PolicyPak Security & Technical Whitepaper Series

Want to know how to maximize your control over your system using PolicyPak? You’re in the right place.

This whitepaper series will show you how PolicyPak can empower, extend and amplify your control over your system – whatever kind of Administrator you are.

Whether you’re a Group Policy admin, if you use SCCM, MDOP, Citrix XenApp, VMware View or if you’re dealing with App-V, ThinApp or Citrix Steaming Clients, we can boost you up to the next level of control with PolicyPak.

Search For Whitepapers

Security and Principle of Least Privilege

How to be a Better Security Admin with PolicyPak

Most security tools have a limited scope: one security tool only applies to domain-joined machines, another for MDM-enrolled machines, and those remote machines that aren’t a part of anything, well they get left to fend for themselves. That isn’t the way it is with PolicyPak. All of our solutions apply to all Windows devices regardless of their “joined status” using our Group Policy, MDM, or PolicyPak Cloud editions. Your level of security should not be dependent upon how a computer is managed or where it resides. Read “How to be a Better Security Admin with PolicyPak” today to learn about each of the tools available in the PolicyPak security arsenal.

SANS Knows How To Protect Your Network. Shouldn’t You?

Security is a paramount issue for enterprise managers and network administrators today.

Your enterprise network is made up of hundreds or even thousands of stationary, mobile, or VDI-generated user desktops. Ensuring that all of these desktops remain secure throughout the enterprise is a daunting task.

Where do you even start?
In this whitepaper, learn what John Pescatore, Director of Security Trends thinks are the top things you could be (and should be) doing.


Why Microsoft Endpoint Manager Admins Need PolicyPak

Microsoft Endpoint Manager (MEM) unifies Microsoft ConfigMgr and Microsoft Intune in a way that provides greater efficiency, security and visibility for your modern enterprise. The benefits of this new co-managed solution go far beyond branding and licensing simplification. Microsoft will unveil a stream of new tools through MEM including a CSE tool, an add-on to MEMMI, and others. However, If you are accustomed to having access to the more than 10,000 real Group Policy and Group Policy Preference settings available in Windows Server AD environments, then Intune (or any MDM) will end up being a disappointment.

Simplify Java and Browser Management

Browser Management

What Internet Explorer Admins Don’t Know About Application Management

Internet Explorer is second to none in terms of how often it’s used on your network.

And yes, there are several tools which come in the box to help you manage settings and security protocols. But they aren’t enough to achieve full lockdown of these settings.

This paper takes you through the in-the-box tools for managing IE settings, shows you how far they get you, and explains how to achieve full control by adding PolicyPak to your admin toolbox.

Windows 10 Rollouts and Applications

Software Deployment and Patching Methods for Windows 10: Which One Should You Choose?

There are many ways to deliver software and updates to your endpoints, but just because you have a lot of options doesn’t mean it has to be confusing. You might pick one software to do it all, or you might pick several depending on your needs. No software is a “one size fts all” solution for every company, so in this quick overview we will help you navigate the software deployment waters and give you our advice on which methods to use to deploy software and 3rd party patches.

What Most Group Policy Admins Don’t Know About Application Management

Group Policy and Group Policy Preferences are awesome, but they cannot manage all the applications you have.

Using PolicyPak with Group Policy can ensure that settings are delivered to most applications, and locked down and consistently applied and remediated. You can deploy PolicyPak directives using the Group Policy infrastructure you already have (or your own management tool, like SCCM).

What Most IT Admins Don’t Know About VDI

VDI is a powerful way of ensuring you can deliver a normal Windows image to your BYOD users. But it requires careful implementation to ensure that the user experience is optimal, efficient and secure.

The whitepaper shows you some of the key points to watch for in setting and delivering your VDI image to your users, and how adding PolicyPak to your Group Policy toolbox grants you increased control over both the VDI image and the applications within it.

What Office 2010 & Office 2013 Admins Don’t Know About Application Management

Office 2010 and 2013 admins have it hard enough. Users are constantly making changes and working around your security.

Yes, Microsoft ships both ADM and ADMX templates for Office 2010 and Office 2013. But it’s a good idea to understand what they DO and DON’T DO, What you don’t know could hurt you.

See how PolicyPak can fill in the gaps when it comes to managing your Office 2010 and/or Office 2013 on your desktops.

Technology Integrations

Simplify Modern Desktop Management for Windows 10 through Citrix Endpoint Management and PolicyPak

Citrix Endpoint Management provides IT teams with a unified approach for managing all your endpoints used in a modern workspace - corporate owned or personal owned scenario - from a single pane of glass, including those that rely on Windows 10. Together in partnership with our Citrix Ready certified partner PolicyPak, Citrix Endpoint Management can now deploy complex Group Policy settings throughout your Citrix Workspace. Plus, Citrix Endpoint Management gets supercharged beyond the native capabilities of either UEM or Group Policy to deliver custom operating system, application, and user settings that strengthen security and improve user experience.

Citrix WEM and PolicyPak: Competitive or Complementary?

Are you familiar with Citrix Workspace Environment Management (WEM)? Simply defined, WEM provides flexibility and power to optimize user experience, accelerate login time, simplify workspace administration, and reduce hardware utilization.

Sounds great, right? And familiar… From time to time both Group Policy and PolicyPak are compared to WEM. We often field the question from customers, “If I have WEM, do I really need Group Policy and PolicyPak?”

How PolicyPak Helps Customers Accelerate the Transition to G Suite

With more than 3 million enterprise subscribers, Google G Suite has exploded in the past few of years. And in 2017, Network World reported that it is a top choice for businesses in highly regulated industries. As all of these organizations make this transition, it raises the question: how do you effectively manage settings and devices using G Suite in a Microsoft environment, while subsequently securing them from malware and other online threats?

What Most IT Admins Don’t Know About Deep Freeze (and Other Disk Restoration Solutions)

Deep Freeze and similar disk restoration solutions are a really powerful way of ensuring you can restore your system in case of trouble. And they’re great at what they do.

The problem is, they can’t handle everything, and they aren’t enough by themselves to give you a well-managed desktop. For that, you’ll need some additional help, like PolicyPak.

This whitepaper will take you through some of the limitations of disk restoration products such as Deep Freeze, and shows you how adding PolicyPak can ensure you’re properly managing end-user experiences on your network.

VMware’s Missing End-User Computing Management Tool

VMware’s suite of management tools are powerful, popular and extremely useful for busy admins.

But while they’re great at what they do, they can’t do everything, particularly when it comes to controlling the apps and systems they make available to your users.

This whitepaper will take you through the strengths and weaknesses of VMware’s management tools, and show you how PolicyPak is designed to work seamlessly with VMware’s management systems to give you the control you need over your network, user and security settings.