Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
PCaaS vs. DaaS: learn the difference between these services
While there is a lot of confusion surrounding DaaS -- devices as a service -- and PCaaS and what these services are defined as, but there may be less of a distinction than you think. Continue Reading
How to set up MFA for Office 365 on end-user devices
When it comes to authentication factors, more is always better from a security perspective. Find out how to deploy MFA on end-user devices for Microsoft 365 users. Continue Reading
A complete guide to troubleshooting Windows Hello
Windows Hello has several common issues that administrators may need to troubleshoot. Find out what those issues are here and what to do about them. Continue Reading
-
Windows 10 (Microsoft Windows 10)
Windows 10 is a Microsoft operating system for personal computers, tablets, embedded devices and internet of things devices. Continue Reading
Set up Windows Remote Desktop on a Mac device
Organizations that need to enable remote workers on Mac devices should consider allowing them to remotely access Windows desktops with the Windows Remote Desktop application. Continue Reading
How to use the Office cloud policy service with Microsoft 365
The Office cloud policy continues Microsoft's trend of converging management utilities within Microsoft Endpoint Manager, and IT can manage all Office apps within this platform.Continue Reading
Top 5 enterprise Linux distributions to consider adopting
While Linux distributions all serve a similar purpose in the enterprise, organizations should still familiarize themselves with the different distributions to find the best fit.Continue Reading
Passwordless authentication options and best practices
Organizations that want to move away from passwords for authentication should learn the best practices for implementing passwordless authentication and which factors fit them best.Continue Reading
hard-drive encryption
Hard-drive encryption is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions.Continue Reading
remote desktop protocol (RDP)
Remote desktop protocol (RDP) is a secure network communications protocol from Microsoft.Continue Reading
-
Understand and manage Windows 10 virtual memory
It can be difficult for IT pros to understand the intricacies of Windows 10 virtual memory, but they should develop a basic knowledge of virtual memory to effectively manage desktops.Continue Reading
How CMT, MDM and EMM merged into UEM software
The differences between CMT, MDM, EMM and UEM can be confusing. Learn how they differ and how vendors offer these capabilities in a single UEM product.Continue Reading
unified endpoint management (UEM)
Unified endpoint management (UEM) is an approach to securing and controlling desktop computers, laptops, smartphones and tablets in a connected, cohesive manner from a single console.Continue Reading
How to successfully implement MDM for BYOD
It's not easy to implement MDM in BYOD environments. IT should communicate with end users to set expectations about what personal information the MDM platform can and cannot track.Continue Reading
How to perform a Windows Subsystem for Linux install
Want to run Linux on a Windows desktop? Take these steps to perform a Windows Subsystem for Linux install, which includes downloading a distribution and providing authentication.Continue Reading
application performance monitoring (APM)
Application performance monitoring (APM) is the collection of tools and processes designed to help information technology (IT) professionals ensure that the applications users work with meet performance standards and provide a valuable user ...Continue Reading
device driver
A device driver is a special kind of software program that controls a specific hardware device attached to a computer.Continue Reading
patch management
Patch management is an area of systems management that involves acquiring, testing and installing multiple patches, or code changes, to an administered computer system.Continue Reading
How can IT enable Windows Defender Device Guard?
IT professionals should learn how they can enable Windows Defender Device Guard to take advantage of the numerous security features it offers for Windows 10 desktops.Continue Reading
Sysprep (System Preparation Tool)
Sysprep is Microsoft's System Preparation tool intended to duplicate, test and deliver new installations for the Windows operating system based on an established installation.Continue Reading
Manage Windows 10 default file type associations with SetUserFTA
Windows 10 default file type associations dictate which applications open for different file types. Find out how IT can manage these associations with the SetUserFTA tool.Continue Reading
What are Windows 10 disk management terms IT should know?
Windows 10 disk management is a crucial function that system admins should be able to perform. To manage Windows disks, IT must know the difference between volumes and partitions.Continue Reading
Cut through confusion of the digital workspace market
What is a digital workspace, exactly? Find out the definition of this new technology, what it means for the future of end-user computing, and how organizations should prioritize it.Continue Reading
How to fix printer problems after a Windows 10 update
Windows 10 updates, especially an update to Windows 10 version 1809, can sometimes cause printer issues. You can fix these problems with these tips.Continue Reading
How to use and troubleshoot with Device Manager in Windows 10
Device Manager can be extremely useful if you know how to use it properly. Understand how to access and use Device Manager in Windows 10 to manage device drivers and more.Continue Reading
10 Microsoft Ignite 2019 sessions for Windows admins
Windows OS admins attending Microsoft Ignite 2019 will have a variety of relevant sessions from which to choose. Consider these 10 sessions to get new management techniques and tips.Continue Reading
Learning Thunderbolt Technology & Connections
When Belkin sends me a miniature dock more or less out of the blue, I dig in and start learning Thunderbolt technology & connections. Good stuff, but occasionally puzzling.Continue Reading
AI sharpens unified endpoint management tools and apps
Endpoint management is never simple, but AI can help. In this handbook, learn how AI in UEM tools can significantly improve device security and management.Continue Reading
4 steps to check application compatibility with Windows 10
Before a Windows 10 migration, IT admins should make sure all applications are compatible with the new OS. Here are four steps to get started with the process.Continue Reading
How to automate Windows 10 imaging with Packer
Windows 10 imaging isn't easy, especially with Microsoft's continuous release model. Here's how IT can use Packer and MDT to reuse code for Windows images and automate the process.Continue Reading
All roads and flight paths lead to unified endpoint management
Mobile device management, enterprise mobility management and now unified endpoint management -- how can IT keep track? Delve into the details with this handbook.Continue Reading
How to boot to Windows Safe Mode on Windows 10
Having problems with Windows crashes, applications or performance issues? Try booting to Windows Safe Mode on Windows 10 to pinpoint and troubleshoot the problem.Continue Reading
How to use Windows Admin Center to manage Windows 10
Windows Admin Center started as a Windows Server tool, but it can manage Windows 10 desktops too. Learn which features can help with Windows 10 management.Continue Reading
Network File System (NFS)
The Network File System (NFS) is a client/server application that lets a computer user view and optionally store and update files on a remote computer as though they were on the user's own computer. The NFS protocol is one of several distributed ...Continue Reading
What IT should know about the Microsoft Office app for Windows 10
Microsoft released a new Microsoft Office app during an update to Windows 10. Learn about the changes that this new app brings and how to take advantage of its features.Continue Reading
What to know about Microsoft's new Windows Sandbox mode
Windows Sandbox is Microsoft's integrated Windows 10 sandbox environment to test applications and files in isolation. Learn about the new program and its features.Continue Reading
5 digital workspace components to look for
The ideal digital workspace should handle a variety of tasks. By focusing on these five digital workspace components, IT pros can find the right platform to meet their needs.Continue Reading
How to create Windows 10 toast notifications with PowerShell
IT can send pop-up notifications to a Windows 10 user's taskbar with a PowerShell module called BurntToast. Here's how to get started creating toast notifications.Continue Reading
Unified endpoint management systems harness upsurge in devices
As more endpoints enter the IT landscape, a UEM tool becomes more critical. Learn how UEM can help simplify the complexities of endpoint management.Continue Reading
What's included in Microsoft 365 subscription plans
Microsoft 365 has different plans for all kinds of businesses. Learn about the different subscription plans that this cloud-based platform offers.Continue Reading
Digital workspaces upgrade IT delivery, management benefits
Thanks to more simplified management and delivery, digital workspaces can benefit IT pros and users. This guide takes a closer look at the technology and latest features.Continue Reading
Microsoft Windows Explorer
Microsoft Windows Explorer is a graphical file management utility included with Microsoft Windows 95 and later; finally renamed File Explorer with Windows 8 and Windows Server 2012.Continue Reading
What IT needs to know about Windows 10 update troubleshooting
The Windows update process can cause a whole slew of problems for users and IT. Get acquainted with these Windows 10 update troubleshooting tips and make the process a lot easier.Continue Reading
Windows 10 customizations for enterprise desktops
Microsoft offers different services that IT can use to adjust its users' desktop experience. These Windows 10 customizations are a must in an admin's toolbox.Continue Reading
Quiz yourself on top features of Windows 10
With each update, Microsoft introduces many new features that it can be hard to keep track of. Challenge yourself on how well you know these Windows 10 key features and other terms.Continue Reading
How to find Wi-Fi settings in Windows 10
In Windows 10, the Wi-Fi -- and wired -- connectivity settings are in a new spot, but they're as easy to access and configure as ever. You just have to know where to look.Continue Reading
Learn about the device-as-a-service model and its use cases
Device-as-a-service offerings can help IT pros provide their users with support and high-functioning devices, but they must consider the ramifications of choosing such a program.Continue Reading
How can you improve Google Chrome management?
IT professionals should deploy Group Policies to their browsers to improve the user experience. Check out this step-by-step guide on applying Group Policies to Google Chrome.Continue Reading
How does Parallels Mac Management for Microsoft SCCM work?
With Mac Management from Parallels, IT professionals can manage Windows and Apple macOS desktops side by side with System Center Configuration Manager's native features.Continue Reading
Windows Autopilot
Windows Autopilot is a desktop provisioning tool native to Windows 10 that allows IT professionals to automate image deployment of new desktops with preset configurations.Continue Reading
Modern desktop transformation focuses on workspace technology
As workspaces trend toward mobility and device flexibility, IT departments must evolve to fit users' needs by moving away from a desktop-centric approach.Continue Reading
How to set up a Windows Autopilot deployment
IT can set profiles for its devices running Windows 10 and enroll them in Active Directory with the Windows Autopilot tool, but Autopilot does not cover many settings.Continue Reading
The complete guide to Windows 10 security tools
IT professionals must carefully consider which security tools they use to protect their Windows 10 desktops. They may want to stray from the Microsoft path in some instances.Continue Reading
Can you put together an efficient help desk system?
Help desk software should not be an organization's only plan for incident management. An effective help desk should include agreed-upon timelines, a knowledge base and more.Continue Reading
Understanding third-party Windows 10 security tools
Third-party security tools provide value and new utilities for Windows 10 desktop administrators. IT should consider non-Microsoft options for patching, firewalls and more.Continue Reading
Create an email phishing test to minimize attack vectors
With email phishing testing, IT can improve its end-user security. Phishing attacks prey on user ignorance, so IT can use a test to teach users how to avoid this attack vector.Continue Reading
What does a Windows 10 digital certificate do?
IT pros can build trust into Windows 10 by adding certificates that form trusted connections by confirming the identity of any individuals or entities communicating with the OS.Continue Reading
Windows Defender Application Guard
Windows Defender Application Guard is a security tool built into Microsoft Edge that isolates browser sessions from the desktop in a virtual machine (VM) to prevent any malicious activity from reaching the desktop.Continue Reading
desktop computer
A desktop computer is a personal computing device designed to fit on top of a typical office desk.Continue Reading
How to create an internal phishing campaign from scratch
When IT begins an email phishing campaign, it must determine what server the emails will come from, consider phishing tool options and more.Continue Reading
Windows 7
Windows 7 is the Microsoft Windows operating system (OS) released commercially in October 2009 as the successor to Windows Vista.Continue Reading
Understand Windows Insider Program for Business options
With its business-friendly Insider Program, Microsoft allows IT and users to test Windows 10 preview builds for compatibility and performance issues.Continue Reading
8 VMworld 2018 sessions for EUC admins to attend
Put your plan in place now by exploring eight of the top sessions on Windows management, VDI and more at VMworld 2018 in Las Vegas.Continue Reading
PC as a service (PCaaS)
PC as a service (PCaaS) is a device lifecycle management model in which an organization pays a monthly subscription fee to lease endpoint hardware and management services from a vendor.Continue Reading
configuration service provider (CSP)
A configuration service provider (CSP) is a component of the Windows client operating system that shows IT professionals potential device configuration choices and allows them to apply the settings across multiple Windows OSes.Continue Reading
Windows 10 Update Assistant
Windows 10 Update Assistant is a native update management tool designed to help individual users keep up with OS updates as Microsoft publishes them.Continue Reading
Get smart with IAM tools for your EUC strategy
Identity and access management (IAM) is an evolving market that now includes software and services that incorporate machine learning, analytics and microservices. IT departments can use IAM tools to strengthen end-user security. This month's cover ...Continue Reading
Desktop and mobile malware detection takes on high priority
End-user computing professionals must embrace modern Windows and mobile malware protection technologies to defend against ransomware and other attacks.Continue Reading
Create an effective email phishing test in 7 steps
The best way for IT to improve email phishing security is through comprehensive testing, which helps identify which users are susceptible and what type of fake email is most effective.Continue Reading
Top Windows 10 April 2018 Update features you need to know
Microsoft's latest update to Windows 10 helps IT pros and users alike. On the user front, Focus Assist can help employees silence notifications while they work.Continue Reading
Effective end-user management helps fuel productivity
To keep users at their most effective, IT pros must focus on security, pick the right productivity apps, consider companion apps and more.Continue Reading
How to create a custom Windows 10 image for deployment
IT pros can build a Windows 10 image with custom apps, Start menu tools and more that they can easily deliver throughout the organization.Continue Reading
It's time to relinquish control over operating system updates
For the most part, vendors and manufacturers are in control of operating system updates today. IT admins won't be getting their powers back anytime soon.Continue Reading
Four factors to consider when you migrate to Windows 10
When making the move to Windows 10, there are some important factors for IT to keep in mind, including whether to perform an in-place upgrade or a clean installation.Continue Reading
Microsoft Assessment and Planning (MAP) Toolkit
Microsoft Assessment and Planning (MAP) Toolkit is a free utility IT can use to determine whether or not its infrastructure is prepared for a migration to a new operating system, server version or cloud-based deployment.Continue Reading
How AI and machine learning affect end-user computing
End-user computing administrators need to start paying attention to AI and machine learning, not because these technologies will take over their jobs, but because they can bring productivity benefits to both business software and IT management tools...Continue Reading
Microsoft Windows System Image Manager (SIM)
Microsoft Windows System Image Manager (SIM) is a tool in the Windows Assessment and Deployment Kit IT professionals can use to create and manage unattended setup answer files for Windows before installing the operating system.Continue Reading
Windows as a service
Windows as a service is the approach Microsoft introduced with Windows 10 to deploy, update and service the operating system.Continue Reading
desktop
A desktop is a computer display area that represents the kinds of objects one might find on top of a physical desk, including documents, phone books, telephones, reference sources, writing and drawing tools, and project folders.Continue Reading
Software patch/fix
A software patch or fix helps resolve issues that crop up in different programs. It can also bolster security and add new features to the software.Continue Reading
Microsoft Windows Defender Credential Guard
Microsoft Windows Defender Credential Guard is a security feature that isolates users' login information from the rest of the operating system to prevent theft.Continue Reading
virtualization-based security (VBS)
Virtualization-based security (VBS) is technology that abstracts computer processes from the underlying operating system and, in some cases, hardware.Continue Reading
Microsoft Windows Defender Device Guard
Windows Defender Device Guard is a security feature for Windows 10 Enterprise and Windows Server 2016 designed to use application whitelisting and code integrity policies to protect users' devices from malicious code that could compromise the ...Continue Reading
How to fit companion apps into the desktop workflow
Organizations looking for increased work access should look at companion apps, which can integrate mobile flexibility with established desktop infrastructures.Continue Reading
The role of analytics in end-user monitoring tools
The rise of mobility and new application delivery methods have made it necessary for IT departments to take a more proactive approach to monitoring. End-user monitoring tools now take advantage of machine learning and analytics to provide IT with ...Continue Reading
Take a stroll down the Windows 10 upgrade paths
IT can get lost in a Windows 10 upgrade. Save time and money by knowing the do's and don'ts of migrating to the new OS, and avoid common mistakes.Continue Reading
How Apple File System works and what Mac admins need to know
Apple put all its eggs in a new storage basket with the release of Apple File System, its first new system in more than 30 years.Continue Reading
Windows 10 Isolated User Mode (IUM)
Windows 10 Isolated User Mode (IUM) is a virtualization-based security feature in Windows 10 that uses secure kernels to keep business data and processes separate from the underlying OS.Continue Reading
How to deal with the complexities of unified workspaces
Users work with a host of different devices these days, and IT must manage them all. Unified workspaces can help, but they can introduce some complexity as well.Continue Reading
Does Windows 10 virtualization-based security defend the OS?
With Windows 10, Microsoft emphasized virtualization-based security, such as Device Guard and Credential Guard, to keep corporate information off users' devices.Continue Reading
Ivanti
Ivanti is a software company that provides IT management products and services, particularly around endpoint computing.Continue Reading
Trouble with the curve
Cloud-first management is an ahead-of-the-curve strategy for Citrix. But it doesn't align with many IT departments' current needs.Continue Reading
Windows 10 migration tales from the trenches
More organizations are moving forward with Windows 10 migration plans. IT pros have encountered some issues around the update cycle, application compatibility and more, but they have also seen the benefits of the new OS among their users. This ...Continue Reading
ActiveX
ActiveX is a set of object-oriented programming technologies Microsoft developed for Internet Explorer to facilitate rich media playback.Continue Reading
Process Explorer
Process Explorer is a free Windows task manager and system monitoring tool that details which programs in a user's system have a specific file or directory open.Continue Reading
Microsoft Windows 10 Shared PC Mode
Windows 10 Shared PC Mode is an operating system feature that allows IT administrators to configure computers for multiple user access.Continue Reading
How to use a technician machine to create a custom Windows 10 image
IT pros must be able to mold Windows 10 into the OS their organization needs. To do so, they need to first learn to install Windows 10 on a technician machine.Continue Reading
Access Innovation Awards: Rules and criteria
Get all the information you need about the Access Innovation Awards, which will be announced in the January 2018 issue of the Access e-zine.Continue Reading
Microsoft Windows Assessment and Deployment Kit (Windows ADK)
The Microsoft Windows Assessment and Deployment Kit is a set of tools IT professionals can combine to prepare, assess and launch image-based Windows deployments.Continue Reading
Consult MAP Toolkit for Win10 Deployments
Organizations that haven't yet moved to Windows 10 should consult MAP Toolkit for possible or planned Win10 Deployments.Continue Reading