Features
Features
Unified endpoint management
-
4 PC lifecycle management best practices
There isn't a perfect PC lifecycle plan for all organizations, so IT teams and management should ask themselves these four questions to shape their PC policy. Continue Reading
-
What does the new Microsoft Intune Suite include?
With all the recent name changes with Microsoft's endpoint management products and add-ons, IT teams need to know what Intune Suite -- Microsoft's latest bundle -- offers. Continue Reading
-
How are UEM, EMM and MDM different from one another?
IT should understand the differences between UEM, EMM and MDM tools so they can choose the right option for their users. Learn about the differences between these tools. Continue Reading
-
Smartphones and laptops for business hinge on cost, use, apps
Factors like cost, usage, applications, management, longevity and security figure in the selection of company-issued smartphones, laptops and printers for digital workers. Continue Reading
-
Complete guide to unified endpoint management
IT staff uses unified endpoint management software to manage a range of devices within the organization. Learn about all the components of UEM in this comprehensive guide. Continue Reading
-
Endpoint management in a COVID-19 world
While the focus during the pandemic has been on getting employees connected so that they can work from home, proper endpoint management is key to enterprise data security. Continue Reading
-
AI drives unified endpoint management benefits beyond limits
With a big boost from artificial intelligence, UEM tools sharpen applications in security, identity management, app monitoring, dynamic profiles, onboarding and self-help. Continue Reading
-
Essential desktop troubleshooting tools for every IT pro
Remote access tools, help desk systems and others are essential to managing end users. Without these tools, IT would have a much tougher time with even the simplest tasks. Continue Reading
-
Establish help desk best practices to improve the system
To run a successful help desk, IT must prioritize help desk tickets and establish expectations for admins and users, as well as reduce the number of time-wasting tickets. Continue Reading
-
MDM, MIM and MAM products help in securing data
Mobile device management, mobile application management and mobile information management form a security trio that protect data in the age of BYOD. Continue Reading
-
How to enable Windows 8.1 kiosk mode for Modern apps
It's possible to control user application access on startup with Assigned Access, but note that Windows 8.1 kiosk mode works only for Modern apps. Continue Reading
-
Windows kiosk mode locks down PCs, but note workarounds
Switching from the Windows Explorer shell to a particular app can be useful for single-purpose devices, but users can still foil Windows kiosk mode. Continue Reading
-
Windows 9 features may address unified apps and the cloud
Based on the Windows 8.1 update, it's reasonable to expect Windows 9 features for universal apps and cloud integration. Will they entice enterprises? Continue Reading
-
Use Excel's IF statement to track, save on IT support contract costs
Warranty tracking for enterprise software can be an odious task, but if you know how to use the IF statement in Microsoft Excel, you could save money. Continue Reading
-
Track software licenses and IT support with Excel date functions
As part of our series on Excel for IT admins, we look at how Excel date functions can help with calculating software licenses and support dates. Continue Reading
-
If you're not using Windows Sysinternals tools, you should be
Windows Sysinternals tools can make work a lot easier for IT administrators, but many people don't even know the suite exists. Get with the program! Continue Reading
-
Taking over the domain
This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes. Continue Reading
-
Target network
This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes. Continue Reading