PolicyPak Security & Technical Whitepaper Series
Want to know how to maximize your control over your system using PolicyPak? You’re in the right place.
This whitepaper series will show you how PolicyPak can empower, extend and amplify your control over your system – whatever kind of Administrator you are.
Whether you’re a Group Policy admin, if you use SCCM, MDOP, Citrix XenApp, VMware View or if you’re dealing with App-V, ThinApp or Citrix Steaming Clients, we can boost you up to the next level of control with PolicyPak.
Search For Whitepapers
Security and Principle of Least Privilege
Most security tools have a limited scope: one security tool only applies to domain-joined machines, another for MDM-enrolled machines, and those remote machines that aren’t a part of anything, well they get left to fend for themselves. That isn’t the way it is with PolicyPak. All of our solutions apply to all Windows devices regardless of their “joined status” using our Group Policy, MDM, or PolicyPak Cloud editions. Your level of security should not be dependent upon how a computer is managed or where it resides. Read “How to be a Better Security Admin with PolicyPak” today to learn about each of the tools available in the PolicyPak security arsenal.
PolicyPak protects personal health information (PHI) and therefore plays a crucial role in your HIPAA strategy. The examples in this paper demonstrate how PolicyPak meets and exceeds many of the compliance mandates.
Preventing ransomware is a top cybersecurity priority, but mitigating the risk is easier said than done. To help you protect your Windows 10 desktop environment from ransomware, we’ve compiled a list of 24 crucial steps you should take into account today!
You can’t afford the costs of “doing nothing” about Windows desktop security. This whitepaper summarises research on the costs of Windows desktop security exploits, and show you how PolicyPak’s Least Privilege Manager can help secure your systems and reduce both risk and cost.
This paper explains Microsoft AppLocker vs. PolicyPak Least Privilege Manager and where each has merit and best use cases.
In this white paper, we will tackle this threat and do a deep dive into the top 5 reasons that enterprises give local admin rights to users. We will also show how PolicyPak Least Privilege Manager abates this threat and allows users to fully perform their jobs, while protecting desktop devices.
In this white paper from PolicyPak, learn more about the cryptocurrency-mining malware and the new threats it creates for your business and network.
Security is a paramount issue for enterprise managers and network administrators today.
Your enterprise network is made up of hundreds or even thousands of stationary, mobile, or VDI-generated user desktops. Ensuring that all of these desktops remain secure throughout the enterprise is a daunting task.
Where do you even start?
In this whitepaper, learn what John Pescatore, Director of Security Trends thinks are the top things you could be (and should be) doing.
Microsoft Endpoint Manager (MEM) unifies Microsoft ConfigMgr and Microsoft Intune in a way that provides greater efficiency, security and visibility for your modern enterprise. The benefits of this new co-managed solution go far beyond branding and licensing simplification. Microsoft will unveil a stream of new tools through MEM including a CSE tool, an add-on to MEMMI, and others. However, If you are accustomed to having access to the more than 10,000 real Group Policy and Group Policy Preference settings available in Windows Server AD environments, then Intune (or any MDM) will end up being a disappointment.
Do you need MDM and Group Policy or can you replace GPOs with MDM profiles? This paper has all
In this paper, we show you how Group Policy can help you maximize your MDM and Autopilot investment and give you control over your Windows 10 computers.
Simplify Java and Browser Management
Unexpected Java 11 license costs can creep into your IT budget. Use Deployment Rule Sets to match the right website to the right Java version.
For the first time, Mozilla Firefox is offering a new managed settings component called Policy Engine which will allow system administrators the ability to manage and deliver configuration settings using Microsoft Group Policy.
Internet Explorer is second to none in terms of how often it’s used on your network.
And yes, there are several tools which come in the box to help you manage settings and security protocols. But they aren’t enough to achieve full lockdown of these settings.
This paper takes you through the in-the-box tools for managing IE settings, shows you how far they get you, and explains how to achieve full control by adding PolicyPak to your admin toolbox.
Windows 10 Rollouts and Applications
There’s no “one way” to manage your remote workers, but without the right configuration settings and knowhow, it’s easy to make mistakes. In this white paper we’ll review the top 12 Group Policy and MDM settings you need to ensure your work-from-home employees stay efficient and secure.
Group Policy and Group Policy Preferences are awesome, but they cannot manage all the applications you have.
Using PolicyPak with Group Policy can ensure that settings are delivered to most applications, and locked down and consistently applied and remediated. You can deploy PolicyPak directives using the Group Policy infrastructure you already have (or your own management tool, like SCCM).
While Microsoft has taken steps to make transitioning to Windows 10 a smooth process, some are encountering challenges after the migration.
This paper lays out some of the challenges encountered by your peers and how they mitigated them.
PolicyPak and SCCM don’t try to do the same thing. SCCM is great for deploying software & reporting on compliance. PolicyPak delivers settings to your applications, performs UI lockdown & automatic remediation for a huge variety of settings. You can deploy PolicyPak directives using SCCM and deliver those directives to collections on your network or those over the Internet.)
VDI is a powerful way of ensuring you can deliver a normal Windows image to your BYOD users. But it requires careful implementation to ensure that the user experience is optimal, efficient and secure.
The whitepaper shows you some of the key points to watch for in setting and delivering your VDI image to your users, and how adding PolicyPak to your Group Policy toolbox grants you increased control over both the VDI image and the applications within it.
Office 2010 and 2013 admins have it hard enough. Users are constantly making changes and working around your security.
Yes, Microsoft ships both ADM and ADMX templates for Office 2010 and Office 2013. But it’s a good idea to understand what they DO and DON’T DO, What you don’t know could hurt you.
See how PolicyPak can fill in the gaps when it comes to managing your Office 2010 and/or Office 2013 on your desktops.
Citrix Endpoint Management provides IT teams with a unified approach for managing all your endpoints used in a modern workspace - corporate owned or personal owned scenario - from a single pane of glass, including those that rely on Windows 10. Together in partnership with our Citrix Ready certified partner PolicyPak, Citrix Endpoint Management can now deploy complex Group Policy settings throughout your Citrix Workspace. Plus, Citrix Endpoint Management gets supercharged beyond the native capabilities of either UEM or Group Policy to deliver custom operating system, application, and user settings that strengthen security and improve user experience.
Are you familiar with Citrix Workspace Environment Management (WEM)? Simply defined, WEM provides flexibility and power to optimize user experience, accelerate login time, simplify workspace administration, and reduce hardware utilization.
Sounds great, right? And familiar… From time to time both Group Policy and PolicyPak are compared to WEM. We often field the question from customers, “If I have WEM, do I really need Group Policy and PolicyPak?”
With more than 3 million enterprise subscribers, Google G Suite has exploded in the past few of years. And in 2017, Network World reported that it is a top choice for businesses in highly regulated industries. As all of these organizations make this transition, it raises the question: how do you effectively manage settings and devices using G Suite in a Microsoft environment, while subsequently securing them from malware and other online threats?
Deep Freeze and similar disk restoration solutions are a really powerful way of ensuring you can restore your system in case of trouble. And they’re great at what they do.
The problem is, they can’t handle everything, and they aren’t enough by themselves to give you a well-managed desktop. For that, you’ll need some additional help, like PolicyPak.
This whitepaper will take you through some of the limitations of disk restoration products such as Deep Freeze, and shows you how adding PolicyPak can ensure you’re properly managing end-user experiences on your network.
VMware’s suite of management tools are powerful, popular and extremely useful for busy admins.
But while they’re great at what they do, they can’t do everything, particularly when it comes to controlling the apps and systems they make available to your users.
This whitepaper will take you through the strengths and weaknesses of VMware’s management tools, and show you how PolicyPak is designed to work seamlessly with VMware’s management systems to give you the control you need over your network, user and security settings.