Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
Deploying Intune's Microsoft configuration manager console
Organizations looking to deploy Microsoft Configuration Manager console must make sure to set up this platform correctly and should follow these steps. Continue Reading
HyperTerminal
HyperTerminal is a communications and terminal emulation program that came with the Windows 98 and Windows XP operating systems. Continue Reading
desktop
A desktop is a computer display area that represents the kinds of objects found on top of a physical desk, including documents, phone books, telephones, reference sources, writing and drawing tools, and project folders. Continue Reading
-
treemap
A treemap is a visual method for displaying hierarchical data that uses nested rectangles to represent the branches of a tree diagram. Continue Reading
Microsoft Windows 10 Shared PC Mode
Microsoft Windows 10 Shared PC Mode is an operating system feature that allows IT administrators to configure computers for multiple user access. Continue Reading
Microsoft Windows Defender Device Guard
Windows Defender Device Guard is a security feature for Windows 10 and Windows Server designed to use application whitelisting and code integrity policies to protect users' devices from malicious code that could compromise the operating system.Continue Reading
How to set up MFA for an organization's Microsoft 365
To deploy MFA to an entire Microsoft environment, specifically to Microsoft 365, IT administrators will need to set up authentication via Azure AD.Continue Reading
Will Windows 11 become a subscription-only service?
There are several ways to handle Windows 11 licensing, only some of which are truly subscription-based. Find out what the landscape is for Windows licensing moving forward.Continue Reading
ActiveX
ActiveX is a set of object-oriented programming technologies and tools that Microsoft developed for Internet Explorer to facilitate rich media playback.Continue Reading
Microsoft Windows Assessment and Deployment Kit (Windows ADK)
The Microsoft Windows Assessment and Deployment Kit is a set of tools IT professionals can combine to prepare, assess and launch image-based Windows deployments.Continue Reading
-
end-user experience monitoring (EUEM)
End-user experience monitoring (EUEM) is the process of monitoring the performance of IT resources from the perspective of an end user.Continue Reading
What is unified endpoint management (UEM)? A complete guide
Unified endpoint management (UEM) is an approach to securing and controlling desktop computers, laptops, smartphones and tablets in a connected, cohesive manner from a single console.Continue Reading
Process Explorer
Process Explorer is a free Windows task manager and system monitoring tool that details which programs in a user's system have a specific file or directory open.Continue Reading
7 key benefits of mobile device management for businesses
Mobile device management tools offer several benefits, like improved productivity and enhanced security, to organizations that use mobile devices for business tasks.Continue Reading
Windows Autopilot
Windows Autopilot is a desktop provisioning tool native to Windows 10 that allows IT professionals to automate image deployment of new desktops with preset configurations.Continue Reading
Microsoft Assessment and Planning (MAP) Toolkit
Microsoft Assessment and Planning (MAP) Toolkit is a free utility IT can use to determine whether its infrastructure is prepared for a migration to a new operating system, server version or cloud-based deployment.Continue Reading
configuration service provider (CSP)
A configuration service provider (CSP) is a component of Windows client operating systems that shows IT professionals device configuration choices and allows them to apply the settings across multiple Windows OSes.Continue Reading
How to enable Internet Explorer mode on Microsoft Edge
Internet Explorer mode lets users view legacy IE websites not supported by other browsers, which can increase productivity and improve security for IT administrators.Continue Reading
How to successfully implement MDM for BYOD
Implementing MDM in BYOD environments isn't easy. IT should communicate with end users to set expectations about what personal information the MDM platform can and cannot track.Continue Reading
Windows 7
Windows 7 is the Microsoft Windows operating system (OS) released commercially in October 2009 as the successor to Windows Vista.Continue Reading
Sysprep (System Preparation Tool)
Sysprep is Microsoft's System Preparation tool intended to duplicate, test and deliver new installations for the Windows operating system based on an established installation.Continue Reading
device driver
A device driver is a special kind of software program that controls a specific hardware device attached to a computer.Continue Reading
desktop computer
A desktop computer is a personal computing device designed to fit on top of a typical office desk.Continue Reading
digital workspace
A digital workspace is an integrated technology framework that centralizes the management of an enterprise's applications, data and endpoints, allowing employees to collaborate and work remotely.Continue Reading
hard-drive encryption
Hard-drive encryption is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions.Continue Reading
Windows 10 (Microsoft Windows 10)
Windows 10 is a Microsoft operating system for personal computers, tablets, embedded devices and internet of things devices.Continue Reading
How to monitor Windows files and which tools to use
Monitoring files on Windows systems is critical to detect suspicious activities, but there are so many files and folders to keep track of. This is where automation tools come in.Continue Reading
How will Microsoft Loop affect the Microsoft 365 service
While Microsoft Loop is not yet generally available, Microsoft has released details about how Loop can connect users and projects across the Microsoft 365 service.Continue Reading
7 steps to fix a black screen in Windows 11
A black screen can be a symptom of several issues with a Windows 11 desktop. Knowing where to look for the source of the problem can simplify the troubleshooting process.Continue Reading
How Windows 11 Safe Mode works and when to use it
Windows 11 desktops can run into problems that don't have a clear cause. Safe Mode runs a pared-down version of the OS, making it easier to identify and solve system issues.Continue Reading
An introduction to Edge Chromium vs. Edge
The shift to Chromium has improved several aspects of Microsoft's Edge browser -- from privacy settings to reliability.Continue Reading
The role of Windows log monitoring in the enterprise
Whether organizations automate their log monitoring within Windows desktops or inspect them manually, logs can offer IT administrators valuable insight.Continue Reading
message passing interface (MPI)
The message passing interface (MPI) is a standardized means of exchanging messages between multiple computers running a parallel program across distributed memory.Continue Reading
How to choose a PCaaS vendor
The PC-as-a-service and device-as-a-service market is still developing and maturing, so organizations should learn who the major vendors are and how these services work.Continue Reading
The Windows 11 system requirements and what they indicate
When organizations consider upgrading to Windows 11, they need to compare the Windows 11 system requirements to their existing hardware before making the move.Continue Reading
CONFIG.SYS
CONFIG.SYS is a text file containing disk operating system (DOS) commands that tell the operating system (OS) how the computer is initially set up.Continue Reading
Windows 11 upgrade issues that desktop admins should know
Windows upgrades have caused numerous issues in the past, and the move to Windows 11 is no exception. Learn what problems IT can expect during a migration to Windows 11.Continue Reading
VBScript
VBScript is an interpreted script language from Microsoft that is a subset of its Visual Basic programming language designed for interpretation by Microsoft's Internet Explorer (IE) web browser.Continue Reading
Guide to Linux patch management
While patching desktops has some universal aspects across systems, there are specific Linux best practices that Linux administrators need to know. Here are eight important ones.Continue Reading
Windows Registry Editor (regedit)
The Windows Registry Editor (regedit) is a graphical tool in the Microsoft Windows operating system (OS) that enables authorized users to view the Windows registry and make changes.Continue Reading
Patch management vs. vulnerability management: Key differences
Although both patch and vulnerability management are intertwined, they differ in critical ways, and it's important to have tools and processes for executing both.Continue Reading
Creating a patch management policy: Step-by-step guide
A comprehensive IT patch management policy is insurance against network hardware and software prone to bugs and vulnerabilities that can disrupt critical business processes.Continue Reading
Software patch/fix
A software patch or fix is a quick-repair job for a piece of programming designed to resolve functionality issues, improve security or add new features.Continue Reading
graphic equalizer
A graphic equalizer is a high-fidelity audio control that allows the user to see graphically and control individually a number of different frequency bands in a stereophonic system.Continue Reading
How to enroll and manage Mac devices with Intune MDM
Organizations may turn to basic MDM platforms to help manage Mac devices in a Windows-focused environment. Often, these platforms provide just enough management.Continue Reading
remote desktop
A remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.Continue Reading
remote desktop protocol (RDP)
Remote desktop protocol (RDP) is a secure network communications protocol from Microsoft.Continue Reading
PC as a service (PCaaS)
PC as a service (PCaaS) is a device lifecycle management model in which an organization pays a monthly subscription fee to lease endpoint hardware and management services from a vendor.Continue Reading
Network File System (NFS)
Network File System (NFS) is a networking protocol for distributed file sharing.Continue Reading
IO.SYS
IO.SYS is a hidden executable binary file that processes instructions that tell the operating system (OS) how the computer is set up when it is booted or started.Continue Reading
Understanding the features of Windows 11 Enterprise
IT admins considering a migration to Windows 11 should learn how the features of the Enterprise edition can benefit their organizations.Continue Reading
What Microsoft Defender Antivirus features are on Windows?
While there are plenty of viable enterprise-grade third-party desktop security platforms, Microsoft has built out a strong array of native features that IT admins can utilize.Continue Reading
BitLocker
BitLocker Drive Encryption, or BitLocker, is a Microsoft Windows security and encryption feature.Continue Reading
Key native features for Windows 10 security and maintenance
Desktop administrators should look for Windows 10's native security features and architecture to establish a baseline of desktop security before turning to alternative tools.Continue Reading
3 tools to check Windows 11 update compatibility
Updating to Windows 11 isn't recommended for every PC. Tools such as PC Health Check assess whether a device meets the specifications and requirements to upgrade.Continue Reading
Windows 2000
Windows 2000 is an operating system developed by Microsoft.Continue Reading
Security Accounts Manager
The Security Accounts Manager (SAM) is a database file in the Microsoft Windows operating system that contains usernames and passwords.Continue Reading
Microsoft Cortana
Cortana is Microsoft's digital assistant.Continue Reading
Microsoft Endpoint Manager (MEM)
Microsoft Endpoint Manager (MEM) is a cloud-based solution that is designed to address the challenges associated with deploying, managing and securing devices in the enterprise.Continue Reading
cellular automaton (CA)
A cellular automaton (CA) is a collection of cells arranged in a grid of specified shape, such that each cell changes state as a function of time, according to a defined set of rules driven by the states of neighboring cells.Continue Reading
ActiveX controls
ActiveX controls are component program objects that Microsoft developed to enable applications to perform specific functions, such as displaying a calendar or playing a video.Continue Reading
ISA Server
Microsoft's ISA Server (Internet Security and Acceleration Server) was the successor to Microsoft's Proxy Server 2.0 and was part of Microsoft's .NET support.Continue Reading
system tray
The system tray (or "systray") is a section of the taskbars in the Microsoft Windows operating system user interface that provides easy access icons to the user's most commonly used apps and displays the clock.Continue Reading
strong password
A strong password is one that is designed to be hard for a person or program to guess.Continue Reading
MS-DOS (Microsoft Disk Operating System)
MS-DOS (Microsoft Disk Operating System) was the Microsoft-marketed version of the first widely-installed operating system in personal computers.Continue Reading
Excel
Excel is a spreadsheet program from Microsoft and a component of its Office product group for business applications.Continue Reading
client
A client is a hardware or software device that requests access to a service that is typically made available by a server.Continue Reading
Microsoft Windows Hello
Microsoft Windows Hello is a biometric identity and access control feature that supports fingerprint scanners, iris scanners and facial recognition technology on compatible devices running Windows.Continue Reading
Windows 10 disk management terms and tasks IT should know
Windows 10 disk management is a crucial function that system admins should perform. To manage Windows disks, IT must know the difference between volumes and partitions.Continue Reading
How to perform Windows 10 disk optimization
Normal use of a PC causes the disk drive to fragment over time, resulting in suboptimal performance. Use Windows 10 disk optimization to defragment a drive and increase efficiency.Continue Reading
What's included in Microsoft 365 subscription plans
Microsoft 365 has different licensing plans for all kinds of businesses. Learn about the different subscription plans that Microsoft offers for this cloud-based platform.Continue Reading
A Microsoft 365 email migration checklist
When an organization migrates its email servers and profiles to Microsoft 365, it could use several different processes. Sort through the five options listed below.Continue Reading
Remote print management and security for the hybrid workforce
Remote printing via VPN or cloud takes on critical importance as companies reshape a hybrid workforce to accommodate employees returning to the office and those who WFH.Continue Reading
PCaaS vs. DaaS: learn the difference between these services
While there is a lot of confusion surrounding DaaS -- devices as a service -- and PCaaS and what these services are defined as, but there may be less of a distinction than you think.Continue Reading
How to set up MFA for Office 365 on end-user devices
When it comes to authentication factors, more is always better from a security perspective. Find out how to deploy MFA on end-user devices for Microsoft 365 users.Continue Reading
A complete guide to troubleshooting Windows Hello
Windows Hello has several common issues that administrators may need to troubleshoot. Find out what those issues are here and what to do about them.Continue Reading
Set up Windows Remote Desktop on a Mac device
Organizations that need to enable remote workers on Mac devices should consider allowing them to remotely access Windows desktops with the Windows Remote Desktop application.Continue Reading
How to use the Office cloud policy service with Microsoft 365
The Office cloud policy continues Microsoft's trend of converging management utilities within Microsoft Endpoint Manager, and IT can manage all Office apps within this platform.Continue Reading
Top 5 enterprise Linux distributions to consider adopting
While Linux distributions all serve a similar purpose in the enterprise, organizations should still familiarize themselves with the different distributions to find the best fit.Continue Reading
Passwordless authentication options and best practices
Organizations that want to move away from passwords for authentication should learn the best practices for implementing passwordless authentication and which factors fit them best.Continue Reading
Understand and manage Windows 10 virtual memory
It can be difficult for IT pros to understand the intricacies of Windows 10 virtual memory, but they should develop a basic knowledge of virtual memory to effectively manage desktops.Continue Reading
How CMT, MDM and EMM merged into UEM software
The differences between CMT, MDM, EMM and UEM can be confusing. Learn how they differ and how vendors offer these capabilities in a single UEM product.Continue Reading
How to perform a Windows Subsystem for Linux install
Want to run Linux on a Windows desktop? Take these steps to perform a Windows Subsystem for Linux install, which includes downloading a distribution and providing authentication.Continue Reading
How can IT enable Windows Defender Device Guard?
IT professionals should learn how they can enable Windows Defender Device Guard to take advantage of the numerous security features it offers for Windows 10 desktops.Continue Reading
Manage Windows 10 default file type associations with SetUserFTA
Windows 10 default file type associations dictate which applications open for different file types. Find out how IT can manage these associations with the SetUserFTA tool.Continue Reading
Cut through confusion of the digital workspace market
What is a digital workspace, exactly? Find out the definition of this new technology, what it means for the future of end-user computing, and how organizations should prioritize it.Continue Reading
How to fix printer problems after a Windows 10 update
Windows 10 updates, especially an update to Windows 10 version 1809, can sometimes cause printer issues. You can fix these problems with these tips.Continue Reading
How to use and troubleshoot with Device Manager in Windows 10
Device Manager can be extremely useful if you know how to use it properly. Understand how to access and use Device Manager in Windows 10 to manage device drivers and more.Continue Reading
10 Microsoft Ignite 2019 sessions for Windows admins
Windows OS admins attending Microsoft Ignite 2019 will have a variety of relevant sessions from which to choose. Consider these 10 sessions to get new management techniques and tips.Continue Reading
Learning Thunderbolt Technology & Connections
When Belkin sends me a miniature dock more or less out of the blue, I dig in and start learning Thunderbolt technology & connections. Good stuff, but occasionally puzzling.Continue Reading
AI sharpens unified endpoint management tools and apps
Endpoint management is never simple, but AI can help. In this handbook, learn how AI in UEM tools can significantly improve device security and management.Continue Reading
4 steps to check application compatibility with Windows 10
Before a Windows 10 migration, IT admins should make sure all applications are compatible with the new OS. Here are four steps to get started with the process.Continue Reading
How to automate Windows 10 imaging with Packer
Windows 10 imaging isn't easy, especially with Microsoft's continuous release model. Here's how IT can use Packer and MDT to reuse code for Windows images and automate the process.Continue Reading
All roads and flight paths lead to unified endpoint management
Mobile device management, enterprise mobility management and now unified endpoint management -- how can IT keep track? Delve into the details with this handbook.Continue Reading
How to boot to Windows Safe Mode on Windows 10
Having problems with Windows crashes, applications or performance issues? Try booting to Windows Safe Mode on Windows 10 to pinpoint and troubleshoot the problem.Continue Reading
How to use Windows Admin Center to manage Windows 10
Windows Admin Center started as a Windows Server tool, but it can manage Windows 10 desktops too. Learn which features can help with Windows 10 management.Continue Reading
What IT should know about the Microsoft Office app for Windows 10
Microsoft released a new Microsoft Office app during an update to Windows 10. Learn about the changes that this new app brings and how to take advantage of its features.Continue Reading
What to know about Microsoft's new Windows Sandbox mode
Windows Sandbox is Microsoft's integrated Windows 10 sandbox environment to test applications and files in isolation. Learn about the new program and its features.Continue Reading
5 digital workspace components to look for
The ideal digital workspace should handle a variety of tasks. By focusing on these five digital workspace components, IT pros can find the right platform to meet their needs.Continue Reading
How to create Windows 10 toast notifications with PowerShell
IT can send pop-up notifications to a Windows 10 user's taskbar with a PowerShell module called BurntToast. Here's how to get started creating toast notifications.Continue Reading