Browse Definitions:

SearchEnterpriseDesktop

SearchEnterpriseDesktop.com is part of the Windows Network of sites from TechTarget, the Web's most comprehensive source of information for IT professionals architecting, deploying, managing and developing for Windows technology in the corporate environment.

View the complete archive of Enterprise Desktop and Software Management news, research and expert advice.

Go to:  SearchEnterpriseDesktop

Recently on  SearchEnterpriseDesktop

CapsLock Indicator Shows Key States

Jonas Kohl's excellent, compact utility CapsLock Indicator shows key states for Caps Lock, Num Lock, and Scroll Lock keys onscreen in the taskbar.

More Highlights
Definitions
  • Windows 10

    Windows 10 is a Microsoft operating system for personal computers, tablets, embedded devices and internet of things devices.

  • Microsoft Windows Defender Device Guard

    Windows Defender Device Guard is a security feature for Windows 10 Enterprise and Windows Server 2016 designed to use application whitelisting and code integrity policies to protect users' devices from malicious code that could compromise the operating system.

  • Windows 10 Isolated User Mode (IUM)

    Windows 10 Isolated User Mode (IUM) is a virtualization-based security feature in Windows 10 that uses secure kernels to keep business data and processes separate from the underlying OS.

Browse Enterprise Desktop Topics

Enterprise application management

The application management section of our site focuses on managing Microsoft Windows applications like Internet Explorer and Microsoft Office on desktop machines. Your users use these applications every day and as a result are subject to the many Windows security flaws that regularly affect both IE and MS Office.

Recent Definitions

  • ActiveX

    ActiveX is a set of object-oriented programming technologies Microsoft developed for Internet Explorer to facilitate rich media playback.

  • Microsoft Office 365 suite

    Microsoft Office 365 suite is a hosted, online version of Microsoft Office software. IT administrators access it from a web-based portal to set up new user accounts, control access to features and see the status of all Office 365 services and tools.

  • Internet Explorer (IE)

    Internet Explorer (IE) is a World Wide Web browser made by Microsoft for use on its Windows operating system.

Highlights

More Enterprise application management Topics

Back to Top

Microsoft Windows desktop operating systems security management

Keeping Windows desktop systems protected and secure is an ongoing battle. Learn about security management issues, including updates and alerts for Microsoft Windows Vista, XP and legacy OSes.

Recent Definitions

  • Microsoft Windows Defender Device Guard

    Windows Defender Device Guard is a security feature for Windows 10 Enterprise and Windows Server 2016 designed to use application whitelisting and code integrity policies to protect users' devices from malicious code that could compromise the operating system.

  • Ivanti

    Ivanti is a software company that provides IT management products and services, particularly around endpoint computing.

  • Microsoft Windows Deployment Image Servicing and Management (DISM)

    Microsoft Windows Deployment Image Servicing and Management is a tool IT administrators can access through the command line or PowerShell to mount and service a Windows desktop image or hard disk before deploying it to users.

Highlights

More Microsoft Windows desktop operating systems security management Topics

Back to Top

Microsoft Windows hardware, including laptop and notebook reviews

Keeping up with hardware trends for your Windows desktop in the enterprise is a must-do. Read our laptop and notebook reviews, and check out articles on Windows hardware, including chips and USB drive issues.

Recent Definitions

  • external drive enclosure (disk enclosure, disk caddy, drive caddy)

    An external drive enclosure is a metal or plastic casing that holds and powers a disk drive.

  • disk analyzer

    A disk analyzer is a piece of software that checks drives for space and usage and explores files and folders visually, simplifying file cleanup and optimization.

  • Surface (Microsoft Surface tablet)

    Surface is a line of tablet computers from Microsoft. Surface tablets will have a 10.6-inch wide display and come with USB support, dual Wi-Fi antennae, a built-in kick stand and a keyboard that doubles as the tablet’s cover. 

Highlights

Back to Top

Windows desktop operating systems

Microsoft's Windows operating system is easily the dominant OS on corporate desktops and laptops. Learn how to boost the performance of Windows machines and enhance Windows OS security by reading the tips, news and expert advice in this section, which covers issues such as application management and compatibility, suites such as Office, and desktop utilities and security. Also, read about Windows desktop management best practices, deploying newer OSes such as Windows Vista and Windows 7, and migrating from legacy operating systems such as Windows XP.

Recent Definitions

  • Windows 10

    Windows 10 is a Microsoft operating system for personal computers, tablets, embedded devices and internet of things devices.

  • Microsoft Windows Defender Device Guard

    Windows Defender Device Guard is a security feature for Windows 10 Enterprise and Windows Server 2016 designed to use application whitelisting and code integrity policies to protect users' devices from malicious code that could compromise the operating system.

  • Windows 10 Isolated User Mode (IUM)

    Windows 10 Isolated User Mode (IUM) is a virtualization-based security feature in Windows 10 that uses secure kernels to keep business data and processes separate from the underlying OS.

Highlights

More Windows desktop operating systems Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

  • principle of least privilege (POLP)

    The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for...

  • identity management (ID management)

    Identity management (ID management) is the organizational process for identifying, authenticating and authorizing individuals or ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close