Posey's Tips & Tricks


Populating a SharePoint Document Library by E-Mail, Part 1

While Microsoft doesn't allow you to build a SharePoint Online document library using e-mail, there is a roundabout way of getting the job done using the tools that are included with Office 365. Brien shows you how.

Managing Multiple Remote Connections in One Place with mRemoteNG

If you're juggling multiple remote connections daily, this is the utility for you. Brien walks through the steps to use mRemoteNG, from installation to deployment.

Bad Backup Idea: Using OneDrive Sync as an Office 365 Backup Substitute

Don't cut corners when it comes to protecting Office 365 data, Brien warns.

Windows Admin Center vs. Hyper-V Manager: What's Better for Managing VMs?

Microsoft's preferred interface for Windows Server is Windows Admin Center, but can it really replace Hyper-V Manager for managing virtual machines? Brien compares the two management tools.

How To Dynamically Lock Down an Unattended Windows 10 PC

One of the biggest security risks in any organization happens when a user walks away from their PC without logging out. Microsoft has the solution (and it's not a password-protected screensaver).

How To Protect User Privacy from Windows Timeline

Even the most innocuous PC user might not want this Windows 10 feature tracking everything they do across PCs and Microsoft accounts. Here's how to keep your Windows 10 history locked down.

How To Bait End Users into Better Anti-Phishing Habits

Nobody likes to be lectured about security. When it comes to enforcing e-mail security practices among end users, some benevolent trickery is sometimes needed.

What's Behind the Rumored Office 365 Password Manager

Microsoft is said to be planning a new "Life" edition of Office 365 for spring 2020, but Brien is most intrigued by the password manager that's reportedly coming with the bundle.

Mini Bricks Graphic

Microsoft Adds Anti-Phishing 'Campaign Views' to Office 365 ATP

A new feature in Microsoft's Office 365 Advanced Threat Protection service promises to fill in the gaps of traditional anti-phishing defenses.

What Computing Will Look Like in 2030: Top 5 Tech Predictions for the Next Decade

For better or worse, the next 10 years will bring more intelligent devices to more areas of our daily lives. From the proliferation of AI to what that means for user privacy, here are Brien's tech predictions for 2020 and beyond.

The Decade in Tech: Biggest Innovations from 2010 to Now

From Google Glass to the Microsoft HoloLens, the past decade has dramatically changed the face of the tech landscape. Here's a year-by-year look at the biggest game-changers of the decade.

How To Organize Windows 10's Admin Tools in One Folder

After the Windows 8 fiasco, Microsoft has mostly succeeded in cleaning up the GUI with Windows 10, with one exception: The administrative tools are still scattered all over the place.

Top 4 Errors When Backing Up Hyper-V Guest Clusters

Though handy, Hyper-V guest clusters can extra complexity to your workloads that can cause problems with backups. Here are the four most common error messages and how to fix them.

How To Disable Touch Input in Windows 10

When the touchscreen on your Windows 10 laptop goes bad, there's no reason to throw that baby out with the bath water.

Hyper-V Architecture: Some Clarifications

Brien answers two thought-provoking reader questions. First, do Hyper-V VMs have direct hardware access? And second, how is it possible to monitor VM resource consumption from the host operating system?

Subscribe on YouTube