Unified endpoint management
The modern enterprise is an assortment of devices ranging from user-owned smartphones to corporate-controlled desktop PCs. It doesn't matter where the devices come from. If users work with them, IT must manage them. Unified endpoint management aims to simplify that process by giving IT pros a single location to manage all device types.
Top Stories
-
Tutorial
25 Oct 2024
How to use Ansible with Windows for server management
Initially made for Linux, Ansible also manages Windows systems through playbooks that use declarative syntax. Learn how to set up a control node and add roles to Windows Server. Continue Reading
-
Opinion
23 May 2024
VMware EUC is now Omnissa: What we know so far
VMware EUC users waiting to see where the products would land after Broadcom's divestiture now have some answers. Continue Reading
By- Gabe Knuth, Senior Analyst
-
Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
-
Feature
04 Mar 2015
MDM, MIM and MAM products help in securing data
Mobile device management, mobile application management and mobile information management form a security trio that protect data in the age of BYOD. Continue Reading
By -
Answer
03 Feb 2015
What Web application monitoring tools exist for desktops?
Microsoft Intune and other mobile device management tools are also useful for desktop management from the cloud and Web application monitoring. Continue Reading
By -
Answer
23 Jan 2015
What's the best way to reformat a hard drive remotely?
Whether you need to remotely reformat a hard drive for security or prepare new network-attached machines, a few utilities can make the job easier. Continue Reading
By -
Feature
30 Sep 2014
How to enable Windows 8.1 kiosk mode for Modern apps
It's possible to control user application access on startup with Assigned Access, but note that Windows 8.1 kiosk mode works only for Modern apps. Continue Reading
-
Feature
18 Sep 2014
Windows kiosk mode locks down PCs, but note workarounds
Switching from the Windows Explorer shell to a particular app can be useful for single-purpose devices, but users can still foil Windows kiosk mode. Continue Reading
-
Definition
19 Aug 2014
client-side extension (CSE)
A client-side extension (CSE) is an integral component of enterprise group policy administration that applies Group Policy to users or endpoint systems. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Tip
12 Aug 2014
Using tools to back up and restore bootable USB device images
Do you have more install or diagnostic environment images to manage than physical UFDs? Learn how to back up and restore bootable USB device images. Continue Reading
By- Kim Lindros and Ed Tittel
-
Photo Story
04 Aug 2014
Three visual disk analyzer utilities to help you optimize disk space
Learn about visual exploration tools for Windows drives of all sizes. These disk analyzers can help identify big unnecessary items for space savings. Continue Reading
-
News
22 Jul 2014
Microsoft talks up services, mum on Windows strategy
Microsoft has acknowledged that users aren't just tied to desktop OSes, shifting its focus to Office 365 and DaaS rather than its Windows strategy. Continue Reading
By -
Feature
16 Jul 2014
Windows 9 features may address unified apps and the cloud
Based on the Windows 8.1 update, it's reasonable to expect Windows 9 features for universal apps and cloud integration. Will they entice enterprises? Continue Reading
-
Feature
10 Feb 2014
Use Excel's IF statement to track, save on IT support contract costs
Warranty tracking for enterprise software can be an odious task, but if you know how to use the IF statement in Microsoft Excel, you could save money. Continue Reading
By -
Feature
03 Feb 2014
Track software licenses and IT support with Excel date functions
As part of our series on Excel for IT admins, we look at how Excel date functions can help with calculating software licenses and support dates. Continue Reading
By -
Tip
20 Jan 2014
More remote Group Policy Object settings and checking refresh status
Admins can refresh Group Policy Object settings across multiple computers, but they must verify that Group Policy settings have successfully changed. Continue Reading
-
Answer
30 Dec 2013
Before you clone HDD to SSD, know the benefits and danger to data
Which type of drive is better: hard disk drive or solid-state drive? HDD to SSD cloning can ease data access, but SSDs aren't without risks to data. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Feature
19 Nov 2013
If you're not using Windows Sysinternals tools, you should be
Windows Sysinternals tools can make work a lot easier for IT administrators, but many people don't even know the suite exists. Get with the program! Continue Reading
By- Margaret Jones, Executive Editor
-
Answer
08 Nov 2013
Can I plug a USB drive into a phone with a micro-USB connector?
This week, our expert answers a question on how to connect a phone or tablet to a USB drive with a micro-USB connector. Continue Reading
-
Answer
27 Feb 2013
Ways to detect and delete duplicate files in Windows systems
Our enterprise desktop expert answers a question about some third-party tools for eliminating duplicate files in Windows desktops. Continue Reading
-
Definition
14 Jun 2012
application manager (app manager)
An application manager (app manager) is programming for overseeing the installation, patching and updating and perhaps access of software applications. Continue Reading
-
News
27 Oct 2011
Interop reporter's notebook
Here are some interesting factoids picked up from the IT consumerization coverage at Interop, including some debate about the cost of BYOD. Continue Reading
-
News
27 Oct 2011
BlackBerry vs. Microsoft: Who will survive?
While Apple and Google dominate the mobile OS market, there's still room for a third vendor to succeed. Will that vendor be Microsoft or RIM? Continue Reading
-
News
27 Oct 2011
Interop pays tribute to Steve Jobs
The day after the passing of Apple's Steve Jobs, Interop's keynote began with a tribute to him. Continue Reading
-
Tip
21 Oct 2011
Configuration profiles: An iPad administrator's best friend
The influx of iPads and other mobile devices into the enterprise may worry IT administrators, but configuration profiles allow for centralized management of iOS devices. Continue Reading
By- Greg Shields, Concentrated Technology
-
News
20 Oct 2011
VMware mobile virtualization arrives, but with baggage
VMware is finally bringing mobile virtualization to market, but it's far from a slam-dunk solution to bring-your-own-device problems. Continue Reading
-
Tip
11 Oct 2011
Tablet licensing rules with Microsoft Office
As tablets make their way into the enterprise, it might be time to brush up on licensing rules for mobilizing Microsoft Office. We also provide some solutions for reducing costs. Continue Reading
By -
News
07 Oct 2011
Experts to IT: Focus on data, not devices
Analysts at Interop told IT pros to focus more on securing the data on users' smartphones and tablets, and less on the devices themselves. Continue Reading
-
News
22 Mar 2011
Microsoft sweetens MDOP deal and releases Intune
Windows Intune, Microsoft's cloud-based desktop management console is ready, and an MDOP 2011 update is due this year which will be offered to a wider customer base. Continue Reading
By- Bridget Botelho, Editorial Director, News
-
Tip
16 Dec 2009
Group Policy tricks to secure network endpoints
There are thousands of Group Policy settings available -- lock down your network endpoints with these favorites. Continue Reading
By -
Tip
23 Sep 2009
Top 5 registry keys for Windows XP
Systems administrators may not know about useful registry keys for Windows XP. Learn how they can help you secure your network, create drive shares, manage passwords and more. Continue Reading
By- Eric Schultze, Amazon Web Services
-
Tip
04 May 2009
Four Internet Explorer 8 Group Policy security settings
Internet Explorer 8 doesn't have nearly as many new security mechanisms as its predecessor; however, there are four Group Policy security settings for IE8 worth mentioning. Continue Reading
By -
Tip
06 Feb 2009
Sysinternals tools: A must-have for every Windows security toolbox
Learn about the free Sysinternals tools that make managing and troubleshooting Windows-based PCs almost effortless for administrators. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Tutorial
24 Sep 2008
Step-by-step guide: Laptop hacking
Laptops with sensitive data are getting stolen every day. Contributor Kevin Beaver says the best way to secure your laptops is to understand how they will be attacked. He provides the basic attack methods and a set of contingencies in this step-by-step guide. Continue Reading
-
Tip
18 Sep 2007
Find Windows vulnerabilities with a hex editor
If you haven't heard of a hex editor, then pay attention, because it could be the security testing tool that you've been waiting for all your life. Read how this underrated tool can help you find weaknesses and vulnerabilities in your Windows environment, if you dare. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Tip
09 Aug 2007
Windows pagefile security risks and how to avoid them
Learn about the security risks involved in using Windows pagefile, and avoid putting your sensitive data in harm's way. Continue Reading
By -
Feature
18 Aug 2005
Taking over the domain
This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes. Continue Reading
-
Feature
18 Aug 2005
Target network
This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes. Continue Reading