Tips
Tips
-
Get to know enterprise patch management tools
Unpatched software and OSes can create a huge security hole in any organization. IT should know what tools can fill in the gaps. Continue Reading
-
Discover three key exploit protection features in Windows 10
To defend against memory-based attacks, Microsoft introduced three key features to Windows Defender Exploit Guard, including Address Space Layout Randomization. Continue Reading
-
How the Microsoft Teams app can boost collaboration
Microsoft Teams is an app users can work with to collaborate no matter where they're located. It comes as part of certain business-focused Office 365 subscriptions. Continue Reading
-
Desktop and mobile malware detection takes on high priority
End-user computing professionals must embrace modern Windows and mobile malware protection technologies to defend against ransomware and other attacks. Continue Reading
-
Use Windows Analytics to better support Windows 10 desktops
With the help of Windows Analytics, IT can improve its Windows 10 desktop support with tools such as Device Health, which monitors desktop performance and identifies underperforming devices. Continue Reading
-
Create an effective email phishing test in 7 steps
The best way for IT to improve email phishing security is through comprehensive testing, which helps identify which users are susceptible and what type of fake email is most effective. Continue Reading
-
Manage Windows 10 desktops, mobile devices with EMM software
Windows 10 supports crucial functions that enable enterprise mobility management. IT must follow a few important steps to prepare desktops for management through EMM. Continue Reading
-
Spectre and Meltdown vulnerabilities show haste makes waste
When the Meltdown and Spectre vulnerabilities came to light, everyone scrambled to find a fix. As a result, the patching process has been anything but smooth. Continue Reading
-
How to get the best desktop support SLA bang for your buck
IT can save money on its desktop service-level agreements by mixing and matching the level of support to meet the importance of the device. Continue Reading
-
How to take advantage of SCCM and Intune co-management
IT can combine Microsoft Intune and System Center Configuration Manager to manage users' mobile devices, as well as any legacy systems in its network. Continue Reading
-
Top six Windows 10 migration problems and how to avoid them
Users and IT professionals sometimes have issues after a Windows 10 migration. Careful planning can mitigate these issues before IT undertakes a full-scale migration. Continue Reading
-
How to establish Windows 10 security baselines
IT should consider following Microsoft's Windows 10 security recommendations in the Security Compliance Toolkit to better protect the operating system. Continue Reading
-
A Windows vulnerability scan should leave no stones unturned
When it comes to scanning for vulnerabilities in Windows, IT pros need to run both authenticated and unauthenticated scans so they can see the deployment from every angle. Continue Reading
-
Ten Windows 10 Fall Creators Update features to know
Microsoft introduced some significant changes to Windows 10 in the Fall Creators Update. The My People app, for example, lets users pin contacts to their task bars. Continue Reading
-
Guard the line with Windows Defender features
The Windows 10 Fall Creators Update took Windows 10 security up a notch by adding advanced features to Windows Defender, including Application Guard and Exploit Guard. Continue Reading
-
How to create a snapshot of your custom Windows 10 image
Once you finish creating your custom Windows 10 image, the time is right to take a snapshot of it so you can deliver it to your users. Continue Reading
-
Top Windows 10 backup and restore utilities
The key to a good backup and restore tool is reliability. Look into third-party utilities such as Reflect or OneKey for Windows 10 restore and backup. Continue Reading
-
How to use Sysprep to install a custom Windows 10 image
Walk through the process of adding custom software, apps and assets to your Windows 10 image in audit mode. Continue Reading
-
Pros and cons of a Windows 10 clean install vs. upgrade
When migrating to Windows 10, IT must decide whether to perform an upgrade install or clean install. The benefits of one are the weaknesses of the other. Continue Reading
-
How to check Windows 10 compatibility for legacy apps
Testing apps is just one way to ensure that legacy apps have Windows 10 compatibility. Find out how to confirm the compatibility of legacy apps with the OS. Continue Reading
-
Set up a virtual hard disk and perform a Windows 10 dual boot
Dual booting Windows 10 can come in handy in a variety of ways. The process requires that IT knows how to build a virtual hard disk and install Windows 10 on it. Continue Reading
-
Clear cached credentials with the cmdkey and PowerShell
Cached credentials make users' lives easier, but they can be a security issue in Windows if a device falls into the wrong hands. IT can manage them on a large scale with PowerShell. Continue Reading
-
12 Windows 10 GPO settings IT must know
Group Policy Objects in Windows 10 are powerful. IT can use them to turn off the Windows Store app, reshape the Start menu, change how users log in and more. Continue Reading
-
How to use the Windows Assessment and Deployment Kit for Windows 10
It's important for IT admins to know everything is going to work before they deploy Windows 10 desktops. They can use the tools in the Windows ADK to do just that and more. Continue Reading
-
Windows 10 security tools to have handy
Cyberthreats lurk around every corner, so it's always a good time to fortify Windows 10 defenses. These top security tools can help make that happen. Continue Reading
-
How to build and use a bootable recovery partition in Windows 10
Understanding how to set up a bootable recovery partition in Windows 10 allows you to restore a damaged OS or troubleshoot a litany of problems. Continue Reading
-
How to fix Windows 10 update problems with the DISM command tool
With a few tricks in the Windows Deployment Image Servicing and Management command utility, admins can solve some of the most common Windows 10 update problems plaguing their users. Continue Reading
-
Office 365 vs. Office 2013: What are the key differences?
Software as a service may be one reason for choosing Office 365 over Office 2013, but licensing and update frequency are other considerations. Continue Reading
-
Take a close-up look at Windows 10 permissions settings
With all the new updates and features, Windows 10 can appear daunting. To simplify the transition, break down and tailor the permissions in Windows 10 to users' specific needs. Continue Reading
-
How to use WMI and the CIM standard with Windows PowerShell
WMI, Microsoft's implementation of the CIM standard, lets admins use PowerShell commands to view and modify system data and configuration. Continue Reading
-
How to handle Windows 10 browser compatibility issues
IT often runs into problems with legacy apps not functioning well on new browser versions. There are a few ways to combat Windows 10 browser compatibility issues in Internet Explorer 11. Continue Reading
-
Use an in-place upgrade to repair Windows 10
If your Windows 10 installation has gone wonky and needs some attention, one way to fix it is with an in-place upgrade to the same version of Windows you already use. Continue Reading
-
Productivity suite smack down: Office 365 vs. Office 2016
Microsoft's Office 2016 for the desktop might seem like the de facto option for delivering productivity apps to users, but its cloud-based cousin Office 365 offers more flexibility. Continue Reading
-
Choosing between Microsoft Office 2016 versions
Choosing between Office 2016 versions may seem like a simple choice, but don't jump to conclusions: Consider functionality, operational consistency and cost. Continue Reading
-
Four ways to put Sysinternals Process Explorer to work
IT admins can use Process Explorer in Sysinternals to find suspicious software, inspect process and object privileges, and more. Continue Reading
-
Microsoft Office Trust Center settings that help stop malware
The Trust Center in Microsoft's Office suite has some important and useful settings to prevent users from opening files infected with malware and viruses, but admins need to know about and enable them. Continue Reading
-
Windows 8 GPO settings to configure search, indexing options
Windows 8 and 8.1 GPOs can help with many tasks, including creating Start screen layouts that adhere to corporate policies, as well as configuring search and indexing settings. Continue Reading
-
Ten most useful Windows Sysinternals utilities
Sysinternals utilities such as Autoruns and TCPView can target specific problem areas in a Microsoft Windows environment, including performance issues. Continue Reading
-
What to expect from Macs in the enterprise
For enterprise IT, Apple's Mac OS can pose a few problems, including compatibility, applications, support, networking and other issues. But if you know what could be coming your way, you can get the training and tools to manage Macs. Continue Reading
-
Desktop management tools and best practices
Desktop management tools are the key to making sure things in your fleet are running smoothly. Systems such as Desktop Central and Client Management Suite cover the big five of desktop management. Continue Reading
-
The importance of desktop inventory management tools
Desktop inventory management tools help keep track of how many endpoints are in use and who's using them. That basic information can help with sundry other management tasks, such as budgeting and responses to security breaches. Continue Reading
-
Tighten Windows 8.1 security in five simple steps
Microsoft has improved Windows 8.1 security, but no OS is free of vulnerabilities. Some basic settings can further protect Windows 8.x systems. Continue Reading
-
Four utilities can verify Group Policy object settings
Client-side extensions could cause a Group Policy object to fail. Fortunately, there are a few different ways to track down Windows GPO settings. Continue Reading
-
Using tools to back up and restore bootable USB device images
Do you have more install or diagnostic environment images to manage than physical UFDs? Learn how to back up and restore bootable USB device images. Continue Reading
-
Office Telemetry reports on Office 2013 docs and apps
If IT administrators need information on document and application usage, they can use Office Telemetry, an Office 2013 feature that gathers such data. Continue Reading
-
Save WIM file space with WIMBoot in Windows 8.1 update
With Windows 8.1 Update 1, it's possible to boot desktops directly from a WIM file. Follow these steps to create WIMBoot images and save disk space. Continue Reading
-
How to perform a Windows XP upgrade to Windows 8.1
As organizations must now implement a Windows XP upgrade to Windows 8.1, they should understand that Windows 8 and 8.1 aren't identical and use the Windows 8.1 Upgrade Assistant. Continue Reading
-
For missing GPO settings, check the Winlogon component
If a Windows system isn't applying certain Group Policy settings, you may need to check Winlogon and common client-side extensions. Continue Reading
-
More remote Group Policy Object settings and checking refresh status
Admins can refresh Group Policy Object settings across multiple computers, but they must verify that Group Policy settings have successfully changed. Continue Reading
-
Locking down Internet Explorer settings with Group Policy in IE 11
New Internet Explorer settings can tighten enterprise security, but only if Group Policy is properly enabled in IE 11 and you have Windows 8. Continue Reading
-
Learn how to install Office 2013 with Group Policies or SCCM
To successfully deploy Office 2013 across a network, you'll need Group Policies or tools such as Microsoft System Center Configuration Manager. Continue Reading
-
Click-to-Run and MSI provide Office 2013 installation options
The Microsoft Installer has competition for Office 2013 installation. See how Office Click-to-Run allows Office 2013 to run without a full download. Continue Reading
-
Microsoft's revised Resource Kit can ease Office 2013 deployment
Microsoft's free Office 2013 Resource Kit provides documentation for Office 2013 deployment, as well as for management after an Office deployment. Continue Reading
-
Using Active Directory activation and other new Office 2013 tools
Among the new Office 2013 tools for IT admins are a method for volume activation, administrative template files and files for custom installations. Continue Reading
-
Stripping a Microsoft Office password from a document with DocRecrypt
DocRecrypt, an Office 2013 tool, allows an admins to get into an otherwise inaccessible file by stripping it of its Microsoft Office password. Continue Reading
-
Windows Server Update Services weaknesses you may not know about
Built-in tools such as WSUS can help with Windows patching, but you may still need other tools to verify that enterprise systems are safe. Continue Reading
-
Microsoft Office 2013 crackable, so look to Office password recovery
Microsoft Office 2013 may have improved protection, but third-party tools have already cracked passwords. See how to use Office password recovery. Continue Reading
-
Desktop audit checklist: Five steps to a successful desktop audit
Now that 2012 has begun, consider doing a desktop audit to get your IT house in order. A strong desktop audit checklist can help you manage hardware, software and applications better. Continue Reading
-
Tablet licensing rules with Microsoft Office
As tablets make their way into the enterprise, it might be time to brush up on licensing rules for mobilizing Microsoft Office. We also provide some solutions for reducing costs. Continue Reading
-
Microsoft Windows 7 Task Manager troubleshooting tips
Here are some troubleshooting tips for Microsoft Windows 7's improved Task Manager -- from identifying processes and services to using the Resource Monitor. Continue Reading
-
Turn a Windows 7 desktop into a wireless hotspot
Faulty Internet connections are a nightmare for on-the-go admins, but wireless hotspot software can eliminate network headaches. Continue Reading
-
Using P2V Migration for Software Assurance for Windows 7 upgrades
P2V Migration for Software Assurance automates the Windows 7 migration process and preserves XP applications and data. Yet its limitations may be a deal breaker. Continue Reading
-
Licensing options for accessing Microsoft Office remotely
There are plenty of choices for licensing virtual applications, but understanding when to use which ones can be a challenge. Continue Reading
-
Resetting passwords in the enterprise without the help desk
While there are several self-service password-reset options on the market, many organizations are hesitant to implement them -- even though the payoffs are significant. Continue Reading
-
Controlling desktops with AppLocker and software restriction policies
Many IT admins rely on User Account Control, but AppLocker or software restriction policies can also prevent unauthorized installation of desktop apps. Continue Reading
-
How do Group Policy settings differ between versions of Windows?
Group Policy Objects vary from one version of Windows to another. Determine which ones to apply in your environment. Continue Reading
-
Where does Windows store its temporary files?
The temporary files generated by Windows can pile up and become a security hazard. Learn how to track them down and tidy up your systems. Continue Reading
-
How to crack a password
Expert Brien Posey describes some techniques used to crack Windows passwords and offers several defenses against attack. Continue Reading
-
What is a Microsoft hotfix?
Hotfixes can solve an array of problems in your enterprise, but they have certain limitations and need to be managed properly. Continue Reading
-
How to install a clean version of Windows 7
Installing a clean version of Windows 7 on your desktops may be easier than upgrading from Windows XP or Vista. Migrate to Microsoft's newest OS with these steps. Continue Reading
-
Securing removable drives with BitLocker To Go
BitLocker To Go, which ships with Windows 7 Ultimate and Enterprise Editions, can help secure FireWire and USB drives — but is it right for your business? Continue Reading
-
Five network security resolutions for 2010
Tighten your enterprise's network security this year with these simple steps, which include regularly changing passwords, keeping patches up to date and talking to end users. Continue Reading
-
Checklist for upgrading from Windows XP or Vista to Windows 7
While there's no single method for all enterprises to upgrade machines to Windows 7, these steps can help if you choose to migrate from Windows XP to Vista and then to Windows 7. Continue Reading
-
What can Windows 7's AppLocker do for you?
Control applications on individual workstations more efficiently with AppLocker, an improved application management feature in Windows 7. Continue Reading
-
Top 5 registry keys for Windows 7
Use these helpful Windows 7 registry keys to manage user account control, prevent the computer from rebooting after installing patches and more. Continue Reading
-
Desktop security predictions for 2010
Smarter hackers, more malicious malware and the rise of social engineering may make 2010 a dangerous year in terms of security. See what to look out for to keep your desktops safe. Continue Reading
-
Group Policy tricks to secure network endpoints
There are thousands of Group Policy settings available -- lock down your network endpoints with these favorites. Continue Reading
-
Using BitLocker in Windows 7
BitLocker allows users to lock down workstations and mobile devices. But the drive-encryption technology isn't for all enterprises. Find out if it's right security control for you. Continue Reading
-
Remote troubleshooting made easier with Windows 7's Problem Step Recorder
Remote technical support is easier to administer with Windows 7's Problem Step Recorder -- a new tool that allows users to show you exactly what their problems are. Continue Reading
-
Top 5 registry keys for Windows XP
Systems administrators may not know about useful registry keys for Windows XP. Learn how they can help you secure your network, create drive shares, manage passwords and more. Continue Reading
-
Should you switch to the Office 2007 file format?
Are the benefits of the Open XML file format in Microsoft Office 2007 significant enough to make switching a high priority? Consider your businesses' needs. Continue Reading
-
Microsoft Office 2010: At a glance
With Microsoft Office 2010 on the horizon, but no public betas as of yet, information on the new release is scattered across the Internet. Get everything you need to know here. Continue Reading
-
Four Internet Explorer 8 Group Policy security settings
Internet Explorer 8 doesn't have nearly as many new security mechanisms as its predecessor; however, there are four Group Policy security settings for IE8 worth mentioning. Continue Reading
-
Using Sysinternals tools in security management scenarios
Discover three valuable Sysinternals tools and common Windows security management scenarios in which these tools would be used. Continue Reading
-
Sysinternals tools: A must-have for every Windows security toolbox
Learn about the free Sysinternals tools that make managing and troubleshooting Windows-based PCs almost effortless for administrators. Continue Reading
-
The 10 most common Windows security vulnerabilities
Most Windows networks, including yours, have a number of security holes. Fortunately, though, many of these holes can be filled quickly and easily before they pose a major threat to your business-critical data. In this tip, learn what security ... Continue Reading
-
Troubleshooting IEEE 1394 bus devices for Windows machines
FireWire (or 1394) devices work well most of the time, but when things go wrong, troubleshooting techniques can vary depending on what's causing the problem. Continue Reading
-
How to recover from lost BitLocker PINs and startup keys
Windows BitLocker Drive Encryption makes it possible to encrypt your system drive, but permanent data loss can occur if you forget the PIN or lose the startup key. This article explains some steps that you can take to regain your lost data. Continue Reading
-
Metasploit 3.1 updates improve Windows penetration testing
Metasploit has long been a popular tool to use to conduct Windows penetration testing. Well, just this January, the latest version, Metasploit 3.1, was released. Learn about the new features and updates of this cool tool, which include a true GUI ... Continue Reading
-
How to create a Windows Vista boot CD with WinPE
Using WinPE, admins can launch Vista from a disk and use the deployment to create and restore images. Continue Reading
-
Windows 2000 batch file command reference
Check out this reference guide to batch file commands for Windows 2000, based on Microsoft documentation, but rewritten to increase usefulness and readability. Continue Reading
-
The last resort for troubleshooting hardware resource conflicts
Brien Posey explains how to use the Windows Device Manager to manually reallocate system resources. Be careful, though, or you may be forced to reinstall Windows from scratch. Continue Reading
-
Troubleshooting Windows XP Device Manager error codes
Windows XP Device Manager alerts you if a system's hardware malfunctions, but often you need an advanced degree in unraveling cryptic code in order to understand the problem. Device Manager's error codes may be puzzling, but once you crack them, ... Continue Reading
-
Use Driver Query to resolve device driver problems
The Driver Query utility may not be perfect, but it can help to compile a device driver usage history. Continue Reading
-
Find Windows vulnerabilities with a hex editor
If you haven't heard of a hex editor, then pay attention, because it could be the security testing tool that you've been waiting for all your life. Read how this underrated tool can help you find weaknesses and vulnerabilities in your Windows ... Continue Reading
-
Windows pagefile security risks and how to avoid them
Learn about the security risks involved in using Windows pagefile, and avoid putting your sensitive data in harm's way. Continue Reading
-
Fast Reboot: quick reboot utility for Windows
Windows' shut down/reboot process is not that snappy; it can take a couple of minutes for everything to terminate and be written to disk. You can initiate a reboot quickly with a tool like Fast Reboot, which performs the usual quick-reboot/shutdown ... Continue Reading
-
What to do if system hangs when building DMI pool
When powered on, a PC creates the DMI pool, which shows the devices available to the BIOS. If a PC hangs at this point, here are some possible culprits. Continue Reading
-
Device drivers: Installation and configuration
To install hardware devices on Windows servers, admins must install the appropriate device drivers first. Here are some guidelines for installing, configuring and troubleshooting device drivers. Continue Reading
-
How to Bypass BIOS Passwords
BIOS passwords can be a liability if a user forgets his password. Here are a few tips and tricks that can help to bypass or reset the BIOS password on most systems. Continue Reading