Following a Specops Password Policy installation (and in some cases an upgrade), you will need to import your license. The process is pretty seamless, but there are some errors you may encounter. In this blog post, we’ll walk through... Read More
Blog
Free tool identifies AD password security weaknesses
Specops Password Auditor allows organizations to take stock of current Active Directory password policies and other security-related vulnerabilities. Scans Active Directory Identifies stale admin and user accounts Checks password policy strength and compliance Easy to export reports Free download... Read More
A smart alternative to SCCM
Are you looking for a smart and simple alternative to System Center Configuration Manager (SCCM)? Specops Deploy automates the installation of operating systems, software, and applications in your Microsoft Active Directory environment. Specops Deploy extends the functionality of Group... Read More
PXE-e18: Server response timeout
I was imaging some recently purchased machines with a Specops Deploy client, but no matter which machine we worked on, we would get a PXE-e18 server response timeout error. No response from Windows Deployment server. All the boot files... Read More
Press release: Specops uReset Now Supports Symantec VIP
Organizations using Symantec VIP can extend this authentication investment to the self-service password reset process • Strengthened MFA with support for Symantec VIP • Alternative to security questions in password reset situations Stockholm, Sweden <November 10, 2016> – Specops... Read More
Deploy / OS Training Series (part 2): Installation
Welcome to part 2 of the Specops Deploy / OS training series. In part 1, we provided an overview of the environmental preparations. In this post, we will provide some supplemental information that can be used alongside the installation guide.... Read More
7 ways to strengthen security questions
Security questions have been around almost as long as the Internet and passwords. They are inherently weak and recently both Gartner and the National Institute for Standards and Technology (NIST) have drawn a hard line in the sand concerning them.... Read More
Secure privileged accounts and keep business secrets where they belong
What did the breaches at Target, JPMorgan Chase, and Anthem have in common? They stemmed from a violation of privileged access. Those with privileged access own the proverbial keys to the kingdom – elevated permissions, and access to sensitive... Read More
Specops does biometrics with the Fingerprint Authenticator
With more and more manufacturers embedding biometric capabilities into their devices, biometric authentication is here to stay. According to the Biometrics Research Group, the number of people using biometrics on mobile devices totaled 650 million towards the end of... Read More
Deploy / OS Training Series (part 1): Environmental Preparations
Specops Deploy has been designed from the ground up to utilize and integrate with your existing Windows environment. This offers customers unique advantages such as fast implementation, and native scalability. Most importantly, your Specops Deploy environment will be as... Read More