Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
message passing interface (MPI)
The message passing interface (MPI) is a standardized means of exchanging messages between multiple computers running a parallel program across distributed memory. Continue Reading
How to choose a PCaaS vendor
The PC-as-a-service and device-as-a-service market is still developing and maturing, so organizations should learn who the major vendors are and how these services work. Continue Reading
The Windows 11 system requirements and what they indicate
When organizations consider upgrading to Windows 11, they need to compare the Windows 11 system requirements to their existing hardware before making the move. Continue Reading
-
CONFIG.SYS
CONFIG.SYS is a text file containing disk operating system (DOS) commands that tell the operating system (OS) how the computer is initially set up. Continue Reading
Windows 11 upgrade issues that desktop admins should know
Windows upgrades have caused numerous issues in the past, and the move to Windows 11 is no exception. Learn what problems IT can expect during a migration to Windows 11. Continue Reading
VBScript
VBScript is an interpreted script language from Microsoft that is a subset of its Visual Basic programming language designed for interpretation by Microsoft's Internet Explorer (IE) web browser.Continue Reading
Guide to Linux patch management
While patching desktops has some universal aspects across systems, there are specific Linux best practices that Linux administrators need to know. Here are eight important ones.Continue Reading
Windows Registry Editor (regedit)
The Windows Registry Editor (regedit) is a graphical tool in the Microsoft Windows operating system (OS) that enables authorized users to view the Windows registry and make changes.Continue Reading
Patch management vs. vulnerability management: Key differences
Although both patch and vulnerability management are intertwined, they differ in critical ways, and it's important to have tools and processes for executing both.Continue Reading
Creating a patch management policy: Step-by-step guide
A comprehensive IT patch management policy is insurance against network hardware and software prone to bugs and vulnerabilities that can disrupt critical business processes.Continue Reading
-
Software patch/fix
A software patch or fix is a quick-repair job for a piece of programming designed to resolve functionality issues, improve security or add new features.Continue Reading
graphic equalizer
A graphic equalizer is a high-fidelity audio control that allows the user to see graphically and control individually a number of different frequency bands in a stereophonic system.Continue Reading
How to enroll and manage Mac devices with Intune MDM
Organizations may turn to basic MDM platforms to help manage Mac devices in a Windows-focused environment. Often, these platforms provide just enough management.Continue Reading
remote desktop
A remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.Continue Reading
remote desktop protocol (RDP)
Remote desktop protocol (RDP) is a secure network communications protocol from Microsoft.Continue Reading
PC as a service (PCaaS)
PC as a service (PCaaS) is a device lifecycle management model in which an organization pays a monthly subscription fee to lease endpoint hardware and management services from a vendor.Continue Reading
Network File System (NFS)
Network File System (NFS) is a networking protocol for distributed file sharing.Continue Reading
IO.SYS
IO.SYS is a hidden executable binary file that processes instructions that tell the operating system (OS) how the computer is set up when it is booted or started.Continue Reading
Understanding the features of Windows 11 Enterprise
IT admins considering a migration to Windows 11 should learn how the features of the Enterprise edition can benefit their organizations.Continue Reading
What Microsoft Defender Antivirus features are on Windows?
While there are plenty of viable enterprise-grade third-party desktop security platforms, Microsoft has built out a strong array of native features that IT admins can utilize.Continue Reading
BitLocker
BitLocker Drive Encryption, or BitLocker, is a Microsoft Windows security and encryption feature.Continue Reading
Key native features for Windows 10 security and maintenance
Desktop administrators should look for Windows 10's native security features and architecture to establish a baseline of desktop security before turning to alternative tools.Continue Reading
3 tools to check Windows 11 update compatibility
Updating to Windows 11 isn't recommended for every PC. Tools such as PC Health Check assess whether a device meets the specifications and requirements to upgrade.Continue Reading
Windows 2000
Windows 2000 is an operating system developed by Microsoft.Continue Reading
Security Accounts Manager
The Security Accounts Manager (SAM) is a database file in the Microsoft Windows operating system that contains usernames and passwords.Continue Reading
Microsoft Cortana
Cortana is Microsoft's digital assistant.Continue Reading
Microsoft Endpoint Manager (MEM)
Microsoft Endpoint Manager (MEM) is a cloud-based solution that is designed to address the challenges associated with deploying, managing and securing devices in the enterprise.Continue Reading
cellular automaton (CA)
A cellular automaton (CA) is a collection of cells arranged in a grid of specified shape, such that each cell changes state as a function of time, according to a defined set of rules driven by the states of neighboring cells.Continue Reading
ActiveX controls
ActiveX controls are component program objects that Microsoft developed to enable applications to perform specific functions, such as displaying a calendar or playing a video.Continue Reading
ISA Server
Microsoft's ISA Server (Internet Security and Acceleration Server) was the successor to Microsoft's Proxy Server 2.0 and was part of Microsoft's .NET support.Continue Reading
system tray
The system tray (or "systray") is a section of the taskbars in the Microsoft Windows operating system user interface that provides easy access icons to the user's most commonly used apps and displays the clock.Continue Reading
strong password
A strong password is one that is designed to be hard for a person or program to guess.Continue Reading
MS-DOS (Microsoft Disk Operating System)
MS-DOS (Microsoft Disk Operating System) was the Microsoft-marketed version of the first widely-installed operating system in personal computers.Continue Reading
Excel
Excel is a spreadsheet program from Microsoft and a component of its Office product group for business applications.Continue Reading
client
A client is a hardware or software device that requests access to a service that is typically made available by a server.Continue Reading
Microsoft Windows Hello
Microsoft Windows Hello is a biometric identity and access control feature that supports fingerprint scanners, iris scanners and facial recognition technology on compatible devices running Windows.Continue Reading
Windows 10 disk management terms and tasks IT should know
Windows 10 disk management is a crucial function that system admins should perform. To manage Windows disks, IT must know the difference between volumes and partitions.Continue Reading
How to perform Windows 10 disk optimization
Normal use of a PC causes the disk drive to fragment over time, resulting in suboptimal performance. Use Windows 10 disk optimization to defragment a drive and increase efficiency.Continue Reading
How to deploy Microsoft Endpoint Manager step by step
Organizations looking to deploy Microsoft Endpoint Manager must make sure to set up this platform correctly, and they should follow these steps for setup in different scenarios.Continue Reading
What's included in Microsoft 365 subscription plans
Microsoft 365 has different licensing plans for all kinds of businesses. Learn about the different subscription plans that Microsoft offers for this cloud-based platform.Continue Reading
A Microsoft 365 email migration checklist
When an organization migrates its email servers and profiles to Microsoft 365, it could use several different processes. Sort through the five options listed below.Continue Reading
Remote print management and security for the hybrid workforce
Remote printing via VPN or cloud takes on critical importance as companies reshape a hybrid workforce to accommodate employees returning to the office and those who WFH.Continue Reading
PCaaS vs. DaaS: learn the difference between these services
While there is a lot of confusion surrounding DaaS -- devices as a service -- and PCaaS and what these services are defined as, but there may be less of a distinction than you think.Continue Reading
How to set up MFA for Office 365 on end-user devices
When it comes to authentication factors, more is always better from a security perspective. Find out how to deploy MFA on end-user devices for Microsoft 365 users.Continue Reading
A complete guide to troubleshooting Windows Hello
Windows Hello has several common issues that administrators may need to troubleshoot. Find out what those issues are here and what to do about them.Continue Reading
Windows 10 (Microsoft Windows 10)
Windows 10 is a Microsoft operating system for personal computers, tablets, embedded devices and internet of things devices.Continue Reading
Set up Windows Remote Desktop on a Mac device
Organizations that need to enable remote workers on Mac devices should consider allowing them to remotely access Windows desktops with the Windows Remote Desktop application.Continue Reading
How to use the Office cloud policy service with Microsoft 365
The Office cloud policy continues Microsoft's trend of converging management utilities within Microsoft Endpoint Manager, and IT can manage all Office apps within this platform.Continue Reading
Top 5 enterprise Linux distributions to consider adopting
While Linux distributions all serve a similar purpose in the enterprise, organizations should still familiarize themselves with the different distributions to find the best fit.Continue Reading
Passwordless authentication options and best practices
Organizations that want to move away from passwords for authentication should learn the best practices for implementing passwordless authentication and which factors fit them best.Continue Reading
hard-drive encryption
Hard-drive encryption is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions.Continue Reading
Understand and manage Windows 10 virtual memory
It can be difficult for IT pros to understand the intricacies of Windows 10 virtual memory, but they should develop a basic knowledge of virtual memory to effectively manage desktops.Continue Reading
How CMT, MDM and EMM merged into UEM software
The differences between CMT, MDM, EMM and UEM can be confusing. Learn how they differ and how vendors offer these capabilities in a single UEM product.Continue Reading
unified endpoint management (UEM)
Unified endpoint management (UEM) is an approach to securing and controlling desktop computers, laptops, smartphones and tablets in a connected, cohesive manner from a single console.Continue Reading
How to successfully implement MDM for BYOD
It's not easy to implement MDM in BYOD environments. IT should communicate with end users to set expectations about what personal information the MDM platform can and cannot track.Continue Reading
How to perform a Windows Subsystem for Linux install
Want to run Linux on a Windows desktop? Take these steps to perform a Windows Subsystem for Linux install, which includes downloading a distribution and providing authentication.Continue Reading
device driver
A device driver is a special kind of software program that controls a specific hardware device attached to a computer.Continue Reading
How can IT enable Windows Defender Device Guard?
IT professionals should learn how they can enable Windows Defender Device Guard to take advantage of the numerous security features it offers for Windows 10 desktops.Continue Reading
Sysprep (System Preparation Tool)
Sysprep is Microsoft's System Preparation tool intended to duplicate, test and deliver new installations for the Windows operating system based on an established installation.Continue Reading
Manage Windows 10 default file type associations with SetUserFTA
Windows 10 default file type associations dictate which applications open for different file types. Find out how IT can manage these associations with the SetUserFTA tool.Continue Reading
Cut through confusion of the digital workspace market
What is a digital workspace, exactly? Find out the definition of this new technology, what it means for the future of end-user computing, and how organizations should prioritize it.Continue Reading
How to fix printer problems after a Windows 10 update
Windows 10 updates, especially an update to Windows 10 version 1809, can sometimes cause printer issues. You can fix these problems with these tips.Continue Reading
How to use and troubleshoot with Device Manager in Windows 10
Device Manager can be extremely useful if you know how to use it properly. Understand how to access and use Device Manager in Windows 10 to manage device drivers and more.Continue Reading
10 Microsoft Ignite 2019 sessions for Windows admins
Windows OS admins attending Microsoft Ignite 2019 will have a variety of relevant sessions from which to choose. Consider these 10 sessions to get new management techniques and tips.Continue Reading
Learning Thunderbolt Technology & Connections
When Belkin sends me a miniature dock more or less out of the blue, I dig in and start learning Thunderbolt technology & connections. Good stuff, but occasionally puzzling.Continue Reading
AI sharpens unified endpoint management tools and apps
Endpoint management is never simple, but AI can help. In this handbook, learn how AI in UEM tools can significantly improve device security and management.Continue Reading
4 steps to check application compatibility with Windows 10
Before a Windows 10 migration, IT admins should make sure all applications are compatible with the new OS. Here are four steps to get started with the process.Continue Reading
How to automate Windows 10 imaging with Packer
Windows 10 imaging isn't easy, especially with Microsoft's continuous release model. Here's how IT can use Packer and MDT to reuse code for Windows images and automate the process.Continue Reading
All roads and flight paths lead to unified endpoint management
Mobile device management, enterprise mobility management and now unified endpoint management -- how can IT keep track? Delve into the details with this handbook.Continue Reading
How to boot to Windows Safe Mode on Windows 10
Having problems with Windows crashes, applications or performance issues? Try booting to Windows Safe Mode on Windows 10 to pinpoint and troubleshoot the problem.Continue Reading
How to use Windows Admin Center to manage Windows 10
Windows Admin Center started as a Windows Server tool, but it can manage Windows 10 desktops too. Learn which features can help with Windows 10 management.Continue Reading
What IT should know about the Microsoft Office app for Windows 10
Microsoft released a new Microsoft Office app during an update to Windows 10. Learn about the changes that this new app brings and how to take advantage of its features.Continue Reading
What to know about Microsoft's new Windows Sandbox mode
Windows Sandbox is Microsoft's integrated Windows 10 sandbox environment to test applications and files in isolation. Learn about the new program and its features.Continue Reading
5 digital workspace components to look for
The ideal digital workspace should handle a variety of tasks. By focusing on these five digital workspace components, IT pros can find the right platform to meet their needs.Continue Reading
How to create Windows 10 toast notifications with PowerShell
IT can send pop-up notifications to a Windows 10 user's taskbar with a PowerShell module called BurntToast. Here's how to get started creating toast notifications.Continue Reading
Unified endpoint management systems harness upsurge in devices
As more endpoints enter the IT landscape, a UEM tool becomes more critical. Learn how UEM can help simplify the complexities of endpoint management.Continue Reading
Digital workspaces upgrade IT delivery, management benefits
Thanks to more simplified management and delivery, digital workspaces can benefit IT pros and users. This guide takes a closer look at the technology and latest features.Continue Reading
Microsoft Windows Explorer
Microsoft Windows Explorer is a graphical file management utility included with Microsoft Windows 95 and later; finally renamed File Explorer with Windows 8 and Windows Server 2012.Continue Reading
What IT needs to know about Windows 10 update troubleshooting
The Windows update process can cause a whole slew of problems for users and IT. Get acquainted with these Windows 10 update troubleshooting tips and make the process a lot easier.Continue Reading
Windows 10 customizations for enterprise desktops
Microsoft offers different services that IT can use to adjust its users' desktop experience. These Windows 10 customizations are a must in an admin's toolbox.Continue Reading
Quiz yourself on top features of Windows 10
With each update, Microsoft introduces many new features that it can be hard to keep track of. Challenge yourself on how well you know these Windows 10 key features and other terms.Continue Reading
How to find Wi-Fi settings in Windows 10
In Windows 10, the Wi-Fi -- and wired -- connectivity settings are in a new spot, but they're as easy to access and configure as ever. You just have to know where to look.Continue Reading
Learn about the device-as-a-service model and its use cases
Device-as-a-service offerings can help IT pros provide their users with support and high-functioning devices, but they must consider the ramifications of choosing such a program.Continue Reading
How can you improve Google Chrome management?
IT professionals should deploy Group Policies to their browsers to improve the user experience. Check out this step-by-step guide on applying Group Policies to Google Chrome.Continue Reading
How does Parallels Mac Management for Microsoft SCCM work?
With Mac Management from Parallels, IT professionals can manage Windows and Apple macOS desktops side by side with System Center Configuration Manager's native features.Continue Reading
Windows Autopilot
Windows Autopilot is a desktop provisioning tool native to Windows 10 that allows IT professionals to automate image deployment of new desktops with preset configurations.Continue Reading
Modern desktop transformation focuses on workspace technology
As workspaces trend toward mobility and device flexibility, IT departments must evolve to fit users' needs by moving away from a desktop-centric approach.Continue Reading
How to set up a Windows Autopilot deployment
IT can set profiles for its devices running Windows 10 and enroll them in Active Directory with the Windows Autopilot tool, but Autopilot does not cover many settings.Continue Reading
The complete guide to Windows 10 security tools
IT professionals must carefully consider which security tools they use to protect their Windows 10 desktops. They may want to stray from the Microsoft path in some instances.Continue Reading
Can you put together an efficient help desk system?
Help desk software should not be an organization's only plan for incident management. An effective help desk should include agreed-upon timelines, a knowledge base and more.Continue Reading
Understanding third-party Windows 10 security tools
Third-party security tools provide value and new utilities for Windows 10 desktop administrators. IT should consider non-Microsoft options for patching, firewalls and more.Continue Reading
Create an email phishing test to minimize attack vectors
With email phishing testing, IT can improve its end-user security. Phishing attacks prey on user ignorance, so IT can use a test to teach users how to avoid this attack vector.Continue Reading
What does a Windows 10 digital certificate do?
IT pros can build trust into Windows 10 by adding certificates that form trusted connections by confirming the identity of any individuals or entities communicating with the OS.Continue Reading
Windows Defender Application Guard
Windows Defender Application Guard is a security tool built into Microsoft Edge that isolates browser sessions from the desktop in a virtual machine (VM) to prevent any malicious activity from reaching the desktop.Continue Reading
desktop computer
A desktop computer is a personal computing device designed to fit on top of a typical office desk.Continue Reading
How to create an internal phishing campaign from scratch
When IT begins an email phishing campaign, it must determine what server the emails will come from, consider phishing tool options and more.Continue Reading
Windows 7
Windows 7 is the Microsoft Windows operating system (OS) released commercially in October 2009 as the successor to Windows Vista.Continue Reading
Understand Windows Insider Program for Business options
With its business-friendly Insider Program, Microsoft allows IT and users to test Windows 10 preview builds for compatibility and performance issues.Continue Reading
8 VMworld 2018 sessions for EUC admins to attend
Put your plan in place now by exploring eight of the top sessions on Windows management, VDI and more at VMworld 2018 in Las Vegas.Continue Reading
configuration service provider (CSP)
A configuration service provider (CSP) is a component of the Windows client operating system that shows IT professionals potential device configuration choices and allows them to apply the settings across multiple Windows OSes.Continue Reading