Tips
Tips
-
Choosing between Microsoft Office 2016 versions
Choosing between Office 2016 versions may seem like a simple choice, but don't jump to conclusions: Consider functionality, operational consistency and cost. Continue Reading
-
Four ways to put Sysinternals Process Explorer to work
IT admins can use Process Explorer in Sysinternals to find suspicious software, inspect process and object privileges, and more. Continue Reading
-
Microsoft Office Trust Center settings that help stop malware
The Trust Center in Microsoft's Office suite has some important and useful settings to prevent users from opening files infected with malware and viruses, but admins need to know about and enable them. Continue Reading
-
Windows 8 GPO settings to configure search, indexing options
Windows 8 and 8.1 GPOs can help with many tasks, including creating Start screen layouts that adhere to corporate policies, as well as configuring search and indexing settings. Continue Reading
-
Ten most useful Windows Sysinternals utilities
Sysinternals utilities such as Autoruns and TCPView can target specific problem areas in a Microsoft Windows environment, including performance issues. Continue Reading
-
What to expect from Macs in the enterprise
For enterprise IT, Apple's Mac OS can pose a few problems, including compatibility, applications, support, networking and other issues. But if you know what could be coming your way, you can get the training and tools to manage Macs. Continue Reading
-
Desktop management tools and best practices
Desktop management tools are the key to making sure things in your fleet are running smoothly. Systems such as Desktop Central and Client Management Suite cover the big five of desktop management. Continue Reading
-
The importance of desktop inventory management tools
Desktop inventory management tools help keep track of how many endpoints are in use and who's using them. That basic information can help with sundry other management tasks, such as budgeting and responses to security breaches. Continue Reading
-
Tighten Windows 8.1 security in five simple steps
Microsoft has improved Windows 8.1 security, but no OS is free of vulnerabilities. Some basic settings can further protect Windows 8.x systems. Continue Reading
-
Four utilities can verify Group Policy object settings
Client-side extensions could cause a Group Policy object to fail. Fortunately, there are a few different ways to track down Windows GPO settings. Continue Reading
-
Using tools to back up and restore bootable USB device images
Do you have more install or diagnostic environment images to manage than physical UFDs? Learn how to back up and restore bootable USB device images. Continue Reading
-
Office Telemetry reports on Office 2013 docs and apps
If IT administrators need information on document and application usage, they can use Office Telemetry, an Office 2013 feature that gathers such data. Continue Reading
-
Save WIM file space with WIMBoot in Windows 8.1 update
With Windows 8.1 Update 1, it's possible to boot desktops directly from a WIM file. Follow these steps to create WIMBoot images and save disk space. Continue Reading
-
How to perform a Windows XP upgrade to Windows 8.1
As organizations must now implement a Windows XP upgrade to Windows 8.1, they should understand that Windows 8 and 8.1 aren't identical and use the Windows 8.1 Upgrade Assistant. Continue Reading
-
For missing GPO settings, check the Winlogon component
If a Windows system isn't applying certain Group Policy settings, you may need to check Winlogon and common client-side extensions. Continue Reading
-
More remote Group Policy Object settings and checking refresh status
Admins can refresh Group Policy Object settings across multiple computers, but they must verify that Group Policy settings have successfully changed. Continue Reading
-
Locking down Internet Explorer settings with Group Policy in IE 11
New Internet Explorer settings can tighten enterprise security, but only if Group Policy is properly enabled in IE 11 and you have Windows 8. Continue Reading
-
Learn how to install Office 2013 with Group Policies or SCCM
To successfully deploy Office 2013 across a network, you'll need Group Policies or tools such as Microsoft System Center Configuration Manager. Continue Reading
-
Click-to-Run and MSI provide Office 2013 installation options
The Microsoft Installer has competition for Office 2013 installation. See how Office Click-to-Run allows Office 2013 to run without a full download. Continue Reading
-
Microsoft's revised Resource Kit can ease Office 2013 deployment
Microsoft's free Office 2013 Resource Kit provides documentation for Office 2013 deployment, as well as for management after an Office deployment. Continue Reading
-
Using Active Directory activation and other new Office 2013 tools
Among the new Office 2013 tools for IT admins are a method for volume activation, administrative template files and files for custom installations. Continue Reading
-
Stripping a Microsoft Office password from a document with DocRecrypt
DocRecrypt, an Office 2013 tool, allows an admins to get into an otherwise inaccessible file by stripping it of its Microsoft Office password. Continue Reading
-
Windows Server Update Services weaknesses you may not know about
Built-in tools such as WSUS can help with Windows patching, but you may still need other tools to verify that enterprise systems are safe. Continue Reading
-
Microsoft Office 2013 crackable, so look to Office password recovery
Microsoft Office 2013 may have improved protection, but third-party tools have already cracked passwords. See how to use Office password recovery. Continue Reading
-
Desktop audit checklist: Five steps to a successful desktop audit
Now that 2012 has begun, consider doing a desktop audit to get your IT house in order. A strong desktop audit checklist can help you manage hardware, software and applications better. Continue Reading
-
Tablet licensing rules with Microsoft Office
As tablets make their way into the enterprise, it might be time to brush up on licensing rules for mobilizing Microsoft Office. We also provide some solutions for reducing costs. Continue Reading
-
Microsoft Windows 7 Task Manager troubleshooting tips
Here are some troubleshooting tips for Microsoft Windows 7's improved Task Manager -- from identifying processes and services to using the Resource Monitor. Continue Reading
-
Turn a Windows 7 desktop into a wireless hotspot
Faulty Internet connections are a nightmare for on-the-go admins, but wireless hotspot software can eliminate network headaches. Continue Reading
-
Licensing options for accessing Microsoft Office remotely
There are plenty of choices for licensing virtual applications, but understanding when to use which ones can be a challenge. Continue Reading
-
Using P2V Migration for Software Assurance for Windows 7 upgrades
P2V Migration for Software Assurance automates the Windows 7 migration process and preserves XP applications and data. Yet its limitations may be a deal breaker. Continue Reading
-
Resetting passwords in the enterprise without the help desk
While there are several self-service password-reset options on the market, many organizations are hesitant to implement them -- even though the payoffs are significant. Continue Reading
-
Controlling desktops with AppLocker and software restriction policies
Many IT admins rely on User Account Control, but AppLocker or software restriction policies can also prevent unauthorized installation of desktop apps. Continue Reading
-
How do Group Policy settings differ between versions of Windows?
Group Policy Objects vary from one version of Windows to another. Determine which ones to apply in your environment. Continue Reading
-
Where does Windows store its temporary files?
The temporary files generated by Windows can pile up and become a security hazard. Learn how to track them down and tidy up your systems. Continue Reading
-
How to crack a password
Expert Brien Posey describes some techniques used to crack Windows passwords and offers several defenses against attack. Continue Reading
-
What is a Microsoft hotfix?
Hotfixes can solve an array of problems in your enterprise, but they have certain limitations and need to be managed properly. Continue Reading
-
How to install a clean version of Windows 7
Installing a clean version of Windows 7 on your desktops may be easier than upgrading from Windows XP or Vista. Migrate to Microsoft's newest OS with these steps. Continue Reading
-
Securing removable drives with BitLocker To Go
BitLocker To Go, which ships with Windows 7 Ultimate and Enterprise Editions, can help secure FireWire and USB drives — but is it right for your business? Continue Reading
-
Five network security resolutions for 2010
Tighten your enterprise's network security this year with these simple steps, which include regularly changing passwords, keeping patches up to date and talking to end users. Continue Reading
-
Checklist for upgrading from Windows XP or Vista to Windows 7
While there's no single method for all enterprises to upgrade machines to Windows 7, these steps can help if you choose to migrate from Windows XP to Vista and then to Windows 7. Continue Reading
-
What can Windows 7's AppLocker do for you?
Control applications on individual workstations more efficiently with AppLocker, an improved application management feature in Windows 7. Continue Reading
-
Top 5 registry keys for Windows 7
Use these helpful Windows 7 registry keys to manage user account control, prevent the computer from rebooting after installing patches and more. Continue Reading
-
Desktop security predictions for 2010
Smarter hackers, more malicious malware and the rise of social engineering may make 2010 a dangerous year in terms of security. See what to look out for to keep your desktops safe. Continue Reading
-
Group Policy tricks to secure network endpoints
There are thousands of Group Policy settings available -- lock down your network endpoints with these favorites. Continue Reading
-
Using BitLocker in Windows 7
BitLocker allows users to lock down workstations and mobile devices. But the drive-encryption technology isn't for all enterprises. Find out if it's right security control for you. Continue Reading
-
Remote troubleshooting made easier with Windows 7's Problem Step Recorder
Remote technical support is easier to administer with Windows 7's Problem Step Recorder -- a new tool that allows users to show you exactly what their problems are. Continue Reading
-
Top 5 registry keys for Windows XP
Systems administrators may not know about useful registry keys for Windows XP. Learn how they can help you secure your network, create drive shares, manage passwords and more. Continue Reading
-
Should you switch to the Office 2007 file format?
Are the benefits of the Open XML file format in Microsoft Office 2007 significant enough to make switching a high priority? Consider your businesses' needs. Continue Reading
-
Microsoft Office 2010: At a glance
With Microsoft Office 2010 on the horizon, but no public betas as of yet, information on the new release is scattered across the Internet. Get everything you need to know here. Continue Reading
-
Four Internet Explorer 8 Group Policy security settings
Internet Explorer 8 doesn't have nearly as many new security mechanisms as its predecessor; however, there are four Group Policy security settings for IE8 worth mentioning. Continue Reading
-
Using Sysinternals tools in security management scenarios
Discover three valuable Sysinternals tools and common Windows security management scenarios in which these tools would be used. Continue Reading
-
Sysinternals tools: A must-have for every Windows security toolbox
Learn about the free Sysinternals tools that make managing and troubleshooting Windows-based PCs almost effortless for administrators. Continue Reading
-
The 10 most common Windows security vulnerabilities
Most Windows networks, including yours, have a number of security holes. Fortunately, though, many of these holes can be filled quickly and easily before they pose a major threat to your business-critical data. In this tip, learn what security ... Continue Reading
-
Troubleshooting IEEE 1394 bus devices for Windows machines
FireWire (or 1394) devices work well most of the time, but when things go wrong, troubleshooting techniques can vary depending on what's causing the problem. Continue Reading
-
How to recover from lost BitLocker PINs and startup keys
Windows BitLocker Drive Encryption makes it possible to encrypt your system drive, but permanent data loss can occur if you forget the PIN or lose the startup key. This article explains some steps that you can take to regain your lost data. Continue Reading
-
Metasploit 3.1 updates improve Windows penetration testing
Metasploit has long been a popular tool to use to conduct Windows penetration testing. Well, just this January, the latest version, Metasploit 3.1, was released. Learn about the new features and updates of this cool tool, which include a true GUI ... Continue Reading
-
How to create a Windows Vista boot CD with WinPE
Using WinPE, admins can launch Vista from a disk and use the deployment to create and restore images. Continue Reading
-
Windows 2000 batch file command reference
Check out this reference guide to batch file commands for Windows 2000, based on Microsoft documentation, but rewritten to increase usefulness and readability. Continue Reading
-
The last resort for troubleshooting hardware resource conflicts
Brien Posey explains how to use the Windows Device Manager to manually reallocate system resources. Be careful, though, or you may be forced to reinstall Windows from scratch. Continue Reading
-
Troubleshooting Windows XP Device Manager error codes
Windows XP Device Manager alerts you if a system's hardware malfunctions, but often you need an advanced degree in unraveling cryptic code in order to understand the problem. Device Manager's error codes may be puzzling, but once you crack them, ... Continue Reading
-
Use Driver Query to resolve device driver problems
The Driver Query utility may not be perfect, but it can help to compile a device driver usage history. Continue Reading
-
Windows pagefile security risks and how to avoid them
Learn about the security risks involved in using Windows pagefile, and avoid putting your sensitive data in harm's way. Continue Reading
-
Fast Reboot: quick reboot utility for Windows
Windows' shut down/reboot process is not that snappy; it can take a couple of minutes for everything to terminate and be written to disk. You can initiate a reboot quickly with a tool like Fast Reboot, which performs the usual quick-reboot/shutdown ... Continue Reading
-
What to do if system hangs when building DMI pool
When powered on, a PC creates the DMI pool, which shows the devices available to the BIOS. If a PC hangs at this point, here are some possible culprits. Continue Reading
-
Device drivers: Installation and configuration
To install hardware devices on Windows servers, admins must install the appropriate device drivers first. Here are some guidelines for installing, configuring and troubleshooting device drivers. Continue Reading
-
How to Bypass BIOS Passwords
BIOS passwords can be a liability if a user forgets his password. Here are a few tips and tricks that can help to bypass or reset the BIOS password on most systems. Continue Reading