Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
AI sharpens unified endpoint management tools and apps
Endpoint management is never simple, but AI can help. In this handbook, learn how AI in UEM tools can significantly improve device security and management. Continue Reading
4 steps to check application compatibility with Windows 10
Before a Windows 10 migration, IT admins should make sure all applications are compatible with the new OS. Here are four steps to get started with the process. Continue Reading
How to automate Windows 10 imaging with Packer
Windows 10 imaging isn't easy, especially with Microsoft's continuous release model. Here's how IT can use Packer and MDT to reuse code for Windows images and automate the process. Continue Reading
-
All roads and flight paths lead to unified endpoint management
Mobile device management, enterprise mobility management and now unified endpoint management -- how can IT keep track? Delve into the details with this handbook. Continue Reading
How to boot to Windows Safe Mode on Windows 10
Having problems with Windows crashes, applications or performance issues? Try booting to Windows Safe Mode on Windows 10 to pinpoint and troubleshoot the problem. Continue Reading
How to use Windows Admin Center to manage Windows 10
Windows Admin Center started as a Windows Server tool, but it can manage Windows 10 desktops too. Learn which features can help with Windows 10 management.Continue Reading
What IT should know about the Microsoft Office app for Windows 10
Microsoft released a new Microsoft Office app during an update to Windows 10. Learn about the changes that this new app brings and how to take advantage of its features.Continue Reading
What to know about Microsoft's new Windows Sandbox mode
Windows Sandbox is Microsoft's integrated Windows 10 sandbox environment to test applications and files in isolation. Learn about the new program and its features.Continue Reading
5 digital workspace components to look for
The ideal digital workspace should handle a variety of tasks. By focusing on these five digital workspace components, IT pros can find the right platform to meet their needs.Continue Reading
How to create Windows 10 toast notifications with PowerShell
IT can send pop-up notifications to a Windows 10 user's taskbar with a PowerShell module called BurntToast. Here's how to get started creating toast notifications.Continue Reading
-
Unified endpoint management systems harness upsurge in devices
As more endpoints enter the IT landscape, a UEM tool becomes more critical. Learn how UEM can help simplify the complexities of endpoint management.Continue Reading
Digital workspaces upgrade IT delivery, management benefits
Thanks to more simplified management and delivery, digital workspaces can benefit IT pros and users. This guide takes a closer look at the technology and latest features.Continue Reading
What IT needs to know about Windows 10 update troubleshooting
The Windows update process can cause a whole slew of problems for users and IT. Get acquainted with these Windows 10 update troubleshooting tips and make the process a lot easier.Continue Reading
Windows 10 customizations for enterprise desktops
Microsoft offers different services that IT can use to adjust its users' desktop experience. These Windows 10 customizations are a must in an admin's toolbox.Continue Reading
Quiz yourself on top features of Windows 10
With each update, Microsoft introduces many new features that it can be hard to keep track of. Challenge yourself on how well you know these Windows 10 key features and other terms.Continue Reading
How to find Wi-Fi settings in Windows 10
In Windows 10, the Wi-Fi -- and wired -- connectivity settings are in a new spot, but they're as easy to access and configure as ever. You just have to know where to look.Continue Reading
Learn about the device-as-a-service model and its use cases
Device-as-a-service offerings can help IT pros provide their users with support and high-functioning devices, but they must consider the ramifications of choosing such a program.Continue Reading
How can you improve Google Chrome management?
IT professionals should deploy Group Policies to their browsers to improve the user experience. Check out this step-by-step guide on applying Group Policies to Google Chrome.Continue Reading
How does Parallels Mac Management for Microsoft SCCM work?
With Mac Management from Parallels, IT professionals can manage Windows and Apple macOS desktops side by side with System Center Configuration Manager's native features.Continue Reading
Modern desktop transformation focuses on workspace technology
As workspaces trend toward mobility and device flexibility, IT departments must evolve to fit users' needs by moving away from a desktop-centric approach.Continue Reading
How to set up a Windows Autopilot deployment
IT can set profiles for its devices running Windows 10 and enroll them in Active Directory with the Windows Autopilot tool, but Autopilot does not cover many settings.Continue Reading
The complete guide to Windows 10 security tools
IT professionals must carefully consider which security tools they use to protect their Windows 10 desktops. They may want to stray from the Microsoft path in some instances.Continue Reading
Can you put together an efficient help desk system?
Help desk software should not be an organization's only plan for incident management. An effective help desk should include agreed-upon timelines, a knowledge base and more.Continue Reading
Understanding third-party Windows 10 security tools
Third-party security tools provide value and new utilities for Windows 10 desktop administrators. IT should consider non-Microsoft options for patching, firewalls and more.Continue Reading
Create an email phishing test to minimize attack vectors
With email phishing testing, IT can improve its end-user security. Phishing attacks prey on user ignorance, so IT can use a test to teach users how to avoid this attack vector.Continue Reading
What does a Windows 10 digital certificate do?
IT pros can build trust into Windows 10 by adding certificates that form trusted connections by confirming the identity of any individuals or entities communicating with the OS.Continue Reading
Windows Defender Application Guard
Windows Defender Application Guard is a security tool built into Microsoft Edge that isolates browser sessions from the desktop in a virtual machine (VM) to prevent any malicious activity from reaching the desktop.Continue Reading
How to create an internal phishing campaign from scratch
When IT begins an email phishing campaign, it must determine what server the emails will come from, consider phishing tool options and more.Continue Reading
Understand Windows Insider Program for Business options
With its business-friendly Insider Program, Microsoft allows IT and users to test Windows 10 preview builds for compatibility and performance issues.Continue Reading
8 VMworld 2018 sessions for EUC admins to attend
Put your plan in place now by exploring eight of the top sessions on Windows management, VDI and more at VMworld 2018 in Las Vegas.Continue Reading
Windows 10 Update Assistant
Windows 10 Update Assistant is a native update management tool designed to help individual users keep up with OS updates as Microsoft publishes them.Continue Reading
Get smart with IAM tools for your EUC strategy
Identity and access management (IAM) is an evolving market that now includes software and services that incorporate machine learning, analytics and microservices. IT departments can use IAM tools to strengthen end-user security. This month's cover ...Continue Reading
Desktop and mobile malware detection takes on high priority
End-user computing professionals must embrace modern Windows and mobile malware protection technologies to defend against ransomware and other attacks.Continue Reading
Create an effective email phishing test in 7 steps
The best way for IT to improve email phishing security is through comprehensive testing, which helps identify which users are susceptible and what type of fake email is most effective.Continue Reading
Top Windows 10 April 2018 Update features you need to know
Microsoft's latest update to Windows 10 helps IT pros and users alike. On the user front, Focus Assist can help employees silence notifications while they work.Continue Reading
Effective end-user management helps fuel productivity
To keep users at their most effective, IT pros must focus on security, pick the right productivity apps, consider companion apps and more.Continue Reading
How to create a custom Windows 10 image for deployment
IT pros can build a Windows 10 image with custom apps, Start menu tools and more that they can easily deliver throughout the organization.Continue Reading
It's time to relinquish control over operating system updates
For the most part, vendors and manufacturers are in control of operating system updates today. IT admins won't be getting their powers back anytime soon.Continue Reading
Four factors to consider when you migrate to Windows 10
When making the move to Windows 10, there are some important factors for IT to keep in mind, including whether to perform an in-place upgrade or a clean installation.Continue Reading
How AI and machine learning affect end-user computing
End-user computing administrators need to start paying attention to AI and machine learning, not because these technologies will take over their jobs, but because they can bring productivity benefits to both business software and IT management tools...Continue Reading
Microsoft Windows Defender Credential Guard
Microsoft Windows Defender Credential Guard is a security feature that isolates users' login information from the rest of the operating system to prevent theft.Continue Reading
virtualization-based security (VBS)
Virtualization-based security (VBS) is technology that abstracts computer processes from the underlying operating system and, in some cases, hardware.Continue Reading
Does Windows 10 virtualization-based security defend the OS?
With Windows 10, Microsoft emphasized virtualization-based security, such as Device Guard and Credential Guard, to keep corporate information off users' devices.Continue Reading
How to use a technician machine to create a custom Windows 10 image
IT pros must be able to mold Windows 10 into the OS their organization needs. To do so, they need to first learn to install Windows 10 on a technician machine.Continue Reading
Microsoft Windows Deployment Image Servicing and Management (DISM)
Microsoft Windows Deployment Image Servicing and Management is a tool IT administrators can access through the command line or PowerShell to mount and service a Windows desktop image or hard disk before deploying it to users.Continue Reading
How to build and use a bootable recovery partition in Windows 10
Understanding how to set up a bootable recovery partition in Windows 10 allows you to restore a damaged OS or troubleshoot a litany of problems.Continue Reading
Microsoft Office 365 suite
Microsoft Office 365 suite is a hosted, online version of Microsoft Office software. IT administrators access it from a web-based portal to set up new user accounts, control access to features and see the status of all Office 365 services and tools.Continue Reading
How to use WMI and the CIM standard with Windows PowerShell
WMI, Microsoft's implementation of the CIM standard, lets admins use PowerShell commands to view and modify system data and configuration.Continue Reading
How does Windows AppLocker work?
Windows AppLocker lets you use rules to whitelist or block applications based on attributes such as publisher or path, but it's not a comprehensive application control tool.Continue Reading
What are Microsoft Windows 10 update rings?
Microsoft's Insider Program lets members choose from two different update rings -- a fast and a slow speed -- to get OS updates on their Windows 10 machines.Continue Reading
Can I customize the Windows 10 Start menu?
In Windows 10 there are four options you can use to turn off different features of the Start menu and customize it to your liking.Continue Reading
What is the best way to transition from Windows XP to Windows 10?
If you're still on Windows XP, there's really only one Microsoft-supported way you can move from XP to Windows 10.Continue Reading
Windows 10 guide for IT administrators
Windows 10 boasts of bevy of features, including Contiuum, Universal Windows apps, Cortana and improved security. Before you migrate to the latest OS, read up on what it has to offer.Continue Reading
What is the multiple desktop feature in Windows 10?
The Windows 10 multiple desktop features gives workers the feel of using multiple monitors on the same screen, which can increase productivity for users that keep many windows open at once.Continue Reading
Is Windows 10 really the last version of Windows?
Microsoft has said that Windows 10 is the last version of Windows, and that's sort of true. Rather than releasing Windows 11 in years to come, the company will deploy perpetual updates to Windows 10.Continue Reading
How do I build Apportals in Windows 8.1?
Windows Apportals let you put the applications certain user groups need right in front of them, but you need some development knowledge and a Windows Developer License if you want to build them yourself.Continue Reading
Can you provision desktop apps with Windows To Go?
It's OK to install desktops applications on a Windows To Go image, as long as they're small enough to fit on the USB drive and can run locally.Continue Reading
What are my options for configuring Windows 8 startup?
The System Configuration tool features four tabs of options you can use to configure Windows 8 startup.Continue Reading
How do I open an .xpx file in Office 2002 SP3?
An .xpx file can cause problems for Office 2002 SP3 users, but Microsoft does provide help in Windows 7 and with a free XPS viewer.Continue Reading
Why doesn't closing a file return me to Microsoft Windows Explorer?
If you open a Windows document in Windows Explorer rather than in the Microsoft Word interface, closing it launches File Explorer. The file hasn't moved.Continue Reading
What are some alternatives to Windows Defender?
Windows Defender is useful for Windows 8 security, but it can't keep up with malicious software alone. Several third-party products can help.Continue Reading
kiosk mode (Windows assigned access)
Kiosk mode is specialized function that allows Microsoft Windows to provide a single application for users signing on as guests or generic authorized users while preventing access to other files, data and functionality of the operating system and ...Continue Reading
Microsoft Click-To-Run
Microsoft Click-to-Run is a way to quickly install Microsoft products, including versions of Office 2010 and Office 2013. Continue Reading
Microsoft Windows Recovery Environment (Windows RE)
The Microsoft Windows Recovery Environment, or Windows RE, is a simplified, scaled-back version of the Windows operating system that is used to boot the system when Windows 8.x, Windows Server 2012 or Windows Server 2012 R2 can't.Continue Reading
client-side extension (CSE)
A client-side extension (CSE) is an integral component of enterprise group policy administration that applies Group Policy to users or endpoint systems.Continue Reading
Office Telemetry reports on Office 2013 docs and apps
If IT administrators need information on document and application usage, they can use Office Telemetry, an Office 2013 feature that gathers such data.Continue Reading
Save WIM file space with WIMBoot in Windows 8.1 update
With Windows 8.1 Update 1, it's possible to boot desktops directly from a WIM file. Follow these steps to create WIMBoot images and save disk space.Continue Reading
How to perform a Windows XP upgrade to Windows 8.1
As organizations must now implement a Windows XP upgrade to Windows 8.1, they should understand that Windows 8 and 8.1 aren't identical and use the Windows 8.1 Upgrade Assistant.Continue Reading
Windows Management Instrumentation Command line (WMIC)
The Windows Management Instrumentation Command line (WMIC) is a software utility intended to help IT staffers retrieve information contained within the Windows Management Instrumentation (WMI) architecture of almost any Microsoft operating system, ...Continue Reading
Windows key (Winkey)
The Windows key (Winkey) is a relatively new keyboard key sporting a specially-designed Microsoft Windows logo.Continue Reading
Use Excel's IF statement to track, save on IT support contract costs
Warranty tracking for enterprise software can be an odious task, but if you know how to use the IF statement in Microsoft Excel, you could save money.Continue Reading
If you're not using Windows Sysinternals tools, you should be
Windows Sysinternals tools can make work a lot easier for IT administrators, but many people don't even know the suite exists. Get with the program!Continue Reading
Microsoft Windows Task Manager
Microsoft Windows Task Manager is a component of Microsoft Windows intended to assist administrators or advanced system users in monitoring, managing and troubleshooting a Windows computer system.Continue Reading
AppX file
AppX is the application distribution file format that was introduced with Microsoft Windows 8.Continue Reading
desktop personalization
Desktop personalization is the process of adjusting the look, feel and organization of a Windows end-user experience.Continue Reading
Windows Imaging Format (WIM)
The Windows Imaging Format (or WIM) is used for the creation and distribution of disk image files.Continue Reading
Microsoft USMT (User State Migration Tool)
The Microsoft User State Migration Tool (USMT) is a command-line utility used to transfer user files and settings between computers.Continue Reading
application manager (app manager)
An application manager (app manager) is programming for overseeing the installation, patching and updating and perhaps access of software applications.Continue Reading
Error messages for Windows XP Pro
MS Windows XP Professional Error MessagesContinue Reading
key-value pair (KVP)
A key-value pair (KVP) is a set of two linked data items: a key, which is a unique identifier for some item of data, and the value, which is either the data that is identified or a pointer to the location of that data.Continue Reading
Access
is for IT professionals, business leaders and developers who want to take a strategic approach to end-user computing. We cover the forward-thinking tactics and technologies needed to provide users with the tools they need to do their jobs.Continue Reading