Use cases
Software Products E-commerce MSPs Schools Development & Marketing DevOps Agencies Help Desk
Company
Internet Status Blog Pricing Log in Get started free

Outage in YSoft SAFEQ Cloud

Incident - SAFEQ Cloud - Potential issues with PC Client

Resolved Minor
March 26, 2026 - Started 24 days ago - Lasted 6 days

Incident Report

Summary AI Generated

YSoft SAFEQ Cloud experienced printing issues across all data centers due to version 2026.03.05.10 of the PC Client, with the problem appearing to stem from a security update that hardened TLS 1.3 and HTTP/2 protocols, causing connectivity problems in environments using SSL packet inspection tools. The incident affected users for approximately 149 hours, though widespread impact was not observed throughout most of the duration. The issue was resolved through a workaround of rolling back the PC Client to the previous version, which was confirmed effective by multiple field teams.

We are investigating alerts that we have received, and version 2026.03.05.10 of our Cloud Client is affecting printing across all data centers,**Workaround:** Rolling back the PC Client to the previous version resolves the issue. This has been confirmed by multiple field teams.Updates will follow on this channel.

Trusted by 1,000+ teams

The Status Page Aggregator with Early Outage Detection

Stop finding out about outages from your users. Monitor 6,320+ cloud services and get alerted the second something breaks.

Start Free Trial
  • No credit card
  • 14-day trial
  • 2-minute setup
IsDown status aggregator dashboard
Latest Updates ( sorted recent to last )
INVESTIGATING 24 days ago - at 03/26/2026 10:46AM

We are investigating alerts that we have received, and version 2026.03.05.10 of our Cloud Client is affecting printing across all data centers,**Workaround:** Rolling back the PC Client to the previous version resolves the issue. This has been confirmed by multiple field teams.Updates will follow on this channel.

INVESTIGATING 24 days ago - at 03/26/2026 11:23AM

We are currently investigating the reported issue and our team is actively working to identify the root cause. At this time, we are not observing widespread or global impact, and the majority of users remain unaffected.The previously communicated workaround continues to be effective. We will provide further updates as our investigation progresses. Thank you for your patience.

INVESTIGATING 24 days ago - at 03/26/2026 12:48PM

Our investigation is ongoing and we continue to actively monitor the situation. While we have been unable to reproduce the issue in our environment so far, we remain committed to identifying the root cause.The previously communicated workaround remains effective in the meantime.We will post our next update in approximately one hour. Thank you for your continued patience.

INVESTIGATING 24 days ago - at 03/26/2026 01:47PM

Our investigation is ongoing and we continue to actively monitor the situation. While we still have been unable to reproduce the issue in our environment so far, we remain committed to identifying the root cause.The previously communicated workaround remains effective in the meantime.We will post our next update by the end of the day. Thank you for your continued patience.

MONITORING 23 days ago - at 03/26/2026 05:21PM

While we have not been able to fully identify the root cause of the reported issue, we have not observed continued or widespread impact throughout the day. Our team will continue monitoring the situation and investigating further. As a precautionary measure, we advise that a downgrade is available as a fallback option should any issues arise. We will continue to provide updates if the situation changes. Thank you for your patience and understanding.

MONITORING 23 days ago - at 03/27/2026 03:09PM

Our investigation and monitoring are ongoing, and we wanted to share our current working theory.We're analysing the recent security update in the PC client, which hardens preference for TLS 1.3 and HTTP/2 over older protocols. Based on our analysis so far, this change appears to cause connectivity problems in environments where SSL packet inspection tools (such as SSL analysers or deep packet inspection proxies) are in use.If you are affected and have such tools in your environment, a downgrade to the previous version remains available as a fallback and is recommended until a resolution is in place.We will continue analysing and monitoring the situation and will provide further updates as our investigation progresses. Thank you for your patience and understanding.

The Status Page Aggregator with Early Outage Detection

With IsDown, you can monitor all your critical services' official status pages from one centralized dashboard and receive instant alerts the moment an outage is detected. Say goodbye to constantly checking multiple sites for updates and stay ahead of outages with IsDown.

Start free trial

No credit card required · Cancel anytime · 6320 services available

Integrations with Slack Microsoft Teams Google Chat Datadog PagerDuty Zapier Discord Webhook