PolicyPak Blog

Build A Zero Trust Model by First Killing Local Admin Rights

Build A Zero Trust Model by Killing Local Admin Rights Words mean something. The words we use change over time, reflecting the transitory nature of our notions and thoughts at large. For thirty years, we embraced the concept of networking as a way to “share” things. Sharing reflects openness and requires a sense of trust…. [Read More]

Don’t Disable Device Guard Just Yet, Here’s Why

Microsoft has placed a lot of emphasis on security with Windows 10. They have introduced so many tools, including Device Guard, Credential Guard, and Windows Security Center, that it can get a bit confusing determining the role for each one. The fact that Microsoft also changes the names of some and deprecates others adds to… [Read More]

Prevent Sodinokibi Ransomware from Infecting Your Enterprise

Preventing Sodinokibi Ransomware and similar strains require a combination of software and knowhow. In this blog, we’ll review both, so you can confidently build out your cybersecurity program. Cost of Ransomware The cost of Ransomware is rising astronomically. According to an article published by Bankinfosecurity.com, the average ransomware payment increased to $36,292 in Q2 of… [Read More]

Windows Virtual Desktop: Simple Step-by-Step Walkthrough

Windows Virtual Desktop (WVD) is not Hyper-V or a rehabilitated version Windows Virtual PC. It doesn’t even install on your local machine like VMware Workstation or VMplayer. Rather, WVD lets you deploy and scale virtualized Windows desktops and apps on Azure Windows Virtual Desktops. If you’re looking for more information about Windows Virtual Desktop, you’ve… [Read More]

Domain-Joined vs Non-Domain-Joined: Best Management Tool

Domain Join or not to Domain Join, a Lurking Question The case to domain-join or non-domain join is the decision network administrators and domain administrators must make for work and school networks. For many years, domain-joined was “the way” that enterprises chose to secure and manage their Windows domains. It was a tried and true… [Read More]

Windows Update for Business (WuFB): A Simplified Guide

Let’s talk about Windows Update for Business. Windows updates are one of the significant responsibilities of a Windows systems administrator. Without updates, you leave your systems vulnerable to attacks, bugs, and merely staying behind. The question is: How do you manage Windows updates in the ever-changing landscape that is the “always on the go” office… [Read More]

5 Top Local Administrator Password Solution (LAPS) Tips

The local Windows administrator account is a coveted target for hackers and malware. There are potentially a lot of bad things that can happen if a hacker can crack the local admin account of one of your servers. Dreadful things usually occur when someone downloads a malicious malware strain using the administrator account as well…. [Read More]

Apply a Java Deployment Rule Set in 4 Easy Steps

What is a Java Deployment Rule Set A Java Deployment Rule Set enables you to continue using legacy business applications despite the changes to Java applet and Java Web Start application security policies. You can also use a Java Deployment Rule Set to control which version of Java Runtime Environment (JRE) JRE is used for… [Read More]

How to Solve Windows 10 Taskbar Issues Across Domains

Windows 10 Taskbar Not Working for Users? Whether its Post-it notes, Pinterest or the Windows 10 Taskbar, users love to pin stuff to have quick access to it. As an administrator, you want to make sure that their most important stuff is pinned to the Taskbar, but how do you manage that? Easy, with PolicyPak… [Read More]

Top 6 Windows Security Settings To Configure Right Now

Do You Have These 6 Windows Security Settings Set Up? Windows security settings can help secure domain controllers, servers, clients, and other resources in your organization. Without Windows security settings, you would be unable to authenticate users, limit access to resources, manage group membership, or audit changelogs. Microsoft designed Windows security settings to combat the… [Read More]