Applications on tablet and laptop

Deploy / App Basic Training

Application management has never been easier – at least according to us. Our application distribution platform, otherwise known as Specops Deploy / App, leverages existing infrastructure and offers a Group Policy based approach to application management. You’re hooked, and... Read More

7 Common Mistakes SysAdmins Make

Mistakes, we all make them. Even the guys and gals that work to keep the organization running smoothly. The responsibility of protecting the network, combined with the complexity of the work, and pressure from users, brings forth unexpected challenges.... Read More

Add one computer object to many AD groups

I recently visited a Specops Deploy customer that was migrating from Windows 7 to Windows 10.  As a part of the preparations, they went through their Deploy App targets to make sure that the correct application would be rolled... Read More

keeping a golden image up-to-date

Keep your corporate golden image golden

Trying to keep a golden image up-to-date is a challenge many IT administrators struggle with. But it’s a necessity since updating the image with patches and settings means you shorten the time your users need to wait. There’s a... Read More

specify the AD attribute to search from the helpdesk

Search for custom AD attributes from the helpdesk

From Specops Password Reset (SPR) 6.4 and onwards, there will be a new registry setting that will allow you to specify the AD attribute to search from the helpdesk. If the registry setting is not set, the default will... Read More

Test Driver Lookup 1

How to find the right drivers in OS deployment

When you are deploying an operating system in Specops Deploy, you start with creating the make, model and OS driver folders tree. Many people want to jump to importing drivers, but it’s important to understand how to find the... Read More

multi-factor authentication in password resets

Turn mobiles into high-trust devices

Passwords have well-known drawbacks for user authentication. They are hard to remember and easy to hack. Organizations are increasingly adopting two-factor or multi-factor authentication to strengthen passwords and safeguard online information. The high-trust device in your pocket It the... Read More