The complexities of managing a Microsoft Windows Server infrastructure are critically dependent on the numerous Group Policies, each of which is a collection of settings that IT administrators or users use to centrally enforce security settings and other functional settings to users or computers across the network. The downside of a just single setting error will cause inevitable chain of events involving accesses or permissions, which should not have been authorized in the first place, and ultimately compromise IT security and irreversibly damage the organization’s data and reputation.
Six Steps to Implementing Change Management that Works
Solid change management capability will help you boost your ITSM maturity, break out of the “firefighting mode,” align IT activity with business objectives, and transform IT from a service provider to a business innovator. However, these benefits don’t come easily
ADManager Plus: Creating Users in Bulk by Importing a CSV File
It is extremely common for a company to hire employees in mass. It might be a school with a new school year, a corporation hiring interns for the summer, a business which is hiring contractors for a project, or a result of two companies merging. Regardless of the reason, being able to create new users in Active Directory should be simple and easy
Windows Phone Support Added to Desktop Central’s MDM Menu
Mobile devices are an integral part of today’s enterprises. And, Windows phones are gaining traction in many organizations
Tracking Down Users with no Logon Script Configuration
When users are created in Active Directory, the logon script configuration often fails to get configured.
Desktop Central Makes the Magic Quadrant
Drum roll, please! We’ve been recognized in Gartner’s Magic Quadrant, specifically the 2014 Magic Quadrant for Client Management Tools.
How to Track Down Inactive Users in Active Directory
We can all fall behind on our “simple” tasks in lieu of accomplishing more difficult duties. One such task is staying on top of user accounts in Active Directory that have not been used in a while. These user accounts need to be managed to ensure that security is maintained around the use of these accounts
Auditing with Advanced Audit Policy Configuration
Within the confines of the Windows Server environment lies the group policy settings, which are the security configuration powerhouses controlling every security event. The legacy audit settings and advanced audit settings — subsets of the group policy settings — are the lifelines that help administer many events and their permissions
How Blessing Hospital Replaced FrontRange Heat with ServiceDesk Plus – Customer talk
Unlike the past, these days, customers are better equipped to evaluate products. They base their opinions on how they experienced the product at different points in time and whether the product live up to their expectations.
How to Find Active Directory Accounts with Expiring Passwords
Every organization has one or more user accounts — used for services, applications, development, kiosks, or even standard employees — which need to ensure the password changes or the account will lock.