Rename a computer with PowerShell

Rename-Computer

In this “how” tutorial I will explain how to rename a computer in PowerShell. Using PowerShell allows you to go more empty than going through the graphical interface which requires going through several configuration windows. Rename a computer with PowerShell In a PowerShell prompt use: Rename-Computer The PowerShell command to rename a computer is Rename-Computer. …

Read moreRename a computer with PowerShell

Windows 10: install Hyper-V

In this tutorial, I will explain how to install Hyper-V on Windows 10. Hyper-V is a virtualization system that allows you to launch virtual machines. Before starting the installation, you must check the following prerequisites: Have virtualization activated at the Bios level. Have 4GB of memory (RAM)4 Have an Enterprise, Professional or Education version of …

Read moreWindows 10: install Hyper-V

Outlook : autodiscover disable SCP Active Directory

In this troubleshooting tutorial, we’ll see how to prevent Outlook autodiscover from using the Active Directory SCP point for mailbox configuration. What this type of “trick” is used for: If the computer environment in which you already have an Exchange installation and the mail servers have not been properly uninstalled. If you find yourself in …

Read moreOutlook : autodiscover disable SCP Active Directory

Hyper-V : enable nested virtualization

Presentation Nested virtualization is a feature available on Hyper-V from Windows Server 2016 and Windows 10, which enables virtualization options in a virtual machine. To put it simply, nested virtualization allows virtualization in a virtual machine. There are also some prerequisites : The Hyper-V host must be on Windows Server 2016/2019 or Windows 10 1607 …

Read moreHyper-V : enable nested virtualization

Remote desktop: configure who can connect

In this tutorial, we will see how to configure who can connect to the computer using Remote Desktop. This tutorial does not apply to RDS deployment, where this configuration is done at the collection level. This tutorial applies to computers and servers where the remote desktop is configured for takeover. There are several methods to …

Read moreRemote desktop: configure who can connect