Posey's Tips & Tricks


Microsoft Includes a VPN with Some Microsoft 365 Subscriptions

It's hidden, but it's there.

Set File Explorer to Open 'This PC' by Default

Learn how to configure File Explorer in Windows 11 to simplify access to your drives and folders.

Abstract illustration of snapshots

Are Storage Array Snapshots a Viable Backup Substitute?

While storage array snapshots offer quick, hardware-level data protection, they are not a standalone substitute for traditional backups due to limitations in protection, management and retention capabilities.

Hyper-V Replication Lessons Learned

Avoiding this configuration blunder should save you some considerable time.

The Future for AI Adoption, Part 2: Chill

Once the "new" has worn off, look for Gen AI to continue with much less fanfare.

Microsoft Improves Planner

While it's much more useful than it used to be, it's still missing some key features.

The Future for AI Adoption, Part 1: Hype

Here's how a new tech takes off in the early stages of its life.

A Look at Microsoft Word's Designer Integration

Let's take a look at how Microsoft's AI image generator works in Word.

Boxes

How Microsoft Protects Copilot Against ASCII Smuggling Attacks

With new tech comes the rise of new attack vectors.

Creating Bootable USB Installation Media for Windows Server

The process might be bumpy, as you can see in my attempt.

A Better Use for Passthrough Disks

A passthrough disk feature can offer practical alternative use cases, like simplifying file transfers between isolated virtual machines.

Indexing a Windows-Based File Server

Although File Explorer makes it relatively easy to locate files located on your PC, you can also index your Windows file servers, thereby making it possible to search for individual files by content.

Business Continuity and Disaster Recovery Lessons Learned

Test, test and test some more.

It's the End of an Era

Looking back at my long run as a Microsoft MVP.

How Much Space Are You Using in Microsoft 365?

Reclaim your cloud storage by locating unwanted data.

Subscribe on YouTube

Upcoming Training Events