Manage
Learn to apply best practices and optimize your operations.
Manage
Learn to apply best practices and optimize your operations.
Is it a security risk to have Microsoft Windows PowerShell on my desktops?
Microsoft Windows PowerShell is a versatile and powerful command-line tool for administrators, but it's probably not something users need installed on their desktops. Continue Reading
Desktop management tools and best practices
Desktop management tools are the key to making sure things in your fleet are running smoothly. Systems such as Desktop Central and Client Management Suite cover the big five of desktop management. Continue Reading
Software deployment tools, patching critical to endpoint management
The software deployment component of your endpoint management system plays an important role in desktop health. So too do monitoring, patching and security capabilities. Continue Reading
-
The importance of desktop inventory management tools
Desktop inventory management tools help keep track of how many endpoints are in use and who's using them. That basic information can help with sundry other management tasks, such as budgeting and responses to security breaches. Continue Reading
Desktop management tools still an IT staple
Despite predictions of impending doom, the decline in hardware sales for desktops and laptops just means that the many people who still use them need good software and high reliability more than ever. This chapter of the Endpoint Management ... Continue Reading
How to do an Oscar-worthy hardware demo
Treat a hardware demo like you're going on stage. Prepare your script, rehearse like crazy and make sure your material is rock solid.Continue Reading
Establish BYOD guidelines for every step of your mobile initiative
BYOD is becoming increasingly more complicated as more devices enter the enterprise. Establish policies that can manage the BYOD lifecycle from start to finish.Continue Reading
Tighten app control and manage identities with EMM
EMM may be the key to balancing personal privacy and business control. Discover important elements of a BYOD policy and new ways to control apps.Continue Reading
MDM, MIM and MAM products help in securing data
Mobile device management, mobile application management and mobile information management form a security trio that protect data in the age of BYOD.Continue Reading
How does Windows 8.1 support affect Active Directory?
Windows 8.1 support for endpoint security includes Open MDM and biometrics, but removing Remote Server Administration Tools can affect Active Directory.Continue Reading
-
Synchronize Windows 8 settings across PCs with OneDrive
Windows 8 settings can be synchronized across devices, but the differences between OneDrive and Active Directory will determine which one you use.Continue Reading
What non-Linux admins need to know about the apt-get tool
Apt-get is a widely used application manager for Unix and Linux systems, so even Windows and Linux admins can benefit from knowing its requirements.Continue Reading
Flying without a net: How to find Windows 7 support
IT can buy extended support for Windows 7 desktops from Microsoft, but security and other features may make Windows 8 and 10 increasingly appealing.Continue Reading
Tighten Windows 8.1 security in five simple steps
Microsoft has improved Windows 8.1 security, but no OS is free of vulnerabilities. Some basic settings can further protect Windows 8.x systems.Continue Reading
What's the best way to reformat a hard drive remotely?
Whether you need to remotely reformat a hard drive for security or prepare new network-attached machines, a few utilities can make the job easier.Continue Reading
VDI and the cloud add options to desktop management software
Desktop management software is only one way to tackle endpoint complexity. You can also consider standardizing devices or moving to cloud services.Continue Reading
Why often-overlooked desktop tools are still essential
Proper tools are critical for managing today's diverse array of hardware, operating systems, applications and permissions across an enterprise.Continue Reading
How come Microsoft Internet Explorer collects my data?
Some users have noticed that Microsoft Internet Explorer collects personal information through its AutoComplete feature. There is a way to turn it off.Continue Reading
Managing desktop processes with Mac Activity Monitor
Desktop admins can use the Mac Activity Monitor to filter views of system activity and diagnose performance problems, similar to Windows Task Manager.Continue Reading
How do I remove admin restrictions from Windows 7 laptops?
To relax the usual restrictions on Windows 7 laptops, use the Windows administrator account, but remember to record your password.Continue Reading
Registry tweaks can speed up Windows 8 performance
Our latest article on using the Windows registry to improve Windows 8 performance looks at disk access and shutting down Windows Store appsContinue Reading
Use the Windows 8 registry to reduce CPU cycle waste
The Windows 8 registry is a key component of the OS that admins can use to disable background checks and other activities to make systems run faster.Continue Reading
Using Windows 8 settings for performance improvement
Windows 8 settings and built-in optimization tools such as Windows 8 Fast Startup can make life easier for Windows 8 and Windows 8.1 admins and users.Continue Reading
Windows 8 disk cleanup is part of routine maintenance
Windows 8 and Windows 8.1 include built-in utilities for improving and maintaining performance. Start with simple Windows 8 disk cleanup practices.Continue Reading
Four utilities can verify Group Policy object settings
Client-side extensions could cause a Group Policy object to fail. Fortunately, there are a few different ways to track down Windows GPO settings.Continue Reading
How to enable Windows 8.1 settings for admin troubleshooting
Changing default Windows 8.1 settings -- such as the dialog box confirming file deletion -- is easy and potentially useful for desktop admins.Continue Reading
How to enable Windows 8.1 kiosk mode for Modern apps
It's possible to control user application access on startup with Assigned Access, but note that Windows 8.1 kiosk mode works only for Modern apps.Continue Reading
Windows kiosk mode locks down PCs, but note workarounds
Switching from the Windows Explorer shell to a particular app can be useful for single-purpose devices, but users can still foil Windows kiosk mode.Continue Reading
Using tools to back up and restore bootable USB device images
Do you have more install or diagnostic environment images to manage than physical UFDs? Learn how to back up and restore bootable USB device images.Continue Reading
How to allow multiple users to share an Excel workbook
Public folders allow users to share an Excel workbook, but OneDrive and Windows 8.1 HomeGroups might be better.Continue Reading
The Rufus USB tool may ease building bootable Windows flash drives
Find out about a quick, free alternative to the Windows 7 USB/DVD Download Tool -- the open source Reliable USB Formatting Utility.Continue Reading
Five Windows Sysinternals utilities can aid in desktop troubleshooting
There are many free tools in the Windows Sysinternals suite, but some might help admins more than others for viewing data and managing desktops.Continue Reading
Why was the Windows XP lifespan so long?
There are many reasons why the Windows XP lifespan lasted longer than those of most operating systems. Our columnist looks at three major reasons.Continue Reading
Windows 8.1 user interface improves on previous Windows 8 features
Several small but significant changes in the Windows 8.1 user interface may placate those who were annoyed by Windows 8's limitations.Continue Reading
Ten hidden Windows command prompt tricks
Every desktop admin should have these command prompt tricks up their sleeves to save time and make Windows management easier.Continue Reading
Mastery of Excel pivot tables can help IT admins monitor contracts
Desktop admins can use Excel pivot tables for the critical task of tracking support contracts and software warranties and communicating costs.Continue Reading
Before a Microsoft Office 2013 install, beware of potential gotchas
After you deal with a Microsoft Office 2013 install, know about both the problems and workarounds lurking in Office 2013 features.Continue Reading
Use Excel's IF statement to track, save on IT support contract costs
Warranty tracking for enterprise software can be an odious task, but if you know how to use the IF statement in Microsoft Excel, you could save money.Continue Reading
Use your XP migration to explore mobile, cloud computing
Five things to keep in mind as Windows XP end of life approaches
The Windows XP end-of-life date is coming up fast. IT pros scrambling to upgrade have some serious decisions to make around security and costs.Continue Reading
Track software licenses and IT support with Excel date functions
As part of our series on Excel for IT admins, we look at how Excel date functions can help with calculating software licenses and support dates.Continue Reading
More remote Group Policy Object settings and checking refresh status
Admins can refresh Group Policy Object settings across multiple computers, but they must verify that Group Policy settings have successfully changed.Continue Reading
Set IT support and reporting priorities with an Excel pivot table
An Excel pivot table can help IT report on support, especially if admins use its ability to prioritize data by location, date and other criteria.Continue Reading
IT can tackle Windows configuration with a well-planned desktop audit
Enforcing Windows policies across the enterprise seems like a pain, but a few desktop audit practices can help IT reach its configuration goals.Continue Reading
Excel pivot tables can help IT admins track support, costs
Excel isn't just for end users. If you know how to properly filter data with Excel pivot tables, you can track expenses and create detailed reports.Continue Reading
Use new Windows 8 Group Policy settings to control the Windows 8.1 UI
Windows 8.1 administration includes new Windows 8 Group Policy settings. See how Windows 8.1 settings can affect the Start menu and Control Panel.Continue Reading
Before you clone HDD to SSD, know the benefits and danger to data
Which type of drive is better: hard disk drive or solid-state drive? HDD to SSD cloning can ease data access, but SSDs aren't without risks to data.Continue Reading
Locking down Internet Explorer settings with Group Policy in IE 11
New Internet Explorer settings can tighten enterprise security, but only if Group Policy is properly enabled in IE 11 and you have Windows 8.Continue Reading
What you need to know about the Windows Security Accounts Manager
These five capabilities of Security Accounts Manager, which is built into Windows, can help IT manage and enforce enterprise password management.Continue Reading
Learn how to install Office 2013 with Group Policies or SCCM
To successfully deploy Office 2013 across a network, you'll need Group Policies or tools such as Microsoft System Center Configuration Manager.Continue Reading
Microsoft Windows Task Manager
Microsoft Windows Task Manager is a component of Microsoft Windows intended to assist administrators or advanced system users in monitoring, managing and troubleshooting a Windows computer system.Continue Reading
Microsoft Windows File Manager
The Microsoft Windows File Manager is the graphical user interface through which users could see and manipulate files and folders on early-version Windows computers.Continue Reading
Windows tools and terminology for desktop admins
There are a number of Windows tools that desktop admins can use, but before you can use them you have to know what the terms actually mean.Continue Reading
How to find and use the Windows 8 start menu and admin tools
Users who miss Windows 7's interface shouldn't despair; the Windows 8 start menu can still be found. Get help tracking down Windows admin tools.Continue Reading
Microsoft USMT (User State Migration Tool)
The Microsoft User State Migration Tool (USMT) is a command-line utility used to transfer user files and settings between computers.Continue Reading
Third-party Windows desktop management tools to consider
IT admins who are eyeing Windows desktop management software beyond Microsoft’s products have many options. Our expert looks at three of the best tools.Continue Reading
application manager (app manager)
An application manager (app manager) is programming for overseeing the installation, patching and updating and perhaps access of software applications.Continue Reading
Using Windows 7 Task Manager features for Windows memory management
To fix your Windows memory management problems, you must first diagnose how memory is allocated. Certain Windows 7 Task Manager features can cure what ails your desktops.Continue Reading
Need more memory? Getting started with Windows memory management
Do you need more memory? Our expert explains how to manage Windows memory, both physical and virtual, and how to diagnose memory-related performance issues.Continue Reading
Tablet licensing rules with Microsoft Office
As tablets make their way into the enterprise, it might be time to brush up on licensing rules for mobilizing Microsoft Office. We also provide some solutions for reducing costs.Continue Reading
Microsoft Windows 7 Task Manager troubleshooting tips
Here are some troubleshooting tips for Microsoft Windows 7's improved Task Manager -- from identifying processes and services to using the Resource Monitor.Continue Reading
Who should know about Microsoft licensing? And why should you care?
Microsoft software licensing is complicated, but our licensing expert breaks it down and gives the basics of what you need to know, including budgeting and volume purchasing.Continue Reading
Managing Windows desktops with PowerShell
PowerShell isn't just for Windows servers -- Microsoft made the scripting language the core management platform in Windows 7.Continue Reading
Using P2V Migration for Software Assurance for Windows 7 upgrades
P2V Migration for Software Assurance automates the Windows 7 migration process and preserves XP applications and data. Yet its limitations may be a deal breaker.Continue Reading
Windows 7 Learning Guide
The recent release of Windows 7 SP1 means Microsoft's newest operating system is likely coming to a desktop near you. Prepare for the unexpected with this guide.Continue Reading
A desktop admin's guide to passwords in the enterprise
If password management causes headaches in your enterprise, don’t stress. This guide will get you back to basics and help heal your password woes.Continue Reading
Creating an IT admin's PowerShell toolbox
The PowerShell scripting tool in Windows 7 and Windows Server 2008 R2 should be the staple of any IT administrator's toolbox. Learn how it can help you.Continue Reading
desktop management
Desktop management is a comprehensive approach to managing all the computers within an organization. Despite its name, desktop management includes overseeing laptops and other computing devices as well as desktop computers. Desktop management is a ...Continue Reading
Netbook guide
Netbooks are becoming increasingly popular with corporate workers and in the enterprise. Check out this guide for netbook trends, news and reviews.Continue Reading
Top 10 command-line commands for managing Windows 7 desktops
Admins don't always need fancy software to manage Windows 7 desktops. Here are 10 command-line utilities that can help you handle scripting tasks.Continue Reading
Underlying causes of inconsistent patch management
Think your business is secure? Think again. Many environments, including those with patch management systems, are missing critical patches. Learn how to secure your organization.Continue Reading
Manage the desktop image lifecycle to limit work, ensure security
An image lifecycle management plan makes it easier to balance the need to limit the number of desktop images with the need to keep up with security patches and new software.Continue Reading
Protect your computer from direct attacks in Windows 7
Secure Windows 7 by taking basic precautions like turning on Windows Firewall, locking your computer and requiring Ctrl+Alt+Delete at startup.Continue Reading
Using Sysinternals tools in security management scenarios
Discover three valuable Sysinternals tools and common Windows security management scenarios in which these tools would be used.Continue Reading
Step-by-step guide: Laptop hacking
Laptops with sensitive data are getting stolen every day. Contributor Kevin Beaver says the best way to secure your laptops is to understand how they will be attacked. He provides the basic attack methods and a set of contingencies in this ...Continue Reading
Step 3: Crack them with software
An unknown BIOS password can be a pesky obstacle to overcome. Find out the best methods for solving this problem in this step-by-step guide.Continue Reading
Tools for virus removal and detection
Learn about antivirus tools and best practices for removing viruses from your system in this section of our malware learning guide.Continue Reading
Step 1: Guess BIOS passwords yourself
An unknown BIOS password can be a pesky obstacle to overcome. Find out the best methods for solving this problem in this step-by-step guide.Continue Reading
Step 2: Fiddle with the hardware
An unknown BIOS password can be a pesky obstacle to overcome. Find out the best methods for solving this problem in this step-by-step guide.Continue Reading
Step 4: Start the BitLocker encryption process
In Vista, the BitLocker function allows you to encrypt your hard drive, but a computer with Trusted Platform Module is preferred. Not to worry … learn how to use BitLocker on a computer without TPM and encrypt your hard drive with this ...Continue Reading
Windows XP Troubleshooting Tutorial
Need help troubleshooting Windows XP? This tutorial features tons of tips and tricks that admins can use to solve a variety of system and network problems, with advice on troubleshooting Windows XP system startup issues, printer problems and more.Continue Reading
Troubleshooting Windows XP Device Manager error codes continued
Brien Posey expands on the error codes he described in his first article on Windows XP Device Manager. Here are more error code explanations, starting with error code 10, which relates to the device driver.Continue Reading
Troubleshooting Windows XP Device Manager error codes
Windows XP Device Manager alerts you if a system's hardware malfunctions, but often you need an advanced degree in unraveling cryptic code in order to understand the problem. Device Manager's error codes may be puzzling, but once you crack them, ...Continue Reading
Internet Explorer security settings and controls
Managing Internet Explorer security is a complicated job. You need to be aware of all of the latest IE flaws and threats as well as how to prevent hackers from using these flaws to hack your Windows network. Read about how you can keep IE secure in ...Continue Reading
Rootkit and malware detection and removal guide
This malware learning guide will provide several tips and tools on rootkit prevention, spyware and adware removal, antivirus tools, malware removal best practices and more.Continue Reading
Security Accounts Manager
The Security Accounts Manager (SAM) is a database in the Windows operating system (OS) that contains user names and passwords... (Continued)Continue Reading
Security Accounts Manager (SAM)
The Security Accounts Manager (SAM) is a database in the Windows operating system (OS) that contains user names and passwords... (Continued)Continue Reading
Step-by-Step Guide: Finding and removing a rootkit
It's difficult -- but not impossible -- to be totally sure that your system is 100% rootkit free, says Windows security expert Kevin Beaver. In this step-by-step guide, Beaver shows you how to strengthen your Windows systems against the rootkit ...Continue Reading
BIOS password hacking
An unknown BIOS password can be a pesky obstacle to overcome. Contributor Kevin Beaver presents a step-by-step methodology to hack, crack or otherwise reset your unwanted BIOS password.Continue Reading
Patch management tools: Different types, different approaches
Patch management tools seem pretty simple, but there are a couple different types with unique functionalities. Contributor Serdar Yegulalp takes a look at different types of tools and offers advice to companies trying to settle on a single product.Continue Reading
Fast Guide: Hardening Remote Desktop
Remote Desktop allows users to access their work computers from virtually any computer they can get their hands on. With such functionality, however, comes great security risk. Check out this collection of tips, guides and expert advice to see how ...Continue Reading
Preventing domain admins from logging onto domain controllers
Windows network security expert Wes Noonan explains how to control who can log onto domain controllers.Continue Reading
Step-by-step guide: Google hacking to test your security
Make sure your Web site is not vulnerable to Google hacking. Let contributor and Microsoft MVP Brien Posey guide you through a Google hack of your Web site.Continue Reading
Checklist: Measuring patch management metrics
How effective is your patch management program? In this checklist, patch management expert Jason Chan recommends the most important patch management metrics to track.Continue Reading
What are the advantages and disadvantages of patch management?
How can we restrict the ability to edit group policies to a subgroup of domain admins (just senior a
Is there an alternative bypass for AutoAdminLogon than using Shift at startup?
Access
is for IT professionals, business leaders and developers who want to take a strategic approach to end-user computing. We cover the forward-thinking tactics and technologies needed to provide users with the tools they need to do their jobs.Continue Reading