Vue normale

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.
Hier — 16 mai 2025Flux principal
À partir d’avant-hierFlux principal

Enable Device Encryption on Windows 11

13 mai 2025 à 22:09
Device Encryption is a Windows feature that automatically enables BitLocker-based encryption on the system drive and other fixed drives, protecting personal data from unauthorized access without requiring complex setup. It is especially valuable on Windows Home devices, where traditional BitLocker management features are unavailable.

Source

Check the Windows Server version to determine if an in-place upgrade to Server 2025 is supported

25 avril 2025 à 18:28
Before upgrading to Windows Server 2025, check your existing Windows Server version to determine if an in-place upgrade is feasible. You can check the Windows version via the graphical user interface, Windows PowerShell, or the command prompt.

Source

Disable NTLM authentication on Windows Server 2025

31 mars 2025 à 14:11
With Microsoft’s decision to deprecate NTLM (NT LAN Manager), it’s time to disable NTLM authentication on Windows Server 2025 and move toward more secure alternatives. NTLMv1 has already been removed in Windows Server 2025 and Windows 11, version 24H2, signaling the beginning of NTLM’s end. Given the protocol’s vulnerabilities—like pass-the-hash attacks—organizations should begin transitioning to stronger authentication methods such as Kerberos, the preferred protocol in Active Directory environments.

Source

Using Windows Terminal Chat with GitHub Copilot

27 mars 2025 à 13:28
Terminal Chat enables the integration of GitHub Copilot, Azure OpenAI, and OpenAI's AI services into Windows Terminal Canary. Through this experimental feature, you can request assistance from an AI for your PowerShell commands and directly execute the AI's recommendations in the terminal.

Source

Install an iSCSI Server on Windows Server 2025

12 février 2025 à 16:29
Installing an iSCSI server on Windows Server 2025 enables the creation of scalable and flexible storage solutions by presenting remote drives as locally accessible resources. This guide provides a step-by-step approach to deploying an iSCSI server, configuring iSCSI virtual disks, and establishing connections to iSCSI targets from a client. Additionally, it examines the advantages and potential limitations of the iSCSI protocol.

Source

❌
❌