
Microsoft Architect, Microsoft Technology Evangelist & Technical Blog Author

Recent articles

How to Migrate Files to SharePoint Online: 2025 Ultimate Guide
How to Migrate Files to SharePoint Online: 2025 Ultimate Guide Migrating your file shares to…
How to Configure App Protection Policies in Microsoft Intune
How to Configure App Protection Policies in Microsoft Intune In today’s business landscape, safeguarding sensitive…
Azure Cloud Migration for Beginners: A Practical 2025 Guide
Azure Cloud Migration for Beginners: A Practical 2025 Guide Moving your business to the cloud…
Ultimate Guide to How to Screenshot on a Computer Mac
Ultimate Guide to How to Screenshot on a Computer Mac For nearly two decades, I’ve…
SharePoint Site Building: A Complete Walkthrough for Your First Collection
SharePoint Site Building: A Complete Walkthrough for Your First Collection It is not very easy…
How to Enable MFA on Microsoft 365 for Better Security
How to Enable MFA on Microsoft 365 for Better Security Cybersecurity threats are on the…





Ultimate Guide to How to Screenshot on a Computer Mac
Ultimate Guide to How to Screenshot on a Computer Mac For nearly two decades, I’ve…
Intune Training Made Simple: Start Learning Now
Intune Training Made Simple: Start Learning Now Microsoft Intune is a powerful cloud-based service that…
VBScript to add printers at user logon
VBScript to add printers at user logon This VBScript to add printers at user logon…
How to Fix GPO – 16 Most Common Issues
How to fix GPO – 16 Most Common Issues Check out this post on how…
Guide: How to find domain controller cmd (DCLocator)
Guide: How to find domain controller cmd (DCLocator) and how to change AD subnets This…
Best Practices for Assigning FSMO Roles
Best Practices for Assigning FSMO Roles If you are looking for assigning FSMO roles to…
How to apply GPO without reboot Windows
How to apply GPO without reboot Windows If you want to apply GPO without reboot…
How to add UPN suffix in Active Directory
How to add UPN suffix in Active Directory If you want to know how to…
How to perform a non-authoritative SYSVOL restoration
How to perform a non-authoritative SYSVOL restoration If you are facing issues with some Group…
How to Enable MFA on Microsoft 365 for Better Security
How to Enable MFA on Microsoft 365 for Better Security Cybersecurity threats are on the…
