Select Page

OSD Video Tutorial: Part 14 – Pre-staged Media

This session is part fourteen of an ongoing series focusing on Operating System Deployment in Configuration Manager. In it, Steven discusses the pre-staged media option for image deployment. The discussion includes a description of pre-staged media, the scenarios solved by ... continue reading

OSD Video Tutorial: Part 13 – to be Known or to be Unknown – that is the question

This session is part thirteen of an ongoing series focusing on Operating System Deployment in Configuration Manager. Steven discusses the concept of Known and Unknown computer imaging and provides demonstrations and detailed discussion of the advantages and disadvantages of each ... continue reading

OSD Video Tutorial: Part 12 – OSD and the ADK

This session is part twelve of an ongoing series focusing on Operating System Deployment in Configuration Manager. We are taking a pause in our more traditional OSD discussion and looping back to the Windows Automated Deployment Kit (ADK). Topics center ... continue reading
Image of four hands collaborating over a drawing of a lightbulb.

Cybersecurity threats: How to discover, remediate, and mitigate

This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series youll find context, answers, and guidance for deployment and driving adoption within your organization ... continue reading

OSD Video Tutorial: Part 11 – MDT Integration

This session is part eleven of an ongoing series focusing on Operating System Deployment in Configuration Manager. In it, Steven gives an overview of the Microsoft Deployment Toolkit comparing it's use standalone and integrated with Configuration Manager. Demonstrations include the ... continue reading

OSD Video Tutorial: Part 10 – USMT and OSD

This session is part ten of an ongoing series focusing on Operating System Deployment in Configuration Manager. In it, Steven details the integration of User State Migration with Configuration Manager. The discussion includes the components of Configuration Manager 2012 focused ... continue reading
Protecting the modern workplace from a wide range of undesirable software

Protecting the modern workplace from a wide range of undesirable software

Security is a fundamental component of the trusted and productive Windows experience that we deliver to customers through modern platforms like Windows 10 and Windows 10 in S mode. As we build intelligent security technologies that protect the modern workplace, ... continue reading

Updated: Speculation Execution Side-Channel Vulnerabilities Configuration Baseline

We have updated the Speculation Execution Side-Channel Vulnerabilities Configuration Baseline. The updated baseline now includes support for verifying the protections for CVE-2018-3639 (Speculative store bypass) in addition to the previously supported CVE-2017-5715 and CVE-2017-5754. Download the updated baseline This configuration ... continue reading

OSD Video Tutorial: Part 6 – Task Sequence variables a deeper dive

We are starting the intermediate section of the OSD Tutorial video series titled A Deeper Dive. And we kick things off with video number six that I skipped over in the Introductory Sessions. This session is part six of an ... continue reading
Loading...