IT professionals can no longer swing by someone’s desk and grab their desktop or pick up a laptop to work on an issue. Due to public health concerns and social distancing, remotely triaging and resolving issues is the new normal, and IT workers have to consider how to install monitoring software remotely. The shift towards working-from-home has spiked the demand for endpoint remote management tools among organizations. Most businesses simply have not been prepared to face a sudden mass transition to remote operations and social distancing. However, the benefits of utilizing cloud-based remote monitoring and management tools have been known for as long as remote work has been practiced.
How to Uninstall Programs With Standard Windows Tools
In this article, you’ll learn where is the uninstallation of programs in Windows 10 operating system and 3 simple ways to uninstall programs in Windows 10
How to Shutdown Remote Computers via PowerShell
This guide describes how to run remote Windows shutdown command on multiple computers at once using simple PowerShell script
What is an Endpoint Protection Platform (EPP)
With businesses making use of the cloud technologies, and employees having the ability to access business environments using mobile devices and other device types, today’s network perimeter has shifted to the endpoint. An Endpoint Protection Platform (EPP) provides a holistic approach to cybersecurity that takes into consideration today’s shift to the cloud and end user device-centric productivity. What is an endpoint protection platform? How does it compare with traditional security solutions?
Zerologon Windows Vulnerability: What Is It and How to Tackle It?
On top of dealing with a global pandemic and the challenges that working from home poses for IT administrators, the past few months have seen quite a few alarming vulnerabilities. One of the most critical was announced in August of this year and dubbed the Zerologon vulnerability. What is it and how can organizations ensure the remote workforce is patched and safe from Zerologon?
How to Upgrade Windows 10 Build from the Command Line
How to upgrade Windows to the latest current version and check compatibility with the new Windows 10 build via command line
How to Get CPU Information in Windows PowerShell
How to get CPU information in windows using powershell. Several ways to obtain system information about the processor using PowerShell on a local or remote PC
What Machine Learning Means for Endpoint Security in 2020
Cybersecurity threats are some of the most worrisome that are facing businesses today. The risk of a cybersecurity event that leads to data leaks or data loss is very real and the effects can be catastrophic. Attackers today are making use of often very sophisticated tools and attack techniques. To effectively win today’s cybersecurity war facing your organization, artificial intelligence (AI) and machine learning (ML) in endpoint security is a must. Let’s take a look at how AI and ML are being used in this space as an effective weapon against security compromise.
5 Strategies to Improve Your IT Management and Endpoint Security Tactics
With people across the world encouraged to stay at home to do their part in slowing the spread of COVID-19, many employees are currently working from home. Given the rise of remote workers, addressing security vulnerabilities and organizing software updates have become a top challenge for companies. Organizations need to rapidly incorporate strategies to enhance their IT asset management software.
Cybersecurity Risks for Remote Workforce
Many organizations are shifting their...
Installing and Configuring WSUS on Windows Server
In this article, we will cover the basic issues of installing and configuring a WSUS server based on Windows Server 2012 R2 / Windows Server 2016.
WSUS Offline Update Tool Integration with MDT
We will look at an example of integrating security updates from WSUS Offline Update tool into a Windows 10 installation task over the network using MDT
What is IT Asset Management: Defining ITAM
IT asset management is not yet another buzzword but a real set of practices that can help your organization maximize the use of IT resources and avoid potential risks. Sounds interesting? This post will introduce you to IT asset management (ITAM) and help you navigate your way towards a tangible management strategy.
How to Manage Systems Remotely with Sysinternals PsExec Utility
How to execute commands on remote computers using sysinternals psexec utility. Psexec – how to download and use the program
How to Get a PC Hard Drive Information with Powershell
This article describes how to get information about hard drives and partitions using Windows PowerShell cmdlets of the Storage module
How to Check RAM Type with Powershell on Windows
This article shows the steps you can use to check the characteristics such as capacity or RAM type with help of PowerShell on Windows operating systems
Determine and Adjust Screen Resolution on Windows 10
How to determine the installed and native screen resolution in Windows 10. Learn how to choose and adjust the screen resolution in different ways
How to Check BIOS Version and Update It on Windows Systems
Learn how to check BIOS version on windows operating systems and how to update different types (AMI, Award, Phoenix) of motherboard BIOS
How to Uninstall Software Using PowerShell in Windows 10
Detailed step-by-step instructions that show how to uninstall standard and third-party software completely using Powershell in Windows 10 operating system
Disabling Driver Signature Verification in Windows 10
In this article is considered different methods how to completely disable driver digital signature verification in Windows operating system