Enhance the functionality and potential of your Intune or Azure AD environment.
500 SysAdmins recently shared their experience and insights with us. Download the white paper to gain a deeper understanding of the current state of the SysAdmin field.
Many of you know Recast Software for the powerful dashboards in Right Click Tools Enterprise. However, you may be less aware of a very useful feature embedded within these dashboards. Our AD Cleanup, BitLocker Compliance, LAPS (Local Admin Password Solution) Compliance, and Software Updates dashboards all come with the ability to create a Trend Dashboard. These Trend Dashboards provide a historical look at each of the individual dashboards, which assists IT Managers and security teams by providing clear, trackable status updates.
Recast Software has launched Recast Academy, a learning platform for Enterprise customers to train on our software’s features. Initial courses focus on Right Click Tools Enterprise and enable users to understand the vital features and functionality of our platform.
One of the tasks that often gets pushed to the wayside, but is very important, is managing devices in Active Directory (AD). As the Active Directory accumulates more Organizational Units (OUs), it’s easy to let objects become obsolete as time passes.
The "Local Administrator Password Solution" (LAPS) provides management of local account passwords of domain joined computers. Passwords are stored in Active Directory (AD) and protected by ACL, so only eligible users can read it or request its reset
With Right Click Tools, clearing outdated content from the CCM cache folder is super easy. However, before I show you how to do this, let me tell you about a situation I once faced. Maybe you can relate.
Recast Version 4.9 includes software updates and bug fixes added to our products since the 4.8 version, which went live on October 2021. Ticket submissions by customers enable us to uncover and then prioritize updates and fixes.
In a world where Zero Trust is becoming the industry standard, the last thing you want to do is give out unnecessary permissions. Striking a balance between empowering your employees and reigning in admin access can be challenging. While we often think of these issues in terms of our end users, IT employee accounts should be treated with the same level of scrutiny, providing just enough access to get the job done.