Windows Intune: Software

This part of an ongoing series about Windows Intune. This part will focus on deploying software with Windows Intune. This section is mainly for Windows-based clients, as iOS and Android must go through their respective app stores. Intune Software Publisher The first step is to install the Intune Software Publisher. This will automatically download if Intune does not see it...

Read More»

Windows Intune: Groups and Updates

This is part of an ongoing series about Windows Intune. This week will focus on groups and updates. Groups In Intune, groups work similarly to collections in SCCM. You can group devices and users for various tasks, such as organization or deployment of software. Just like with collections in SCCM, membership can be based on criteria (similar to queries) or...

Read More»

Windows Intune: Policy

This is part of a continuing series about Windows Intune. This section will focus on creating policies for the different types of clients. If you are familiar with setting client policies in SCCM, this will be very similar. Adding Policies To add a policy, click “Add Policy” under Tasks in the Policy node of the web interface. There will be...

Read More»

Windows Intune: Getting set up and Enrolling Devices

This is the second part of a series on Windows Intune. Windows Intune is Microsoft’s mobile device management solution. Setting up Intune – Users Setting up the trial of Intune is pretty simple. Go to the Intune homepage and set up a trial. No credit card information is needed, and you can use your trial for 30 days and manage...

Read More»

Managing Mac’s with Parallels: Software and OSD

This is the second part of a series about the Parallels SCCM plug-in for managing Mac’s with SCCM. This first part was an introduction and covered agent installation, as well as configuration profiles. This part will cover software deployment and OSD. Detailed information, white papers, and contact information for Parallels can be found here. Software Deployment Currently, Parallels only supports...

Read More»

Managing Mac’s using Parallels: Introduction

Parallels is known for running Windows in a virtual environment on your Mac. It is the premiere software program for doing this. They also have another product – an SCCM plugin that allows for Mac management with SCCM. Detailed information, white papers, and contact information can be found here. Advantages The primary advantage of using the Parallels plugin over native...

Read More»

Windows Azure: Creating VM’s and SQL Databases

This is part of an ongoing series about Windows Azure. See this blog post for an introduction to Azure. This part in the series will focus on creating and managing virtual machines and SQL databases. Pricing for everything covered in this post can be found on the Windows Azure website. Virtual Machines To create a virtual machine, click the “New”...

Read More»

Windows Azure: Virtual Networking

This post is part of a continuing series on Windows Azure. For an introduction, please see last week’s article. This article will focus on virtual networking in Azure. This is the first step in creating your virtual cloud environment. By using Azure virtual networks, you can also connect your virtual machines and resources in Azure to your on premise network....

Read More»

Microsoft Azure: Introduction

This will be the first part in an ongoing series about Microsoft Azure. Azure is Microsoft’s offering in the cloud computing/server space. Azure allows organizations from a small businesses to Fortune 500 companies have a cloud presence and take advantage of having their services in a data center that is guaranteed to have 99.9% uptime. You began using Azure with...

Read More»

EMET: Enhanced Mitigation Experience Toolkit

EMET is a product from Microsoft that further restricts access to system-level files, folders, and processes. It is like a step above User Access Control. It can be used to restrict access and keep a computer safe. Users primarily use it to mitigate risks associated with browser plugins that are known vectors for infecting computers. When set up properly, this...

Read More»