Microsoft Teams新版升级或安装方法

Microsoft Teams作为一款国际化公司会议软件,在2024年7月1日起不再支持经典版本,提示升级New Teams。

由于New Teams官网提供的Windows系统安装包并不是传统的可执行文件MSI,EXE等,而是新型封装的MSIX格式,无法直接双击安装完成升级的。

小编为大家分享New Teams的几种安装方法。

方法一:如果您的电脑系统是Win10 21H2版本及以上,且登录微软账号和系统带有Microsoft Store,那么可以直接打开Microsoft Store搜索Teams,下载并安装新版本的Teams即可。

方法二:如果您的电脑系统是Windows企业版,LTSC版,且不带有Microsoft Store和系统版本在21H2及以上。

1.复制网址Your request has been blocked. This could be due to several reasons.到浏览器打开,下载安转包。

2.打开安装包所在目录,鼠标放在该目录的空白位置,同时按下键盘Shift键和鼠标右键,选择在此打开powershell窗口。

3.输入add-appxpackage ./MSTeams-x64.msix回车执行安装。

4.打开开始菜单,即可看到New Teams的图标,打开运行即可

方法三:如果在方法二执行安装命令提示已有更高版本存在,无法继续安装,可以按照这个方法直接运行。

1.复制网址下载 - voidtools到浏览器打开,下载并安装everything搜索软件打开,搜索Teams。选中C盘-Program Files-WindowsApps目录下的ms-teams.exe右键选择打开文件所在位置。

2.选中ms-teams右键选择发送到桌面快捷方式,后打开即可运行New Teams。

方法四:如果您的电脑系统是Win10 21H2及以下版本,且不是使用微软账号和不带有microsoft Store,或者安装中提示错误,无法继续安装的,可以使用此终极方法。

1. .复制网址Your request has been blocked. This could be due to several reasons.到浏览器打开,下载安转包。

2.打开安装包所在目录,将安装包的msix拓展名改为zip,后使用解压软件解压。

3.打开解压的目录,选中ms-teams右键选择发送到桌面快捷方式,后打开即可运行New Teams。

以上就是小编测试出来New Teams的安装方式,当然微软官方也给出了适合专业IT人员的升级安装方法,请参考网站批量部署新的 Microsoft Teams 桌面客户端 - Microsoft Teams | Microsoft Learn

### CVE-2018-0886 CredSSP RCE Vulnerability Explanation The CVE-2018-0886 vulnerability affects the Credential Security Support Provider (CredSSP) protocol used by Remote Desktop Protocol (RDP). This issue allows an attacker to execute arbitrary code on a target system with elevated privileges, leading to remote code execution (RCE)[^2]. The flaw exists because of how CredSSP handles encrypted credentials during authentication processes. When connecting via RDP from affected versions like Windows 8.1 or Windows Server 2012 R2 upwards, unpatched configurations can lead to errors due to this security weakness[^1]. #### Scanning Methods for Detecting CVE-2018-0886 To detect whether systems are vulnerable to CVE-2018-0886, several approaches may be employed: 1. **Vulnerability Scanner Tools**: Utilize automated tools designed specifically for identifying known vulnerabilities within networks. These often include predefined checks for specific issues such as CVE-2018-0886. 2. **Manual Testing Using Scripts**: Implement custom scripts that attempt connections using potentially maliciously crafted packets targeting the CredSSP handshake process. An example script might look something like this: ```powershell $target = "192.168.1.1" $port = 3389 function Test-CredSSPVuln { param ( [string]$Target, [int]$Port ) try { # Attempt connection and check response behavior indicative of vulnerability Write-Host "Testing $Target:$Port..." # Code here would simulate part of the CredSSP negotiation phase throw "Simulated exception indicating potential vulnerability." } catch { if ($_.Exception.Message.Contains("potential")) { Write-Warning "$Target appears VULNERABLE!" } else { Write-Output "$Target does not appear vulnerable." } } } Test-CredSSPVuln -Target $target -Port $port ``` 3. **Patch Level Verification**: Verify installed updates against those listed as fixes for CVE-2018-0886. For instance, ensuring KB4103725 is applied indicates mitigation efforts have been taken[^3]. --related questions-- 1. What other protocols besides CredSSP could pose similar risks? 2. How do modern operating systems prevent exploitation through credential handling mechanisms? 3. Can you provide more details about implementing defensive coding practices when developing network services? 4. Are there any notable incidents where attackers exploited CVE-2018-0886 in real-world attacks?
评论 4
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

華仔96

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值