Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form

Tag: Microsoft Windows

How to install and Update Azure PowerShell on your Windows PC

Posted on 09/04/202011/09/2023 Christian By Christian No Comments on How to install and Update Azure PowerShell on your Windows PC
How to install and Update Azure PowerShell on your Windows PC

Here are the steps to install the Azure PowerShell module on Windows.– Install the Azure PowerShell modules using PowerShellGet (best method).– By installing (importing) windows module for PowerShell– By installing Azure PowerShell modules with the MSI Note: Azure PowerShell is also available in Azure Cloud Shell and is now preinstalled in Docker images. Example 1:…

Read More “How to install and Update Azure PowerShell on your Windows PC” »

AWS/Azure/OpenShift

Create a self-signed certificate and export it in PFX format via PowerShell [Part 1]

Posted on 09/04/202025/03/2024 Christian By Christian 2 Comments on Create a self-signed certificate and export it in PFX format via PowerShell [Part 1]
Create a self-signed certificate and export it in PFX format via PowerShell [Part 1]

A self-signed certificate is a certificate that is signed by the person or organization creating it rather than a trusted certificate authority. In this article, we shall discuss how to create a self-signed certificate and export it in PFX format via PowerShell [Part 1]. Please see how to Delete Quick Heal Anti-virus cfrbackup folder, and Generate a self-signed SSL certificate: How to enable…

Read More “Create a self-signed certificate and export it in PFX format via PowerShell [Part 1]” »

Scripts

How to create a KDS root key using PowerShell

Posted on 09/04/202009/10/2024 Christian By Christian No Comments on How to create a KDS root key using PowerShell
How to create a KDS root key using PowerShell

If you intend to use Group Managed Service Accounts (gMSAs) feature. You will have to create a root key for the group key distribution service within Active Directory. One great benefit is that the gMSA password management moves to the Windows operating system. In this article, we will discuss how to create a KDS root key using PowerShell….

Read More “How to create a KDS root key using PowerShell” »

Scripts

Import certificates into Trusted Root and Personal certificate store

Posted on 09/04/202021/01/2026 Christian By Christian No Comments on Import certificates into Trusted Root and Personal certificate store
Import certificates into Trusted Root and Personal certificate store

Trusted Root Certification Authorities certificate store is configured with a set of public CAs that have met the requirements of the Microsoft Root Certificate Program. Administrators can configure the default set of trusted CAs and install their own private CA for verifying software. In this article, I will show you how to Import certificates into…

Read More “Import certificates into Trusted Root and Personal certificate store” »

Windows Server

Request a certificate signing request in Windows using Microsoft Management Console

Posted on 09/04/202003/03/2025 Christian By Christian No Comments on Request a certificate signing request in Windows using Microsoft Management Console
Request a certificate signing request in Windows using Microsoft Management Console

In this article, we shall discuss how to Request a certificate signing request in Windows using Microsoft Management Console. SSL certificates are what enable websites to move from HTTP to HTTPS, which is more secure. An SSL certificate is a data file hosted in a website’s origin server. See the following interesting guides on how…

Read More “Request a certificate signing request in Windows using Microsoft Management Console” »

Windows Server

Active Directory Contact and a User Account Object Differences

Posted on 09/04/202001/10/2023 Christian By Christian No Comments on Active Directory Contact and a User Account Object Differences
Active Directory Contact and a User Account Object Differences

In the Active Directory (AD) environment, both the user accounts and contact objects are used to manage and organize information about individuals or entities. But they serve different purposes and have distinct characteristics. See this article on how to create a contact in Active Directory. In this short piece, we shall be discussing the differences…

Read More “Active Directory Contact and a User Account Object Differences” »

Security | Vulnerability Scans and Assessment, Windows Server

Synchronize your Domain Controller with an external time source

Posted on 08/04/202018/12/2025 Christian By Christian 3 Comments on Synchronize your Domain Controller with an external time source
Synchronize your Domain Controller with an external time source

Network Time Protocol (NTP) is a protocol designed to time-synchronize a network of machines. NTP runs on User Datagram Protocol (UDP), which in turn runs on IP. Whenever you experience a drift in your servers, below are the steps to synchronize your domain controller with an external time source in your time zone. For related…

Read More “Synchronize your Domain Controller with an external time source” »

Windows Server

Failed to create a new scheduled task name RemoteException: Cannot create the file when that file already exists

Posted on 08/04/202001/10/2024 Christian By Christian No Comments on Failed to create a new scheduled task name RemoteException: Cannot create the file when that file already exists
Failed to create a new scheduled task name RemoteException: Cannot create the file when that file already exists

Windows Task Scheduler enables you to perform routine tasks in Windows on individual PCs. Task Scheduler does this by monitoring whatever criteria you choose. This is referred to as “triggers” and then executing the tasks when those criteria are met. In this guide, you will learn how to resolve the following error “Failed to create…

Read More “Failed to create a new scheduled task name RemoteException: Cannot create the file when that file already exists” »

Windows Server

Could not open a connection to the host, on the port, connect failed

Posted on 07/04/202001/10/2023 Christian By Christian No Comments on Could not open a connection to the host, on the port, connect failed
Could not open a connection to the host, on the port, connect failed

Telnet is a client/server application protocol that provides access to virtual terminals of remote systems on local area networks or the Internet. Telnet consists of two components: the protocol itself which specifies how two parties to communicate and the software application that provides the service. For more related Windows Operating System errors you can read…

Read More “Could not open a connection to the host, on the port, connect failed” »

Windows Server

The push installation of the agent failed for the computer – Error message (67) The network cannot be found

Posted on 07/04/202018/09/2023 Christian By Christian No Comments on The push installation of the agent failed for the computer – Error message (67) The network cannot be found
The push installation of the agent failed for the computer – Error message (67) The network cannot be found

Encryption is another main feature of DriveLock that can help you secure sensitive information. It provides an additional layer of security for your organization’s data by enforcing encryption on data sent and copied to removable drives. Moreover, you can use the DriveLock Full Disk Encryption option to encrypt hard disks, including the system partition, and…

Read More “The push installation of the agent failed for the computer – Error message (67) The network cannot be found” »

Security | Vulnerability Scans and Assessment

How to resolve request timed out when pinging

Posted on 07/04/202003/07/2025 Christian By Christian 1 Comment on How to resolve request timed out when pinging
How to resolve request timed out when pinging

Ping is a network administration utility used to test the reachability of a host on an Internet Protocol network. This command is used for troubleshooting the accessibility of devices between two endpoints. In this article, we shall discuss how to resolve request timed out when pinging. Please see Unable to Ping an EC2 Instance, how…

Read More “How to resolve request timed out when pinging” »

Windows Server

The DriveLock server returned an invalid or unrecognized response

Posted on 06/04/202001/10/2024 Christian By Christian No Comments on The DriveLock server returned an invalid or unrecognized response
The DriveLock server returned an invalid or unrecognized response

Encryption is another main feature of DriveLock that can help you secure sensitive information. It does this by enforcing encryption when copying data to removable drives. In this article, we shall discuss how to fix “The following server could not be reached or validated: The DriveLock server returned an invalid or unrecognized response”. Please see…

Read More “The DriveLock server returned an invalid or unrecognized response” »

Security | Vulnerability Scans and Assessment

How to perform DriveLock quick setup

Posted on 06/04/202010/09/2023 Christian By Christian No Comments on How to perform DriveLock quick setup
How to perform DriveLock quick setup

Encryption is another main feature of DriveLock that can help you secure sensitive information by enforcing encryption when data is copied to removable drives. You can use the DriveLock Full Disk Encryption option to encrypt hard disks, including the system partition, and to perform pre-boot authentication with a single sign-on to Windows. DriveLock can also…

Read More “How to perform DriveLock quick setup” »

Security | Vulnerability Scans and Assessment

Posts pagination

Previous 1 … 51 52 53 … 61 Next

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • Featured image
    Latest Improvement to File Explorer on Windows 11 Windows
  • screenshot 2020 05 05 at 22.42.35
    How to run Windows applications on Linux via WineHQ Linux
  • mountedimagenotaccessible
    Unable to access the image: Make sure that the image path exist Windows
  • Disable Hardware Acceleration in Browsers and Windows
    How to Disable Hardware Acceleration in Browsers and Windows Windows
  • How to configure Cisco switches A step by step guide
    How to configure a console port password on Cisco Router Network | Monitoring
  • banner 3
    How to Set Network Adapter Priority on Windows 11 Network | Monitoring
  • Screenshot 4
    Veeam Agent for AIX: Initial Deploy/UUID Error Network | Monitoring
  • upgrade Microsoft SQL Server
    How to upgrade Microsoft SQL Server 2019 to 2022 Oracle/MSSQL/MySQL

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,808 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive