tools are valuable and widely tested — but always keep backups, test on non‑critical hardware, and be prepared to manage updates manually.
Developer and vendor signals
  • Ventoy’s maintainers actively release fixes when Windows installer behaviour changes; those releases can both improve reliability and temporarily trigger AV heuristics that look suspicious to signature‑based engines — a standard tradeoff when executables change. Verify downloads and hashes.
  • Rufus’ developer documents the bypass features and the rationale: convenience for diagnostic, repair, and testing scenarios — not a recommendation to deploy unsupported devices at scale. Read the Rufus changelog / FAQ and test before broad use.
What we don’t know (and how to think about future uncertainty)
  • Whether Microsoft will change update entitlement for existing unsupported installs in any specific, deterministic way is inherently uncertain. Community evidence shows mixed update behaviour; Microsoft’s official stance remains: unsupported installs are not guaranteed updates. Treat future update availability as an open variable and plan replacement/segmentation accordingly.
Bottom line — a practical take
  • If your PC meets Microsoft’s Windows 11 requirements: use Microsoft’s supported paths (Windows Update, Installation Assistant, MCT on a supported host).
  • If the MCT fails on a Windows 10 host: download the official ISO and use a trusted tool (Rufus or Ventoy) to create your USB — prefer Rufus if you need fine‑grained installer options, and Ventoy if you want multi‑ISO convenience. Verify checksums and test. fileciteturn0file3turn0file14
  • If you are intentionally bypassing hardware checks: do so only with full awareness of the security, update, and support tradeoffs. Use these methods on non‑critical machines and keep good backups. fileciteturn0file2turn0file11
Further reading and sources
  • Community archives and recent WindowsForum threads summarizing MCT problems and practical workarounds. fileciteturn0file3turn0file6
  • Rufus behaviour, changelogs, and community testing documenting the Extended Windows 11 installation mode.
  • Ventoy release notes and guidance about the 1.1.03 fixes for Windows 11 installation errors and how to mitigate AV false positives.
If you want it from us
If you’d like, we can:
  • Produce a shorter how‑to checklist (one page) optimized for home users that walks through a Rufus or Ventoy USB creation from scratch (including exact UI wording to look for).
  • Create a technician’s playbook (with exact DiskPart, reagentc, and verification steps) appropriate for IT teams preparing a fleet migration.
    Tell us which you prefer and we’ll prepare it — and if you want links to the official project pages and Microsoft download pages, say so and we’ll include verified URLs and SHA‑256 checksums for commonly used ISOs.
Acknowledgements
Research and community reporting summarized from recent WindowsForum threads and archives covering the MCT regressions, Rufus/ Ventoy behaviour, and practical mitigation strategies. See the cited thread summaries and release notes for the underlying detail. fileciteturn0file3turn0file18turn0file14
— End of feature

Source: baonghean.vn https://baonghean.vn/en/rufus-va-ventoy-cho-usb-cai-windows-11-tren-pc-khong-ho-tro-10308816.html
 

Back
Top