Improve security by optimizing your reboot strategy

Many  computer changes we make for security reasons are not effective until the  computer is rebooted (restarted). However, reboots require all the software on  the computer to be shut down. This leads to some key challenges:

  • There is a danger that as the software is shut down, any unsaved data or document changes might not be saved
  • In almost all cases the user will have to start their applications again as needed, reopen the documents, and reposition the application windows
  • If the user was in the midst of a task, that task will be delayed while the computer reboots
    1. The task might be particularly time critical
    2. The interruption might be embarrassing to the user
  • The user might have had a bad experience with a previous reboot and thus fear this reboot could be problematic

For these reasons, computer administrators and end-users often hesitate to force reboots. Computers are commonly left vulnerable for weeks as reboots are delayed and thus the security improvements are not effective. In this paper we will:

  • Review core concepts related to reboot strategies
  • Detail reboot options
  • Outline the process to review your strategy and optimize it

Fill in the form to download the whitepaper

Share this post

Share this post on your favorite social media platform.

Find this resource useful?

If so please click here

Related Content

On-demand Webinar

Configuration Manager State of the Nation 2019

Back again by popular demand, we are proud to start the year off with the CM State of the Nation review hosted by MVP Kent Agerlund. Seen as one of the foremost experts of CM, Kent returns for the fourth…

Case Study

WakeUp! How a leading architecture firm boosted its patch success rates by 55%

Sheppard Robson, a leading architecture firm, was struggling to patch all of its end user’s machines in a timely manner and was also experiencing difficulties ensuring all of its Windows Servicing updates were being met. Here's how 1E made the…

Product Sheet

ServiceNow ITSM

81% of IT incidents reoccur across multiple devices within 1 month. 1E’s ServiceNow ITSM lets you supercharge your ServiceNow environment and prevent reoccurring incidents before user productivity is impacted.

Product Sheet

Enterprise Software Asset Management

38% of software spend is wasted on unused or rarely used software. 1E’s Enterprise Software Asset Management lets you manage entitlement for SaaS, Desktop and Server software metrics, and get real-time visibility from all devices.

About 1E

Modern users expect a mobile-like experience, with self-service and instant results. 1E enables IT to deliver comprehensive self-service and respond in real-time by augmenting Microsoft and ServiceNow solutions. Over 1000 organizations trust 1E to meet their user, business, and security needs. Your employees are important; they deserve 1E managed endpoints.