Unified endpoint management
The modern enterprise is an assortment of devices ranging from user-owned smartphones to corporate-controlled desktop PCs. It doesn't matter where the devices come from. If users work with them, IT must manage them. Unified endpoint management aims to simplify that process by giving IT pros a single location to manage all device types.
Top Stories
-
Opinion
23 May 2024
VMware EUC is now Omnissa: What we know so far
VMware EUC users waiting to see where the products would land after Broadcom's divestiture now have some answers. Continue Reading
-
Tip
23 Apr 2024
Creating a patch management policy: Step-by-step guide
A comprehensive patch management policy is insurance against security vulnerabilities and bugs in networked hardware and software that can disrupt your critical business processes. Continue Reading
-
Answer
03 Feb 2015
What Web application monitoring tools exist for desktops?
Microsoft Intune and other mobile device management tools are also useful for desktop management from the cloud and Web application monitoring. Continue Reading
-
Answer
23 Jan 2015
What's the best way to reformat a hard drive remotely?
Whether you need to remotely reformat a hard drive for security or prepare new network-attached machines, a few utilities can make the job easier. Continue Reading
-
Feature
30 Sep 2014
How to enable Windows 8.1 kiosk mode for Modern apps
It's possible to control user application access on startup with Assigned Access, but note that Windows 8.1 kiosk mode works only for Modern apps. Continue Reading
-
Feature
18 Sep 2014
Windows kiosk mode locks down PCs, but note workarounds
Switching from the Windows Explorer shell to a particular app can be useful for single-purpose devices, but users can still foil Windows kiosk mode. Continue Reading
-
Definition
19 Aug 2014
client-side extension (CSE)
A client-side extension (CSE) is an integral component of enterprise group policy administration that applies Group Policy to users or endpoint systems. Continue Reading
-
Tip
12 Aug 2014
Using tools to back up and restore bootable USB device images
Do you have more install or diagnostic environment images to manage than physical UFDs? Learn how to back up and restore bootable USB device images. Continue Reading
-
Photo Story
04 Aug 2014
Three visual disk analyzer utilities to help you optimize disk space
Learn about visual exploration tools for Windows drives of all sizes. These disk analyzers can help identify big unnecessary items for space savings. Continue Reading
-
News
22 Jul 2014
Microsoft talks up services, mum on Windows strategy
Microsoft has acknowledged that users aren't just tied to desktop OSes, shifting its focus to Office 365 and DaaS rather than its Windows strategy. Continue Reading
-
Feature
16 Jul 2014
Windows 9 features may address unified apps and the cloud
Based on the Windows 8.1 update, it's reasonable to expect Windows 9 features for universal apps and cloud integration. Will they entice enterprises? Continue Reading
-
Feature
10 Feb 2014
Use Excel's IF statement to track, save on IT support contract costs
Warranty tracking for enterprise software can be an odious task, but if you know how to use the IF statement in Microsoft Excel, you could save money. Continue Reading
-
Feature
03 Feb 2014
Track software licenses and IT support with Excel date functions
As part of our series on Excel for IT admins, we look at how Excel date functions can help with calculating software licenses and support dates. Continue Reading
-
Tip
20 Jan 2014
More remote Group Policy Object settings and checking refresh status
Admins can refresh Group Policy Object settings across multiple computers, but they must verify that Group Policy settings have successfully changed. Continue Reading
-
Answer
30 Dec 2013
Before you clone HDD to SSD, know the benefits and danger to data
Which type of drive is better: hard disk drive or solid-state drive? HDD to SSD cloning can ease data access, but SSDs aren't without risks to data. Continue Reading
-
Feature
19 Nov 2013
If you're not using Windows Sysinternals tools, you should be
Windows Sysinternals tools can make work a lot easier for IT administrators, but many people don't even know the suite exists. Get with the program! Continue Reading
-
Answer
08 Nov 2013
Can I plug a USB drive into a phone with a micro-USB connector?
This week, our expert answers a question on how to connect a phone or tablet to a USB drive with a micro-USB connector. Continue Reading
-
Answer
27 Feb 2013
Ways to detect and delete duplicate files in Windows systems
Our enterprise desktop expert answers a question about some third-party tools for eliminating duplicate files in Windows desktops. Continue Reading
-
Definition
14 Jun 2012
application manager (app manager)
An application manager (app manager) is programming for overseeing the installation, patching and updating and perhaps access of software applications. Continue Reading
-
News
27 Oct 2011
Interop reporter's notebook
Here are some interesting factoids picked up from the IT consumerization coverage at Interop, including some debate about the cost of BYOD. Continue Reading
-
News
27 Oct 2011
BlackBerry vs. Microsoft: Who will survive?
While Apple and Google dominate the mobile OS market, there's still room for a third vendor to succeed. Will that vendor be Microsoft or RIM? Continue Reading
-
News
27 Oct 2011
Interop pays tribute to Steve Jobs
The day after the passing of Apple's Steve Jobs, Interop's keynote began with a tribute to him. Continue Reading
-
Tip
21 Oct 2011
Configuration profiles: An iPad administrator's best friend
The influx of iPads and other mobile devices into the enterprise may worry IT administrators, but configuration profiles allow for centralized management of iOS devices. Continue Reading
-
News
20 Oct 2011
VMware mobile virtualization arrives, but with baggage
VMware is finally bringing mobile virtualization to market, but it's far from a slam-dunk solution to bring-your-own-device problems. Continue Reading
-
Tip
11 Oct 2011
Tablet licensing rules with Microsoft Office
As tablets make their way into the enterprise, it might be time to brush up on licensing rules for mobilizing Microsoft Office. We also provide some solutions for reducing costs. Continue Reading
-
News
07 Oct 2011
Experts to IT: Focus on data, not devices
Analysts at Interop told IT pros to focus more on securing the data on users' smartphones and tablets, and less on the devices themselves. Continue Reading
-
News
22 Mar 2011
Microsoft sweetens MDOP deal and releases Intune
Windows Intune, Microsoft's cloud-based desktop management console is ready, and an MDOP 2011 update is due this year which will be offered to a wider customer base. Continue Reading
-
Tip
16 Dec 2009
Group Policy tricks to secure network endpoints
There are thousands of Group Policy settings available -- lock down your network endpoints with these favorites. Continue Reading
-
Tip
23 Sep 2009
Top 5 registry keys for Windows XP
Systems administrators may not know about useful registry keys for Windows XP. Learn how they can help you secure your network, create drive shares, manage passwords and more. Continue Reading
-
Tip
04 May 2009
Four Internet Explorer 8 Group Policy security settings
Internet Explorer 8 doesn't have nearly as many new security mechanisms as its predecessor; however, there are four Group Policy security settings for IE8 worth mentioning. Continue Reading
-
Tip
06 Feb 2009
Sysinternals tools: A must-have for every Windows security toolbox
Learn about the free Sysinternals tools that make managing and troubleshooting Windows-based PCs almost effortless for administrators. Continue Reading
-
Tutorial
24 Sep 2008
Step-by-step guide: Laptop hacking
Laptops with sensitive data are getting stolen every day. Contributor Kevin Beaver says the best way to secure your laptops is to understand how they will be attacked. He provides the basic attack methods and a set of contingencies in this step-by-step guide. Continue Reading
-
Tip
18 Sep 2007
Find Windows vulnerabilities with a hex editor
If you haven't heard of a hex editor, then pay attention, because it could be the security testing tool that you've been waiting for all your life. Read how this underrated tool can help you find weaknesses and vulnerabilities in your Windows environment, if you dare. Continue Reading
-
Tip
09 Aug 2007
Windows pagefile security risks and how to avoid them
Learn about the security risks involved in using Windows pagefile, and avoid putting your sensitive data in harm's way. Continue Reading
-
Feature
18 Aug 2005
Taking over the domain
This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes. Continue Reading
-
Feature
18 Aug 2005
Target network
This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes. Continue Reading