Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Saving a Windows Product Key to a Microsoft Account

Tip of the Week: Saving a Windows Product Key to a Microsoft Account

To activate Windows 10, every user will need a product key. Every legitimate version of the software has one, but often times, users will need the product key later down the road, only to find that they’ve lost it or tossed it. For this week’s tip, we’ll describe a way to link your software’s product key to a Microsoft account so that you’ll never lose it again.

Step One: Get a Microsoft Account
In order to link your Windows 10 product key to your Microsoft account, you’ll have to have a Microsoft account. If you don’t have an account under the Microsoft umbrella (hotmail, live, outlook, etc.) and depend on another platform such as Google or Apple, have your IT administrator set up a Microsoft account for you. This way you can know you have an authorized account that is ready to go.

Step Two: Link the Product Key to Your Account
Now that you have a Microsoft account that is authorized by your organization’s IT administrator, you can log in and navigate to Settings in the Windows 10 Start Menu. Click on Update & Security, and then on Activation.

The Activation page will read “Windows is activated with a digital license”. If it doesn’t, you can stop because your product key doesn’t enable you to digitize your license and you won’t be able to link your Microsoft account with Windows 10. If this happens to you it is important that you keep your Windows 10 product key on file.

If you have a digital license, you then have to change your type of account to successfully link your Windows 10 product key to your Microsoft account. To do this, open Settings and then click on Accounts. You will then click on Your Info. Find the hyperlink on the page that reads “Sign in with a Microsoft account instead” and click on that.

You will then sign in using your Microsoft account using your username and password and click the Sign In button at the bottom of the screen. Enter your Windows password if it is different, otherwise click Next and it will ask you to Set up a PIN. If you don’t want to set up a PIN, you can click on the “Skip this step” hyperlink on the left side of the box.

Step Three: Verification
To check to see if this process has been successful, open your Settings, click on Update & Security, click on Activation, and you will see “Windows is activated with a digital license linked to your Microsoft Account” under the Activation subheading in the main box under Windows.

To protect your software and yourself, knowing the best practices of software management is important. If you would like to know more great tips and tricks in Windows 10, visit our blog regularly.

5 Security Analogies to Help You Better Understand...
BDR Needs to Be a Business Priority


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, July 21 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Network Security Hackers Business Computing Backup Hosted Solutions Malware Managed IT Services Google VoIP Mobile Devices Microsoft Disaster Recovery Software Productivity Business Internet Business Continuity Email Data Innovation Outsourced IT Data Backup Efficiency Cybercrime communications IT Support Smartphones Windows 10 Ransomware Computer IT Services Browser Android Cloud Computing Hardware Data Recovery Internet of Things Office BDR Business Management Telephone Systems Tech Term Windows Alert Saving Money Computers Server Upgrade Virtualization User Tips Mobile Device Management Network Small Business Smartphone Cybersecurity Social Engineering Save Money Law Enforcement Microsoft Office Collaboration Quick Tips Managed IT BYOD Chrome Workplace Tips Work/Life Balance Router Office Tips Firewall Managed Service Provider Avoiding Downtime Bandwidth Productivity Money Facebook Recovery Artificial Intelligence Holiday Password Office 365 Private Cloud Communication Social Media Miscellaneous Hacking Passwords Mobility How To App Data Security Bring Your Own Device VPN Applications Proactive IT Remote Monitoring HaaS Business Intelligence Automation Operating System Budget Gmail Information Technology Health Two-factor Authentication Redundancy Data Protection Flexibility Wi-Fi Phishing Data Management Compliance Google Drive Connectivity Mobile Device Cleaning Risk Management Vulnerability Data Breach Employer-Employee Relationship SaaS Managed IT Services Big Data Identity Theft Blockchain Safety Windows 10 Value Word Document Management User Error Marketing Entertainment Gadgets Black Market Apps Spam Legal Spam Blocking Battery Data loss Training Downtime Paperless Office Update Education IT Support History Content Filtering DDoS Best Practice Charger CES Data storage Shadow IT Networking Electronic Medical Records Smart Tech Website Government Data Storage Workers End of Support Solid State Drive Content Management Meetings Internet Exlporer Hiring/Firing Wireless YouTube Computer Care Apple HIPAA The Internet of Things Samsung eWaste Credit Cards Windows 7 Patch Management Sports Business Owner IT Management Keyboard Public Cloud Settings Scam OneNote Remote Computing Streaming Media IT Plan Wireless Technology Access Control Save Time Unsupported Software Servers Encryption Infrastructure PDF Worker Comparison Automobile Computing Infrastructure Wearable Technology USB Analysis Physical Security Mobile Computing webinar Rootkit Nanotechnology Specifications hacker Mobile Office Sync Television Smart Office Evernote Troubleshooting Business Mangement Accountants IT solutions Software as a Service NIST Conferencing Millennials Content HBO Telephony Windows 10s Public Computer Hosted Solution Recycling Two Factor Authentication Screen Mirroring Cryptocurrency Vendor Management Devices Workforce Audiobook Wireless Charging Frequently Asked Questions Going Green Skype Robot Tech Support Students Antivirus Criminal Safe Mode IoT Google Docs Relocation Cast Laptop Thought Leadership Telecommuting Politics Fiber-Optic Excel Hard Drives Start Menu Video Games Audit Healthcare IaaS File Sharing Distributed Denial of Service WiFi Users Touchpad Unified Threat Management Content Filter Remote Work Cables Tip of the week Mobile Scalability Outlook Computer Fan IBM Electronic Health Records Books Business Technology Insurance Voice over Internet Protocol Virtual Reality Knowledge Storage Unified Communications Internet exploMicrosoft Windows Server 2008 Professional Services Instant Messaging Humor FENG Supercomputer Machine Learning Emergency Virtual Assistant Mouse Employer Employee Relationship Practices Multi-Factor Security Worker Commute iPhone Data Warehousing Network Congestion Emails Theft Advertising Human Resources Tools Search Monitor Current Events Telephone System Computer Accessories Hosted Computing Trending NarrowBand Lithium-ion battery Addiction Environment Fraud Cortana Regulations Staff How to Reputation Running Cable Bluetooth Inventory Lifestyle Files IT Consultant Techology Loyalty Cache Amazon Experience Google Apps Hybrid Cloud Transportation Digital Signature Botnet Customer HVAC SharePoint Colocation Chromecast Leadership Netflix Wireless Internet Amazon Web Services Music Benefits Strategy Travel Root Cause Analysis Enterprise Content Management Authentication Software Tips Flash Uninterrupted Power Supply Notifications Assessment Wire Online Shopping Password Manager People Smart Technology Fax Server Password Management Administration Thank You Congratulations Twitter Company Culture Webinar Managing Stress IT solutions CrashOverride

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!