We are kicking off the new year with a rocking lineup of Microsoft MVPs. We’ve met the year faced with one of the biggest cyber security threats of all time— how have you been dealing with it? What kinds of advice do the most expert people in the industry have? Join us on Monday to
Recently, I built and published the Dell driver update script that may or may not require a reboot. I instituted the script as a task sequence in MDT and then made the following task sequence a reboot. Thinking about it, the reboot may not be required and therefore that would be a waste of time.
For the very first time in its history of putting on (amazing) conference experiences, Experts Live is coming to the US. Started in 2009, Experts Live has lived as a user group in Europe designed to gather MVPs together to share their insights. With their mission to “enable the sharing of knowledge and experience about
We are starting to see existing 1E customers investigate moving their entire ConfigMgr hierarchy up into the Cloud or Infrastructure as a Service (IaaS), regardless if that is Azure or Amazon Web Services (“AWS”). I guess from a senior management perspective this move would help them decrease the number of on-premise servers and continue the
Nomad 6.3 introduces a new mechanism to speed up downloads on high-bandwidth network links, whilst retaining the trusted safe and secure measures on low-bandwidth high-latency connections. Nomad has always put a priority on moving content as fast as possible without ever impacting other WAN traffic. Nomad’s intelligent bandwidth throttling technology, ReverseQoS, is still the best
It’s been over two decades since the inception of the industry’s beloved Configuration Manager (ConfigMgr) —25 years, in fact— and just like Microsoft, we wanted to celebrate the anniversary of the era-defining tool. 1E, who is famous for building solutions that help enhance ConfigMgr, joined the party with the following film which features some of
It likely won’t come as a surprise to hear that 1E, a world-leading organization at enhancing SCCM, has worked with many (if not most) of the world’s top SCCM experts. It’s probably no more of a surprise to hear that many (if not most) of these same experts write and run blogs that help enlighten and sometimes entertain the CM community. We wanted to select
As you probably know, the requirement for Setting Up Nomad synchronization in a distributed environment using Constrained Kerberos Delegation and is very difficult to implement and even more difficult to actually get working. I thought it was already difficult enough until I recently came to learn (the hard way) that when using Constrained Kerberos Delegation,
The question of how to manage systems in a multi-forest Active Directory (AD) infrastructure using System Center Configuration Manager (ConfigMgr) comes up quite often in online forums and at customers; this post will summarize and detail the answers I’ve given (over and over again). The Really Short Answer It doesn’t matter, and ConfigMgr doesn’t care.
We’ve seen many recent news stories about data theft, destruction, and security breaches in some of the world’s most high profile private companies and public sector bodies. Almost certainly all of these organizations have invested significantly in Security Tools to stop unauthorized ingress into their networks and information systems. So why has this investment been