If you are an administrator using Specops Deploy, you may have had the following experience: an application can be deployed without any problems when you are trying it on your local machine but when you try to deploy it... Read More
Blog
Reimage the entire lab remotely with zero touch deployment
Computer labs require daily or weekly refreshes. Wouldn’t it be nice to remotely reinstall OS, distribute applications, lockdown lab computers against viruses without physically going to every computer when you have to do something? Sometimes you just don’t have... Read More
Social engineering warning: watch out for that password reset call
Fake password reset calls are the new hack Service desk staff are trained to help users with password related issues gain access to their account. This makes them popular targets for hackers. According to the 2018 Verizon Data Breach... Read More
Remove unwanted APPX applications
Have you ever wanted to deploy a Windows 10 client, but without all the built-in Windows Store applications that it comes with? This is possible with running a simple script in MDT. The following script removes unwanted applications after... Read More
Turn mobiles into high-trust devices
Passwords have well-known drawbacks for user authentication. They are hard to remember and easy to hack. Organizations are increasingly adopting two-factor or multi-factor authentication to strengthen passwords and safeguard online information. The high-trust device in your pocket It the... Read More
Who knows the answers to your security questions?
Security questions, also known as challenge questions or secret questions, are a way to help you recover access to accounts when you forget your passwords. Security questions are meant to protect your accounts, but they can actually provide hackers... Read More
Claims-Based Identity: A Better Model for Authentication
Claims-based identity is a common method used by applications to obtain identity information about a user that another application has authenticated. Claims are pieces of information about a user that have been packaged and signed into security tokens and... Read More
Why won’t my WinPE image connect to my deployment server anymore?
If your WinPE image will no longer connect to your deployment server, it may be because of the following: A driver has been added to the boot image that isn’t Windows PE compatible, the boot image has become corrupt,... Read More
Press release: Specops Software supports Windows 10 in Specops Password Management
Support for Windows 10 in Specops Password Policy, Specops Password Reset and Specops Password Sync Support for the new Google API in Specops Password Sync Maintenance release delivers continued development Stockholm, Sweden – May 25, 2015. Specops Software announced... Read More
Using claims-based identity to achieve multi-factor authentication
Claims-based identity in real life The claims-based identity model is a secure way to authenticate users for access but understanding how the trust relationship works is key. Instead of jumping into claims, security tokens and Identity Providers let’s talk... Read More