Sign in with Microsoft
Sign in or create an account.
Hello,
Select a different account.
You have multiple accounts
Choose the account you want to sign in with.
Créer un support d’installation pour Windows - Support Microsoft
Pour créer le support d’installation, voici ce dont vous avez besoin : Un PC disposant d’une connexion Internet fiable. La durée du téléchargement variera en fonction de votre connexion internet.
Crear medios de instalación de Windows - Soporte técnico de Microsoft
Para crear el medio de instalación, aquí puedes encontrar lo que necesitarás: Un equipo con una conexión estable a Internet. El tiempo de descarga variará en función de la conexión a Internet.
Fix problems with the Start menu - Microsoft Support
Sign out of your account and then sign in to your new account. If everything is fixed, move your personal data and files to the new account. To move your personal files from your old account to your new account, try opening File Explorer, expanding This PC > OSDisk (C:), and looking in the Users folder, where you should see folders for both accounts.
Control the formatting when you paste text - Microsoft Support
Merge Formatting (M) This option discards most formatting that was applied directly to the copied text, but it retains formatting that is considered emphasis, such as bold and italic, when it is applied to only a portion of the selection.The text takes on the style characteristics of the paragraph where it is pasted. The text also takes on any direct formatting or character style properties of ...
Applies To: Word for Microsoft 365, Word 2021, Word 2019, Word 2016, Word 2013
Turn on app permissions for your microphone in Windows 10
Once you've allowed microphone access to your apps, you can change the settings for each app. In Microphone settings, go to Choose which Microsoft apps can access your microphone, and turn on apps you want to use with it.For desktop apps, make sure that Allow desktop apps to access your microphone is turned on.
Remove specific prevalent malware with Windows Malicious Software ...
Microsoft generally releases the MSRT on a monthly cadence as part of Windows Update or as a standalone tool. (For exceptions, see Skipped releases.)Use this tool to find and remove specific prevalent threats and reverse the changes that they made (see Covered malware families).For comprehensive malware detection and removal, consider using Windows Defender Offline or Microsoft Safety Scanner.
Fixes or workarounds for recent issues in Outlook for PC
Then, create REG_SZ values in this key for each form you wish to allow scripts to run. In the above example, you would create a REG_SZ value named “IPM.Note.Custom” with empty data. When designing a form, Run This Form will run a form using the message class of the base form. So if you started designing an IPM.Note form and want to Run This Form, you will need to have IPM.Note registered.
Applies To: Outlook for Microsoft 365, Outlook 2021, Outlook 2019, Outlook 2016
How to go passwordless with your Microsoft account
Going passwordless refers to removing your password and using a passwordless method to sign in instead. Passwordless solutions such as Windows Hello, the Microsoft Authenticator app, SMS or Email codes, and physical security keys provide a more secure and convenient sign-in method. While passwords can be guessed, stolen, or phished, only you can provide fingerprint authentication, or provide ...
Applies To: Microsoft account dashboard
"Access Denied" or other errors when you access or work with files and ...
If the Encrypt contents to secure data check box is selected, you have to have the certificate that was used to encrypt the file or folder to be able to open it. In this situation, you should obtain the certificate from the person who created or encrypted the file or folder, or have that person decrypt the file or folder.
32-bit and 64-bit Windows: Frequently asked questions
To install a 64-bit version of Windows, you need a CPU that's capable of running a 64-bit version of Windows. The benefits of using a 64-bit operating system are most apparent when you have a large amount of random access memory (RAM) installed on your computer, typically 4 GB of RAM or more.