Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Free up filesystem root space How to fix the Filesystem root is running low on Disk space Virtualization
XCP ng installation and VM creation A-Z of XCP-ng and Xen Orchestra setup and VM Creation Virtualization
Backup is an attacker real target Hacker Thinking in Ransomware Attacks: Backup Is the real Target Backup
BitLocker Loop fix Bypassing BitLocker Loop by Unlocking or Disabling or PC Reset Windows
Unable to reinstall Deploy Service SSH Veeam Host Components: Unable to reinstall Deploy Service SSH Backup

How to block the Change Password Feature for All Users via the Exchange Administrative Center

Posted on 11/04/201606/04/2023 Christian By Christian No Comments on How to block the Change Password Feature for All Users via the Exchange Administrative Center
How to block the Change Password Feature for All Users via the Exchange Administrative Center

Now, imagine you don’t want to give this feature to your end-users, or maybe not to all of them. In this case, you have to modify certain settings on the Exchange server side. To do this, you will have to log on to your company’s Exchange Administrative Center with an Exchange Admin account. Using this…

Read More “How to block the Change Password Feature for All Users via the Exchange Administrative Center” »

Network | Monitoring

How to change your password in Outlook Web Access

Posted on 11/04/201626/10/2023 Christian By Christian No Comments on How to change your password in Outlook Web Access
How to change your password in Outlook Web Access

in this article, we shall discuss how to change your password in Outlook Web Access. In Outlook Web Access, the process of changing your password is seamless and user-friendly. This functionality has been a part of Exchange OWA since version 5.5 and continues to be available even in Exchange 2013, where it’s automatically enabled. This…

Read More “How to change your password in Outlook Web Access” »

Network | Monitoring

Failed Edge Transport: Easy Guide For Removal

Posted on 11/04/201617/08/2023 Christian By Christian No Comments on Failed Edge Transport: Easy Guide For Removal
Failed Edge Transport: Easy Guide For Removal

In the realm of email operations, Failed Edge Transport servers handle vital inbound and outbound Internet mail flow. They serve as relays and smart hosts, bolstering your Exchange setup. Operating as guardians, agents on these servers offer extra shielding against spam and enforce mail flow rules (transport rules) for precise control. Open Command prompt with…

Read More “Failed Edge Transport: Easy Guide For Removal” »

Network | Monitoring

Map a Network Drive: How to mount a Network Drive

Posted on 11/04/201614/10/2024 Christian By Christian No Comments on Map a Network Drive: How to mount a Network Drive
Map a Network Drive: How to mount a Network Drive

In this article, we shall discuss hw to “Map a Network Drive: How to mount a Network Drive”. A mapped drive serves as a shortcut to a distinct drive on another device, granting access to shared resources within a local network. Here are the steps required in creating a network drive via Group policy (GPO)….

Read More “Map a Network Drive: How to mount a Network Drive” »

Windows

How to add or remove email addresses from a mailbox

Posted on 11/04/201617/08/2023 Christian By Christian No Comments on How to add or remove email addresses from a mailbox
How to add or remove email addresses from a mailbox

Easily enhance your mailbox by setting up proxy addresses to add or remove email addresses as needed. Streamline your communication. A proxy address lets a user receive an email sent to a different email address. Email messages sent to the user’s proxy address reach their primary email, SMTP, or default reply address. You can use…

Read More “How to add or remove email addresses from a mailbox” »

Network | Monitoring

Email Size Limits: Boost for High Profile Users in Exchange 2010

Posted on 11/04/201617/08/2023 Christian By Christian No Comments on Email Size Limits: Boost for High Profile Users in Exchange 2010
Email Size Limits: Boost for High Profile Users in Exchange 2010

When dealing with business communications, managing Email Size Limits becomes crucial. Email serves as a pivotal Business Critical application within virtually every organization. Given this context, optimizing your Exchange infrastructure’s performance is a top priority. A strategic move in this endeavor involves regulating the average message size your users can send and receive. The value…

Read More “Email Size Limits: Boost for High Profile Users in Exchange 2010” »

Network | Monitoring

OpenVZ template on Proxmox Server: How to Guide

Posted on 11/04/201617/08/2023 Christian By Christian No Comments on OpenVZ template on Proxmox Server: How to Guide
OpenVZ template on Proxmox Server: How to Guide

Welcome to our comprehensive “OpenVZ template on Proxmox Server: How to Guide.” In this informative exploration, we uncover how to enhance your virtualization experience using the software’s power. Whether you’re an IT professional or an enthusiast, follow a step-by-step guide to deploy and optimize the software effectively. It offers a remarkable solution for efficient resource…

Read More “OpenVZ template on Proxmox Server: How to Guide” »

Virtualization

How to update Cisco ASA

Posted on 11/04/201610/10/2024 Christian By Christian No Comments on How to update Cisco ASA
How to update Cisco ASA

Here is an “how to update Cisco ASA Software”. In the ever-evolving landscape of network security, ensuring that your Cisco ASA software is up-to-date is paramount. This guide simplifies updating Cisco ASA software, empowering you to enhance network resilience and protection. Please see How to enable ssh via ASDM on Cisco ASA, How to Activate…

Read More “How to update Cisco ASA” »

Network | Monitoring

Setup Cisco ASA: Wiping Old Configurations

Posted on 11/04/201622/02/2025 Christian By Christian No Comments on Setup Cisco ASA: Wiping Old Configurations
Setup Cisco ASA: Wiping Old Configurations

To setup Cisco ASA involves a crucial step: wiping old configurations. When embarking on the journey to setup Cisco ASA. It’s imperative to ensure a clean slate by removing previous settings and configurations. This guide will walk you through the process to “Setup Cisco ASA: Wiping Old Configurations”. Please see How to Shrink and Compact…

Read More “Setup Cisco ASA: Wiping Old Configurations” »

Network | Monitoring

Clone a Proxmox Container: CT Restoration Guide

Posted on 11/04/201612/08/2023 Christian By Christian No Comments on Clone a Proxmox Container: CT Restoration Guide
Clone a Proxmox Container: CT Restoration Guide

To clone a Proxmox Container, you have to know that Cloning is associated with VM machines, but when the term is used for containers, it simply means to create a new CT and restore a backup from an existing container. Kindly follow the steps to complete the cloning or restoration of a container.– Create a…

Read More “Clone a Proxmox Container: CT Restoration Guide” »

Virtualization

Administer Cisco ASA: Mastering CLI Management

Posted on 11/04/201612/08/2023 Christian By Christian No Comments on Administer Cisco ASA: Mastering CLI Management
Administer Cisco ASA: Mastering CLI Management

Having discussed how to administer Cisco ASA using the ASDM, here is a brief description of some important parameters. Interface: Identify the hardware interface or switch vlan interface. Enter interface config mode (e.g. e0/1) to assign and activate the switch port. Note: Names and security levels can also be assigned to a VLAN interface. Nameif:…

Read More “Administer Cisco ASA: Mastering CLI Management” »

Network | Monitoring

How to convert a VHDX file to a VHD

Posted on 11/04/201626/06/2024 Christian By Christian No Comments on How to convert a VHDX file to a VHD
How to convert a VHDX file to a VHD

You will learn how to convert a VHDX file to a VHD. The Virtual Hard Disk (VHD) file format can store the contents of a hard disk drive. Windows 7 and newer systems include the ability to manually mount VHD files. Here are some related articles: 3 Ways to Convert VMware VMs to Hyper-V, vCenter…

Read More “How to convert a VHDX file to a VHD” »

Virtualization

SSH access on Ubuntu server: Easy Guide

Posted on 11/04/201613/08/2023 Christian By Christian No Comments on SSH access on Ubuntu server: Easy Guide
SSH access on Ubuntu server: Easy Guide

To enable SSH access on your Ubuntu server, follow these steps. Open the Linux Terminal and enter the command below to initiate the installation. This process establishes secure remote connections, a crucial element in server administration, ensuring efficient management. SSH access on the Ubuntu server provides a secure and efficient way to manage your server…

Read More “SSH access on Ubuntu server: Easy Guide” »

Linux

Posts pagination

Previous 1 … 163 164 165 166 Next

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • Windows 11
    How to Change the Lock Screen Wallpaper in Windows 11 Network | Monitoring
  • yarnfinalfeature
    How to Install and Uninstall Yarn on Ubuntu Linux Linux
  • slide office 365 79
    Configure WSUS Email Notification for Office365 Windows Server
  • homebrew social card
    Package Manager for macOS: How to install Homebrew on macOS Mac
  • fsa
    How to prevent MacBook from automatically Logging out Mac
  • dsdfg
    Create a Bootable USB Drive Using dd Command on Linux Linux
  • Banner
    How to Scan Your Code by Integrating SonarCloud into Your GitHub Repository Security | Vulnerability Scans and Assessment
  • Root
    Change your root password: Manage the root user on your macOS Mac

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,832 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Server 2016

Copyright © 2025 TechDirectArchive