Tips
Tips
-
UEFI vs. BIOs in Windows 8 for desktop startup
The Unified Extensible Firmware Interface can speed and secure startup for today's computers, but systems that dual-boot into Linux spur controversy. Continue Reading
-
Stripping a Microsoft Office password from a document with DocRecrypt
DocRecrypt, an Office 2013 tool, allows an admins to get into an otherwise inaccessible file by stripping it of its Microsoft Office password. Continue Reading
-
Windows Server Update Services weaknesses you may not know about
Built-in tools such as WSUS can help with Windows patching, but you may still need other tools to verify that enterprise systems are safe. Continue Reading
-
Comparing Office 2013 and Office 365 pricing, packages
We explain the differences between Microsoft Office 365 and Office 2013, including the evolution of Office and Microsoft Office pricing. Continue Reading
-
Microsoft Office 2013 crackable, so look to Office password recovery
Microsoft Office 2013 may have improved protection, but third-party tools have already cracked passwords. See how to use Office password recovery. Continue Reading
-
Java malware, fileless malware pose threats to desktop security
Conventional antivirus software can't detect fileless malware, and recent attacks highlighted Java vulnerabilities on Windows and Mac OS machines. Continue Reading
-
Windows XP end of support: What are the risks for users?
As the Windows XP end of support nears, see what IT admins should do to prepare for the end of life of Microsoft's venerable OS. Continue Reading
-
Don't ignore Windows 8 security when reviewing desktop vulnerabilities
Microsoft Windows 8 security may not be at the top of IT admins' to-do lists, but they should pay attention to the OS's features and flaws. Continue Reading
-
Examining alternatives to Windows 8
As enterprise IT gets ready for Windows 8, some are opting out and looking at alternative operating systems. Let's explore some Windows alternatives. Continue Reading
-
What we know so far about Microsoft Office 2013
We do have some early knowledge of Microsoft Office 2013. Check out what we know so far in this FAQ. Continue Reading
-
Hedging your bets on Microsoft Software Assurance
Microsoft Software Assurance requires enterprises to roll the dice on upgrades vs. unneeded expense. IT shops can improve their odds, however. Continue Reading
-
How to install Windows 8 on your laptop in just 45 minutes
The process of installing the Windows 8 Consumer Preview isn't difficult. Follow these steps and get to testing Microsoft's new OS in under an hour. Continue Reading
-
What type of Windows user profile should you use?
Windows user profiles come in a few flavors: local, roaming and mandatory. Each one offers different availability and performance to IT and users. Continue Reading
-
Full-disk encryption can save IT grief from lost laptops
Full-disk encryption can help enterprises comply with data security regulations, but it can hurt performance. See if the pros outweigh the cons for this laptop protection measure. Continue Reading
-
Group Policy settings FAQ: Why they matter
Group Policy settings in Microsoft's Active Directory are useful not only for managing user access and applications, but IT admins can also apply them to desktop and server security. Continue Reading
-
How Microsoft OneNote 2010 can improve productivity, organization
If organization isn't your strong suit, you can get help from Microsoft OneNote 2010. This powerful tool can save important emails, documents and more in easy-to-find locations. Continue Reading
-
Microsoft OneNote 2010: Office's best-kept productivity secret
Microsoft OneNote lives in the shadows of other Office programs, but it can be one of the most useful. OneNote 2010 helps organize data, emails, notes and more all in one place. Continue Reading
-
How application whitelisting can help prevent advanced malware attacks
Advanced malware can be tricky, but application whitelisting on desktops can provide an additional layer of protection against malware attacks. Continue Reading
-
Windows 7 improvements: Hype vs. reality
It has been almost three years since Microsoft's previous OS release, so it's time to see if Windows 7 improvements, such as the Aero user interface, have lived up to IT expectations. Continue Reading
-
Using Windows 7 Task Manager features for Windows memory management
To fix your Windows memory management problems, you must first diagnose how memory is allocated. Certain Windows 7 Task Manager features can cure what ails your desktops. Continue Reading
-
Using Group Policy settings to lock down enterprise desktop security
Enterprise desktop security involves many moving parts, but Group Policy settings can help. Use them to manage IE and Outlook, as well as Windows 7's Control Panel and UAC. Continue Reading
-
Desktop audit checklist: Five steps to a successful desktop audit
Now that 2012 has begun, consider doing a desktop audit to get your IT house in order. A strong desktop audit checklist can help you manage hardware, software and applications better. Continue Reading
-
Need more memory? Getting started with Windows memory management
Do you need more memory? Our expert explains how to manage Windows memory, both physical and virtual, and how to diagnose memory-related performance issues. Continue Reading
-
Managing client encryption with BitLocker To Go
Windows 7 Enterprise users have access to BitLocker To Go, Microsoft's encryption program for removable drives. Find out how to use it easily and automate with Group Policy settings. Continue Reading
-
Full-system encryption with BitLocker vs. third-party alternatives
The BitLocker feature in Windows allows for full-system encryption, but it may not do everything you need. Consider third-party encryption products, but be aware of their costs. Continue Reading
-
Tablet licensing rules with Microsoft Office
As tablets make their way into the enterprise, it might be time to brush up on licensing rules for mobilizing Microsoft Office. We also provide some solutions for reducing costs. Continue Reading
-
Microsoft Windows 7 Task Manager troubleshooting tips
Here are some troubleshooting tips for Microsoft Windows 7's improved Task Manager -- from identifying processes and services to using the Resource Monitor. Continue Reading
-
Enterprise password protection checklist
Everyone should know by now that passwords are often the weakest link in enterprise security. Here's a password protection checklist for both end users and IT managers. Continue Reading
-
The limitations of restoring files in Windows using Previous Versions
Microsoft's Previous Versions function can retrieve files, but only copies made during a system checkpoint or snapshot. Our expert found a third-party backup tool to span the gap. Continue Reading
-
What to do when USB flash drives refuse to mount in Windows
If you're having trouble figuring out why a USB flash drive won't mount in your PC, this expert tip will help by providing advice on how to fix such a problem. Continue Reading
-
Who should know about Microsoft licensing? And why should you care?
Microsoft software licensing is complicated, but our licensing expert breaks it down and gives the basics of what you need to know, including budgeting and volume purchasing. Continue Reading
-
Why Microsoft wants you to make the move to Office 365
Here are some of Microsoft's motivations to get enterprises onto Office 365. Make sure your own motivations are in alignment. Continue Reading
-
The truth about Microsoft licensing for portable devices
Microsoft's rules for portable devices are different from those for desktops and include a catch-22 in its licensing policy. Continue Reading
-
The facts about Windows 7 licensing
Windows 7 licensing can be complicated, partly because the OS has had multiple predecessors and editions. Get control by using helpful tools and avoiding common problems. Continue Reading
-
Using Windows ReadyBoost in enterprise settings
There are some misconceptions about what ReadyBoost is. Here's a look at what it really is, what it does and what it doesn't do. Continue Reading
-
How to build a WIM file in Microsoft Deployment Toolkit 2010
WIM files let admins consolidate desktop images onto a single disk to simplify OS deployments, such as Windows 7. Continue Reading
-
Enterprise Agreement renewal: Is it worth the cost?
Hidden price increases can not only make an Enterprise Agreement renewal less attractive, but burden enterprises with unnecessary software as well. Continue Reading
-
Turn a Windows 7 desktop into a wireless hotspot
Faulty Internet connections are a nightmare for on-the-go admins, but wireless hotspot software can eliminate network headaches. Continue Reading
-
Reasons for Windows 7 backup adding non-system drives to a system image
Is your Windows 7 backup system adding non-system drives to a system image? Don't fret. There are several solutions for this common -- yet frustrating -- problem. Continue Reading
-
Managing Windows desktops with PowerShell
PowerShell isn't just for Windows servers -- Microsoft made the scripting language the core management platform in Windows 7. Continue Reading
-
Licensing options for accessing Microsoft Office remotely
There are plenty of choices for licensing virtual applications, but understanding when to use which ones can be a challenge. Continue Reading
-
Using P2V Migration for Software Assurance for Windows 7 upgrades
P2V Migration for Software Assurance automates the Windows 7 migration process and preserves XP applications and data. Yet its limitations may be a deal breaker. Continue Reading
-
Resetting passwords in the enterprise without the help desk
While there are several self-service password-reset options on the market, many organizations are hesitant to implement them -- even though the payoffs are significant. Continue Reading
-
How Office 365 is changing the Microsoft Enterprise Agreement
The release of Office 365 will bring many changes to Microsoft's premiere volume licensing agreement, including a more diverse application selection and Office subscriptions. Continue Reading
-
Options for licensing Windows in virtual scenarios
Confused by Microsoft's virtual licensing? Who isn't? Our expert describes options you may not know about and explains how to bypass SA's stringent requirements. Continue Reading
-
Network tracing 101: collecting client data for troubleshooting
As desktop users increasingly rely on virtualized applications, they become more sensitive to network performance problems. Network trace tools can help troubleshoot client data. Continue Reading
-
The pros and cons of PS/2 to USB adapters and converters
Now that most PCs and laptops ship with only USB ports, you'll need an adapter for older PS/2 devices. Here are some things to look out for when picking an adapter or converter. Continue Reading
-
Controlling desktops with AppLocker and software restriction policies
Many IT admins rely on User Account Control, but AppLocker or software restriction policies can also prevent unauthorized installation of desktop apps. Continue Reading
-
Window desktop features you didn't know you had
There's more to Windows 7 than meets the eye. These nondefault features may be useful in your enterprise. Continue Reading
-
How do Group Policy settings differ between versions of Windows?
Group Policy Objects vary from one version of Windows to another. Determine which ones to apply in your environment. Continue Reading
-
The Windows Remote Assistance feature: Friend or foe?
The Remote Assistance feature in Windows makes desktop support easier, but it can be a nuisance and weaken enterprise security. Restrict access with these Group Policy settings. Continue Reading
-
Using security and desktop management products to block USB access
While gluing your USB ports shut is one way to avoid data loss via a portable driver, a less drastic -- but still effective -- option is a security or desktop management product. Continue Reading
-
Where does Windows store its temporary files?
The temporary files generated by Windows can pile up and become a security hazard. Learn how to track them down and tidy up your systems. Continue Reading
-
How to make legacy applications run on Windows 7
Windows 7 was designed to avoid the application-compatibility problems of Vista, but some legacy apps still require extra effort to work properly. Continue Reading
-
How to crack a password
Expert Brien Posey describes some techniques used to crack Windows passwords and offers several defenses against attack. Continue Reading
-
The art of locating device drivers for Windows computers
Installing device drivers on Windows machines shouldn't be difficult, but the specific device and version of Windows matter. Continue Reading
-
How to run the chkdsk utility in Windows 7
Hard drives and file systems have undergone major changes in the past few years. But the tool that keeps these file systems consistent when things go wrong remains the same. Continue Reading
-
Sysinternals tools can help clean your Windows systems
PC cleanup is no one's favorite task. Process Monitor and Process Explorer are two Sysinternals tools that can help make your systems tidy again. Continue Reading
-
Six Windows 7 security vulnerabilities you don't know about
Just because Windows 7 is Microsoft's most secure desktop OS doesn't mean it's trouble-free. Before you migrate, address these new and old security issues. Continue Reading
-
Using Group Policy to lock down the Control Panel
Preventing unauthorized changes to Windows systems is a basic security precaution. Group Policy settings can keep users from messing with the Control Panel. Continue Reading
-
What is a Microsoft hotfix?
Hotfixes can solve an array of problems in your enterprise, but they have certain limitations and need to be managed properly. Continue Reading
-
Simple steps to securing Terminal Services communications
Enabling certain features in Windows Server 2008 -- like network-level authentication -- can improve the security of your terminal servers. Continue Reading
-
Using Group Policy settings to secure local admin groups on your desktops
Controlling local admin group memberships with Group Policy settings is relatively easy -- but you need to proceed with caution to avoid disastrous errors. Continue Reading
-
Using Windows 7's BranchCache to optimize WAN bandwidth
The BranchCache feature in Windows Server 2008 R2 and Windows 7 is designed to improve WAN bandwidth for end users. Find out how to configure it in distributed mode or hosted mode. Continue Reading
-
Top 10 command-line commands for managing Windows 7 desktops
Admins don't always need fancy software to manage Windows 7 desktops. Here are 10 command-line utilities that can help you handle scripting tasks. Continue Reading
-
How to install a clean version of Windows 7
Installing a clean version of Windows 7 on your desktops may be easier than upgrading from Windows XP or Vista. Migrate to Microsoft's newest OS with these steps. Continue Reading
-
Securing removable drives with BitLocker To Go
BitLocker To Go, which ships with Windows 7 Ultimate and Enterprise Editions, can help secure FireWire and USB drives — but is it right for your business? Continue Reading
-
Five network security resolutions for 2010
Tighten your enterprise's network security this year with these simple steps, which include regularly changing passwords, keeping patches up to date and talking to end users. Continue Reading
-
Checklist for upgrading from Windows XP or Vista to Windows 7
While there's no single method for all enterprises to upgrade machines to Windows 7, these steps can help if you choose to migrate from Windows XP to Vista and then to Windows 7. Continue Reading
-
What can Windows 7's AppLocker do for you?
Control applications on individual workstations more efficiently with AppLocker, an improved application management feature in Windows 7. Continue Reading
-
Top 5 registry keys for Windows 7
Use these helpful Windows 7 registry keys to manage user account control, prevent the computer from rebooting after installing patches and more. Continue Reading
-
Group Policy tricks to secure network endpoints
There are thousands of Group Policy settings available -- lock down your network endpoints with these favorites. Continue Reading
-
Using Windows 7 to configure workstations for optimal power management
Windows 7 can help organizations manage their power consumption. Learn how to use power management reports, workstation settings and group policy settings to save energy and money. Continue Reading
-
Underlying causes of inconsistent patch management
Think your business is secure? Think again. Many environments, including those with patch management systems, are missing critical patches. Learn how to secure your organization. Continue Reading
-
Converting Windows 7 deployment images to virtual hard drive files
Microsoft has made it easier to deploy custom desktop images with a feature in Windows Server 2009 R2 that allows you to convert a.WIM file to a virtual hard drive file. Continue Reading
-
Monitoring user activity with network analyzers
Network analyzers are one of the best -- and cheapest -- security tools for managing an enterprise and minimizing business risks, but they are often overlooked. Continue Reading
-
Top 5 registry keys for Windows XP
Systems administrators may not know about useful registry keys for Windows XP. Learn how they can help you secure your network, create drive shares, manage passwords and more. Continue Reading
-
Manage the desktop image lifecycle to limit work, ensure security
An image lifecycle management plan makes it easier to balance the need to limit the number of desktop images with the need to keep up with security patches and new software. Continue Reading
-
Should you switch to the Office 2007 file format?
Are the benefits of the Open XML file format in Microsoft Office 2007 significant enough to make switching a high priority? Consider your businesses' needs. Continue Reading
-
Microsoft Office 2010: At a glance
With Microsoft Office 2010 on the horizon, but no public betas as of yet, information on the new release is scattered across the Internet. Get everything you need to know here. Continue Reading
-
Troubleshooting Microsoft WSUS connectivity issues
Microsoft Windows Server Update Services may impede your system updates because of IIS and Group Policy settings issues. Find out quick solutions to these WSUS errors in this tip. Continue Reading
-
Four Internet Explorer 8 Group Policy security settings
Internet Explorer 8 doesn't have nearly as many new security mechanisms as its predecessor; however, there are four Group Policy security settings for IE8 worth mentioning. Continue Reading
-
Should administrators use hard disk compression?
Should admins use hard disk compression? There's no right or wrong answer. Weigh the pros and cons of hard disk compression and learn when compressing the hard drive can be harmful. Continue Reading
-
How to move hard drives and transplant system drives between servers
Moving hard drives can be tricky; but it may be faster and more cost-effective than re-imaging. Learn how to remove hard drives and transplant system drives. Continue Reading
-
Combining folder redirection with roaming profiles
Using roaming profiles and folder redirection can prevent corporate data loss and streamline network management processes. Continue Reading
-
Using Sysinternals tools in security management scenarios
Discover three valuable Sysinternals tools and common Windows security management scenarios in which these tools would be used. Continue Reading
-
Sysinternals tools: A must-have for every Windows security toolbox
Learn about the free Sysinternals tools that make managing and troubleshooting Windows-based PCs almost effortless for administrators. Continue Reading
-
Deciphering the Blue Screen of Death
What exactly happens when the Blue Screen of Death occurs? Learn the components of this much dreaded stop message and get advice on some quick action you can take to fix the problem. Continue Reading
-
AppLocker improves on software restriction policies
AppLocker, Windows 7's updated and rebranded version of software restriction policies, could reduce the headaches caused by unauthorized applications in Windows systems. Continue Reading
-
A Windows security checklist for IT managers
Do the Windows security products you're considering address every security issue? Use this high-level checklist as a quick reference to make sure all your bases are covered. Continue Reading
-
Check IT List: Five steps for rootkit detection
Rootkit detection and removal is no easy task. Here are five steps to help you identify and prevent rootkits on your systems. Continue Reading
-
Top Windows client security tools for end users
Tony Bradley helps narrow down the field of client security tools on the market and gives his top four picks. Continue Reading
-
Unauthenticated vs. authenticated security testing
Security testing as a user signed into the network can yield different results. Use unauthenticated and authenticated testing and learn the pros and cons of each method. Continue Reading
-
How to exploit two common Windows vulnerabilities
Metasploit and other free security testing tools can help you uncover Windows security vulnerabilities, like unencrypted laptop drives and local Windows password hashes. Continue Reading
-
The 10 most common Windows security vulnerabilities
Most Windows networks, including yours, have a number of security holes. Fortunately, though, many of these holes can be filled quickly and easily before they pose a major threat to your business-critical data. In this tip, learn what security ... Continue Reading
-
How to use Group Policy to control wireless access
Group Policy can be used to control wireless access in Windows networks. Find out which Group Policy settings you should create to accomplish this in this tip. Continue Reading
-
Troubleshooting IEEE 1394 bus devices for Windows machines
FireWire (or 1394) devices work well most of the time, but when things go wrong, troubleshooting techniques can vary depending on what's causing the problem. Continue Reading
-
How to recover from lost BitLocker PINs and startup keys
Windows BitLocker Drive Encryption makes it possible to encrypt your system drive, but permanent data loss can occur if you forget the PIN or lose the startup key. This article explains some steps that you can take to regain your lost data. Continue Reading
-
Metasploit 3.1 updates improve Windows penetration testing
Metasploit has long been a popular tool to use to conduct Windows penetration testing. Well, just this January, the latest version, Metasploit 3.1, was released. Learn about the new features and updates of this cool tool, which include a true GUI ... Continue Reading
-
Have my Windows patches actually been installed?
Sometimes, knowing if a machine has been properly patched is not as easy as you would like it to be. Do you have to reboot? Have any of your programs changed the way they operate? Were the updates automated? This kind of thing can be a real mystery.... Continue Reading