Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

How To

How to Set Up Windows Sandbox

by Russell Smith

If you want to spin up an isolated Windows 10 desktop quickly, without the knowledge required to work with virtual machines (VM) or the cloud, then Windows Sandbox is the answer. How does Windows Sandbox work? Windows Sandbox is a feature in Windows 10 Pro, Enterprise, and Education SKUs, which provides users an easy way… Read More

How to Create an Approval Workflow in Teams

by Michael Reinders

Introduction One of the most important workflows in a business is the approval process. This can range from administration-like approvals like vacation requests, expense reports, and document signoffs. However, there is almost an innumerable amount of approval categories in the business world besides these. Think Finance, Manufacturing, HR, heck, even IT. (Imagine having to get… Read More

How to Fully Patch the PrintNightmare Vulnerability

by Brad Sams

Image Credit: Microsoft If you are an admin and have been scrambling the past week to patch the PrintNightmare vulnerability, you are not alone. The messaging around this zero-day has been confusing with Microsoft saying they have a solution, industry experts saying it’s not effective, and now Microsoft saying “you’re patching it wrong”. Microsoft isn't… Read More

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: