Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
Finding and fixing Office 2013 installation problems
Desktop administrators can streamline Office deployments by understanding fixes to important installation problems. Continue Reading
For missing GPO settings, check the Winlogon component
If a Windows system isn't applying certain Group Policy settings, you may need to check Winlogon and common client-side extensions. Continue Reading
Five Windows Sysinternals utilities can aid in desktop troubleshooting
There are many free tools in the Windows Sysinternals suite, but some might help admins more than others for viewing data and managing desktops. Continue Reading
-
More remote Group Policy Object settings and checking refresh status
Admins can refresh Group Policy Object settings across multiple computers, but they must verify that Group Policy settings have successfully changed. Continue Reading
Before you clone HDD to SSD, know the benefits and danger to data
Which type of drive is better: hard disk drive or solid-state drive? HDD to SSD cloning can ease data access, but SSDs aren't without risks to data. Continue Reading
Locking down Internet Explorer settings with Group Policy in IE 11
New Internet Explorer settings can tighten enterprise security, but only if Group Policy is properly enabled in IE 11 and you have Windows 8.Continue Reading
Can I plug a USB drive into a phone with a micro-USB connector?
This week, our expert answers a question on how to connect a phone or tablet to a USB drive with a micro-USB connector.Continue Reading
Learn how to install Office 2013 with Group Policies or SCCM
To successfully deploy Office 2013 across a network, you'll need Group Policies or tools such as Microsoft System Center Configuration Manager.Continue Reading
Click-to-Run and MSI provide Office 2013 installation options
The Microsoft Installer has competition for Office 2013 installation. See how Office Click-to-Run allows Office 2013 to run without a full download.Continue Reading
Microsoft's revised Resource Kit can ease Office 2013 deployment
Microsoft's free Office 2013 Resource Kit provides documentation for Office 2013 deployment, as well as for management after an Office deployment.Continue Reading
-
Using Active Directory activation and other new Office 2013 tools
Among the new Office 2013 tools for IT admins are a method for volume activation, administrative template files and files for custom installations.Continue Reading
Stripping a Microsoft Office password from a document with DocRecrypt
DocRecrypt, an Office 2013 tool, allows an admins to get into an otherwise inaccessible file by stripping it of its Microsoft Office password.Continue Reading
Ways to detect and delete duplicate files in Windows systems
Our enterprise desktop expert answers a question about some third-party tools for eliminating duplicate files in Windows desktops.Continue Reading
Microsoft Office 2013 crackable, so look to Office password recovery
Microsoft Office 2013 may have improved protection, but third-party tools have already cracked passwords. See how to use Office password recovery.Continue Reading
Desktop audit checklist: Five steps to a successful desktop audit
Now that 2012 has begun, consider doing a desktop audit to get your IT house in order. A strong desktop audit checklist can help you manage hardware, software and applications better.Continue Reading
Tablet licensing rules with Microsoft Office
As tablets make their way into the enterprise, it might be time to brush up on licensing rules for mobilizing Microsoft Office. We also provide some solutions for reducing costs.Continue Reading
Microsoft Windows 7 Task Manager troubleshooting tips
Here are some troubleshooting tips for Microsoft Windows 7's improved Task Manager -- from identifying processes and services to using the Resource Monitor.Continue Reading
Using P2V Migration for Software Assurance for Windows 7 upgrades
P2V Migration for Software Assurance automates the Windows 7 migration process and preserves XP applications and data. Yet its limitations may be a deal breaker.Continue Reading
Licensing options for accessing Microsoft Office remotely
There are plenty of choices for licensing virtual applications, but understanding when to use which ones can be a challenge.Continue Reading
Resetting passwords in the enterprise without the help desk
While there are several self-service password-reset options on the market, many organizations are hesitant to implement them -- even though the payoffs are significant.Continue Reading
Controlling desktops with AppLocker and software restriction policies
Many IT admins rely on User Account Control, but AppLocker or software restriction policies can also prevent unauthorized installation of desktop apps.Continue Reading
How do Group Policy settings differ between versions of Windows?
Group Policy Objects vary from one version of Windows to another. Determine which ones to apply in your environment.Continue Reading
Where does Windows store its temporary files?
The temporary files generated by Windows can pile up and become a security hazard. Learn how to track them down and tidy up your systems.Continue Reading
How to crack a password
Expert Brien Posey describes some techniques used to crack Windows passwords and offers several defenses against attack.Continue Reading
What is a Microsoft hotfix?
Hotfixes can solve an array of problems in your enterprise, but they have certain limitations and need to be managed properly.Continue Reading
How to troubleshoot a Windows system that won't shut down
Tracking down what's keeping a Windows desktop from sleeping requires looking at power management. Our expert helps you tackle the problem.Continue Reading
How to install a clean version of Windows 7
Installing a clean version of Windows 7 on your desktops may be easier than upgrading from Windows XP or Vista. Migrate to Microsoft's newest OS with these steps.Continue Reading
Securing removable drives with BitLocker To Go
BitLocker To Go, which ships with Windows 7 Ultimate and Enterprise Editions, can help secure FireWire and USB drives — but is it right for your business?Continue Reading
Five network security resolutions for 2010
Tighten your enterprise's network security this year with these simple steps, which include regularly changing passwords, keeping patches up to date and talking to end users.Continue Reading
Checklist for upgrading from Windows XP or Vista to Windows 7
While there's no single method for all enterprises to upgrade machines to Windows 7, these steps can help if you choose to migrate from Windows XP to Vista and then to Windows 7.Continue Reading
What can Windows 7's AppLocker do for you?
Control applications on individual workstations more efficiently with AppLocker, an improved application management feature in Windows 7.Continue Reading
Top 5 registry keys for Windows 7
Use these helpful Windows 7 registry keys to manage user account control, prevent the computer from rebooting after installing patches and more.Continue Reading
Desktop security predictions for 2010
Smarter hackers, more malicious malware and the rise of social engineering may make 2010 a dangerous year in terms of security. See what to look out for to keep your desktops safe.Continue Reading
Group Policy tricks to secure network endpoints
There are thousands of Group Policy settings available -- lock down your network endpoints with these favorites.Continue Reading
Using BitLocker in Windows 7
BitLocker allows users to lock down workstations and mobile devices. But the drive-encryption technology isn't for all enterprises. Find out if it's right security control for you.Continue Reading
Remote troubleshooting made easier with Windows 7's Problem Step Recorder
Remote technical support is easier to administer with Windows 7's Problem Step Recorder -- a new tool that allows users to show you exactly what their problems are.Continue Reading
Top 5 registry keys for Windows XP
Systems administrators may not know about useful registry keys for Windows XP. Learn how they can help you secure your network, create drive shares, manage passwords and more.Continue Reading
Should you switch to the Office 2007 file format?
Are the benefits of the Open XML file format in Microsoft Office 2007 significant enough to make switching a high priority? Consider your businesses' needs.Continue Reading
Microsoft Office 2010: At a glance
With Microsoft Office 2010 on the horizon, but no public betas as of yet, information on the new release is scattered across the Internet. Get everything you need to know here.Continue Reading
Four Internet Explorer 8 Group Policy security settings
Internet Explorer 8 doesn't have nearly as many new security mechanisms as its predecessor; however, there are four Group Policy security settings for IE8 worth mentioning.Continue Reading
Using Sysinternals tools in security management scenarios
Discover three valuable Sysinternals tools and common Windows security management scenarios in which these tools would be used.Continue Reading
Sysinternals tools: A must-have for every Windows security toolbox
Learn about the free Sysinternals tools that make managing and troubleshooting Windows-based PCs almost effortless for administrators.Continue Reading
The 10 most common Windows security vulnerabilities
Most Windows networks, including yours, have a number of security holes. Fortunately, though, many of these holes can be filled quickly and easily before they pose a major threat to your business-critical data. In this tip, learn what security ...Continue Reading
Troubleshooting IEEE 1394 bus devices for Windows machines
FireWire (or 1394) devices work well most of the time, but when things go wrong, troubleshooting techniques can vary depending on what's causing the problem.Continue Reading
How to recover from lost BitLocker PINs and startup keys
Windows BitLocker Drive Encryption makes it possible to encrypt your system drive, but permanent data loss can occur if you forget the PIN or lose the startup key. This article explains some steps that you can take to regain your lost data.Continue Reading
Metasploit 3.1 updates improve Windows penetration testing
Metasploit has long been a popular tool to use to conduct Windows penetration testing. Well, just this January, the latest version, Metasploit 3.1, was released. Learn about the new features and updates of this cool tool, which include a true GUI ...Continue Reading
Windows XP Troubleshooting Tutorial
Need help troubleshooting Windows XP? This tutorial features tons of tips and tricks that admins can use to solve a variety of system and network problems, with advice on troubleshooting Windows XP system startup issues, printer problems and more.Continue Reading
Windows 2000 batch file command reference
Check out this reference guide to batch file commands for Windows 2000, based on Microsoft documentation, but rewritten to increase usefulness and readability.Continue Reading
Troubleshooting Windows XP Device Manager error codes
Windows XP Device Manager alerts you if a system's hardware malfunctions, but often you need an advanced degree in unraveling cryptic code in order to understand the problem. Device Manager's error codes may be puzzling, but once you crack them, ...Continue Reading
Use Driver Query to resolve device driver problems
The Driver Query utility may not be perfect, but it can help to compile a device driver usage history.Continue Reading
Can I delete certificates from the CA?
Learn how you can manage Microsoft security certificates and improve Internet Information Services (IIS) security.Continue Reading
Windows pagefile security risks and how to avoid them
Learn about the security risks involved in using Windows pagefile, and avoid putting your sensitive data in harm's way.Continue Reading
How to use GPOs to deny folder permissions
You can use a Group Policy Object (GPO) to deny folder permissions in Windows. Find out how to manage folder permissions with GPOs with this advice from Kevin Beaver.Continue Reading
Fast Reboot: quick reboot utility for Windows
Windows' shut down/reboot process is not that snappy; it can take a couple of minutes for everything to terminate and be written to disk. You can initiate a reboot quickly with a tool like Fast Reboot, which performs the usual quick-reboot/shutdown ...Continue Reading
Prevent copying files from shared folders to remote computers
It's a tricky issue -- how to stop users from copying files from shared folders. Learn how to manage a user's file and folder copying rights with this advice from Windows security expert Kevin Beaver.Continue Reading
Restricting user permissions in folders
If you have a question about managing the permissions of a folder in your domain, this advice from Jonathan Hassell tells you how to set those permissions and prevent users from deleting that folder.Continue Reading
What to do if system hangs when building DMI pool
When powered on, a PC creates the DMI pool, which shows the devices available to the BIOS. If a PC hangs at this point, here are some possible culprits.Continue Reading
Making a Windows folder read-only
Windows hardening expert Jonathan Hassell explains how to make a Windows folder that multiple users share read-only.Continue Reading
Device drivers: Installation and configuration
To install hardware devices on Windows servers, admins must install the appropriate device drivers first. Here are some guidelines for installing, configuring and troubleshooting device drivers.Continue Reading
How to Bypass BIOS Passwords
BIOS passwords can be a liability if a user forgets his password. Here are a few tips and tricks that can help to bypass or reset the BIOS password on most systems.Continue Reading
How can I set up a BIOS password on my PC?
Access
is for IT professionals, business leaders and developers who want to take a strategic approach to end-user computing. We cover the forward-thinking tactics and technologies needed to provide users with the tools they need to do their jobs.Continue Reading