Endpoint security management tools

Email Alerts

Register now to receive SearchEnterpriseDesktop.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Avoiding pitfalls on the path to endpoint security

    IT security can be overwhelming, but it doesn’t have to be that way. Admins can strengthen desktop and enterprise security by taking a step back to consider the bigger picture. 

  • Understanding Microsoft Office 2013 features, licensing and security

    Many features have been altered or added in Microsoft's application suite, with implications for enterprise desktop admins. See which ones can be helpful, as well as where Microsoft Office 2013 sits in the market in comparison with alternatives such ... 

  • State of the art endpoint management

    Employees use cloud services for work whether they’re sanctioned by IT or not. IT's only choices -- aside from blocking every service, which won’t make users happy -- are to embrace these services or develop user- and IT-friendly alternatives. It’s n... 

  • Endpoint Management Strategies and Best Practices

    The job of an IT administrator has become a lot more challenging today than what it once was. IT has evolved from a controlled endpoint environment behind four walls to thousands of islands of information scattered about an organization that must be ... 

  • FIDO (Fast Identity Online)

    FIDO (Fast ID Online) is an open standard for a secure and easy-to-use universal authentication interface created to address the lack of interoperability among strong authentication devices. The FIDO standard supports multifactor authentication and ... 

  • SmartScreen

    SmartScreen is a Microsoft filtering tool designed to detect and block suspicious and malicious sites, applications and files. The program checks the safety of websites and downloads and tracks malware and phishing attempts. Introduced in Windows 7'... 

  • host intrusion prevention systems (HIPS)

    A host intrusion prevention system (HIPS) is a security method that relies on third-party software tools to monitor network traffic and system activities for anomalous code behavior to identify and prevent malicious activities. 

  • Windows Management Instrumentation Command line (WMIC)

    The Windows Management Instrumentation Command line (WMIC) is a software utility intended to help IT staffers retrieve information contained within the Windows Management Instrumentation (WMI) architecture of almost any Microsoft operating system, st... 

  • application performance monitoring (APM)

    Application performance monitoring, also called app monitoring, is an area of information technology (IT) that focuses on making sure software application programs perform as expected. The goal of performance monitoring is to provide end users with a... 

  • desktop personalization

    Desktop personalization is the process of adjusting the look, feel and organization of a Windows end-user experience. 

  • prefetch folder (PF)

    A Windows prefetch folder is a specific location within Windows XP and later computers that contains a series of small files detailing the startup activities and frequently-used applications. 

  • Windows Imaging Format (WIM)

    The Windows Imaging Format (or WIM) is used for the creation and distribution of disk image files. 

  • Windows Remote Desktop

    Windows Remote Desktop is a program that allows the user to connect to a computer in another location and interact with it as if it were local. (Continued) 

  • BIOS password

    A BIOS password is a security precaution that requires a computer user to log into the machine's basic input/output system (BIOS) before a computer will boot up. 

  • See more Definitions on Endpoint security management tools
About Endpoint security management tools

A proper set of tools can be the difference between a fully operational desktop deployment and an under-performing collection of paper weights. The free tools discussed in the Windows security tools section can help you automate patch management in Windows, fight malware infections and test the security of your desktop machines.