Skip to content

“PowerShell, Active Directory & IT Automation Simplified”

Sign In
  • Home
  • About Me
  • Join the Facebook group

Category: Microsoft

  • Home
  • Microsoft
  • Page 4
Microsoft

Microsoft: Critical worm hole could be exploited within 30 days

by antoniorennvickMarch 15, 2012

There is a critical vulnerability in many versions of Windows, which could be exploited to spread a worm automatically between vulnerable computers. Microsoft has issued a patch, urging owners of vulnerable PCs to fix their…

Windows 8

Install .NET frameworks in windows 8 manually.

by antoniorennvickMarch 15, 2012

Try to add the feature. Click here to see the tutorial. If it fails to add the feature you have to add the feature manually. First insert the window 8 DVD. Open the command prompt…

WIndows 7

Windows 7 presentation on Features and Edition Comparison.

by antoniorennvickMarch 15, 2012

A simple presentation on windows 7 feature and edition comparison. it includes some enterprise level usable features and graphical features (GUI features)  Click here to download the presentation

Windows 8

Microsoft removes start button in Windows 8

by antoniorennvickMarch 15, 2012

“Say goodbye to the Windows start button. Microsoft has gotten rid of it from the latest build of Windows 8.” Hitting the Web over the weekend, screenshots of the new Windows 8 build display the…

Windows 8

How to install .Net Framework 3.5.1 on Windows 8 Developer Preview

by antoniorennvickMarch 13, 2012

Go to control panel and select Programs and Features . In the left side of the Programs and Features click Turn Windows features on or off.    3. A window will appear and in the…

Windows 8

Windows 8 Consumer Preview

by antoniorennvickMarch 8, 2012

Windows 8 VIEW SLIDE SHOW DOWNLOAD ALL To download WINDOWS 8 click here! [tweetmeme only_single="false"]

Windows Server

Internet Explorer Proxy Settings via Group Policy

by antoniorennvickNovember 9, 2011

Antonio Rennvick Annoson 1. Open group policy Manager. 2. Create a group policy.     3. Name the policy with a suitable name. 4. Right click the newly created policy and select edit. 5.In group policy management…

Posts pagination

Previous 1 … 3 4

Recent Posts

  • Microsoft Intune Cloud PKI: A Deep Technical Dive into Architecture, Security, and Deployment
  • Phish‑Resistant MFA on Linux with Microsoft Entra Single Sign‑On: A Deep Technical Guide
  • Cross‑Tenant Synchronization in Microsoft Entra ID: Deep‑Dive Configuration, Architecture, and Security Best Practices
  • Microsoft Entra Conditional Access Optimization Agent: A Deep Technical Guide for Security Architects
  • The Evolution of Microsoft Entra ID: From Azure Active Directory to a Modern Identity Control Plane

Recent Comments

  1. How to protect your RDP session with a SSL certificate. – Antonio's Blog on How to purchase a SSL certificate
  2. Eimear Serious on Translate a document or a web site from one language to another language………………
  3. Celena Radick on Counter-Strike: Global Offensive
  4. nataliewhitegame on Counter Strike With Hamachi
  5. Install .NET frameworks in windows 8 manually. « Antonio's Blog on How to install .Net Framework 3.5.1 on Windows 8 Developer Preview

Archives

Categories

Active Directory (11) ADFS (2) Azure (3) Cloud Identity (1) Cloud Security (1) Conditional Access (1) Cybersecurity (4) Email Authentication (1) Email Security (1) Enterprise Security (1) Exchange (2) Game (2) Identity & Access Management (2) Identity Security (1) LAPS (1) Microsoft (11) Microsoft 365 (1) Microsoft Entra (5) Microsoft Exchange (1) Microsoft Intune (1) Mobile (4) NTP Server (1) NVIDEA (1) Open Source (2) Performance (1) Phishing Protection (1) PKI & Certificates (1) PowerShell (2) RADIUS (1) Security (6) Security Copilot (1) Social Network (4) Start screen (1) Technical (3) Tech Tips (3) Thunderbird (1) Troubleshooting (17) Uncategorized (34) Windows (5) WIndows 7 (4) Windows 8 (12) Windows 8.1 (4) Windows 10 (7) Windows 11 (5) Windows 11 Tips (11) Windows Server (7) Windows Server (1) Windows Server 2008 R2 (1) Windows Store (1) Zero Trust (2)

Tags

Azure AD B2B (1) Certificate-Based Authentication (2) Conditional Access (2) Cross-Tenant Sync (1) DirectAccess (1) Enterprise Identity (1) IAM (1) Intune (2) Intune Cloud PKI (1) Linux Security (1) microsoft (2) Microsoft 365 Security (1) Microsoft Entra (3) Microsoft Entra ID (1) microsoft exchange (2) Microsoft Identity Broker (1) Microsoft Intune (1) migration (1) NTP (2) office 365 (1) office 365 for education (1) Phishing-Resistant MFA (1) PKI (1) SCEP (1) Server (1) Smart Card Authentication (1) SSO (1) ubuntu (1) YubiKey (1) Zero Trust (4)

© 2026 Core365 Cloud. All rights reserved.