For power users of Microsoft's various Office services, life just got a little bit easier.
Now that he's had a few months to test drive Microsoft's new browser, Brien shares his thoughts on what makes Edge tick.
Of the many security improvements Microsoft made to the latest Windows 10 release, the ability to wall-off the Edge browser against malware attacks is one of the most critical.
Microsoft's newest Office 365 addition seems like a solid business app, but does it bring any functionality that isn't already scattered throughout the rest of the suite?
Few things are more frustrating that being interrupted by an unwanted reboot. Here's how to make Microsoft's Windows 10 updates work around your schedule.
Windows Server has a built-in iSCSI initiator that it can use to connect to an iSCSI target. Before it can do so, however, you'll need to enable and configure the initiator. Here's how.
If the hardware behind your domain controllers has become outdated, here's a step-by-step guide to performing a hardware refresh.
So you want to know whether a Hyper-V virtual machine built on a legacy host will be supported by a newer server? There's a PowerShell command for that.
It's time again for Brien to perform a major storage upgrade on his Hyper-V hosts. But this time, he's taking a new approach.
While the overall look and feel of Office 365 is pretty standard across organizations, there are several ways to personalize it and make it fit better with your company's specific needs.
For decades, group policies have been the go-to method for securing devices on a Windows network. In this age of BYOD, however, that may not be enough.
Brien walks you through the basics of building a PowerShell script that examines remote servers one at a time.
There are plenty of reasons to make Hyper-V VMs portable. The key is to make sure they work consistently, regardless of where each VM is running. Here's how to do it.
Hyper-V in Windows 10 has a built-in tool called Quick Create that lets you automate the process of setting up new virtual machines. Here's how to use it.
With hackers infiltrating one in three Office 365 customers, an IT pro's best bet is to be suspicious of almost everything.