Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Free up filesystem root space How to fix the Filesystem root is running low on Disk space Virtualization
XCP ng installation and VM creation A-Z of XCP-ng and Xen Orchestra setup and VM Creation Virtualization
Backup is an attacker real target Hacker Thinking in Ransomware Attacks: Backup Is the real Target Backup
BitLocker Loop fix Bypassing BitLocker Loop by Unlocking or Disabling or PC Reset Windows
Unable to reinstall Deploy Service SSH Veeam Host Components: Unable to reinstall Deploy Service SSH Backup

How to target WSUS clients with the registry keys

Posted on 10/03/201814/04/2025 Christian By Christian 8 Comments on How to target WSUS clients with the registry keys
How to target WSUS clients with the registry keys

The Windows Registry is a hierarchical database that stores low-level settings for the Microsoft Windows operating system and for applications that opt to use the registry. The kernel, device drivers, services, Security Accounts Manager, and user interface can all use the registry. In this article, you will learn how to target WSUS clients with registry…

Read More “How to target WSUS clients with the registry keys” »

Windows Server

How to configure Windows server update services

Posted on 10/03/201801/05/2024 Christian By Christian No Comments on How to configure Windows server update services
How to configure Windows server update services

In this article, we shall discuss How to configure Windows server update services (WSUS) on Windows server 2019. Windows server update services are needed to download updates from Microsoft and store them locally on the WSUS server. It decreases data transfer over the WAN link for multiple servers, preventing the need for installing essential Windows…

Read More “How to configure Windows server update services” »

Windows Server

Configure failover for ManageEngine Password Manager Pro

Posted on 09/03/201823/03/2024 Christian By Christian No Comments on Configure failover for ManageEngine Password Manager Pro
Configure failover for ManageEngine Password Manager Pro

Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises. Please see how to create Virtual Hosts in a WAMPserver. In this article, I will show you how to configure failover for ManageEngine Password Manager. Please see How To Setup A New…

Read More “Configure failover for ManageEngine Password Manager Pro” »

Password Manager

How to setup and configure Jitsi as SoftPhone

Posted on 09/03/201821/03/2024 Christian By Christian No Comments on How to setup and configure Jitsi as SoftPhone
How to setup and configure Jitsi as SoftPhone

Jitsi is a Secure and Simple Video Conferencing and Instant Messaging application that can be run on Windows, Linux, Mac etc. This is a standalone application that supports instant messaging and telephony protocols (OTR and SIP etc.). In this article, you will learn how to set up and configure Jitsi as SoftPhone. Here are some…

Read More “How to setup and configure Jitsi as SoftPhone” »

Network | Monitoring

Access EC2 Linux Instance via the Password

Posted on 09/03/201822/02/2025 Christian By Christian No Comments on Access EC2 Linux Instance via the Password
Access EC2 Linux Instance via the Password

An Amazon EC2 instance is a virtual server in Amazon’s Elastic Compute Cloud (EC2) for running applications on the Amazon Web Services (AWS) infrastructure. In this article, we will describe how to access EC2 Linux Instance via the Password. Please see Create Folders and Enable File sharing on Windows, How to deploy Ansible AWX on centos…

Read More “Access EC2 Linux Instance via the Password” »

AWS/Azure/OpenShift

AWS Flow Logs IAM Role Setup

Posted on 09/03/201818/12/2025 Christian By Christian No Comments on AWS Flow Logs IAM Role Setup
AWS Flow Logs IAM Role Setup

In this article, we shall discuss “AWS Flow Logs IAM Role Setup” To effectively monitor traffic within your VPC, subnet, or network interface using flow logs, it’s crucial to have the required permissions to create AWS Flow Logs roles. Please, see Logon Failure Reasons for Windows Event Viewer, how to Add and Remove Multiple Virtual…

Read More “AWS Flow Logs IAM Role Setup” »

AWS/Azure/OpenShift

Upgrade ManageEngine Password Manager Pro

Posted on 18/11/201726/04/2023 Christian By Christian No Comments on Upgrade ManageEngine Password Manager Pro
Upgrade ManageEngine Password Manager Pro

Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises. Please see How to Upgrade Windows 11 Pro to Enterprise and vice Versa, How to update Fujitsu server BIOS, How to enable Hyper-V on a VMware Workstation, how to Enable automatic update…

Read More “Upgrade ManageEngine Password Manager Pro” »

Password Manager

All About Windows Server 2016

Posted on 18/11/201712/01/2024 Christian By Christian No Comments on All About Windows Server 2016
All About Windows Server 2016

Microsoft Windows Server 2016 is an operating system built by Microsoft and is the successor of Windows Server 2012. It is the server edition of Windows 10 and is available since September 2016. Installing Windows Server 2016, you should choose the right version of Windows to install because currently, Microsoft does not provide the option to…

Read More “All About Windows Server 2016” »

Windows Server

How to grant Access to User Mailbox

Posted on 18/11/201716/07/2024 Christian By Christian No Comments on How to grant Access to User Mailbox
How to grant Access to User Mailbox

This article will discuss the steps on How to grant Access to User Mailbox. Since we will be utilizing the Exchange Admin Center (EMC) for this, lets discuss what it is. EAC is the web-based management console in Exchange Server that’s optimized for on-premises, online, and hybrid Exchange deployments. Please see How to add or…

Read More “How to grant Access to User Mailbox” »

Network | Monitoring

How to uninstall AWS CLI in Windows

Posted on 16/11/201715/12/2023 Christian By Christian No Comments on How to uninstall AWS CLI in Windows
How to uninstall AWS CLI in Windows

Managing your AWS services becomes seamless with the AWS CLI in Windows. In this article, we shall discuss how to uninstall AWS CLI in Windows. Download and configure this unified tool to control and automate AWS services through scripts, simplifying your workflow. Easily control and automate services using this unified tool. Kindly refer to some…

Read More “How to uninstall AWS CLI in Windows” »

AWS/Azure/OpenShift

How to configure WatchGuard WebCenter

Posted on 16/11/201723/04/2024 Christian By Christian No Comments on How to configure WatchGuard WebCenter
How to configure WatchGuard WebCenter

In this guide, we shall discuss “how to configure WatchGuard WebCenter”. When you configure WatchGuard WebCenter, you unlock a dynamic, interactive, real-time web UI application. With just a click, seamlessly navigate pages, access detailed log messages, reports, and certificate management. Here are other exciting guides on Microsoft apps to read about: How to Use a Whiteboard…

Read More “How to configure WatchGuard WebCenter” »

Network | Monitoring

How to set up WatchGuard Log Server

Posted on 16/11/201709/10/2024 Christian By Christian No Comments on How to set up WatchGuard Log Server
How to set up WatchGuard Log Server

In this article, we shall discuss the steps on how to set up WatchGuard Log Server. To effectively manage your network security, it’s crucial to set up a WatchGuard Log Server. This key component of WatchGuard Server Center acts as a local database, efficiently collecting log message data from every connected Firebox. Nonetheless, Gain real-time…

Read More “How to set up WatchGuard Log Server” »

Network | Monitoring

How to extend System Drive Partition on Windows

Posted on 15/11/201727/04/2025 Christian By Christian No Comments on How to extend System Drive Partition on Windows
How to extend System Drive Partition on Windows

You can use Disk Management to add space to an existing volume, extending it into empty space on the drive, but only if the empty space doesn’t have a volume on it (it’s unallocated) and comes immediately after the volume you want to extend, with no other volumes in-between, as shown in the following image….

Read More “How to extend System Drive Partition on Windows” »

Windows

Posts pagination

Previous 1 … 159 160 161 … 166 Next

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • Windows 11
    How to Change the Lock Screen Wallpaper in Windows 11 Network | Monitoring
  • yarnfinalfeature
    How to Install and Uninstall Yarn on Ubuntu Linux Linux
  • slide office 365 79
    Configure WSUS Email Notification for Office365 Windows Server
  • homebrew social card
    Package Manager for macOS: How to install Homebrew on macOS Mac
  • fsa
    How to prevent MacBook from automatically Logging out Mac
  • dsdfg
    Create a Bootable USB Drive Using dd Command on Linux Linux
  • Banner
    How to Scan Your Code by Integrating SonarCloud into Your GitHub Repository Security | Vulnerability Scans and Assessment
  • Root
    Change your root password: Manage the root user on your macOS Mac

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,832 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.