Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Saving a Windows Product Key to a Microsoft Account

Tip of the Week: Saving a Windows Product Key to a Microsoft Account

To activate Windows 10, every user will need a product key. Every legitimate version of the software has one, but often times, users will need the product key later down the road, only to find that they’ve lost it or tossed it. For this week’s tip, we’ll describe a way to link your software’s product key to a Microsoft account so that you’ll never lose it again.

Step One: Get a Microsoft Account
In order to link your Windows 10 product key to your Microsoft account, you’ll have to have a Microsoft account. If you don’t have an account under the Microsoft umbrella (hotmail, live, outlook, etc.) and depend on another platform such as Google or Apple, have your IT administrator set up a Microsoft account for you. This way you can know you have an authorized account that is ready to go.

Step Two: Link the Product Key to Your Account
Now that you have a Microsoft account that is authorized by your organization’s IT administrator, you can log in and navigate to Settings in the Windows 10 Start Menu. Click on Update & Security, and then on Activation.

The Activation page will read “Windows is activated with a digital license”. If it doesn’t, you can stop because your product key doesn’t enable you to digitize your license and you won’t be able to link your Microsoft account with Windows 10. If this happens to you it is important that you keep your Windows 10 product key on file.

If you have a digital license, you then have to change your type of account to successfully link your Windows 10 product key to your Microsoft account. To do this, open Settings and then click on Accounts. You will then click on Your Info. Find the hyperlink on the page that reads “Sign in with a Microsoft account instead” and click on that.

You will then sign in using your Microsoft account using your username and password and click the Sign In button at the bottom of the screen. Enter your Windows password if it is different, otherwise click Next and it will ask you to Set up a PIN. If you don’t want to set up a PIN, you can click on the “Skip this step” hyperlink on the left side of the box.

Step Three: Verification
To check to see if this process has been successful, open your Settings, click on Update & Security, click on Activation, and you will see “Windows is activated with a digital license linked to your Microsoft Account” under the Activation subheading in the main box under Windows.

To protect your software and yourself, knowing the best practices of software management is important. If you would like to know more great tips and tricks in Windows 10, visit our blog regularly.

5 Security Analogies to Help You Better Understand...
BDR Needs to Be a Business Priority


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 21 January 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Hackers Technology Backup Business Computing Network Security Malware Hosted Solutions Managed IT Services Disaster Recovery Microsoft VoIP Google Business Continuity Business Software Mobile Devices Productivity Outsourced IT Email Windows 10 Data Internet Smartphones communications Computer Hardware Innovation Efficiency IT Support Office Android Ransomware Cybercrime Alert Data Backup Server Telephone Systems IT Services Browser Windows Small Business Saving Money Computers Business Management Chrome Quick Tips Upgrade Social Engineering User Tips Mobile Device Management Microsoft Office How To Data Recovery Save Money Virtualization Collaboration Holiday Law Enforcement Network Recovery Smartphone Social Media Miscellaneous BDR Passwords Workplace Tips Managed IT Cybersecurity App Cloud Computing BYOD Firewall Hacking Mobility Work/Life Balance Avoiding Downtime Office Tips Proactive IT Operating System Money HaaS Office 365 Budget Password Information Technology Health Private Cloud Flexibility Wi-Fi Two-factor Authentication Bandwidth Bring Your Own Device Managed Service Provider Communication Productivity Facebook SaaS Phishing Remote Monitoring Spam Gmail Automation Artificial Intelligence Safety User Error Marketing Value Redundancy Managed IT Services Gadgets Data Management Black Market Router Risk Management Windows 10 Compliance Internet of Things Employer-Employee Relationship Google Drive Data Breach Wireless Best Practice Apple Data storage Solid State Drive Shadow IT Government Data Security Hiring/Firing End of Support Computer Care Internet Exlporer Spam Blocking Settings Samsung Patch Management The Internet of Things Business Owner Keyboard Vulnerability Entertainment Scam Public Cloud Remote Computing Wireless Technology Data Storage Save Time Workers Wearable Technology Business Intelligence Automobile Worker Identity Theft Computing Infrastructure Apps VPN Credit Cards Physical Security Mobile Computing Battery IT Management DDoS Word Mobile Device OneNote Downtime Cleaning Content Filtering History Applications Unsupported Software Meetings Charger Networking Big Data Relocation Travel Video Games Root Cause Analysis Laptop Software Tips Electronic Medical Records Comparison Infrastructure Users Online Shopping Flash Unified Threat Management IaaS Mouse IBM Books Scalability Touchpad webinar eWaste Specifications Password Manager Virtual Reality Evernote HIPAA Outlook Sync Supercomputer Emergency Software as a Service Instant Messaging YouTube Data loss Worker Commute HBO Conferencing Lithium-ion battery Environment Employer Employee Relationship Internet exploMicrosoft Millennials Humor Telephony Windows 10s Running Cable Streaming Media Current Events iPhone Update Search Screen Mirroring Frequently Asked Questions IT Support Computer Accessories Advertising Workforce Monitor Skype Sports SharePoint Google Docs Wireless Charging How to NarrowBand Cast Document Management Excel Encryption Bluetooth Telecommuting Loyalty Experience Reputation Start Menu Techology Audit Transportation Files Website Fiber-Optic People Tip of the week Notifications Hybrid Cloud Remote Work Fax Server Music Customer Mobile Computer Fan Knowledge Benefits Colocation Voice over Internet Protocol Cables Chromecast Mobile Office Windows Server 2008 PDF Assessment IT solutions USB Professional Services FENG Network Congestion Smart Technology Multi-Factor Security Unified Communications Data Warehousing Windows 7 Uninterrupted Power Supply Emails Rootkit Television Troubleshooting Tools Legal hacker Trending Theft Content Regulations Antivirus Training Fraud Public Computer Hosted Solution IT Consultant Two Factor Authentication Lifestyle Cortana Education IT Plan Audiobook Vendor Management Amazon Distributed Denial of Service WiFi Botnet Leadership Data Protection Google Apps Going Green Amazon Web Services Politics Robot Servers Hard Drives Tech Support Netflix Thank You Congratulations Business Mangement Recycling Webinar Administration IT solutions CrashOverride

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!