Prerequisites Ensure port 445 is open: The SMB protocol requires TCP port 445 to be open. Connections will fail if port 445 is blocked. You can check if your firewall or ISP is blocking port 445 by using the Test-NetConnection cmdlet. See Port 445 is blocked. Using an Azure file share with Windows To use an Azure file Read More
Category: Microsoft Family
Microsoft Windows Servers, AD, Exchange, Azure, Windows 10, Office 365 and more
How to Install Windows 11 Without Internet?
You can press SHIFT+F10 keys to open Command Prompt. Execute OOBE\BYPASSNRO command then. After this, setup will reboot the computer and after reboot, you’ll get a new option I don’t have Internet or Continue with limited setup to skip the Internet requirement. Also, see if this video fix helps you:
How To Find Domain Controllers That Hold Master Roles
Use DCDIAG On a Windows Domain Controller, run the following command: Use the NTDSUTIL Tool NTDSUTIL is a tool included with Windows 2000 Server, Windows 2000 Advanced Server, and Windows 2000 Datacenter Server. This tool is can be used to verify change certain aspects of the Active Directory. The following is the steps needed to Read More
How to Backup Microsoft SQL Database by Using Transact-SQL
Create a full database backup by executing the BACKUP DATABASE statement to create the full database backup, specifying: The name of the database to back up.The backup device where the full database backup is written.The backup options like COPY_ONLY, COMPRESSION, etc. COMPRESSION will be very helpful to reduce the backup size.COPY_ONLY is very useful for Read More
How to Fix Windows Batch (.BAT) Only Execute the First Line
Solution 1 Bat file contents (if you want to stop batch when one of cmds errors) Bat file contents (if you want to continue batch when one of cmds errors)
How to Remove Computers from 365 Defender “Device Inventory”
If you can’t act on a device, for example if it’s offboarded or a duplicate, you can choose to have it excluded from threat and vulnerability management views. Excluded devices won’t be visible in any of the vulnerability management pages and reports, and they won’t have updated or relevant information about vulnerabilities. Not being able Read More