User passwords and network permissions
Top Stories
-
E-Zine
29 May 2018
Get smart with IAM tools for your EUC strategy
Identity and access management (IAM) is an evolving market that now includes software and services that incorporate machine learning, analytics and microservices. IT departments can use IAM tools to strengthen end-user security. This month's cover story of Access magazine delves into the latest trends in IAM tools and how IT pros are taking advantage.
Also in this issue, learn about mobile and desktop malware detection and how risks differ on these devices, plus what tools are available to help. One expert column explores the reality of cross-platform mobile application development and what vendors are doing in this area. Another explains whether IT pros should consider moving away from Microsoft System Center Configuration Manager and why. Finally, get some stats on IT's priorities around mobility projects.
Continue Reading -
Feature
27 Apr 2018
Conquer the end-user productivity balancing act
Keeping users productive is one of the most critical jobs IT pros have. But there are some hurdles to jump, including understanding the risks with collaboration tools. Continue Reading
-
Tip
30 Jan 2017
Office 365 vs. Office 2013: What are the key differences?
Software as a service may be one reason for choosing Office 365 over Office 2013, but licensing and update frequency are other considerations. Continue Reading
-
Answer
05 Mar 2015
How do I open an .xpx file in Office 2002 SP3?
An .xpx file can cause problems for Office 2002 SP3 users, but Microsoft does provide help in Windows 7 and with a free XPS viewer. Continue Reading
-
Answer
26 Feb 2015
Why doesn't closing a file return me to Microsoft Windows Explorer?
If you open a Windows document in Windows Explorer rather than in the Microsoft Word interface, closing it launches File Explorer. The file hasn't moved. Continue Reading
-
Answer
25 Feb 2015
What are some alternatives to Windows Defender?
Windows Defender is useful for Windows 8 security, but it can't keep up with malicious software alone. Several third-party products can help. Continue Reading
-
Answer
11 Feb 2015
How does Windows 8.1 support affect Active Directory?
Windows 8.1 support for endpoint security includes Open MDM and biometrics, but removing Remote Server Administration Tools can affect Active Directory. Continue Reading
-
Answer
03 Feb 2015
What Web application monitoring tools exist for desktops?
Microsoft Intune and other mobile device management tools are also useful for desktop management from the cloud and Web application monitoring. Continue Reading
-
Tip
28 Jan 2015
Tighten Windows 8.1 security in five simple steps
Microsoft has improved Windows 8.1 security, but no OS is free of vulnerabilities. Some basic settings can further protect Windows 8.x systems. Continue Reading
-
Answer
05 Jan 2015
How do I remove admin restrictions from Windows 7 laptops?
To relax the usual restrictions on Windows 7 laptops, use the Windows administrator account, but remember to record your password. Continue Reading
-
Feature
22 Dec 2014
Registry tweaks can speed up Windows 8 performance
Our latest article on using the Windows registry to improve Windows 8 performance looks at disk access and shutting down Windows Store apps Continue Reading
-
Tip
10 Nov 2014
Four utilities can verify Group Policy object settings
Client-side extensions could cause a Group Policy object to fail. Fortunately, there are a few different ways to track down Windows GPO settings. Continue Reading
-
Feature
30 Sep 2014
How to enable Windows 8.1 kiosk mode for Modern apps
It's possible to control user application access on startup with Assigned Access, but note that Windows 8.1 kiosk mode works only for Modern apps. Continue Reading
-
Feature
18 Sep 2014
Windows kiosk mode locks down PCs, but note workarounds
Switching from the Windows Explorer shell to a particular app can be useful for single-purpose devices, but users can still foil Windows kiosk mode. Continue Reading
-
Tip
21 Jul 2014
Office Telemetry reports on Office 2013 docs and apps
If IT administrators need information on document and application usage, they can use Office Telemetry, an Office 2013 feature that gathers such data. Continue Reading
-
Answer
08 Jul 2014
How to allow multiple users to share an Excel workbook
Public folders allow users to share an Excel workbook, but OneDrive and Windows 8.1 HomeGroups might be better. Continue Reading
-
Tip
02 Jun 2014
For missing GPO settings, check the Winlogon component
If a Windows system isn't applying certain Group Policy settings, you may need to check Winlogon and common client-side extensions. Continue Reading
-
Photo Story
10 Apr 2014
Five Windows Sysinternals utilities can aid in desktop troubleshooting
There are many free tools in the Windows Sysinternals suite, but some might help admins more than others for viewing data and managing desktops. Continue Reading
-
Tip
11 Dec 2013
Locking down Internet Explorer settings with Group Policy in IE 11
New Internet Explorer settings can tighten enterprise security, but only if Group Policy is properly enabled in IE 11 and you have Windows 8. Continue Reading
-
Tip
07 Oct 2013
Learn how to install Office 2013 with Group Policies or SCCM
To successfully deploy Office 2013 across a network, you'll need Group Policies or tools such as Microsoft System Center Configuration Manager. Continue Reading
-
Tip
31 May 2013
Using Active Directory activation and other new Office 2013 tools
Among the new Office 2013 tools for IT admins are a method for volume activation, administrative template files and files for custom installations. Continue Reading
-
Tip
23 Apr 2013
Stripping a Microsoft Office password from a document with DocRecrypt
DocRecrypt, an Office 2013 tool, allows an admins to get into an otherwise inaccessible file by stripping it of its Microsoft Office password. Continue Reading
-
Answer
27 Feb 2013
Ways to detect and delete duplicate files in Windows systems
Our enterprise desktop expert answers a question about some third-party tools for eliminating duplicate files in Windows desktops. Continue Reading
-
Tip
07 Jan 2013
Microsoft Office 2013 crackable, so look to Office password recovery
Microsoft Office 2013 may have improved protection, but third-party tools have already cracked passwords. See how to use Office password recovery. Continue Reading
-
Tip
02 Mar 2011
Resetting passwords in the enterprise without the help desk
While there are several self-service password-reset options on the market, many organizations are hesitant to implement them -- even though the payoffs are significant. Continue Reading
-
Tip
25 Aug 2010
Where does Windows store its temporary files?
The temporary files generated by Windows can pile up and become a security hazard. Learn how to track them down and tidy up your systems. Continue Reading
-
Tip
28 Jul 2010
How to crack a password
Expert Brien Posey describes some techniques used to crack Windows passwords and offers several defenses against attack. Continue Reading
-
Tip
20 Jan 2010
Five network security resolutions for 2010
Tighten your enterprise's network security this year with these simple steps, which include regularly changing passwords, keeping patches up to date and talking to end users. Continue Reading
-
Tutorial
24 Sep 2008
Step 4: Start the BitLocker encryption process
In Vista, the BitLocker function allows you to encrypt your hard drive, but a computer with Trusted Platform Module is preferred. Not to worry … learn how to use BitLocker on a computer without TPM and encrypt your hard drive with this step-by-step guide. Continue Reading
-
Tutorial
24 Sep 2008
Step-by-step guide: Laptop hacking
Laptops with sensitive data are getting stolen every day. Contributor Kevin Beaver says the best way to secure your laptops is to understand how they will be attacked. He provides the basic attack methods and a set of contingencies in this step-by-step guide. Continue Reading
-
Tip
25 Mar 2008
How to recover from lost BitLocker PINs and startup keys
Windows BitLocker Drive Encryption makes it possible to encrypt your system drive, but permanent data loss can occur if you forget the PIN or lose the startup key. This article explains some steps that you can take to regain your lost data. Continue Reading
-
Answer
19 Mar 2007
Restricting user permissions in folders
If you have a question about managing the permissions of a folder in your domain, this advice from Jonathan Hassell tells you how to set those permissions and prevent users from deleting that folder. Continue Reading
-
Tip
12 Sep 2005
How to Bypass BIOS Passwords
BIOS passwords can be a liability if a user forgets his password. Here are a few tips and tricks that can help to bypass or reset the BIOS password on most systems. Continue Reading
-
News
19 Dec 2004
#7: How to manage multiple unique passwords
Do you really need to use unique passwords for every account? Get Roberta's answer to that question and her advice for managing multiple passwords in this expert response. Continue Reading
-
News
12 Nov 2004
Access control how-tos
From setting account options to limit systems access to implementing permissions in Windows 2000, check out this collection of how-tos for preventing unauthorized access to Windows systems. Continue Reading
-
News
19 Aug 2004
Graphical passwords still far from picture perfect
The proliferation of data and devices is making more enterprises consider graphics-based authentication, from which arises a greater pool of possibilities -- and problems. Continue Reading