Ask the Experts
Ask the Experts
Endpoint security management tools
-
How can you whitelist apps and fight ransomware with Windows 10 AppLocker?
With application whitelisting, admins can create a list of approved apps users can work with. This way, users cannot accidentally open an app containing ransomware. Continue Reading
-
Why should I limit the number of desktop audit logs?
A Windows audit log can get big and cumbersome, which presents a problem if you need to look at it after a security breach. Only audit what is necessary. Continue Reading
-
How does Windows AppLocker work?
Windows AppLocker lets you use rules to whitelist or block applications based on attributes such as publisher or path, but it's not a comprehensive application control tool. Continue Reading
-
How does Windows 10 virtualization-based security work?
The Isolated User Mode in Windows 10 is a virtualization-based security technology that helps power Credential Guard and Device Guard. Continue Reading
-
Is it a security risk to have Microsoft Windows PowerShell on my desktops?
Microsoft Windows PowerShell is a versatile and powerful command-line tool for administrators, but it's probably not something users need installed on their desktops. Continue Reading
-
Can you provision desktop apps with Windows To Go?
It's OK to install desktops applications on a Windows To Go image, as long as they're small enough to fit on the USB drive and can run locally. Continue Reading
-
What are some of the biggest software patching myths?
Desktop patch management is subject to its share of myths. Our expert penetrates the fog around waiting on software patching and Windows XP security. Continue Reading
-
What are some alternatives to Windows Defender?
Windows Defender is useful for Windows 8 security, but it can't keep up with malicious software alone. Several third-party products can help. Continue Reading
-
How does Windows 8.1 support affect Active Directory?
Windows 8.1 support for endpoint security includes Open MDM and biometrics, but removing Remote Server Administration Tools can affect Active Directory. Continue Reading
-
What Web application monitoring tools exist for desktops?
Microsoft Intune and other mobile device management tools are also useful for desktop management from the cloud and Web application monitoring. Continue Reading
-
What's the best way to reformat a hard drive remotely?
Whether you need to remotely reformat a hard drive for security or prepare new network-attached machines, a few utilities can make the job easier. Continue Reading
-
How come Microsoft Internet Explorer collects my data?
Some users have noticed that Microsoft Internet Explorer collects personal information through its AutoComplete feature. There is a way to turn it off. Continue Reading
-
How do I remove admin restrictions from Windows 7 laptops?
To relax the usual restrictions on Windows 7 laptops, use the Windows administrator account, but remember to record your password. Continue Reading
-
What's the best way to deploy a Windows service pack?
It's possible to deploy a Windows service pack with either Group Policy or Windows Server Update Services, but our expert says that one is better. Continue Reading
-
What security needs is Windows Defender best for?
Windows Defender is included with Windows 8, but it isn't enabled by default, and enterprises will want more third-party antimalware protection. Continue Reading