Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
How to create a local admin account with Microsoft Intune
Local admin accounts can cause problems for Windows administrators due to their lack of oversight and privileged account status. Learn how IT can manage these accounts with Intune. Continue Reading
How to add and enroll devices to Microsoft Intune
The Intune enrollment process can follow several paths, but one of the most common and efficient approaches involves Windows Autopilot. IT can set this up within Intune. Continue Reading
How does Microsoft 365 Copilot pricing and licensing work?
Getting access to Copilot for Microsoft 365 may be a simple process or almost completely unfeasible at this time, depending on the organization that wants to deploy it. Continue Reading
-
How IT can use the gpresult command to check GPOs
When Windows issues arise, desktop administrators can use the gpresult utility to see what Group Policy settings are in place and which ones should be applied. Continue Reading
How to deploy and force updates with gpupdate
Group Policy can be a helpful tool during the troubleshooting process. Further, refreshing a system's Group Policy settings with gpupdate can solve plenty of issues. Continue Reading
-
Definitions to Get Started
- Windows Imaging Format (WIM)
- Task Manager
- Windows Management Instrumentation Command-line (WMIC) utility
- virtualization-based security (VBS)
- Windows key (winkey)
- Microsoft Windows Credential Guard
- Microsoft Windows Deployment Image Servicing and Management (DISM)
- kiosk mode (Windows assigned access)
What to do when Group Policy shows an access denied message
IT administrators might encounter an error message that states 'access denied' when working with Group Policy. There are a few different steps to fix a problem like this.Continue Reading
Comparing Copilot for Microsoft 365 vs. GitHub Copilot
There are significant differences between the various copilots that Microsoft has brought to market. Find out details about two of the most prolific copilots.Continue Reading
How to install and set up Copilot for Microsoft 365
Copilot for Microsoft 365 offers AI-powered functionality to users, but there's more to consider before installing it. Data governance and licensing determine the setup process.Continue Reading
Windows Imaging Format (WIM)
Windows Imaging Format (WIM) is used for the creation and distribution of disk image files.Continue Reading
How to back up, repair and restore the Windows 11 Registry
The simplest way to fix a broken Windows 11 registry is to restore a backup, but that isn't always possible. Find out different methods to fix a broken registry.Continue Reading
-
How do you back up the Windows 11 registry before editing it?
Without a Windows 11 registry backup, IT risks breaking the OS by making edits. Find out how easy it is to back up the Windows 11 registry.Continue Reading
Task Manager
Task Manager, which was previously known as Microsoft Windows Task Manager, is a component of the Windows operating system (OS) that helps administrators and end users monitor, manage and troubleshoot tasks.Continue Reading
Windows Management Instrumentation Command-line (WMIC) utility
The Windows Management Instrumentation Command-line (WMIC) utility is a command-line interface for working with Windows Management Instrumentation (WMI), a framework for managing data and operations on a Windows computer.Continue Reading
virtualization-based security (VBS)
Virtualization-based security (VBS) is a technology that abstracts computer processes from the underlying operating system (OS) and, in some cases, hardware.Continue Reading
Windows key (winkey)
The Windows key (winkey) is a button on a Windows computer keyboard.Continue Reading
Microsoft Windows Credential Guard
Microsoft Credential Guard is a security feature in Microsoft Windows operating system (OS) that isolates user credentials, such as login information, from the rest of the operating system.Continue Reading
How to access and read Intune management extension logs
The Intune management extension provides new capabilities for Windows admins, including the ability to track and analyze logs related to the management add-on.Continue Reading
Microsoft Windows Deployment Image Servicing and Management (DISM)
Microsoft Windows Deployment Image Servicing and Management (DISM) is a command-line tool that allows IT administrators to service Windows desktop images and virtual hard disks prior to deployment to users.Continue Reading
kiosk mode (Windows assigned access)
Kiosk mode is a feature in Windows operating system (OS) that allows a device to run only specified applications and settings.Continue Reading
How to restart the Intune Management Extension agent service
When IT has issues with Intune deploying commands to endpoints, IT teams should consider restarting the Intune Management Extension to address lingering issues.Continue Reading
BIOS password
A BIOS password is authentication information that's sometimes required to log into a computer's basic input/output system (BIOS) settings before a computer boots up.Continue Reading
Windows as a service
Windows as a service is the approach Microsoft introduced with Windows 10 to deploy, update and service the operating system.Continue Reading
Microsoft Windows System Image Manager (SIM)
Microsoft Windows System Image Manager (SIM) is a tool in the Windows Assessment and Deployment Kit that IT professionals can use to create and manage unattended setup answer files for Windows before installing the operating system.Continue Reading
Windows reboot loop
A reboot loop (or boot loop) occurs when a Windows device unexpectedly restarts at some point during its startup process.Continue Reading
Apache OpenOffice
Apache OpenOffice is an open source office productivity suite used to create and edit documents (Writer), presentations (Impress), spreadsheets (Calc), graphics (Draw), mathematical formulas (Math) and databases (Base).Continue Reading
context menu (right-click menu)
A context menu is a pop-up menu that provides shortcuts for actions the software developer anticipates the user might want to take.Continue Reading
Internet Explorer (IE)
Internet Explorer (IE) is a web browser that formerly came bundled with the Microsoft Windows operating system.Continue Reading
host intrusion prevention system (HIPS)
A host intrusion prevention system (HIPS) is an approach to security that relies on third-party software tools to identify and prevent malicious activities.Continue Reading
Microsoft Windows File Explorer
Microsoft Windows File Explorer is a graphical file management utility for the Windows operating system (OS).Continue Reading
Deploying Intune's Microsoft configuration manager console
Organizations looking to deploy Microsoft Configuration Manager console must make sure to set up this platform correctly and should follow these steps.Continue Reading
HyperTerminal
HyperTerminal is a communications and terminal emulation program that came with the Windows 98 and Windows XP operating systems.Continue Reading
desktop
A desktop is a computer display area that represents the kinds of objects found on top of a physical desk, including documents, phone books, telephones, reference sources, writing and drawing tools, and project folders.Continue Reading
treemap
A treemap is a visual method for displaying hierarchical data that uses nested rectangles to represent the branches of a tree diagram.Continue Reading
Microsoft Windows 10 Shared PC Mode
Microsoft Windows 10 Shared PC Mode is an operating system feature that allows IT administrators to configure computers for multiple user access.Continue Reading
Microsoft Windows Defender Device Guard
Windows Defender Device Guard is a security feature for Windows 10 and Windows Server designed to use application whitelisting and code integrity policies to protect users' devices from malicious code that could compromise the operating system.Continue Reading
How to set up MFA for an organization's Microsoft 365
To deploy MFA to an entire Microsoft environment, specifically to Microsoft 365, IT administrators will need to set up authentication via Azure AD.Continue Reading
Will Windows 11 become a subscription-only service?
There are several ways to handle Windows 11 licensing, only some of which are truly subscription-based. Find out what the landscape is for Windows licensing moving forward.Continue Reading
ActiveX
ActiveX is a set of object-oriented programming technologies and tools that Microsoft developed for Internet Explorer to facilitate rich media playback.Continue Reading
Microsoft Windows Assessment and Deployment Kit (Windows ADK)
The Microsoft Windows Assessment and Deployment Kit is a set of tools IT professionals can combine to prepare, assess and launch image-based Windows deployments.Continue Reading
end-user experience monitoring (EUEM)
End-user experience monitoring (EUEM) is the process of monitoring the performance of IT resources from the perspective of an end user.Continue Reading
What is unified endpoint management (UEM)? A complete guide
Unified endpoint management (UEM) is an approach to securing and controlling desktop computers, laptops, smartphones and tablets in a connected, cohesive manner from a single console.Continue Reading
Process Explorer
Process Explorer is a free Windows task manager and system monitoring tool that details which programs in a user's system have a specific file or directory open.Continue Reading
7 key benefits of mobile device management for businesses
Mobile device management tools offer several benefits, like improved productivity and enhanced security, to organizations that use mobile devices for business tasks.Continue Reading
Windows Autopilot
Windows Autopilot is a desktop provisioning tool native to Windows 10 that allows IT professionals to automate image deployment of new desktops with preset configurations.Continue Reading
Microsoft Assessment and Planning (MAP) Toolkit
Microsoft Assessment and Planning (MAP) Toolkit is a free utility IT can use to determine whether its infrastructure is prepared for a migration to a new operating system, server version or cloud-based deployment.Continue Reading
configuration service provider (CSP)
A configuration service provider (CSP) is a component of Windows client operating systems that shows IT professionals device configuration choices and allows them to apply the settings across multiple Windows OSes.Continue Reading
How to enable Internet Explorer mode on Microsoft Edge
Internet Explorer mode lets users view legacy IE websites not supported by other browsers, which can increase productivity and improve security for IT administrators.Continue Reading
How to successfully implement MDM for BYOD
Implementing MDM in BYOD environments isn't easy. IT should communicate with end users to set expectations about what personal information the MDM platform can and cannot track.Continue Reading
Windows 7
Windows 7 is the Microsoft Windows operating system (OS) released commercially in October 2009 as the successor to Windows Vista.Continue Reading
Sysprep (System Preparation Tool)
Sysprep is Microsoft's System Preparation tool intended to duplicate, test and deliver new installations for the Windows operating system based on an established installation.Continue Reading
device driver
A device driver is a special kind of software program that controls a specific hardware device attached to a computer.Continue Reading
desktop computer
A desktop computer is a personal computing device designed to fit on top of a typical office desk.Continue Reading
digital workspace
A digital workspace is an integrated technology framework that centralizes the management of an enterprise's applications, data and endpoints, allowing employees to collaborate and work remotely.Continue Reading
hard-drive encryption
Hard-drive encryption is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions.Continue Reading
Windows 10 (Microsoft Windows 10)
Windows 10 is a Microsoft operating system for personal computers, tablets, embedded devices and internet of things devices.Continue Reading
How to monitor Windows files and which tools to use
Monitoring files on Windows systems is critical to detect suspicious activities, but there are so many files and folders to keep track of. This is where automation tools come in.Continue Reading
How will Microsoft Loop affect the Microsoft 365 service
While Microsoft Loop is not yet generally available, Microsoft has released details about how Loop can connect users and projects across the Microsoft 365 service.Continue Reading
7 steps to fix a black screen in Windows 11
A black screen can be a symptom of several issues with a Windows 11 desktop. Knowing where to look for the source of the problem can simplify the troubleshooting process.Continue Reading
How Windows 11 Safe Mode works and when to use it
Windows 11 desktops can run into problems that don't have a clear cause. Safe Mode runs a pared-down version of the OS, making it easier to identify and solve system issues.Continue Reading
An introduction to Edge Chromium vs. Edge
The shift to Chromium has improved several aspects of Microsoft's Edge browser -- from privacy settings to reliability.Continue Reading
The role of Windows log monitoring in the enterprise
Whether organizations automate their log monitoring within Windows desktops or inspect them manually, logs can offer IT administrators valuable insight.Continue Reading
message passing interface (MPI)
The message passing interface (MPI) is a standardized means of exchanging messages between multiple computers running a parallel program across distributed memory.Continue Reading
How to choose a PCaaS vendor
The PC-as-a-service and device-as-a-service market is still developing and maturing, so organizations should learn who the major vendors are and how these services work.Continue Reading
The Windows 11 system requirements and what they indicate
When organizations consider upgrading to Windows 11, they need to compare the Windows 11 system requirements to their existing hardware before making the move.Continue Reading
CONFIG.SYS
CONFIG.SYS is a text file containing disk operating system (DOS) commands that tell the operating system (OS) how the computer is initially set up.Continue Reading
Windows 11 upgrade issues that desktop admins should know
Windows upgrades have caused numerous issues in the past, and the move to Windows 11 is no exception. Learn what problems IT can expect during a migration to Windows 11.Continue Reading
VBScript
VBScript is an interpreted script language from Microsoft that is a subset of its Visual Basic programming language designed for interpretation by Microsoft's Internet Explorer (IE) web browser.Continue Reading
Guide to Linux patch management
While patching desktops has some universal aspects across systems, there are specific Linux best practices that Linux administrators need to know. Here are eight important ones.Continue Reading
Windows Registry Editor (regedit)
The Windows Registry Editor (regedit) is a graphical tool in the Microsoft Windows operating system (OS) that enables authorized users to view the Windows registry and make changes.Continue Reading
Patch management vs. vulnerability management: Key differences
Although both patch and vulnerability management are intertwined, they differ in critical ways, and it's important to have tools and processes for executing both.Continue Reading
Creating a patch management policy: Step-by-step guide
A comprehensive IT patch management policy is insurance against network hardware and software prone to bugs and vulnerabilities that can disrupt critical business processes.Continue Reading
Software patch/fix
A software patch or fix is a quick-repair job for a piece of programming designed to resolve functionality issues, improve security or add new features.Continue Reading
graphic equalizer
A graphic equalizer is a high-fidelity audio control that allows the user to see graphically and control individually a number of different frequency bands in a stereophonic system.Continue Reading
How to enroll and manage Mac devices with Intune MDM
Organizations may turn to basic MDM platforms to help manage Mac devices in a Windows-focused environment. Often, these platforms provide just enough management.Continue Reading
remote desktop
A remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.Continue Reading
remote desktop protocol (RDP)
Remote desktop protocol (RDP) is a secure network communications protocol from Microsoft.Continue Reading
PC as a service (PCaaS)
PC as a service (PCaaS) is a device lifecycle management model in which an organization pays a monthly subscription fee to lease endpoint hardware and management services from a vendor.Continue Reading
Network File System (NFS)
Network File System (NFS) is a networking protocol for distributed file sharing.Continue Reading
IO.SYS
IO.SYS is a hidden executable binary file that processes instructions that tell the operating system (OS) how the computer is set up when it is booted or started.Continue Reading
Understanding the features of Windows 11 Enterprise
IT admins considering a migration to Windows 11 should learn how the features of the Enterprise edition can benefit their organizations.Continue Reading
What Microsoft Defender Antivirus features are on Windows?
While there are plenty of viable enterprise-grade third-party desktop security platforms, Microsoft has built out a strong array of native features that IT admins can utilize.Continue Reading
BitLocker
BitLocker Drive Encryption, or BitLocker, is a Microsoft Windows security and encryption feature.Continue Reading
Key native features for Windows 10 security and maintenance
Desktop administrators should look for Windows 10's native security features and architecture to establish a baseline of desktop security before turning to alternative tools.Continue Reading
3 tools to check Windows 11 update compatibility
Updating to Windows 11 isn't recommended for every PC. Tools such as PC Health Check assess whether a device meets the specifications and requirements to upgrade.Continue Reading
Windows 2000
Windows 2000 is an operating system developed by Microsoft.Continue Reading
Security Accounts Manager
The Security Accounts Manager (SAM) is a database file in the Microsoft Windows operating system that contains usernames and passwords.Continue Reading
Microsoft Cortana
Cortana is Microsoft's digital assistant.Continue Reading
Microsoft Endpoint Manager (MEM)
Microsoft Endpoint Manager (MEM) is a cloud-based solution that is designed to address the challenges associated with deploying, managing and securing devices in the enterprise.Continue Reading
cellular automaton (CA)
A cellular automaton (CA) is a collection of cells arranged in a grid of specified shape, such that each cell changes state as a function of time, according to a defined set of rules driven by the states of neighboring cells.Continue Reading
ActiveX controls
ActiveX controls are component program objects that Microsoft developed to enable applications to perform specific functions, such as displaying a calendar or playing a video.Continue Reading
ISA Server
Microsoft's ISA Server (Internet Security and Acceleration Server) was the successor to Microsoft's Proxy Server 2.0 and was part of Microsoft's .NET support.Continue Reading
system tray
The system tray (or "systray") is a section of the taskbars in the Microsoft Windows operating system user interface that provides easy access icons to the user's most commonly used apps and displays the clock.Continue Reading
strong password
A strong password is one that is designed to be hard for a person or program to guess.Continue Reading
MS-DOS (Microsoft Disk Operating System)
MS-DOS (Microsoft Disk Operating System) was the Microsoft-marketed version of the first widely-installed operating system in personal computers.Continue Reading
Excel
Excel is a spreadsheet program from Microsoft and a component of its Office product group for business applications.Continue Reading
client
A client is a hardware or software device that requests access to a service that is typically made available by a server.Continue Reading
Microsoft Windows Hello
Microsoft Windows Hello is a biometric identity and access control feature that supports fingerprint scanners, iris scanners and facial recognition technology on compatible devices running Windows.Continue Reading
Windows 10 disk management terms and tasks IT should know
Windows 10 disk management is a crucial function that system admins should perform. To manage Windows disks, IT must know the difference between volumes and partitions.Continue Reading
How to perform Windows 10 disk optimization
Normal use of a PC causes the disk drive to fragment over time, resulting in suboptimal performance. Use Windows 10 disk optimization to defragment a drive and increase efficiency.Continue Reading
What's included in Microsoft 365 subscription plans
Microsoft 365 has different licensing plans for all kinds of businesses. Learn about the different subscription plans that Microsoft offers for this cloud-based platform.Continue Reading