Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

For Businesses, Windows PowerToys are More Like Power Tools

For Businesses, Windows PowerToys are More Like Power Tools

Windows PowerToys is a collection of handy utilities that can offer a lot of value to those with some use for them. We wanted to briefly run through some of the most business-friendly options you might want to implement into your operations.

We also wanted to inform you that these tools are only available through specific processes that you should always entrust to a trusted technology provider, such as the team here at Voyage Technology. Even if you don’t work with us, you should always have any software added to a business computer by a trusted IT professional so it can be documented and managed appropriately.

With that all attended to, let’s continue as though you currently have PowerToys installed and examine the utilities it offers.

How to Access PowerToys (and What They Do)

Once installed, PowerToys will run as a startup item. This means they are always ready for you to use and can be accessed via an icon in the Windows taskbar. Clicking this icon will bring up an abbreviated list of available tools, with More being available for you to access through a dedicated button.

From there, it’s just a matter of picking the correct utility for your needs… and if you ever need a quick refresher, the page icon at the bottom of the menu will bring you to the dedicated Microsoft Learn pages. 

The bottom of the menu also features a bug icon that allows you to notify Microsoft of an issue and the dedicated Settings for PowerTools, where you can (amongst other things) select which PowerTools you are likely to need more regularly and hide the others.

10 PowerToys You’re Most Likely to Find Useful

While we encourage you to examine the list in full to see what PowerToys offers, these ten utilities will most likely come in handy throughout the workday.

Always On Top
This feature gives you a quick shortcut (WinKey+Ctrl+T) to pin one window to the front, meaning other windows and applications will always move behind them.

Crop And Lock
This utility allows you to create a small thumbnail of an existing window that acts as its own window, making things easier to reference.

FancyZones
As a window manager, FancyZones lets you quickly and easily organize your windows into preset layouts.

Keyboard Manager
There are likely a bunch of keys on the keyboard that you have never used. After all, how often does the average person need to type “|” or set focus to the first icon in the Suggested Actions menu? Accessing the Keyboard Manager allows you to remap existing shortcuts to do different things.

New+
This PowerToy allows you to use templates to create new files and folders in your File Explorer.

PowerRename
This allows you to change large file lists, renaming them in bulk and addressing only specific file types.

Quick Accent
Accent mark combinations are challenging to remember, so the Quick Accent utility offers a handy way of adding them to whatever you’re typing.

Shortcut Guide
Pressing Windows Key+Shift+/ calls up a list of available shortcuts based on what’s currently active on the screen.

Text Extractor
Sometimes, you need to copy text from places that don’t inherently allow you to copy it. Text Extractor, accessible via Windows Key+Shift+T, enables you to grab this text.

Workspaces
If you have a consistent enough work process that you have your applications arranged on your displays in the same way, day in and day out, Workspaces allows you to mass-launch your necessary applications. You can pull up the Workspaces editor by pressing Windows Key+Ctrl+`

Again, this is just a sample of what PowerToys offers, so we encourage you to work with your IT to enable it. Businesses that utilize our managed IT services could have us handle it on their behalf, among the many other benefits we deliver. Give us a call at 800.618.9844 to learn more.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email Collaboration IT Services Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone Managed Service Productivity Upgrade Android VoIP Business Management Smartphones Data Recovery communications Mobile Devices Disaster Recovery Windows AI Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Information Facebook Automation Artificial Intelligence Cloud Computing Covid-19 Holiday Training Miscellaneous Gadgets Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption Employee/Employer Relationship Spam IT Support Office Windows 10 Government Data Management Business Continuity Blockchain Windows 10 Wi-Fi Virtualization Business Technology Bandwidth Mobile Office Data Security Vendor Two-factor Authentication Apps Apple Networking App Mobile Device Management Gmail BYOD Employer-Employee Relationship Tip of the week Chrome Budget Managed Services Voice over Internet Protocol Avoiding Downtime How To Marketing BDR HIPAA Computing Applications WiFi Information Technology Access Control Office 365 Conferencing Hacker Bring Your Own Device Healthcare Managed IT Services Website Operating System Router Virtual Private Network Risk Management Big Data Health Help Desk 2FA Office Tips Analytics Augmented Reality Retail Storage Computers Password Scam Data loss Cooperation Free Resource Project Management Going Green Patch Management Windows 7 Save Money Remote Monitoring Firewall Vulnerability Microsoft 365 End of Support Vendor Management Cybercrime Solutions Physical Security The Internet of Things Display Printer Social Paperless Office Infrastructure Monitoring Windows 11 Document Management Excel Customer Service Remote Workers Telephone Mouse Licensing Wireless Technology iPhone Entertainment Administration Vulnerabilities Data Privacy Word Images 101 Telephone System Robot Cost Management Multi-Factor Authentication Mobility Settings Printing Wireless Content Filtering IT Management VPN YouTube Meetings Safety Cryptocurrency Employees User Tip Integration Modem Computer Repair Mobile Security Processor Virtual Desktop Data storage LiFi Holidays Smart Technology Data Storage Outlook Supply Chain Machine Learning Customer Relationship Management Video Conferencing Money Saving Time Managed Services Provider Humor Virtual Machines Professional Services Managed IT Service Hacking Maintenance Presentation Antivirus Sports Downloads Social Engineering Break Fix Net Neutrality Browsers SQL Server Technology Care Education Connectivity History Upload Business Communications Remote Computing Financial Data Smartwatch IT Mobile Computing Social Network Scams Multi-Factor Security IP Address Search Dark Web Procurement Azure Hybrid Work Tablet IoT Cyber security Best Practice Trends Tech Human Resources Alert Telework CES Recovery Communitications Managed IT Customer Resource management Cables Buisness File Sharing Regulations Dark Data Google Calendar How To Microsoft Excel Hard Drives Supply Chain Management Legal Data Analysis IT solutions Star Wars Business Growth Gamification Term Google Apps Notifications Staff Domains FinTech IT Assessment IT Maintenance Travel Social Networking Legislation Cortana Refrigeration Flexibility Techology Fileless Malware Value Business Intelligence Google Maps Alt Codes Content Shortcuts Wearable Technology Public Speaking Organization Digital Security Cameras Smart Devices Health IT Ransmoware Downtime Unified Threat Management Motherboard Comparison Lithium-ion battery Permissions Remote Working Unified Threat Management Directions Entrepreneur Memory Vendors Hosted Solution Assessment Data Breach Typing Google Play Be Proactive Videos Electronic Health Records Workforce Network Congestion Specifications Knowledge Fraud Undo Google Drive User Error Microchip Wasting Time Threats Internet Exlporer Trend Micro Username Security Cameras Workplace Strategies Software as a Service Meta Point of Sale 5G Black Friday Experience Google Docs Managing Costs Amazon Unified Communications Database eCommerce Bitcoin Network Management SSID Running Cable Tech Support IT Technicians Application Surveillance Google Wallet Proxy Server Virtual Assistant Outsource IT Cookies Monitors Cyber Monday Media Hotspot Virtual Machine Environment Tactics Windows 8 Medical IT Laptop Websites Mirgation IBM Reviews Development Drones Transportation Small Businesses Nanotechnology Electronic Medical Records Language SharePoint Hypervisor Displays Addiction Shopping Optimization Management PowerPoint Halloween Chatbots Lenovo Employer/Employee Relationships Outsourcing Screen Reader Writing Distributed Denial of Service Service Level Agreement Navigation Virtual Reality Computing Infrastructure Competition PCI DSS Gig Economy Hacks Server Management Workplace Scary Stories Private Cloud Identity Fun Internet Service Provider Superfish Bookmark Teamwork Hiring/Firing Identity Theft Smart Tech Deep Learning Download Evernote Paperless Twitter Alerts Regulations Compliance User Memes Co-managed IT Error

Blog Archive