Tips
Tips
-
How to add MDT applications with Chocolatey package manager
The Microsoft Deployment Toolkit allows administrators to install applications during deployment. Here's how IT can simplify the process with Chocolatey's command-line input. Continue Reading
-
4 use cases for Macs in the enterprise
Microsoft Windows is typically regarded as the go-to enterprise desktop, but IT shouldn't rule out macOS. Consider four reasons to run macOS in the enterprise. Continue Reading
-
5 digital workspace components to look for
The ideal digital workspace should handle a variety of tasks. By focusing on these five digital workspace components, IT pros can find the right platform to meet their needs. Continue Reading
-
4 use cases for Linux desktops in the enterprise
Linux OS isn't as popular as Windows, but it still offers a variety of benefits, including flexibility and heightened security. Delve into these use cases for Linux desktops. Continue Reading
-
How to navigate a sea of UEM vendors
The UEM market is relatively new and, therefore, confusing to navigate. But, with an analysis of what's out there, IT can begin to understand which product is the best fit. Continue Reading
-
How to create Windows 10 toast notifications with PowerShell
IT can send pop-up notifications to a Windows 10 user's taskbar with a PowerShell module called BurntToast. Here's how to get started creating toast notifications. Continue Reading
-
Unified endpoint management tools enrich the user experience
A well-conceived and well-executed UEM strategy that prioritizes UX can improve cross-platform capabilities, system access and ultimately worker productivity. Continue Reading
-
How EDR tools can improve endpoint security
IT should be constantly re-evaluating security tool choices. Endpoint detection and response tools, for example, can be a good option to improve endpoint security. Continue Reading
-
5 Windows 10 security settings to tweak
Desktop security is crucial, and the default settings of Windows 10 can leave organizations vulnerable. Here are a few changes to ensure that Windows 10 is as secure as possible. Continue Reading
-
Windows 10 customizations for enterprise desktops
Microsoft offers different services that IT can use to adjust its users' desktop experience. These Windows 10 customizations are a must in an admin's toolbox. Continue Reading
-
How to access Windows 10 troubleshooting tools step by step
Running into problems with Windows 10 booting, starting or other performance issues? Get to know the menus and options for Windows troubleshooting. Continue Reading
-
How to manage cookies across web browsers
There are pros -- saved login credentials -- and cons -- privacy concerns -- to cookies. Either way, IT should understand how to manage cookies across web browsers. Continue Reading
-
How to find Wi-Fi settings in Windows 10
In Windows 10, the Wi-Fi -- and wired -- connectivity settings are in a new spot, but they're as easy to access and configure as ever. You just have to know where to look. Continue Reading
-
How does Parallels Mac Management for Microsoft SCCM work?
With Mac Management from Parallels, IT professionals can manage Windows and Apple macOS desktops side by side with System Center Configuration Manager's native features. Continue Reading
-
How to use PowerShell to troubleshoot Windows desktops
When IT uses remote access to troubleshoot a user's desktop, it prevents the user from working. PowerShell, however, allows IT to fix a problem without disturbing the user. Continue Reading
-
How to manage Windows 10 device drivers
Device drivers connect users' endpoints to the peripheral devices they work with. As a result, IT must know when to update drivers and what to do if they break. Continue Reading
-
Modern desktop transformation focuses on workspace technology
As workspaces trend toward mobility and device flexibility, IT departments must evolve to fit users' needs by moving away from a desktop-centric approach. Continue Reading
-
How to address endpoint security issues caused by users
Certain behaviors, such as ignoring patches, create security issues on the endpoints users work with. IT should enforce policies that prevent users from taking these damaging actions. Continue Reading
-
How to set up a Windows Autopilot deployment
IT can set profiles for its devices running Windows 10 and enroll them in Active Directory with the Windows Autopilot tool, but Autopilot does not cover many settings. Continue Reading
-
How Windows 10 certificates create a chain of trust
Certificates in Windows 10 create a chain of trust that confirms the identity of the user accessing corporate resources and ensures that she is doing so over a trusted connection. Continue Reading
-
Create and enforce a password policy across the enterprise
There are new-fangled approaches to enterprise security, such as biometric authentication, but tried-and-true passwords are still critical to protecting an organization's network. Continue Reading
-
Get to know third-party Windows 10 migration tools
IT professionals should look to third-party migration tools during a transition to Windows 10 to provide any features that the native Windows migration tools do not. Continue Reading
-
5 Windows 10 management tools every IT pro must know
With tools such as PowerShell and the Microsoft Deployment Toolkit, IT can make managing Windows 10 much simpler from deployment through mobile device management. Continue Reading
-
How to manage cookie privacy in the enterprise
Cookies can make life easier for users by preventing them from having to re-enter passwords and preferences on websites, but they also carry some legitimate privacy concerns. Continue Reading
-
How to create an internal phishing campaign from scratch
When IT begins an email phishing campaign, it must determine what server the emails will come from, consider phishing tool options and more. Continue Reading
-
Windows 10 updates options to ease the process
Windows 10 update issues are commonplace in the enterprise, but IT isn't helpless to deal with them. Group Policy and other tools can help IT regain control over updates. Continue Reading
-
Reduce update-related downtime after a Windows 10 OS upgrade
Windows 10 updates are a necessary evil, as they add new features and improve security, but also cause downtime for users. IT can downplay the negative effects of updates. Continue Reading
-
Understand Windows Insider Program for Business options
With its business-friendly Insider Program, Microsoft allows IT and users to test Windows 10 preview builds for compatibility and performance issues. Continue Reading
-
How to get the Windows 10 upgrade process right
To install Windows 10 correctly, IT pros should alter the disk layout for a fresh installation of the OS to match Microsoft's recommended order rather than its default order. Continue Reading
-
Get to know data synchronization tools for the enterprise
Users who work with multiple devices will want their data to transfer across endpoints. IT can ease the syncing process by working with the right tools. Continue Reading
-
7 features for managing Windows 10 updates and upgrades
Managing updates and upgrades in Windows 10 is tough. Fortunately, Microsoft includes seven features in the OS, including SetupDiag, that IT pros can use to simplify both processes. Continue Reading
-
Get to know enterprise patch management tools
Unpatched software and OSes can create a huge security hole in any organization. IT should know what tools can fill in the gaps. Continue Reading
-
Discover three key exploit protection features in Windows 10
To defend against memory-based attacks, Microsoft introduced three key features to Windows Defender Exploit Guard, including Address Space Layout Randomization. Continue Reading
-
How the Microsoft Teams app can boost collaboration
Microsoft Teams is an app users can work with to collaborate no matter where they're located. It comes as part of certain business-focused Office 365 subscriptions. Continue Reading
-
Desktop and mobile malware detection takes on high priority
End-user computing professionals must embrace modern Windows and mobile malware protection technologies to defend against ransomware and other attacks. Continue Reading
-
Use Windows Analytics to better support Windows 10 desktops
With the help of Windows Analytics, IT can improve its Windows 10 desktop support with tools such as Device Health, which monitors desktop performance and identifies underperforming devices. Continue Reading
-
Create an effective email phishing test in 7 steps
The best way for IT to improve email phishing security is through comprehensive testing, which helps identify which users are susceptible and what type of fake email is most effective. Continue Reading
-
Manage Windows 10 desktops, mobile devices with EMM software
Windows 10 supports crucial functions that enable enterprise mobility management. IT must follow a few important steps to prepare desktops for management through EMM. Continue Reading
-
Spectre and Meltdown vulnerabilities show haste makes waste
When the Meltdown and Spectre vulnerabilities came to light, everyone scrambled to find a fix. As a result, the patching process has been anything but smooth. Continue Reading
-
How to get the best desktop support SLA bang for your buck
IT can save money on its desktop service-level agreements by mixing and matching the level of support to meet the importance of the device. Continue Reading
-
How to take advantage of SCCM and Intune co-management
IT can combine Microsoft Intune and System Center Configuration Manager to manage users' mobile devices, as well as any legacy systems in its network. Continue Reading
-
Top six Windows 10 migration problems and how to avoid them
Users and IT professionals sometimes have issues after a Windows 10 migration. Careful planning can mitigate these issues before IT undertakes a full-scale migration. Continue Reading
-
How to establish Windows 10 security baselines
IT should consider following Microsoft's Windows 10 security recommendations in the Security Compliance Toolkit to better protect the operating system. Continue Reading
-
A Windows vulnerability scan should leave no stones unturned
When it comes to scanning for vulnerabilities in Windows, IT pros need to run both authenticated and unauthenticated scans so they can see the deployment from every angle. Continue Reading
-
Ten Windows 10 Fall Creators Update features to know
Microsoft introduced some significant changes to Windows 10 in the Fall Creators Update. The My People app, for example, lets users pin contacts to their task bars. Continue Reading
-
Guard the line with Windows Defender features
The Windows 10 Fall Creators Update took Windows 10 security up a notch by adding advanced features to Windows Defender, including Application Guard and Exploit Guard. Continue Reading
-
How to create a snapshot of your custom Windows 10 image
Once you finish creating your custom Windows 10 image, the time is right to take a snapshot of it so you can deliver it to your users. Continue Reading
-
Top Windows 10 backup and restore utilities
The key to a good backup and restore tool is reliability. Look into third-party utilities such as Reflect or OneKey for Windows 10 restore and backup. Continue Reading
-
How to use Sysprep to install a custom Windows 10 image
Walk through the process of adding custom software, apps and assets to your Windows 10 image in audit mode. Continue Reading
-
Pros and cons of a Windows 10 clean install vs. upgrade
When migrating to Windows 10, IT must decide whether to perform an upgrade install or clean install. The benefits of one are the weaknesses of the other. Continue Reading
-
How to check Windows 10 compatibility for legacy apps
Testing apps is just one way to ensure that legacy apps have Windows 10 compatibility. Find out how to confirm the compatibility of legacy apps with the OS. Continue Reading
-
Set up a virtual hard disk and perform a Windows 10 dual boot
Dual booting Windows 10 can come in handy in a variety of ways. The process requires that IT knows how to build a virtual hard disk and install Windows 10 on it. Continue Reading
-
Clear cached credentials with the cmdkey and PowerShell
Cached credentials make users' lives easier, but they can be a security issue in Windows if a device falls into the wrong hands. IT can manage them on a large scale with PowerShell. Continue Reading
-
12 Windows 10 GPO settings IT must know
Group Policy Objects in Windows 10 are powerful. IT can use them to turn off the Windows Store app, reshape the Start menu, change how users log in and more. Continue Reading
-
How to use the Windows Assessment and Deployment Kit for Windows 10
It's important for IT admins to know everything is going to work before they deploy Windows 10 desktops. They can use the tools in the Windows ADK to do just that and more. Continue Reading
-
Windows 10 security tools to have handy
Cyberthreats lurk around every corner, so it's always a good time to fortify Windows 10 defenses. These top security tools can help make that happen. Continue Reading
-
How to build and use a bootable recovery partition in Windows 10
Understanding how to set up a bootable recovery partition in Windows 10 allows you to restore a damaged OS or troubleshoot a litany of problems. Continue Reading
-
How to fix Windows 10 update problems with the DISM command tool
With a few tricks in the Windows Deployment Image Servicing and Management command utility, admins can solve some of the most common Windows 10 update problems plaguing their users. Continue Reading
-
Office 365 vs. Office 2013: What are the key differences?
Software as a service may be one reason for choosing Office 365 over Office 2013, but licensing and update frequency are other considerations. Continue Reading
-
Take a close-up look at Windows 10 permissions settings
With all the new updates and features, Windows 10 can appear daunting. To simplify the transition, break down and tailor the permissions in Windows 10 to users' specific needs. Continue Reading
-
How to use WMI and the CIM standard with Windows PowerShell
WMI, Microsoft's implementation of the CIM standard, lets admins use PowerShell commands to view and modify system data and configuration. Continue Reading
-
How to handle Windows 10 browser compatibility issues
IT often runs into problems with legacy apps not functioning well on new browser versions. There are a few ways to combat Windows 10 browser compatibility issues in Internet Explorer 11. Continue Reading
-
Use an in-place upgrade to repair Windows 10
If your Windows 10 installation has gone wonky and needs some attention, one way to fix it is with an in-place upgrade to the same version of Windows you already use. Continue Reading
-
Productivity suite smack down: Office 365 vs. Office 2016
Microsoft's Office 2016 for the desktop might seem like the de facto option for delivering productivity apps to users, but its cloud-based cousin Office 365 offers more flexibility. Continue Reading
-
Choosing between Microsoft Office 2016 versions
Choosing between Office 2016 versions may seem like a simple choice, but don't jump to conclusions: Consider functionality, operational consistency and cost. Continue Reading
-
Four ways to put Sysinternals Process Explorer to work
IT admins can use Process Explorer in Sysinternals to find suspicious software, inspect process and object privileges, and more. Continue Reading
-
Microsoft Office Trust Center settings that help stop malware
The Trust Center in Microsoft's Office suite has some important and useful settings to prevent users from opening files infected with malware and viruses, but admins need to know about and enable them. Continue Reading
-
Windows 8 GPO settings to configure search, indexing options
Windows 8 and 8.1 GPOs can help with many tasks, including creating Start screen layouts that adhere to corporate policies, as well as configuring search and indexing settings. Continue Reading
-
Ten most useful Windows Sysinternals utilities
Sysinternals utilities such as Autoruns and TCPView can target specific problem areas in a Microsoft Windows environment, including performance issues. Continue Reading
-
What to expect from Macs in the enterprise
For enterprise IT, Apple's Mac OS can pose a few problems, including compatibility, applications, support, networking and other issues. But if you know what could be coming your way, you can get the training and tools to manage Macs. Continue Reading
-
Desktop management tools and best practices
Desktop management tools are the key to making sure things in your fleet are running smoothly. Systems such as Desktop Central and Client Management Suite cover the big five of desktop management. Continue Reading
-
The importance of desktop inventory management tools
Desktop inventory management tools help keep track of how many endpoints are in use and who's using them. That basic information can help with sundry other management tasks, such as budgeting and responses to security breaches. Continue Reading
-
Tighten Windows 8.1 security in five simple steps
Microsoft has improved Windows 8.1 security, but no OS is free of vulnerabilities. Some basic settings can further protect Windows 8.x systems. Continue Reading
-
Four utilities can verify Group Policy object settings
Client-side extensions could cause a Group Policy object to fail. Fortunately, there are a few different ways to track down Windows GPO settings. Continue Reading
-
Using tools to back up and restore bootable USB device images
Do you have more install or diagnostic environment images to manage than physical UFDs? Learn how to back up and restore bootable USB device images. Continue Reading
-
Office Telemetry reports on Office 2013 docs and apps
If IT administrators need information on document and application usage, they can use Office Telemetry, an Office 2013 feature that gathers such data. Continue Reading
-
Save WIM file space with WIMBoot in Windows 8.1 update
With Windows 8.1 Update 1, it's possible to boot desktops directly from a WIM file. Follow these steps to create WIMBoot images and save disk space. Continue Reading
-
How to perform a Windows XP upgrade to Windows 8.1
As organizations must now implement a Windows XP upgrade to Windows 8.1, they should understand that Windows 8 and 8.1 aren't identical and use the Windows 8.1 Upgrade Assistant. Continue Reading
-
For missing GPO settings, check the Winlogon component
If a Windows system isn't applying certain Group Policy settings, you may need to check Winlogon and common client-side extensions. Continue Reading
-
More remote Group Policy Object settings and checking refresh status
Admins can refresh Group Policy Object settings across multiple computers, but they must verify that Group Policy settings have successfully changed. Continue Reading
-
Locking down Internet Explorer settings with Group Policy in IE 11
New Internet Explorer settings can tighten enterprise security, but only if Group Policy is properly enabled in IE 11 and you have Windows 8. Continue Reading
-
Learn how to install Office 2013 with Group Policies or SCCM
To successfully deploy Office 2013 across a network, you'll need Group Policies or tools such as Microsoft System Center Configuration Manager. Continue Reading
-
Click-to-Run and MSI provide Office 2013 installation options
The Microsoft Installer has competition for Office 2013 installation. See how Office Click-to-Run allows Office 2013 to run without a full download. Continue Reading
-
Microsoft's revised Resource Kit can ease Office 2013 deployment
Microsoft's free Office 2013 Resource Kit provides documentation for Office 2013 deployment, as well as for management after an Office deployment. Continue Reading
-
Using Active Directory activation and other new Office 2013 tools
Among the new Office 2013 tools for IT admins are a method for volume activation, administrative template files and files for custom installations. Continue Reading
-
Stripping a Microsoft Office password from a document with DocRecrypt
DocRecrypt, an Office 2013 tool, allows an admins to get into an otherwise inaccessible file by stripping it of its Microsoft Office password. Continue Reading
-
Windows Server Update Services weaknesses you may not know about
Built-in tools such as WSUS can help with Windows patching, but you may still need other tools to verify that enterprise systems are safe. Continue Reading
-
Microsoft Office 2013 crackable, so look to Office password recovery
Microsoft Office 2013 may have improved protection, but third-party tools have already cracked passwords. See how to use Office password recovery. Continue Reading
-
Desktop audit checklist: Five steps to a successful desktop audit
Now that 2012 has begun, consider doing a desktop audit to get your IT house in order. A strong desktop audit checklist can help you manage hardware, software and applications better. Continue Reading
-
Tablet licensing rules with Microsoft Office
As tablets make their way into the enterprise, it might be time to brush up on licensing rules for mobilizing Microsoft Office. We also provide some solutions for reducing costs. Continue Reading
-
Microsoft Windows 7 Task Manager troubleshooting tips
Here are some troubleshooting tips for Microsoft Windows 7's improved Task Manager -- from identifying processes and services to using the Resource Monitor. Continue Reading
-
Turn a Windows 7 desktop into a wireless hotspot
Faulty Internet connections are a nightmare for on-the-go admins, but wireless hotspot software can eliminate network headaches. Continue Reading
-
Using P2V Migration for Software Assurance for Windows 7 upgrades
P2V Migration for Software Assurance automates the Windows 7 migration process and preserves XP applications and data. Yet its limitations may be a deal breaker. Continue Reading
-
Licensing options for accessing Microsoft Office remotely
There are plenty of choices for licensing virtual applications, but understanding when to use which ones can be a challenge. Continue Reading
-
Resetting passwords in the enterprise without the help desk
While there are several self-service password-reset options on the market, many organizations are hesitant to implement them -- even though the payoffs are significant. Continue Reading
-
Controlling desktops with AppLocker and software restriction policies
Many IT admins rely on User Account Control, but AppLocker or software restriction policies can also prevent unauthorized installation of desktop apps. Continue Reading
-
How do Group Policy settings differ between versions of Windows?
Group Policy Objects vary from one version of Windows to another. Determine which ones to apply in your environment. Continue Reading
-
Where does Windows store its temporary files?
The temporary files generated by Windows can pile up and become a security hazard. Learn how to track them down and tidy up your systems. Continue Reading
-
How to crack a password
Expert Brien Posey describes some techniques used to crack Windows passwords and offers several defenses against attack. Continue Reading
-
What is a Microsoft hotfix?
Hotfixes can solve an array of problems in your enterprise, but they have certain limitations and need to be managed properly. Continue Reading