Manage
Learn to apply best practices and optimize your operations.
Manage
Learn to apply best practices and optimize your operations.
How to create a custom Windows 11 ISO file
With a custom Windows 11 ISO file, IT departments can streamline deployment and apply new version of Windows to repair OS instances. Continue Reading
How to make the most of Windows Autopatch with Intune
IT administrators can use Intune to manage numerous settings related to Windows OSes and business apps. The Windows Autopatch feature can automate and improve those processes. Continue Reading
Comparing Copilot Pro vs. Copilot for Microsoft 365
Microsoft Copilot takes many forms, but the main offerings for end users in an enterprise setting are Copilot Pro and Copilot for Microsoft 365. Learn how these offerings compare. Continue Reading
-
Understanding how GPOs and Intune interact
Group Policy and Microsoft Intune are both mature device management technologies with enterprise use cases. IT should know how to pick between these tools or when to use both. Continue Reading
How to install MSIX and msixbundle
IT admins should know that one of the simplest ways to deploy Windows applications across a fleet of managed desktops is with an msixbundle and MSIX files. Continue Reading
12 best patch management software and tools for 2024
These 12 tools approach patching from different perspectives. Understanding their various approaches can help you find the right product for your needs.Continue Reading
When is Windows 10 end of life? How to extend support
Windows 10 end of support is a critical date for administrators to know about. While the simplest option is to move to Windows 11, organizations can extend support for Windows 10.Continue Reading
How to edit a Domain Group Policy for a Windows desktop
When IT administrators need to edit a Group Policy at the domain level, they can download the RSAT management tool and change policies from the local Windows desktop.Continue Reading
An 11-step patch management process to ensure success
Following these steps will make patch management more reliable and less stressful and keep your software updated, largely bug-free and secure from cyberthreats.Continue Reading
The risks of failed patch management
Some risks -- like security vulnerabilities and system downtime -- are obvious, others not so much. Good patch management also requires weighing the possible risks of patching.Continue Reading
-
Patch management vs. vulnerability management: Key differences
Although patch and vulnerability management are intertwined, they differ in critical ways. It's important to have distinct tools and processes to execute both effectively.Continue Reading
Creating a patch management policy: Step-by-step guide
A comprehensive patch management policy is insurance against security vulnerabilities and bugs in networked hardware and software that can disrupt your critical business processes.Continue Reading
How to remove a device from Intune enrollment
When a device reaches its end of life, IT needs to remove that device from any management software, such as Microsoft Intune. But there are several removal options to learn.Continue Reading
Guide to Linux patch management
While patching desktops has some universal aspects across systems, there are specific Linux best practices that Linux administrators need to know. Here are eight important ones.Continue Reading
How to change a Windows device name with Intune
There are several ways that IT administrators and users can change the name of Intune-managed Windows devices, but first they must understand the different types of device names.Continue Reading
Top 4 unified endpoint management software vendors in 2024
UEM software is vital for helping IT manage every type of endpoint an organization uses. Explore some of the top vendors and how they compare.Continue Reading
What to do when Group Policy shows an access denied message
IT administrators might encounter an error message that states 'access denied' when working with Group Policy. There are a few different steps to fix a problem like this.Continue Reading
How the macOS Security Compliance Project can help IT
It can be difficult for Apple admins to adapt to every new OS release and the respective compliance changes. That's where the macOS Security Compliance Project comes into play.Continue Reading
How to securely recycle enterprise computers
No matter how an organization wants to retire a device when it reaches its end of life, IT must first ensure that any sensitive data on it has been properly destroyed.Continue Reading
Comparing Copilot for Microsoft 365 vs. GitHub Copilot
There are significant differences between the various copilots that Microsoft has brought to market. Find out details about two of the most prolific copilots.Continue Reading
How to back up, repair and restore the Windows 11 Registry
The simplest way to fix a broken Windows 11 registry is to restore a backup, but that isn't always possible. Find out different methods to fix a broken registry.Continue Reading
How do you back up the Windows 11 registry before editing it?
Without a Windows 11 registry backup, IT risks breaking the OS by making edits. Find out how easy it is to back up the Windows 11 registry.Continue Reading
Task Manager
Task Manager, which was previously known as Microsoft Windows Task Manager, is a component of the Windows operating system (OS) that helps administrators and end users monitor, manage and troubleshoot tasks.Continue Reading
How to access and read Intune management extension logs
The Intune management extension provides new capabilities for Windows admins, including the ability to track and analyze logs related to the management add-on.Continue Reading
Using the Intune management extension for PowerShell scripts
Intune and PowerShell have a lot of unique management actions they can take, but with the help of the Intune management extension, they can communicate and manage more efficiently.Continue Reading
How to handle rugged device management in the enterprise
Certain endpoint use cases require ruggedization to ensure devices aren't physically compromised. IT still needs to manage these devices, regardless of the OS or device type.Continue Reading
How to restart the Intune Management Extension agent service
When IT has issues with Intune deploying commands to endpoints, IT teams should consider restarting the Intune Management Extension to address lingering issues.Continue Reading
Maximize PC lifespans with effective PC lifecycle management
When IT departments set lifecycle policy for PCs and desktops, they will need to set the length of a PC's life for user groups. Learn how to calculate the ideal lifecycle length.Continue Reading
The role of Mac file and folder encryption for businesses
IT administrators can enable the Mac FileVault utility across business files and data to provide an extra layer of security and meet compliance standards.Continue Reading
4 PC lifecycle management best practices
There isn't a perfect PC lifecycle plan for all organizations, so IT teams and management should ask themselves these four questions to shape their PC policy.Continue Reading
How to build a plan for PC and desktop lifecycle management
Comprehensive device-as-a-service plans and full in-house management are two options for desktop lifecycles, but there are plenty of in-between options that can be a good fit.Continue Reading
Best practices for a PC end-of-life policy
Organizations that deploy PCs need a strong and clear policy to handle hardware maintenance, end of life decisions, sustainable disposal practices and more.Continue Reading
Should organizations turn on the native firewall on Mac?
The native macOS firewall is off by default, so IT might wonder if it's worth it to set up the security feature. Find out how to enable the Mac firewall and why it's important.Continue Reading
How to use the Apple Rapid Security Response updates
Typical Apple OS updates are large and infrequent, but the Rapid Security Response feature helps admins keep Apple devices patched without performing full OS updates.Continue Reading
Key Apple-native macOS security features for administrators
There are lots of universal security controls that can apply to any type of desktops, but IT teams need to look at the specific features native to desktops such as macOS.Continue Reading
What are the Microsoft 365 password requirements?
When IT administrators manage passwords for Microsoft 365 accounts in Azure AD, they can deploy and remove critical policies that can improve overall security posture.Continue Reading
7 key benefits of mobile device management for businesses
Mobile device management tools offer several benefits, like improved productivity and enhanced security, to organizations that use mobile devices for business tasks.Continue Reading
How to evaluate cloud vs. on-premises MDM, EMM or UEM
Organizations should consider whether an on-premises or cloud MDM or UEM platform is best. Determine how to make the decision and, if that decision is cloud, migrate without issues.Continue Reading
How to fix Windows 11 when Secure Boot and TPM don't work
When organizations consider upgrading to Windows 11, they'll encounter several unique requirements, including TPM 2.0, UEFI and Secure Boot. Learn how to handle these requirements.Continue Reading
How to monitor Windows files and which tools to use
Monitoring files on Windows systems is critical to detect suspicious activities, but there are so many files and folders to keep track of. This is where automation tools come in.Continue Reading
7 steps to fix a black screen in Windows 11
A black screen can be a symptom of several issues with a Windows 11 desktop. Knowing where to look for the source of the problem can simplify the troubleshooting process.Continue Reading
Windows 11 migration tools for desktop administrators
While there are plenty of approaches to a Windows 11 migration, IT should plan out the process carefully and ensure they have the right tools and products to support it.Continue Reading
How to support Mac computers in Windows environments
Organizations that support both Windows and Mac desktops must approach them differently, but there is plenty of overlap with the tools and practices they can use.Continue Reading
3 tools to check Windows 11 update compatibility
Updating to Windows 11 isn't recommended for every PC. Tools such as PC Health Check assess whether a device meets the specifications and requirements to upgrade.Continue Reading
Security Accounts Manager
The Security Accounts Manager (SAM) is a database file in the Microsoft Windows operating system that contains usernames and passwords.Continue Reading
Use Jamf Pro's basic features for enterprise management
While Apple devices are vital to many workplaces, they present unique management challenges. Jamf Pro is a device management platform that helps tackle Apple-specific challenges.Continue Reading
How to scan and repair disks with Windows 10 Check Disk
Windows 10 Disk Check is an intuitive tool that can scan and repair hard drives to reduce the risk of total disk failure and loss of critical information.Continue Reading
How to troubleshoot when Windows 10 won't update
Windows updates can lead to unexpected issues for IT administrators, but there are some simple steps they should always take to find the cause of the update issue.Continue Reading
7 Windows 10 issues and how to troubleshoot them
Microsoft offers different troubleshooters to fix common Windows 10 problems, and once you find the right one for your issue, these troubleshooters are easy to use.Continue Reading
How to manage Windows 10 Power Options in settings
Any Windows 10 desktop -- especially one that users access remotely -- needs special attention for its Power Options to ensure that the connection stays live throughout the session.Continue Reading
The options for running Microsoft 365 on a Chromebook
Without access to the Microsoft 365 service locally, IT admins will have to consider a few workarounds to deliver Microsoft's productivity apps to Chromebook devices.Continue Reading
Incorporating zero trust into endpoint security
Zero trust is a complex term, but organizations that take security seriously must know what it is and how it can support existing endpoint security platforms.Continue Reading
Why endpoint security is important and how it works
Organizations and IT admins must understand the fundamental approaches that endpoint security platforms take to secure endpoints and defend against common threats.Continue Reading
Will Windows 10 be the last Windows OS?
It's difficult to say whether Windows 10 will be the final version of the Windows OS, but a look at Microsoft's history and approach to OSes may shed some light on the situation.Continue Reading
How to enable and disable Tamper Protection in Windows 10
Tamper Protection in Windows 10 can protect against malware and third-party applications from changing Windows security settings. Learn how to use the new security feature.Continue Reading
11 tips to improve Windows 10 performance
With a few minor tweaks, such as maximizing RAM, disabling visual effects and getting rid of unnecessary services, you can increase Windows 10 performance.Continue Reading
How does Microsoft 365 extend Windows 7 support?
Microsoft is ending its official support for Windows 7. However, Microsoft 365 customers have the option to extend support via continued Windows security updates.Continue Reading
Windows 10 updates to avoid and how to address them
While Windows administrators can never ignore Microsoft's updates, it may make sense to delay or even avoid Windows updates until they are stable for enterprise users.Continue Reading
How and when to perform a Windows Registry cleanup
Desktop administrators should learn the best methods to edit the Windows registry, and how to avoid manual registry edits due to the damage that registry issues can cause.Continue Reading
How IT can use the Microsoft Assessment and Planning toolkit
Organizations can use the Microsoft Assessment and Planning toolkit to assess a variety of aspects of their desktop environment, including hardware, resource use and more.Continue Reading
What to do when a Windows Insider Program build isn't working
Organizations that test Windows Insider Program builds must be prepared for bugs in the platform, and systems admins need to know what to do when they encounter them.Continue Reading
A complete guide to troubleshooting Windows Hello
Windows Hello has several common issues that administrators may need to troubleshoot. Find out what those issues are here and what to do about them.Continue Reading
How to enable Hyper-V on Windows 10 for a lab environment
While there are several ways to test new updates on virtual machines, Hyper-V enables desktop administrators to add multiple VMs to a single desktop and run tests.Continue Reading
6 Group Policy best practices for Windows 10 admins
Group policies are a central component of Windows 10 configuration. Here are six best practices that can simplify Group Policy management for Windows 10.Continue Reading
How IT admins can use PowerShell to monitor CPU usage
IT administrators that are familiar with PowerShell can use certain scripts to monitor CPU performance on desktops to determine the root cause of desktop performance issues.Continue Reading
Top 5 enterprise Linux distributions to consider adopting
While Linux distributions all serve a similar purpose in the enterprise, organizations should still familiarize themselves with the different distributions to find the best fit.Continue Reading
What IT can do when Microsoft 365 is not working
IT professionals who manage Microsoft 365 should be aware of common issues that administrators face. They can solve many of these problems with the right policy or PowerShell scripts.Continue Reading
Ensure remote users meet data protection standards
During the pandemic, users may have adopted insecure applications as part of their workflows. IT pros must ensure remote data protection by securing or removing these apps.Continue Reading
How to deploy Office 365 Applications with Microsoft Intune
Organizations that deploy Office 365 applications with Intune can set various configurations, such as what versions of the deployed apps and how the apps receive updates.Continue Reading
End-user productivity becomes a priority for remote work
The initial response to COVID-19 focused on purchasing new technologies and retooling systems to support work from home, but organizations must help maintain end-user productivity.Continue Reading
How to optimize the digital workspace experience
Digital workspaces aim to converge users' resources and IT's management into a single technology, but this massive undertaking can present some administration and UX challenges.Continue Reading
Understand and manage Windows 10 virtual memory
It can be difficult for IT pros to understand the intricacies of Windows 10 virtual memory, but they should develop a basic knowledge of virtual memory to effectively manage desktops.Continue Reading
Discover how Catchpoint helps end-user experience monitoring
The Catchpoint end-user experience monitoring tool supports several notable integrations with enterprise software and monitoring capabilities such as real user monitoring.Continue Reading
How to enable and troubleshoot fast startup in Windows 10
The fast startup feature on Windows desktops can add value, but IT must understand when it should and shouldn't enable this feature and how to troubleshoot common issues.Continue Reading
4 negotiation tactics for success in a Microsoft software agreement
A Microsoft software agreement requires skill and knowledge. Use these four Microsoft negotiation tactics to get the best discounts for a productivity suite.Continue Reading
COVID-19 sparks software licensing issues with remote users
Organizations face a range of issues with the spread of COVID-19, including how to support a newly remote workforce. Learn how to address these enterprise licensing concerns.Continue Reading
5 up-and-coming Mac management software vendors to know
Vendors that are dedicated to Mac management software tout their specialization as an advantage over unified endpoint management vendors and other desktop management tools.Continue Reading
Navigate the micro app builder for Citrix Workspace
With the Citrix micro app builder, IT can create a connection between business apps as well as custom and legacy systems and the Citrix Workspace to provide consistent UI.Continue Reading
How to perform a Windows Subsystem for Linux install
Want to run Linux on a Windows desktop? Take these steps to perform a Windows Subsystem for Linux install, which includes downloading a distribution and providing authentication.Continue Reading
What IT needs to know about Chrome extension security issues
Google Chrome extensions can improve user experience, but they could access a lot of user data. Admins should take control over users' extensions for security and privacy reasons.Continue Reading
Task Manager Startup Tab Shows BIOS Time
A single line of test in Task Manager Startup Tab shows BIOS Time, which is how long it takes your motherboard to initialize its hardware and firmware, before Windows starts booting.Continue Reading
Navigating the Registry Editor for Windows 10 desktop admins
The Windows 10 registry stores some critical desktop settings that IT pros should know how to edit, alter or even delete to provide end users the optimal desktop experience.Continue Reading
Windows 10 1909 Works Well
When I say Windows 10 1909 2orks well, I mean that from a Reliability Monitor standpoint 1909 shows little or nothing to complain/worry about. Good!Continue Reading
Managing Windows Defender Device Guard in Windows desktops
IT pros must understand how Windows Defender Device Guard uses a locked-down approach to desktop security and how this method could cause compatibility issues and headaches for IT.Continue Reading
Browser Updates Require Human Intervention
Right after I learn a new Edge version is out, I realize that browser updates require human intervention. Only users (or admins) can shoulder the awesome responsibility of restarting a browser.Continue Reading
Getting MS Mouse&Keyboard Center Version Info
Getting MS Mouse&Keyboard Center version info proves a bit more challenging and tricksy than I'd wish. Norton File Insight to the rescue.Continue Reading
Self-Inflicted Spurious $SysReset Folder
I call it a self-Inflicted spurious $SysReset folder because if you start and cancel the Windows Reset operation in Windows 10, you'll find that folder on your system drive. It's safe to delete, so ...Continue Reading
3 Windows migration questions IT must answer
Microsoft has stopped mainstream support for Windows 7, so organizations must have a plan to migrate to Windows 10 or extend Windows 7 support. Find out how to shape a Windows migration plan here.Continue Reading
Microsoft Changes WU Driver Inclusion Rules
In the way of well-reported issues with updated device drivers for Intel graphics and networking, Realtek audio and Bluetooth, and more in 2019, MS changes its rule for bundling unapproved drivers ...Continue Reading
Notepad RTL Reading Order Gotcha Has Easy Fix
When text entry starts running in the opposite direction from usual, I learn that Notepad RTL reading order gotcha has easy fix. A simple right-click menu option inside the application does the trick!Continue Reading
NirSoft DriveLetterView Shows Assigned Win10 Drive Letters
NirSoft DriveLetterView shows assigned Win10 drive letters, both for active, mounted drives and removable drives previously installed but not currently present. Very handy!Continue Reading
2004 Gets New Network Status
Windows 10 2004 gets new Network Status look and info, and shows how Settings continues to supplant the Control Panel widgets.Continue Reading
Missing Secunia PSI
As I try one more time to find a reasonable replacement, once again I find myself missing Secunia PSI, the capable and comprehensive PC software scan-and-update utility that's been defunct since 2016.Continue Reading
Windows 10 2004 Gets View Optional Updates
With the latest 20H1/2004 release (Build 15636), Windows 10 2004 Gets View Optional Updates. Now users can see, select, and manage pending optional updates explicitly and directly.Continue Reading
Manage Windows 10 default file type associations with SetUserFTA
Windows 10 default file type associations dictate which applications open for different file types. Find out how IT can manage these associations with the SetUserFTA tool.Continue Reading
UUPDump.ml Invaluable Resource
I call UUPdump.ml invaluable resource because it grabs MS internal download components and uses them to create ISOs for most (if not all) known versions of Windows 10.Continue Reading
3 ways to prepare for the Windows 7 deadline
Organizations holding onto Windows 7 for dear life should reconsider because Microsoft stops supporting the OS in January. Here's how to make the transition to Windows 10 smoother.Continue Reading
Is WU Slowing Down?
When I realize how slowly Windows Update responds on some older PCs, I ask: Is WU slowing down? Subsequent research shows the answer is "no." I'm glad!Continue Reading
MFA Offers Real Security Protection: Use It!
A recent study for 2019 (Jan-Mar) finds 44 M re-used credential sets among Microsoft and Azure AD account holders. Because MFA offers real security protection, MS recommends its use whenever ...Continue Reading
Customizing New Win10 Laptop
After plunking down some hard-earned cash on Black Friday, I find myself customizing new Win10 laptop -- a Lenovo X390 Yoga -- for "the Boss" to replace her 2011/2012 mini-ITX desktop.Continue Reading