Quantcast
Channel: Raxco Software Blog» PolicyLock
Browsing all 20 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Remotely Lock and Enforce Your Windows Group Policy Settings

A common complaint we hear from IT administrators is that no matter how well they perform Active Directory group policy management, their end users find a way to mess up the admins’ handiwork. Sure,...

View Article



Image may be NSFW.
Clik here to view.

Deploy and Lock 3rd-Party Application Settings with Group Policy

Group Policy (GP) does a pretty good job of allowing IT administrators and security officers to manage their Windows-centric infrastructure.  This includes tasks such as: configuring the Windows...

View Article

Image may be NSFW.
Clik here to view.

PolicyLock: Keep End User Application Settings Locked Down — Coming This Summer!

Group Policy (GP) Management — words that can bring a range of emotions to overworked IT administrators. On the surface, Group Policy is a huge time saver for admins, controlling what Windows users can...

View Article

Image may be NSFW.
Clik here to view.

Reject The Limitations of Group Policy ADM / ADMX File Settings Management

PolicyLock, Raxco’s new application settings lockdown solution, makes managing and controlling end user application settings a lot easier and more efficient. Not only can PolicyLock lock down ADMX and...

View Article

Image may be NSFW.
Clik here to view.

ACL Lockdown: Keep Gold Image & End User Application MSI Settings Locked

As an administrator, you may think that because you have preconfigured settings into your applications or you’ve done the same for your gold images, your work — and worries about user misbehavior — are...

View Article


Image may be NSFW.
Clik here to view.

Manage Settings with the Group Policy Preferences Extension? Bad Idea —...

Group Policy Preferences are a set of Group Policy settings that were released with Windows Server 2008. The settings allow IT administrators to configure a wide range of settings for the computers in...

View Article

Image may be NSFW.
Clik here to view.

Kill Ineffective Login Scripts and Opt for Real Application Settings Lockdown

You want to change your application settings and ensure that your users can’t modify them, so you ingeniously create some nifty login scripts. Login scripts work great…until: You need to modify them —...

View Article

Image may be NSFW.
Clik here to view.

Ensure IT Security Lockdown with Popular Application Settings Tool Kits

We think most system administrators agree that Group Policy is an extremely useful technology, making life so much easier when addressing all the issues associated with directory services. But as we’ve...

View Article


Image may be NSFW.
Clik here to view.

Green IT Initiative: Your Managed Desktop Solution

When you think of green IT initiatives, you probably tend to think of more popular ones like improving your data center cooling methods and data center floor layouts, consolidating servers through...

View Article


Image may be NSFW.
Clik here to view.

PolicyLock is Here! Lock Down Application Settings Group Policy Can’t

After one of our most successful Beta tests ever, I’m happy to announce that PolicyLock is now generally available. What do I mean by one of our most successful Beta tests ever? Unanimous consensus by...

View Article

Image may be NSFW.
Clik here to view.

Security Tip: How To Disable Java in the Enterprise

If you are in charge of security for your enterprise, or are responsible for the deployment and management of Java in your organization, then you know your business is at risk and exposed to potential...

View Article

Image may be NSFW.
Clik here to view.

PolicyLock and BYOD Security

Much has been written and continues to be written about BYOD (Bring Your Own Device) — the benefits, opportunities, risks, potential pitfalls, security, policy issues and more. Without question, it...

View Article

Image may be NSFW.
Clik here to view.

VDI BYOD Setup and Windows Images — Don’t Forget This

One of the countless ramifications of the BYOD (Bring Your Own Device) rage is an increase in VDI (Virtual Desktop Infrastructure) implementations. When users come to work with their Apple and Android...

View Article


Image may be NSFW.
Clik here to view.

PolicyLock Review: “Usefulness is Without Question” for SysAdmins, “Dead...

As our newest product, PolicyLock has a ways to go to achieve the amount of recognition and industry awards bestowed upon PerfectDisk over the years. But after just a few weeks on the market, it’s on...

View Article

Image may be NSFW.
Clik here to view.

Filling Holes in Endpoint Security

The online threats to an organization’s network security seem to grow each day. And with that comes increasing complexity for security and IT administrators. No matter the size of your organization,...

View Article


Image may be NSFW.
Clik here to view.

Young Rule-Breakers Put Company Security at Risk: How to Control BYOD

PCWorld reported this week that a survey revealed younger employees are far more likely to ignore company policies and put company security at risk. BYOD hasn’t helped. The respondents – 3,200...

View Article

Image may be NSFW.
Clik here to view.

3 Ways to Secure Your BYOD Policy w/Mobile Malware Attacks on the Rise

They’re just getting warmed up. If you thought the security headlines in 2013 were bad, just wait to see what 2014 has in store according to a threat forecast released by cloud-based email and web...

View Article


The Single Cause of System Downtime You Can Actually Prevent

System downtime is expensive whether the cause is a power outage, premature system failure or software corruption. Find out how you can prevent the largest cause of web-based attacks and save hours of...

View Article

Image may be NSFW.
Clik here to view.

Now You Can Lock User Settings for 140+ Applications with PolicyLock

PolicyLock now allows you to manage and lock down over 140 widely-used applications‘ settings so end users can’t modify or work around them, compromising your company’s security. And you can do it all...

View Article

Image may be NSFW.
Clik here to view.

Quickly Disable IE Flash Add-on for 100s-1000s+ End Users (Even on XP)

As reported April 26, 2014, a serious Internet Explorer bug leaves users open to hackers, who have already used the exploit in “limited, targeted attacks” according to Microsoft. FireEye Research Labs...

View Article
Browsing all 20 articles
Browse latest View live




Latest Images