Posey's Tips & Tricks


Creating Policy Configurations for Office 365 Users

For decades, group policies have been the go-to method for securing devices on a Windows network. In this age of BYOD, however, that may not be enough.

How To Monitor Servers with PowerShell

Brien walks you through the basics of building a PowerShell script that examines remote servers one at a time.

How To Make Hyper-V Virtual Machines Portable

There are plenty of reasons to make Hyper-V VMs portable. The key is to make sure they work consistently, regardless of where each VM is running. Here's how to do it.

Creating a Linux VM in Hyper-V the Easy Way

Hyper-V in Windows 10 has a built-in tool called Quick Create that lets you automate the process of setting up new virtual machines. Here's how to use it.

Defending Against Office 365 Account-Takeover Attacks

With hackers infiltrating one in three Office 365 customers, an IT pro's best bet is to be suspicious of almost everything.

Android: The New Windows Phone

How Microsoft is using its "Your Phone" and "Launcher" apps to sneakily turn Google's smartphone platform into (almost) the mirror image of its own.

What Causes Hyper-V Replication Failures?

Hyper-V replication failures happen rarely, but their impact can be catastrophic when they do. Know the scenarios that are likely to trigger a replication failure.

Windows 10 and the Incredible Shrinking Application

If you've noticed some of your Windows 10 applications taking less and less screen real estate over time, you're not alone. Here are some workarounds.

Troubleshooting 101: Repairing Office 365 When Things Go Wrong

Reimaging might be the easiest option but, as Brien explains, there are certain situations where that just won't work.

Troubleshooting 101: How To Know if Office 365 Is Having Problems

It's easy enough to tell if Office 365 is having performance issues (or is plain down). It's a litle harder to figure out whether the problem is with Microsoft or with you.

Office 365's Phishing Problem Goes Deeper

A recent report suggests that Microsoft's own e-mail security protections have trouble differentiating between real and fraudulent messages from itself.

Unpacking the HoloLens Backlash

Attempts to pigeonhole Microsoft's mixed reality device into a specific use case -- whether it's work or play -- are missing the point, Brien argues.

Microsoft's 'Microtask' Vision: A Gray Area for IT

At first glance, Microsoft's proposal to fill employees' spare time with small tasks seems like a boon for workplace productivity. Don't be fooled, Brien warns.

How To Create a Windows Deployment Image, Part 2

Now that you've created a deployment share, it's time to add your Windows installation files. Brien shows you how.

How To Create a Windows Deployment Image, Part 1

While there are various methods for creating custom Windows deployment images, the process has a reputation for being tedious and convoluted.

Subscribe on YouTube