Configuring “External Sender” Warning Messages for Office 365 emails

How to configure warning messages for Office 365 emails from external senders, when the name of an external sender matches the name of an internal employee. As a security precaution, you can implement a mail flow rule in the Exchange admin center, so that external attacks who try and spoof emails, so they look like […]

How to Stop Windows 7 from Automatically Installing Drivers and Manually Install them Yourself

This is a little guide I had written a few years ago and never had a chance to publish, until now. Note: This method only applies to Windows 7 Professional, Windows 7 Ultimate, and Windows 7 Enterprise. Other editions of windows 7, such as Windows 7 Home, do not come with Group Policy installed. Purpose […]

Oversight, Security, Scalability & Reliability in IT Management

Managing an organization’s IT isn’t just about uptime, it is about building systems that are secure, scalable, reliable, and under proper the oversight. These four pillars form the backbone of resilient IT infrastructure, which in turn supports growth, innovation, and trust. 1. Oversight: Governance for Control and Clarity Why it matters: Oversight gives IT leaders […]

VMware Home Lab

The goal of this home lab is to emulate a small business environment. I use a VMware ESXI server to host a Windows Server 2012 R2 Domain Controller, various “user operating systems” consisting of everything from Windows XP/7/10 to assorted flavors of linux and anything else I would like to evaluate. I then use ESXI’s […]

1 2