Understanding Send As with Signatures from Exchange Shared Mailboxes

Normally when an account is given full permissions to a shared mailbox, the shared mailbox is auto-mapped to the delegate account’s Outlook profile. The shared mailbox is added to a linked attribute in Active Directory. Linked attributes describe a relationship between objects and are often paired as ForwardLinks and BackLinks. In the case of Exchange […]

Oculus Air Link Setup on Unify Networks

Until now, wirelessly streaming games to the Oculus Quest 2 has been limited to using development drivers in combination with specialized software like Virtual Desktop. I’ve written step by step guide to getting that option working here. Now, Facebook has enabled Oculus Air Link which allows streaming of Oculus Store apps too. It was a […]

Xbox Game Pass Ultimate Cloud Streaming on PC

I jumped on the Xbox Game Pass Ultimate bandwagon at the very beginning. The service started out strong and has only gotten stronger. When they added game streaming to Android devices I knew that I had picked a winner. I had just started playing The Outer Worlds on my Xbox and the ability to play […]

PowerShell: Rename Domain Computers from a List

I needed to rename a bunch of computers in a hurry. As usual I turned to PowerShell. The old and new names were provided to me in a CSV. The systems were spread over a wide area and throughout different departments so I would need to include connectivity testing and some simple reporting to keep […]

Two Devices at the Same Time with Jabra 85t True Wireless Earbuds

I’ve been a fan of Bluetooth headphones since the beginning. When true wireless headphones first launched in 2015, I was lucky to get to try a pair of Bragi Dash at a tech show. They sounded horrible by today’s standards and if you turned your head too much you’d loose one. To have no cable […]

TPM Security Processor Troubleshooting Guide

Status  The first step of troubleshooting Trusted Platform Module (TPM) errors is to review the status of the security processor.   Windows 10   Go to Settings -> Update & Security -> Device Security -> Security Processor Details  Or Type “TPM” in the search box and select Security Processor Details  Or run Get-TPM in an administrator PowerShell console.   Any […]

PowerShell: List Microsoft 365 Accounts that do not have MFA Enforced

Microsoft’s 365 enrollment has three states: Enabled, Enforced, and Disabled. Enabled means that a user has, or will be prompted to enroll for multi-factor authentication. However, if they do not complete the enrollment and you do not have any type of enforcement policy, the account will continue to be authenticated without MFA. Once a person […]

Mobile Security the Easy Way, Setup Intune Mobile Application Management

Several of the solutions for controlling mobile data on the market claim to have an easy solutions, but only one of them has impressed me. Microsoft’s Intune Endpoint Device Manager is extremely robust and very complicated. However, if you forget about trying to push apps and manage user profiles for now and concentrate on securing […]

ASUS TUF DASH F15 an Underrated Nvidia 3070 RTX Gaming Laptop

I’ve have owned so many laptops that I’ve literally lost count. Some of those systems, like my Surface Book, are capable of playing games. However, none of them are, or were, dedicated game machines. I’ve helped my friends and family pick out their portable game machines and have spent plenty of hours playing on them. […]