PolicyPak Blog

Windows CSP: Simple Tips That’ll Save Your Bacon

Windows CSP: Simple Tips That’ll Save Your Bacon The majority (66%) of companies today have started some transition or co-management to the cloud.  The goal is to digitally transform the enterprises of the companies. While the basic network concepts may be similar, the cloud is a different beast.  It uses different protocols and management tools. … [Read More]

What is Microsoft Endpoint Manager (MEM)?

What is Microsoft Endpoint Manager (MEM)? It is a wonderful thing when new initiatives benefit both the company behind the implementation and the customers it serves. Such is the case with the announcement at Ignite 2019 that ConfigMgr and Intune are being merged together to form a single management conglomerate tool called Microsoft Endpoint Manager… [Read More]

Build A Zero Trust Model by First Killing Local Admin Rights

Build A Zero Trust Model by Killing Local Admin Rights Words mean something. The words we use change over time, reflecting the transitory nature of our notions and thoughts at large. For thirty years, we embraced the concept of networking as a way to “share” things. Sharing reflects openness and requires a sense of trust…. [Read More]

Don’t Disable Device Guard Just Yet, Here’s Why

Microsoft has placed a lot of emphasis on security with Windows 10. They have introduced so many tools, including Device Guard, Credential Guard, and Windows Security Center, that it can get a bit confusing determining the role for each one. The fact that Microsoft also changes the names of some and deprecates others adds to… [Read More]

Prevent Sodinokibi Ransomware from Infecting Your Enterprise

Preventing Sodinokibi Ransomware and similar strains require a combination of software and knowhow. In this blog, we’ll review both, so you can confidently build out your cybersecurity program. Cost of Ransomware The cost of Ransomware is rising astronomically. According to an article published by Bankinfosecurity.com, the average ransomware payment increased to $36,292 in Q2 of… [Read More]

Windows Virtual Desktop: Simple Step-by-Step Walkthrough

Windows Virtual Desktop (WVD) is not Hyper-V or a rehabilitated version Windows Virtual PC. It doesn’t even install on your local machine like VMware Workstation or VMplayer. Rather, WVD lets you deploy and scale virtualized Windows desktops and apps on Azure Windows Virtual Desktops. If you’re looking for more information about Windows Virtual Desktop, you’ve… [Read More]

Domain-Joined vs Non-Domain-Joined: Best Management Tool

Domain Join or not to Domain Join, a Lurking Question The case to domain-join or non-domain join is the decision network administrators and domain administrators must make for work and school networks. For many years, domain-joined was “the way” that enterprises chose to secure and manage their Windows domains. It was a tried and true… [Read More]

Windows Update for Business (WuFB): A Simplified Guide

Let’s talk about Windows Update for Business. Windows updates are one of the significant responsibilities of a Windows systems administrator. Without updates, you leave your systems vulnerable to attacks, bugs, and merely staying behind. The question is: How do you manage Windows updates in the ever-changing landscape that is the “always on the go” office… [Read More]

5 Top Local Administrator Password Solution (LAPS) Tips

The local Windows administrator account is a coveted target for hackers and malware. There are potentially a lot of bad things that can happen if a hacker can crack the local admin account of one of your servers. Dreadful things usually occur when someone downloads a malicious malware strain using the administrator account as well…. [Read More]

Apply a Java Deployment Rule Set in 4 Easy Steps

What is a Java Deployment Rule Set A Java Deployment Rule Set enables you to continue using legacy business applications despite the changes to Java applet and Java Web Start application security policies. You can also use a Java Deployment Rule Set to control which version of Java Runtime Environment (JRE) JRE is used for… [Read More]