Enterprise Desktop Tips | Page 20


  • How to use Group Policy to control wireless access

    Group Policy can be used to control wireless access in Windows networks. Find out which Group Policy settings you should create to accomplish this in this tip.

  • Creating a custom control panel in Vista

    While Microsoft's Control Panel in Windows Vista is more complex than its predecessors, admins can create a custom control panel to quickly find the icons they want.

  • Protect critical system resources with WRP

    Windows Resource Protection (WRP) has undergone some changes since it's predecessor, Windows File Protection (WFP) was used to protect critcal Windows system files. Learn about WRP's evolution and ...

  • Windows Task Manager: What's new in Vista?

    While already a useful tool for administrators, Microsoft made several improvements to its Task Manager utility for Windows Vista. Technical writer Brien Posey breaks down what has changed.

  • Should you go with 64-bit Vista?

    Deciding between the 32-bit and 64-bit editions of Windows Vista is an important decision for those upgrading to the OS. Brien Posey weighs the pros and cons of each version.

  • Correct improperly assigned user rights in Windows XP

    Assigning user rights in Windows XP can be tricky. In this thread on our IT Knowledge Exchange, learn why your XP users are able to browse, open and modify files when you don't want them to.

  • Demystifying Microsoft's iSCSI Initiator

    The inclusion of the iSCSI Initiator with Microsoft's latest operating systems is just one example of the company's increased focus on SAN. Microsoft MVP Brien Posey explains how to use the iSCSI I...

  • Reduce error reporting woes with Vista enterprise tools

    With Windows Vista, Microsoft created Windows Error Reporting, a tool designed to ease the burden on help desk staffs when troubleshooting workstation errors. Along with Vista's corporate-level rep...

  • Workarounds for Vista compatibility issues

    Windows Vista's new security features cause compatibility problems for many applications. Fortunately, in some cases you can get around these issues and continue to run

  • Establishing multiple hardware profiles in XP

    Administrators can use hardware profiles in Windows XP to enable or disable hardware devices. Microsoft MVP Brien Posey explains how to create and configure hardware profiles in a Windows environment.

  • Vista SP1 vs. XP SP3 -- upgrade or business as usual?

    Vista Service Pack 1 just came out, and XP Service Pack 3 is right around the corner. Time to decide which is best for your organization. In this tip from security pro Kevin Beaver, learn about the...

  • Web security features of Internet Explorer 8

    Internet Explorer 8 will go a long way toward solidifying various Web standards, but it lacks significant improvements in security. Learn about domain highlighting and other changes in this tip.

  • Free enterprise compatibility testing for Vista

    Application compatibility is a major issue for large companies planning a migration to Vista. Fortunately, Microsoft designed its free tool, Application Compatibility Manager, to help large enterpr...

  • How to secure BitLocker configurations

    BitLocker can be configured for Windows security in many ways: with TPM, with TPM and a startup PIN or without TPM but with a USB device. The list goes on and on. Find out which of these settings i...

  • Windows Integrity Control (WIC) in Vista

    BitLocker and User Account Control have gotten lots of hype, as new security features in Vista. But what about Windows Integrity Control? Learn about WIC in this excerpt from Hacking Windows Exposed:...

  • Regaining functionality in the XP Recovery Console

    The fact that so many Windows command prompt features are disabled in the Windows XP Recovery Console is a source of frustration for admins. Fortunately, the Group Policy Object Editor and Set comm...

  • How do I properly configure WSUS?

    An improperly configured WSUS can lead to some quirky security issues. In this question in our ITKnowledge Exchange, a user is seeing multiple instances of the same computer on his WSUS lists. See ...

  • Troubleshooting 1394 devices for Windows machines

    FireWire (or 1394) devices work well most of the time, but when things go wrong, troubleshooting techniques can vary depending on what's causing the problem.

  • Recover from lost BitLocker PINs and startup keys

    Windows BitLocker Drive Encryption makes it possible to encrypt your system drive, but permanent data loss can occur if you forget the PIN or lose the startup key. This article explains some steps ...

  • New user interface in Vista may affect applications

    Changes in the Windows Vista interface may pose compatibility problems.