<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel>
        <copyright>Copyright TechTarget - All rights reserved</copyright>
        <description></description>
        <docs>https://cyber.law.harvard.edu/rss/rss.html</docs>
        <generator>Techtarget Feed Generator</generator>
        <language>en</language>
        <lastBuildDate>Thu, 19 Feb 2026 06:05:46 GMT</lastBuildDate>
        <link>https://www.techtarget.com/searchenterprisedesktop</link>
        <managingEditor>editor@techtarget.com</managingEditor>
        <item>
            <body>&lt;p&gt;BYOD policies are no longer a fringe workforce accommodation. For many organizations, they are a response to cost pressure, hybrid work expectations and employee device preferences. The question for CIOs and CISOs is no longer whether employees will use personal devices for work, but whether the organization will govern that reality strategically.&lt;/p&gt; 
&lt;p&gt;In a zero-trust, SaaS-driven environment, a &lt;a href="https://www.techtarget.com/whatis/definition/BYOD-bring-you"&gt;BYOD&lt;/a&gt; policy affects more than hardware budgets. It shapes identity controls, data segmentation, endpoint visibility and risk exposure. When designed correctly, BYOD can support cost discipline, workforce flexibility and sustainability goals. When poorly governed, it can expand the attack surface and &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-manage-BYOD-security-policies-and-stay-compliant"&gt;complicate compliance efforts&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;The following benefits explain why many organizations formalize BYOD policies -- and where leadership should evaluate the tradeoffs.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="7 benefits of implementing a BYOD policy"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;7 benefits of implementing a BYOD policy&lt;/h2&gt;
 &lt;p&gt;BYOD policies deliver value across cost, workforce flexibility and sustainability -- but only when governance maturity keeps pace with access and data risks.&lt;/p&gt;
 &lt;h3&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lower upfront cost for hardware&lt;/h3&gt;
 &lt;p&gt;The money saved from not purchasing a fleet of endpoints is perhaps the most obvious and easy-to-quantify benefit of a BYOD program. With BYOD in place, the burden of cost is shifted to the end users, but not in a way that drastically affects an end user's bottom line. After all, BYOD users will simply be adding functionality to the devices that they would own anyway.&lt;/p&gt;
 &lt;p&gt;These cost savings are not only upfront but also on the timeline of a refresh cycle. Consider an example organization with an endpoint refresh cycle of three years. The organization will save hundreds of dollars by not purchasing a new device for each user operating a BYOD endpoint.&amp;nbsp;Further, users would likely bring corporate-owned devices in for repairs if damaged, but the user will usually handle a damaged personal device.&lt;/p&gt;
 &lt;p&gt;Some organizations could even consider passing on some of the savings to the end users by offering a BYOD stipend for a portion of the new device's cost if the device is truly critical to the user's day-to-day work.&lt;/p&gt;
 &lt;h4&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Increased employee satisfaction&lt;/h4&gt;
 &lt;p&gt;This benefit is more difficult to quantify precisely, but users often report a better overall working experience if they don't need to carry around two smartphones -- or even laptops -- every day. Of course, each user might have a different preference for a device ownership program, but market research points to employees, in the aggregate, being more satisfied when they work using BYOD.&lt;/p&gt;
 &lt;p&gt;Workforce surveys consistently show that employees prefer using familiar devices, particularly in hybrid and remote roles where mobility and convenience influence overall engagement.&lt;/p&gt;
 &lt;h3&gt;3.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Improve user productivity&lt;/h3&gt;
 &lt;p&gt;Organizations that formalize BYOD often report productivity gains, largely because employees work faster on devices and workflows they already know.&lt;/p&gt;
 &lt;p&gt;Familiarity reduces onboarding friction and shortens the time required for employees to become productive on new roles or projects. In distributed teams, eliminating device constraints can also reduce informal workarounds that introduce security gaps.&lt;/p&gt;
 &lt;p&gt;Productivity gains, however, assume mature identity management, conditional access policies and data segmentation to prevent unmanaged data exposure.&lt;/p&gt;
 &lt;p&gt;If a user is familiar with Apple devices, it might be difficult to adapt to using an Android smartphone or a Windows desktop. The same applies to someone familiar with Windows and &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/Android-OS"&gt;Google Android&lt;/a&gt; -- corporate-owned Apple devices might present a learning curve. Even if a user is used to Android devices, moving from a Samsung-manufactured device to a Google-manufactured device could prove challenging.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    In a zero-trust, SaaS-driven environment, a BYOD policy affects more than hardware budgets. It shapes identity controls, data segmentation, endpoint visibility and risk exposure.
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;h3&gt;4.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A more connected workforce&lt;/h3&gt;
 &lt;p&gt;Users that rely on their personal devices for work tasks are more likely to be able to access work materials at all times than users with a dedicated work device. If users have a dedicated work device, they are more likely to turn it off and put it fully away compared to an endpoint that also functions as a personal device.&lt;/p&gt;
 &lt;p&gt;A BYOD program’s goal is not to trick users into checking their email and absentmindedly returning to work during their time off. However, in the event of timely tasks that need immediate approval or a work-related emergency, it's crucial to reach key employees immediately.&lt;/p&gt;
 &lt;p&gt;In time-sensitive scenarios -- such as incident response, financial approvals or operational disruptions --&amp;nbsp; consistent device access can improve responsiveness without requiring employees to manage multiple endpoints.&lt;/p&gt;
 &lt;p&gt;These benefits are also present with corporate-owned personally enabled (&lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/COPE-corpora"&gt;COPE&lt;/a&gt;) endpoints, but only if users adopt those devices as their primary personal devices, which isn't always possible.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/mobilecomputing-byod_vs_cyod_vs_cope_vs_cobo-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/mobilecomputing-byod_vs_cyod_vs_cope_vs_cobo-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/mobilecomputing-byod_vs_cyod_vs_cope_vs_cobo-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/mobilecomputing-byod_vs_cyod_vs_cope_vs_cobo-f.png 1280w" alt="A chart showing multiple device ownership options for businesses and their differences." height="426" width="560"&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;5.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Easier for employees to keep track of one device&lt;/h3&gt;
 &lt;p&gt;The notion that one device is easier to keep track of than two is almost too obvious, but it's worth exploring why that is key for organizations. One of the dangers of allowing any smartphone -- personal or corporate-owned -- to access an organization's business data and internal services is the risk of that device falling into the wrong hands.&lt;/p&gt;
 &lt;p&gt;From a governance perspective, formalizing BYOD reduces unmanaged device sprawl. Devices enrolled in mobile device management (MDM) platforms, equipped with remote wipe capabilities and governed through conditional access controls, provide more visibility than ad hoc personal device usage.&lt;/p&gt;
 &lt;p&gt;A stolen or lost device can be catastrophic for an organization. Cybercriminals can gain access to internal data, change passwords to key accounts, view private communications and eventually elevate their privilege to access information beyond the user's permissions.&lt;/p&gt;
 &lt;h4&gt;6.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Limit the reasons to use personal devices improperly&lt;/h4&gt;
 &lt;p&gt;In an ideal world, organizations could prevent BYOD use until they deploy an official policy, but unfortunately, that isn't the reality. Whether for convenience or out of desperation in a time-sensitive situation, users will find workarounds to use personal devices if they truly want to.&lt;/p&gt;
 &lt;p&gt;Many organizations still operate with informal or inconsistently enforced BYOD practices. A clearly communicated policy reduces shadow IT behavior and establishes guardrails for SaaS access, cloud storage usage and AI-enabled tools that may process sensitive corporate data.&lt;/p&gt;
 &lt;p&gt;A well-communicated BYOD policy can mitigate both issues by providing a roadmap for securely handling work materials on a personal device.&lt;/p&gt;
 &lt;p&gt;Formal governance helps prevent data from flowing between unmanaged personal apps and enterprise environments.&lt;/p&gt;
 &lt;h4&gt;7.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Improve sustainability by limiting hardware-related emissions&lt;/h4&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchcio/feature/3-tips-CIOs-can-use-for-more-sustainable-device-management"&gt;Sustainability considerations&lt;/a&gt; increasingly influence IT procurement decisions. Because most device-related carbon emissions occur during manufacturing and distribution, reducing enterprise-issued hardware can meaningfully affect Scope 3 supply chain reporting.&lt;/p&gt;
 &lt;p&gt;When calculating the sustainability impact of endpoint policies, practices that reduce device purchases -- or extend device lifecycles -- improve sustainability outcomes.&lt;/p&gt;
 &lt;p&gt;Issuing smartphones to users with a similar endpoint for their personal lives is a practice that significantly increases an organization's overall carbon emissions. As organizations look for ways to quickly reduce their emissions without overhauling their entire day-to-day operations, implementing BYOD programs can provide that value if the user base is on board.&lt;/p&gt;
&lt;/section&gt;                                  
&lt;section class="section main-article-chapter" data-menu-title="Potential drawbacks of implementing a BYOD policy"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Potential drawbacks of implementing a BYOD policy&lt;/h2&gt;
 &lt;p&gt;There are several reasons that organizations might not want to deploy a BYOD policy despite all the benefits that these programs offer. Managing these devices is one of the most common challenges associated with a BYOD policy.&lt;/p&gt;
 &lt;p&gt;Organizations that adopt BYOD successfully typically pair it with zero-trust architecture, identity-based access enforcement, endpoint detection and response (EDR) tooling and containerization features that separate corporate and personal data.&lt;/p&gt;
 &lt;p&gt;With a corporate-owned device, the organization gets to maintain full control of the device's settings and preset the device to block certain apps, functions or actions. However, a personally owned device presents more management challenges. Organizations can try to enact a comprehensive BYOD policy that gives them control over the device, but users might balk at this as an invasion of their privacy.&lt;/p&gt;
 &lt;p&gt;Smartphone manufacturers have been adding BYOD-friendly features that separate a device's work and personal sides. Apple's User Enrollment feature allows organizations to control the aspects of an Apple device &lt;a href="https://www.techtarget.com/searchmobilecomputing/tip/How-to-enable-User-Enrollment-for-iOS-in-Microsoft-Intune"&gt;that are within a managed Apple ID&lt;/a&gt; via mobile device management (&lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/mobhttps:/www.techtarget.com/searchmobilecomputing/definition/mobile-device-managementile-device-management"&gt;MDM&lt;/a&gt;) while ignoring anything on the device that is associated with a personal Apple ID.&lt;/p&gt;
 &lt;p&gt;Google &lt;a href="https://www.techtarget.com/searchmobilecomputing/tip/How-to-create-a-work-profile-on-Android-devices"&gt;offers Android work profiles&lt;/a&gt; to keep Android devices under the proper management while respecting user privacy. The organization gets to choose the apps and services to deploy on the work profile, and once the device is registered, the user can switch back and forth between the profiles as needed.&lt;/p&gt;
 &lt;p&gt;Even with these controls, data leakage risks remain if identity governance, logging and monitoring practices are immature.&lt;/p&gt;
 &lt;p&gt;There are also concerns about user preference and corporate culture when implementing BYOD. Some users might prefer a second device they can bring when needed but put away when they're off the clock.&lt;/p&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="When BYOD may not be appropriate"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;When BYOD may not be appropriate&lt;/h2&gt;
 &lt;p&gt;BYOD policies are not universally beneficial. Highly regulated industries, organizations managing sensitive intellectual property or enterprises with limited identity governance maturity may determine that corporate-owned devices offer stronger control and auditability. Leadership teams should assess regulatory exposure, incident response readiness and support capacity before expanding BYOD programs.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/g4TMM7FrmzI?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>BYOD can reduce hardware costs and improve workforce flexibility -- but it also expands governance, identity and security responsibilities.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/check_g1211896141.jpg</image>
            <link>https://www.techtarget.com/searchmobilecomputing/feature/Key-benefits-of-enacting-a-BYOD-policy</link>
            <pubDate>Wed, 18 Feb 2026 15:06:00 GMT</pubDate>
            <title>7 key benefits of implementing a BYOD policy</title>
        </item>
        <item>
            <body>&lt;p&gt;Windows 11 desktops might experience problems to the point that IT has little choice but to reinstall Windows. In some of these instances, an ISO file is the best option.&lt;/p&gt; 
&lt;p&gt;Determining how and when to use the ISO repair can be a bit more complicated. As a Windows administrator, you should learn about the benefits of using an ISO file to repair a desktop and how to properly apply the ISO install.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Why use an ISO file to repair a Windows desktop?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why use an ISO file to repair a Windows desktop?&lt;/h2&gt;
 &lt;p&gt;There are several options for repairing a Windows 11 installation. Enterprise IT departments often resort to automatically reimaging the OS rather than attempting to repair it. Large organizations find this approach to be quicker and more cost-effective than repairing an ailing Windows system. However, if an organization lacks the infrastructure required to push a deployment image to a Windows 11 machine, repairing Windows 11 might be the best option.&lt;/p&gt;
 &lt;p&gt;It's possible to repair a Windows 11 installation without having to resort to using an ISO file. To do so, click on &lt;b&gt;Settings&lt;/b&gt; in the local desktop, and then make sure that the &lt;b&gt;System&lt;/b&gt; option is selected. Next, click on &lt;b&gt;Recovery&lt;/b&gt;, and then click the &lt;b&gt;Reset PC&lt;/b&gt; button. From there, you can follow the prompts to &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/How-to-perform-a-factory-reset-on-a-Windows-11-desktop"&gt;complete the Windows reset process&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Although this is often the preferred technique for repairing Windows 11, it does have one major shortcoming. If the problems that are occurring within the Windows 11 OS are happening as a result of hard disk corruption, it's entirely possible that the files used to reset and repair Windows might also be corrupt. The same also holds true if the system was &lt;a href="https://www.techtarget.com/searchsecurity/tip/10-common-types-of-malware-attacks-and-how-to-prevent-them"&gt;damaged by a malware attack&lt;/a&gt;. In these cases, there are no guarantees that the files needed to repair the OS are still functioning.&lt;/p&gt;
 &lt;p&gt;Using an ISO file to repair Windows enables you to fix the problem using known-functional copies of the Windows system files.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="How does an ISO repair install differ from a normal install?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How does an ISO repair install differ from a normal install?&lt;/h2&gt;
 &lt;p&gt;An ISO file is essentially just a DVD image file. At one time, it was common practice to install Windows from an installation DVD. However, it's now somewhat rare for PCs to be equipped with DVD drives. An ISO file can take the place of a DVD, thereby negating the need for physical installation media. To use an ISO file to repair Windows 11, the faulty machine must be at least somewhat functional. In extreme cases where the desktop's issues prevent you from completing the repair process, you might be able to &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/How-Windows-11-Safe-Mode-works-and-when-to-use-it"&gt;boot Windows 11 into Safe Mode&lt;/a&gt; prior to attempting the repair.&lt;/p&gt;
 &lt;p&gt;Regardless of whether you're installing Windows 11 from a physical DVD or from an ISO file, there's a significant difference between a normal installation and a repair installation. Typically, installing Windows results in a clean installation. Unless you're upgrading a prior version of Windows, the new Windows installation runs a default installation.&lt;/p&gt;
 &lt;p&gt;In contrast, performing a repair installation reinstalls Windows 11 without overwriting anything important in the process. In other words, the Setup program does not format the system's hard disk. Windows 11 Setup also makes a concerted effort to preserve all the files, apps and settings that are present on the system. You should keep in mind that existing files, apps or settings could be what's causing the problem, so a repair install from an ISO file is not guaranteed to fix the problem.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Using an ISO file to repair Windows 11"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Using an ISO file to repair Windows 11&lt;/h2&gt;
 &lt;p&gt;The first step of using an ISO file to repair Windows 11 is to &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/How-to-create-a-custom-ISO-for-Windows-10"&gt;find an ISO file&lt;/a&gt; that meets your requirements. Many organizations maintain a collection of ISO files that are readily available for such situations. However, if you do not have an ISO file at your disposal, you can download a Windows 11 ISO file &lt;a target="_blank" href="https://www.microsoft.com/software-download/windows11" rel="noopener"&gt;directly&lt;/a&gt; from Microsoft. The nice thing about using the Windows 11 download site is that the ISO is based on the current Windows 11 release, meaning there probably aren't many updates that you need to install when you finish repairing Windows.&lt;/p&gt;
 &lt;p&gt;As a best practice, it's a good idea to create a backup before attempting to repair Windows. Even though Windows 11 Setup is designed to preserve files, settings and apps, things can and occasionally do go wrong. It's also possible that the Setup process could end up deactivating your Windows license or other software licenses. As such, you might have to perform various cleanup tasks, such as entering a product key, when you're done.&lt;/p&gt;
 &lt;p&gt;To get started, copy the ISO file to an empty folder on the computer that needs to be repaired. Next, right-click on the ISO file, and select the &lt;b&gt;Mount&lt;/b&gt; command from the resulting shortcut menu. This causes the ISO file to be mounted as a virtual DVD drive. Windows assigns a drive letter to the virtual DVD drive, and all of the files contained within the ISO file are accessible through the drive mapping.&lt;/p&gt;
 &lt;p&gt;With the ISO file mounted, double-click on the &lt;b&gt;Setup.exe&lt;/b&gt; file. This causes Windows to launch Windows 11 Setup. Click &lt;b&gt;Next&lt;/b&gt;, and Setup then performs a quick update check. When this check is completed, a prompt asking you to accept the &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/What-do-the-different-licenses-for-Windows-11-come-with"&gt;Windows 11 licensing terms&lt;/a&gt; should appear. At this point, an additional, more time-consuming update check might occur.&lt;/p&gt;
 &lt;p&gt;It's possible to skip the update check to save time, but this is generally a bad idea. Skipping the update check can lead to a situation in which the ISO file is older than the version of Windows that is installed on the PC. When that happens, the only option is to either restart Setup and download the updates or to perform a clean Windows installation rather than repair the system.&lt;/p&gt;
 &lt;p&gt;At this point, the computer should show a screen confirming the action that Setup is about to take (Figure 1).&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_iso_repair_process_1-f.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_iso_repair_process_1-f_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_iso_repair_process_1-f_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/windows_iso_repair_process_1-f.jpg 1280w" alt="The dialog box from Windows 11 Setup indicating that the ISO is ready for installation." data-credit="Brien Posey" height="441" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 1. The Windows 11 Setup utility showing the type of ISO install that the admin has chosen.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Notice that Setup is indicating that it installs Windows 11 Pro and keeps personal files and apps. This means that Setup is going to attempt to repair the Windows OS, but it will also try to preserve all the files, settings and apps that presently exist. If you decide that you don't want to preserve anything and prefer to simply overwrite the old copy of Windows with a clean install, you can click on the &lt;b&gt;Change what to keep&lt;/b&gt; link and select the &lt;b&gt;Nothing&lt;/b&gt; option from the screen that appears (Figure 2).&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_iso_repair_process_2-f.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_iso_repair_process_2-f_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_iso_repair_process_2-f_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/windows_iso_repair_process_2-f.jpg 1280w" alt="The option to choose what aspects of the Windows 11 system to keep after the ISO install." data-credit="Brien Posey" height="441" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 2. Windows 11 Setup displaying the ISO install type options.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;There's also an option to keep only personal files but not applications or settings. All you have to do is make your selection and click &lt;b&gt;Next&lt;/b&gt;, followed by &lt;b&gt;Install&lt;/b&gt;. Setup does the rest.&lt;/p&gt;
 &lt;p&gt;Many organizations rely on distributed workforces, diverse hardware fleets and limited on‑site support -- all of which make traditional reimaging workflows harder to execute consistently. Having a reliable, repeatable repair method that preserves user data and minimizes downtime gives admins a useful middle ground between full redeployment and time‑consuming manual troubleshooting. As such, ISO‑based repair installs help IT maintain stability without disrupting productivity.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Brien Posey is a former 22-time Microsoft MVP and a commercial astronaut candidate. In his more than 30 years in IT, he has served as a lead network engineer for the U.S. Department of Defense and a network administrator for some of the largest insurance companies in America.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Wiping and reinstalling with a clean install is the simplest way to fix a broken Windows 11 desktop, but an ISO file repair can help save some of the desktop's settings and files.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/pharma_g1358852671.jpg</image>
            <link>https://www.techtarget.com/searchenterprisedesktop/tip/How-to-repair-Windows-11-with-an-ISO-file</link>
            <pubDate>Tue, 17 Feb 2026 14:00:00 GMT</pubDate>
            <title>How to repair Windows 11 with an ISO file</title>
        </item>
        <item>
            <body>&lt;p&gt;Various operational and lifecycle scenarios may prompt IT teams to perform a factory reset on Windows 11 desktops or laptops.&lt;/p&gt; 
&lt;p&gt;By definition, a factory reset restores the target PC to the same condition it was in when it first left the factory, removing user data, settings and installed applications.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;A factory reset is typically used as a last-resort remediation or lifecycle management step to return a device to a known baseline state. An IT administrator can do this quickly in a Windows 11 environment. Typical situations that call for a factory reset include the following:&lt;/p&gt; 
&lt;ul class="default-list"&gt; 
 &lt;li&gt;Prepping a device for reuse, sale or donation.&lt;/li&gt; 
 &lt;li&gt;Attempting to restore the PC to operation when less drastic repairs don't work (e.g., in-place upgrade repair installs or various Deployment Image Servicing and Management repairs).&lt;/li&gt; 
 &lt;li&gt;Recovering from malware and viruses to restore the PC to a known, good working -- and clean -- state.&lt;/li&gt; 
 &lt;li&gt;Providing a fresh start for PCs with persistent software problems or performance issues.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Admins should understand that restoring a PC to factory settings essentially provides a clean slate. It allows them to start over and rebuild a problem PC or pass it outside the organization for resale or reuse.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Precautions to take before performing a factory reset"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Precautions to take before performing a factory reset&lt;/h2&gt;
 &lt;p&gt;Not every device is immediately suitable for a factory reset, and failing to take proper precautions can result in permanent data loss or recovery complications. First, make an image-based backup, and then make sure you have the tools necessary to restore such a backup. This provides a fallback in case the factory reset fails to complete correctly and leaves the PC in a nonworking state.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/Top-Windows-10-backup-and-restore-utilities"&gt;Consider backup tools&lt;/a&gt; such as Macrium Reflect X or EaseUS Todo Backup. These create bootable rescue media, typically stored on a USB flash or solid-state drive (SSD). If anything goes wrong with the factory reset, you can boot to this media and restore the PC to its pre-reset state using the backup image you made beforehand.&lt;/p&gt;
 &lt;p&gt;Preserving data on the primary drive before initiating a factory reset is essential, particularly in enterprise environments where recovery windows and compliance requirements apply. The most convenient way to do that is via image backup. However, you can also use the built-in OneDrive-based Windows Backup, which is a more time- and labor-intensive process than using an image backup.&lt;/p&gt;
 &lt;p&gt;Everything should turn out well if you can return things to where they were &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/How-to-reset-Windows-11-PC-from-BIOS"&gt;before you started the factory reset operation&lt;/a&gt;. Most image backup tools will force you to save that image to another drive -- which is vital if you need to restore a Windows boot/system drive -- and provide tools to re-image the primary Windows drive from bootable media. Prudence dictates that you save image backups to an external drive, such as a USB-attached SSD or hard disk, to restore the image to a different PC if the source machine quits working entirely.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Why perform a factory reset?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why perform a factory reset?&lt;/h2&gt;
 &lt;p&gt;A factory reset is usually needed in one of two typical situations. The first is when a PC is decommissioned for sale or transferred to another user. The factory reset removes all changes since the PC left the factory, leaving it in a clean state for sale or handoff. Make sure to apply pending updates to the OS to make the PC current and secure. The reset returns to when it left the factory, which &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/3-tools-to-check-Windows-11-update-compatibility"&gt;may be one or more feature upgrades behind current production levels&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;The second scenario is when a PC exhibits persistent performance, stability or behavioral problems that remain unresolved after standard repair techniques. There's little that an &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/Use-an-in-place-upgrade-to-repair-Windows-10"&gt;in-place upgrade repair install&lt;/a&gt; can't fix in Windows 11, but sometimes even that maneuver doesn't restore a PC to regular operation. When that happens, a &lt;a href="https://www.techtarget.com/searchitchannel/definition/clean-install"&gt;clean install&lt;/a&gt; or a factory reset is a potential next step toward Windows recovery. Thus, the factory reset can take the PC back to its earliest Windows state, possibly fixing whatever the root issue is.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="How to factory reset a Windows 11 PC"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to factory reset a Windows 11 PC&lt;/h2&gt;
 &lt;p&gt;To start the factory reset process in Windows 11, click &lt;b&gt;Start&lt;/b&gt; &amp;gt; &lt;b&gt;Settings&lt;/b&gt; &amp;gt; &lt;b&gt;System&lt;/b&gt; &amp;gt; &lt;b&gt;Recovery&lt;/b&gt; (Figure 1). Then, select &lt;b&gt;Reset PC&lt;/b&gt;.&lt;/p&gt;
 &lt;p&gt;You can also start the &lt;b&gt;Reset PC&lt;/b&gt; operation from the sign-in screen or use a recovery drive or installation media to enter recovery mode during boot-up. Press the shift key while selecting &lt;b&gt;Restart&lt;/b&gt; to boot into local recovery mode.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_11_reset_1_h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_11_reset_1_h_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_11_reset_1_h_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/windows_11_reset_1_h.jpg 1280w" alt="The 'Recovery' screen in the Windows 11 system settings." data-credit="Ed Tittel"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 1. The option to reset the PC is under 'Recovery' in the 'System' section of settings.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;From there, the screen will show two options (Figure 2). The option you choose depends on how you plan to use the PC after resetting it. If it's a last-ditch repair operation, it's easiest to select &lt;b&gt;Keep my files&lt;/b&gt; (this preserves files from your primary hard drive, especially those for user accounts Documents, Downloads, Music and other default folders). If you're prepping for sale or handoff, choose &lt;b&gt;Remove everything&lt;/b&gt;.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_11_reset_2_h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_11_reset_2_h_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_11_reset_2_h_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/windows_11_reset_2_h.jpg 1280w" alt="The 'Choose an option' screen in 'Reset this PC' process, showing options to 'Keep my files' or 'Remove everything.'" data-credit="Ed Tittel"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 2. Reset options let you keep personal files or get rid of everything.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;After clicking the desired option, you can choose how to reinstall Windows (Figure 3).&lt;/p&gt;
 &lt;p&gt;Choosing &lt;b&gt;Cloud download&lt;/b&gt; will download the Windows install file from Windows servers in the cloud. This option is safest if you think your local installation is corrupt or damaged.&lt;/p&gt;
 &lt;p&gt;Choosing &lt;b&gt;Local reinstall &lt;/b&gt;will download the Windows install file from the current Windows files on your PC. This option is faster but not immune to local issues. Unless the local Windows drive is compromised, however, it should work. For best results, choose the &lt;b&gt;Cloud download&lt;/b&gt;.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_11_reset_3_h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_11_reset_3_h_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_11_reset_3_h_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/windows_11_reset_3_h.jpg 1280w" alt="The screen showing 'Cloud download' and 'Local reinstall' as the options for how you can reinstall Windows." data-credit="Ed Tittel"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 3. You can download the Windows install image from the cloud or from your Windows drive.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;After choosing either reinstall option, the screen will show &lt;b&gt;Additional settings&lt;/b&gt;. To continue the process without changing settings, click &lt;b&gt;Next&lt;/b&gt;.&lt;/p&gt;
 &lt;p&gt;If you want to make changes, click &lt;b&gt;Change settings&lt;/b&gt;. From there, you can clean the drive completely by toggling &lt;b&gt;Yes&lt;/b&gt; under &lt;b&gt;Clean data?&lt;/b&gt; or download Windows from the cloud by toggling &lt;b&gt;No&lt;/b&gt; under &lt;b&gt;Download Windows? &lt;/b&gt;(Figure 4).&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_11_reset_4_h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_11_reset_4_h_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_11_reset_4_h_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/windows_11_reset_4_h.jpg 1280w" alt="The 'Choose settings' screen, which appears if you select 'Change settings' at the previous step." data-credit="Ed Tittel"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 4. If you click 'Change settings' in the preceding step, you can revisit options here.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Once you confirm your choices, a final confirmation screen will appear. After you select &lt;b&gt;Reset&lt;/b&gt;, the process will begin (Figure 5). This is your final chance to cancel the reset. If you allow this step to proceed and don't click &lt;b&gt;Cancel &lt;/b&gt;at any point, you can no longer reverse the reset process. You'll have to let it complete and then restore a backup to return to where you started.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_11_reset_5_h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_11_reset_5_h_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_11_reset_5_h_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/windows_11_reset_5_h.jpg 1280w" alt="The 'Preparing to reset' screen, showing how ready the PC is for reset and giving the option to cancel." data-credit="Ed Tittel"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 5. The reset process does some preparation work before it reboots the PC.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Finally, the PC reboots and runs the Windows install that drives the chosen &lt;a target="_blank" href="https://support.microsoft.com/en-us/windows/recovery-options-in-windows-31ce2444-7de3-818c-d626-e3b5a3024da5#WindowsVersion=Windows_11" rel="noopener"&gt;reset operation&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Once the OS is in place, the installer will run through several prompts to complete the installation. These include prompts for country or region, language, keyboard layout and privacy settings. Logging in to a Microsoft account completes the process. Once the out-of-box experience finishes, the Windows 11 desktop will be in the same state as when it left the factory. If you plan to sell or hand off the PC to someone else, it's ready to go. If you plan to return it to its original user, substantial work remains to restore the user's preferences and customizations.&lt;/p&gt;
 &lt;p&gt;For IT teams, a factory reset should be treated as a controlled recovery or transition step rather than a routine troubleshooting action. When executed with proper backups and planning, it can return a system to a stable baseline without introducing unnecessary operational risk.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt; &lt;em&gt;This article was updated to improve the reader experience.&lt;/em&gt;&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;Ed Tittel is a 30-plus year IT veteran who has worked as a developer, networking consultant, technical trainer and writer.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>A factory reset may be needed for Windows 11 devices with ongoing performance issues or when reassigned, helping IT reduce data loss and recovery risks.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/wfh_a299201055.jpg</image>
            <link>https://www.techtarget.com/searchenterprisedesktop/tip/How-to-perform-a-factory-reset-on-a-Windows-11-desktop</link>
            <pubDate>Tue, 10 Feb 2026 12:56:00 GMT</pubDate>
            <title>How to perform a factory reset on a Windows 11 desktop</title>
        </item>
        <item>
            <body>&lt;p&gt;Windows 11 is now the standard desktop OS for new enterprise devices, but not every existing PC is eligible to upgrade. Hardware requirements introduced with Windows 11 continue to exclude many older systems, making compatibility checks essential before deployment.&lt;/p&gt; 
&lt;p&gt;Although Windows 11 shares many architectural similarities with Windows 10, its stricter hardware requirements continue to block upgrades on older systems. Microsoft continues to recommend against upgrading unsupported hardware to Windows 11, noting that such systems may not receive feature or &lt;a href="https://www.techtarget.com/searchsecurity/tip/5-enterprise-patch-management-best-practices"&gt;security updates&lt;/a&gt; reliably.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Key Windows 11 hardware requirements"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Key Windows 11 hardware requirements&lt;/h2&gt;
 &lt;p&gt;All the details concerning Windows 11 specifications and requirements are &lt;a href="https://www.microsoft.com/en-us/windows/windows-11-specifications?r=1" target="_blank" rel="noopener"&gt;available from Microsoft&lt;/a&gt;. A select few are likely to pose compatibility issues for older PCs. Older PCs must support the following features or capabilities:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;strong&gt;System firmware.&lt;/strong&gt; Requires Unified Extensible Firmware Interface and must be Secure Boot capable.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Trusted Platform Module.&lt;/strong&gt; Must run TPM version 2.0 or better. 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;This does not require discrete TPM circuitry. Newer Intel, AMD and Azure Resource Manager (ARM)/Qualcomm CPUs support TPM 2.0 via firmware emulation.&lt;/li&gt; 
   &lt;/ul&gt; &lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;CPU requirements. &lt;/strong&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;&lt;strong&gt;&lt;/strong&gt; &lt;strong&gt;Intel.&lt;/strong&gt; Must be eighth-generation CPU or newer, with minor seventh-generation exceptions for certain Microsoft Surface PCs.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;&lt;/strong&gt; &lt;strong&gt;AMD.&lt;/strong&gt; Must be Epyc 72xx or better, or Ryzen 2300X CPU or better -- including most Ryzen 3 and 5 models.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;ARM/Qualcomm.&lt;/strong&gt; Must be Snapdragon 7c or 8xx, or MS SQ1 or SQ2 model.&lt;/li&gt; 
   &lt;/ul&gt; &lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Tools to assess Windows 11 update readiness"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Tools to assess Windows 11 update readiness&lt;/h2&gt;
 &lt;p&gt;Microsoft continues to offer the PC Health Check app, available through the Microsoft Store, that works on individual PCs, one at a time. To find the app, type "PC Health Check" into the &lt;strong&gt;Start Menu&lt;/strong&gt; search box (Figure 1).&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_upgrade_1.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_upgrade_1_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_upgrade_1_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/windows_upgrade_1.jpg 1280w" alt="The PC Health Check app in the Start Menu." data-credit="Ed Tittel" height="344" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Simply type 'PC Health Check' in the Windows 10 Start Menu to launch the app.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;If the version of PC Health Check on a target PC is outdated, Microsoft will update the app before it runs. When the PC Health Check app opens, click &lt;strong&gt;Check now&lt;/strong&gt; to run the Windows 11 system requirements assessment (Figure 2).&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_upgrade_2.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_upgrade_2_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_upgrade_2_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/windows_upgrade_2.jpg 1280w" alt="The opening screen for the PC Health Check app." data-credit="Ed Tittel" height="120" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Click 'Check now' to launch the compatibility assessment.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Click &lt;strong&gt;See all results&lt;/strong&gt; in the resulting pop-up to get to the PC Health Check window and find out whether the target PC meets Windows 11 requirements (Figure 3).&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_upgrade_3.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_upgrade_3_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_upgrade_3_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/windows_upgrade_3.jpg 1280w" alt="The screen showing the results of the PC Health Check." data-credit="Ed Tittel" height="235" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;The Surface Pro 3 PC in this example, purchased in 2014, fails because it's running a fourth-generation Intel CPU (i7-4650U).
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;IT organizations might use third-party Windows 11 compatibility assessment tools on corporate PCs because the PC Health Check doesn't work with policy-based PC management. On such PCs, the native Microsoft tool's check produces only an error result (Figure 4).&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_upgrade_4.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_upgrade_4_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_upgrade_4_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/windows_upgrade_4.jpg 1280w" alt="The notification that PC Health Check results are not available on a PC because it is centrally managed." data-credit="Ed Tittel" height="256" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Centrally managed PCs don't work well with the PC Health Check.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;For PCs that can't properly run the PC Health Check tool, there are a few third-party tools that IT admins can try. &lt;a href="https://github.com/rcmaehl/WhyNotWin11" target="_blank" rel="noopener"&gt;WhyNotWin11&lt;/a&gt; is a project available on GitHub that runs as a standalone Windows application. It reports on a series of checks that it runs on target PCs, such as CPU compatibility and storage availability. The application lists the requirements for Windows 11 and identifies which ones the target PC does and does not meet (Figure 5).&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_upgrade_5.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_upgrade_5_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_upgrade_5_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/windows_upgrade_5.jpg 1280w" alt="The screen showing results in WhyNotWin11." data-credit="Ed Tittel" height="420" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;WhyNotWin11 shows an incompatible CPU and a missing TPM.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;The &lt;a href="https://github.com/jbcarreon123/Win11CompChk" target="_blank" rel="noopener"&gt;Windows 11 Compatibility Check&lt;/a&gt; is another project available on GitHub that takes the form of a &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/batch-file"&gt;batch file&lt;/a&gt; and runs inside an administrative command prompt or PowerShell window on target PCs. It also works on centrally managed PCs to produce a list of which Windows 11 requirements a target PC does and does not meet (Figure 6). To perform the check, start CMD.exe at the directory where Win11CompChk.bat resides and run the file, or do likewise in a PowerShell session.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_upgrade_6.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_upgrade_6_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_upgrade_6_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/windows_upgrade_6.jpg 1280w" alt="The screen showing results in WhyNotWin11." data-credit="Ed Tittel" height="522" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;The Win11CompChk.bat file provides a little more detail about what's missing.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;             
&lt;section class="section main-article-chapter" data-menu-title="Automating compatibility checks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Automating compatibility checks&lt;/h2&gt;
 &lt;p&gt;Both WhyNotWin11 and Windows 11 Compatibility Check can run remotely via PowerShell scripts or batch files. They each support an export facility to save results and send them to a central collection point. IT administrators must embed those scripts with data to identify the PCs that the results address -- machine name or some other unique identifier such as asset ID or vendor ID -- so they can distinguish one computer from another after the compatibility data's collection. The results from these tools help IT teams identify which portions of their PC fleet remain eligible for Windows 11 and which devices require replacement. With &lt;a href="https://www.techtarget.com/searchenterprisedesktop/feature/End-user-computing-trends-to-watch"&gt;Windows 10 now out of support&lt;/a&gt;, compatibility data plays a critical role in identifying upgrade-eligible devices and prioritizing hardware refresh decisions.&lt;/p&gt;
 &lt;p&gt;Windows 11 compatibility checks are less about whether to upgrade and more about understanding the current state of the device fleet. Results from these tools help inform replacement priorities, risk exposure and near-term endpoint decisions.&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;Ed Tittel is a 30-plus-year IT veteran who has worked as a developer, networking consultant, technical trainer and writer.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Before upgrading to Windows 11, IT should verify device compatibility. Tools like PC Health Check and third-party utilities identify hardware readiness.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/check_g1199243271.jpg</image>
            <link>https://www.techtarget.com/searchenterprisedesktop/tip/3-tools-to-check-Windows-11-update-compatibility</link>
            <pubDate>Tue, 10 Feb 2026 00:00:00 GMT</pubDate>
            <title>3 tools to check Windows 11 update compatibility</title>
        </item>
        <item>
            <body>&lt;p&gt;For most enterprises, Linux hasn't been part of serious desktop planning conversations for years. That's starting to change -- not because Linux suddenly became fashionable again, but because Windows 10 is going away, and the replacement comes with strings attached.&lt;/p&gt; 
&lt;p&gt;Browser-based &lt;a href="https://www.techtarget.com/searchcloudcomputing/feature/Top-SaaS-Examples-and-Applications-for-Businesses"&gt;SaaS applications&lt;/a&gt; flattened a lot of day-to-day differences between desktops. Email looks the same. Collaboration tools behave the same. For many users, that was enough to stop caring about which OS sat underneath.&lt;/p&gt; 
&lt;p&gt;That assumption holds -- to a point.&lt;/p&gt; 
&lt;p&gt;The renewed interest in Linux desktops shows where its limits begin to appear.&lt;/p&gt; 
&lt;p&gt;A recent article outlines &lt;a href="https://www.techtarget.com/searchenterprisedesktop/feature/Why-2026-might-bring-more-Linux-desktops-to-the-enterprise"&gt;why Linux is becoming credible again&lt;/a&gt; as an enterprise workstation option. The timing matters. With Windows 10 retiring and Windows 11 introducing new hardware requirements and upgrade costs, many organizations are reassessing whether another forced refresh actually delivers value.&lt;/p&gt; 
&lt;p&gt;The appeal of Linux isn't that it makes the OS irrelevant; it's that OS decisions have become consequential again.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Linux as an escape hatch, not a fashion statement"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Linux as an escape hatch, not a fashion statement&lt;/h2&gt;
 &lt;p&gt;For most enterprises, renewed interest in Linux desktops has very little to do with enthusiasm for Linux itself. It starts with Windows 10 going away -- and with what comes next.&lt;/p&gt;
 &lt;p&gt;Windows 11 brings tighter hardware requirements, shorter upgrade windows and fewer places to pause. For organizations that would rather not replace functioning devices on someone else's timetable, Linux becomes a way to slow the clock.&lt;/p&gt;
 &lt;p&gt;That change shows up first in control, not cost. Linux makes it easier to see what the OS is doing, what data it collects and how much flexibility remains around device lifespans. Hardware requirements are less prescriptive. Upgrade paths are easier to defer or sequence. Teams regain some discretion over when desktops change and why.&lt;/p&gt;
 &lt;p&gt;Sustainability considerations tend to follow. Extending desktop lifecycles is simpler when refresh decisions are not tied to a single OS roadmap. Energy efficiency improves incrementally rather than through forced replacement cycles. For organizations with &lt;a href="https://www.techtarget.com/sustainability/feature/ESG-strategy-and-management-Complete-guide-for-businesses"&gt;environmental, social and governance goals&lt;/a&gt;, Linux doesn't solve the problem -- but it removes one of the pressures that makes it harder.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    The appeal of Linux isn't that it makes the OS irrelevant; it's that OS decisions have become consequential again.
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Where SaaS actually fits"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Where SaaS actually fits&lt;/h2&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/Comparing-DaaS-vs-SaaS-and-how-they-work?Offer=ab_MeteredFormCopyEoc_ctrl"&gt;SaaS is different from desktop-as-a-service&lt;/a&gt; because it is application-specific rather than desktop-specific. Most SaaS tools are delivered through the browser, which makes the OS far less important for day-to-day application use.&lt;/p&gt;
 &lt;p&gt;That shift is what changes the Linux equation.&lt;/p&gt;
 &lt;p&gt;Reduced hardware requirements make Linux more approachable for nontechnical users than it once was. SaaS addresses historic barriers -- application availability, deployment complexity, updates and compatibility -- through simplification rather than platform loyalty.&lt;/p&gt;
 &lt;p&gt;Linux still makes some organizations uncomfortable -- not because of a single, stated objection, but because of accumulated habits that support models built around Windows, procurement assumptions and years of muscle memory. What's different now is that SaaS removes enough friction that those habits matter less. Cost pressure, simpler deployment and browser-first workflows do the work quietly, without anyone needing to champion Linux explicitly.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;p&gt;&lt;/p&gt; 
   &lt;h3 class="splash-heading"&gt;What CIOs often assume about enterprise Linux desktops&lt;/h3&gt; 
   &lt;p&gt;When Linux enters desktop planning discussions, it rarely arrives as a formal proposal. More often, it shows up at the edges -- as a question about refresh timing, device lifespans or whether another Windows upgrade is actually necessary.&lt;/p&gt; 
   &lt;p&gt;Years of SaaS adoption shape those conversations. When most work happens in the browser, the desktop OS starts to feel less important. As long as applications behave the same, differences in look and feel seem tolerable.&lt;/p&gt; 
   &lt;p&gt;Licensing usually fades even further into the background. It is treated as something to sort out later, once the architecture is already in place.&lt;/p&gt; 
   &lt;p&gt;Linux unsettles that sequence -- not by fading into the background, but by reintroducing the OS as something organizations can influence directly. The question stops being how to work around the OS -- and starts being who controls it, and for how long.&lt;/p&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="What this means for CIOs"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What this means for CIOs&lt;/h2&gt;
 &lt;p&gt;Linux desktops are not becoming viable because enterprises suddenly love Linux. They are becoming viable because SaaS softened application dependence at the same time Windows 11 hardened OS consequences.&lt;/p&gt;
 &lt;p&gt;Linux isn't winning because enterprises fell in love with it. It's showing up again because the alternatives became more expensive, more restrictive and harder to justify. In that context, Linux doesn't have to be perfect; it just has to be workable.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;James Alan Miller is a veteran technology editor and writer who leads Informa TechTarget's Enterprise Software group. He oversees coverage of ERP &amp;amp; Supply Chain, HR Software, Customer Experience, Communications &amp;amp; Collaboration and End-User Computing topics.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>As Windows 10 retires and SaaS reduces OS dependence, Linux desktops are re-emerging as a viable enterprise option driven by cost, control, privacy and hardware flexibility.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/clock-time12.jpg</image>
            <link>https://www.techtarget.com/searchenterprisedesktop/feature/When-SaaS-softens-the-OS-but-doesnt-erase-it</link>
            <pubDate>Fri, 06 Feb 2026 14:25:00 GMT</pubDate>
            <title>When SaaS softens the OS -- but doesn't erase it</title>
        </item>
        <item>
            <body>&lt;p&gt;Windows 11 desktops can get stuck in a reboot loop that makes it impossible for users to work, and sometimes it's unclear why the problem occurs or how to fix it.&lt;/p&gt; 
&lt;p&gt;This can hinder productivity to the point that affected users must find another machine to work on until IT can solve the problem. Consequences can include unplanned downtime, increased help desk volume, &lt;a href="https://www.techtarget.com/searchdatabackup/tip/How-to-prevent-data-loss-Strategies-for-better-data-protection"&gt;loss of unsaved work&lt;/a&gt; and elevated security risk when users switch devices.&lt;/p&gt; 
&lt;p&gt;In managed environments, reboot loops often emerge after updates, configuration changes or hardware stress, but the underlying cause isn't always obvious. As an IT administrator, you might have to coordinate multiple strategies to properly address restart issues.&lt;/p&gt; 
&lt;p&gt;The best approach is to determine which category of issue -- software, hardware or system configuration -- is most likely responsible based on how and when the restarts occur. By prioritizing the right troubleshooting steps, IT can restore access quickly and avoid unnecessary disruption.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What can cause Windows 11 to keep restarting?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What can cause Windows 11 to keep restarting?&lt;/h2&gt;
 &lt;p&gt;It can be difficult to track down the root causes of a reboot issue, especially if the problem occurs on some managed computers and not others. You should consider a wide range of possibilities during the troubleshooting process, including the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Improper Group Policy settings.&lt;/b&gt; If admins have misconfigured Group Policies or failed to properly update them, a system might experience reboot issues.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Inappropriate system settings.&lt;/b&gt; A few system configuration settings can cause a Windows 11 computer to keep restarting. For example, reboot problems can occur if users are overly aggressive with the power management settings or disable the Secure Boot function. Automatic restarts and fast startups, which are enabled by default, can also contribute to reboot issues.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;System instability.&lt;/b&gt; Problems at the system level, such as missing or corrupt OS files, can cause restart loops. Third-party apps can sometimes lead to reboot issues as well, especially if users installed or updated them recently. Even a Windows update can cause restart problems, as can &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/Windows-11-upgrade-issues-that-desktop-admins-should-know"&gt;upgrading from Windows 10 to Windows 11&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Malfunctioning hardware.&lt;/b&gt; Hardware drivers and peripheral devices can create restart issues. Potential causes include failing storage devices -- especially if they affect OS or application files -- and hardware overheating, which often worsens with high-intensity workloads.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Malware infection.&lt;/b&gt; A malware infection can cause a computer to keep restarting. A reboot problem can even be one of the only &lt;a href="https://www.techtarget.com/searchsecurity/feature/10-types-of-security-incidents-and-how-to-handle-them"&gt;signs that malware has infected a computer&lt;/a&gt;.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;There can be other sources for the issue as well, but these common causes give admins a few places to start when dealing with persistent rebooting. The causes are not necessarily mutually exclusive, however. Multiple factors can contribute to a Windows 11 reboot loop. This makes early symptom patterns especially useful when deciding where to focus troubleshooting first.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="What to do if Windows 11 keeps restarting"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What to do if Windows 11 keeps restarting&lt;/h2&gt;
 &lt;p&gt;Because there are so many reasons why Windows 11 might keep restarting, there are also many steps admins can take to resolve reboot issues. You should look at three broad areas to identify the source of the problem: software environment, hardware environment and system settings. By assessing the desktop through these three categories, IT can determine what the best way to solve the issue is -- whether that's pausing updates, replacing the local drive or changing Group Policy settings, for example.&lt;/p&gt;
 &lt;p&gt;Whether trying to address reboot issues directly or working with a user remotely, you should understand how to use Safe Mode to access the Windows system. If the restart issue prevents the user from booting normally into the computer, most troubleshooting steps will require the use of Safe Mode, which is a diagnostic and troubleshooting operating environment. It runs a pared-down version of the OS to help isolate and identify system issues.&lt;/p&gt;
 &lt;p&gt;You can use Safe Mode to carry out several tasks, such as updating drivers, removing hardware components, uninstalling new apps or scanning for malware -- in other words, addressing some of the possible causes of a Windows 11 reboot loop.&lt;/p&gt;
 &lt;h3&gt;Assess the software environment&lt;/h3&gt;
 &lt;p&gt;When restart loops begin immediately after updates, app installs or OS upgrades, a problem with the software environment is the most likely culprit.&lt;/p&gt;
 &lt;p&gt;There is no single approach to take with software-related issues, and it will likely come down to some trial and error to discover the underlying cause. In some situations, though, the problem might be readily apparent. For example, it might have started right after applying a Windows update or installing a new app.&lt;/p&gt;
 &lt;p&gt;If the cause isn't clear, a good place to start is with Windows Update. Even if you centrally control updates on managed desktops, you might need to assess an individual computer to determine whether a specific update has been properly installed. If you access the managed computer directly, you can check for updates or view the update history through the &lt;b&gt;Windows Update&lt;/b&gt; feature in &lt;b&gt;Settings&lt;/b&gt; (Figure 1).&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_11_restart_1.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_11_restart_1_half_column_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_11_restart_1_half_column_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/windows_11_restart_1.png 1280w" alt="The 'Windows Update' screen in the Windows 11 system settings." data-credit="Robert Sheldon" height="242" width="280"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 1. The desktop's update history is available under 'Windows Update' in settings.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Here, you can see if an update failed. If it did, check whether any temporary files have been left behind in the software distribution folder. You might need to delete the files before trying to run the update again.&lt;/p&gt;
 &lt;p&gt;In some cases, a successful update still appears to be the root of the reboot problem. If this occurred, you can uninstall the update through the &lt;b&gt;Update history&lt;/b&gt; utility. If the computer then boots up normally, this at least helps get the computer operational and gives you more time to figure out why the update might be causing problems.&lt;/p&gt;
 &lt;p&gt;You can also consider placing controls on when your organization's managed Windows 11 computers should restart after an update. For this, you can use Group Policy settings or an MDM tool to set restart policies that will take effect after an update.&lt;/p&gt;
 &lt;p&gt;Temporarily deferring updates can also help resolve startup issues. Under Windows Update, users have the option to pause updates for &lt;a target="_blank" href="https://support.microsoft.com/en-us/windows/manage-updates-in-windows-643e9ea7-3cf6-7da6-a25c-95d4f7f099fe#WindowsVersion=Windows_11" rel="noopener"&gt;up to three weeks&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Another option for addressing reboot issues is to restore the computer to a specific point in time. This is only possible if Windows has automatically created restore points on the system or if IT has done so manually. When working on an individual computer, you can use the System Restore utility to revert the system to a specific restore point.&lt;/p&gt;
 &lt;p&gt;If you suspect that a recently installed application might be causing the reboot problem, uninstalling the app and rebooting the computer might address the issue. If working directly on the computer, you can use the &lt;b&gt;Apps &amp;amp; features&lt;/b&gt; screen to uninstall the suspected application (Figure 2).&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_11_restart_2.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_11_restart_2_half_column_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_11_restart_2_half_column_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/windows_11_restart_2.png 1280w" alt="The 'Apps &amp;amp; features' screen, with the option to uninstall an app highlighted." data-credit="Robert Sheldon" height="223" width="280"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 2. Under 'Apps &amp;amp; features,' you can view and uninstall applications.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Consider using the Deployment Image Servicing and Management (DISM) tool and the System File Checker (SFC) to scan the Windows 11 computer as well. The DISM scan should run before the SFC scan. Together, these tools enable IT to identify and replace missing or corrupted Windows 11 system files. However, it's important to fully understand how these tools work before running either type of scan. DISM requires a healthy component store or a valid repair source, and on managed networks, it can fail without proper update access.&lt;/p&gt;
 &lt;p&gt;You should also scan the computer for malware infections, which can lead to reboot issues and result in even more serious consequences. The approach IT teams take here will depend on how they've &lt;a href="https://www.techtarget.com/searchsecurity/tip/5-ways-to-achieve-a-risk-based-security-strategy"&gt;implemented security protection&lt;/a&gt; on their networks and desktops.&lt;/p&gt;
 &lt;p&gt;Another software-related option for addressing reboot issues is to reset Windows, which returns the OS to its original factory settings. To do this, navigate to Start &amp;gt; Settings &amp;gt; System &amp;gt; Recovery. After selecting&lt;b&gt; Reset this PC&lt;/b&gt;, you can choose whether or not to retain personal files (Figure 3). In either case, you should back up the files before resetting Windows.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_11_restart_3.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_11_restart_3_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_11_restart_3_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/windows_11_restart_3.png 1280w" alt="The 'Choose an option' screen in the factory reset process, showing options to 'Keep my files' or 'Remove everything.'" data-credit="Robert Sheldon"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 3. When performing a factory rest, you can choose to keep personal files or remove everything.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;You should not reset Windows until you've tried all other options, including those related to hardware and system settings. If resetting Windows doesn't work, you might need to reinstall the OS, effectively starting from scratch.&lt;/p&gt;
 &lt;h3&gt;Assess the hardware environment&lt;/h3&gt;
 &lt;p&gt;Hardware-related reboot loops often appear under sustained workloads, during charging or when connected to external devices such as docks or GPUs.&lt;/p&gt;
 &lt;p&gt;For example, a hardware driver can cause reboot issues if it's corrupted or outdated. An administrator working directly on a Windows 11 PC can use the Device Manager to update drivers or remove a device that might be causing issues.&lt;/p&gt;
 &lt;p&gt;In addition to the drivers, you should test other aspects of the hardware. For example, a peripheral device might be causing the reboot problem. For this reason, it's a good idea to unplug external devices when troubleshooting a system. You should also monitor hardware components -- particularly CPUs and graphics cards -- for &lt;a href="https://www.techtarget.com/searchstorage/post/Understand-SSD-overheating-and-what-to-do-about-it"&gt;signs of overheating&lt;/a&gt;. Overheating can cause a system to continually restart, attempting to avoid any damage to the hardware.&lt;/p&gt;
 &lt;p&gt;You should also run diagnostics against the power supply to ensure that it's delivering sufficient voltage to the computer and operating within recommended parameters. Additionally, make sure that there are no problems with the local drive that might be causing random restarts. To do this, you can &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/How-to-scan-and-repair-disks-with-Windows-10-Check-Disk"&gt;use the Check Disk (CHKDSK) utility&lt;/a&gt; to check the file system and the volume's metadata for logical and physical errors.&lt;/p&gt;
 &lt;p&gt;The CHKDSK utility locates bad sectors and physical disk errors and attempts to recover readable information, which might include data that the OS is trying to access. In some cases, running a scan to check for errors can resolve reboot issues. However, if bad sectors are behind the problem, it might be time to replace the drive.&lt;/p&gt;
 &lt;h3&gt;Assess the system settings&lt;/h3&gt;
 &lt;p&gt;Configuration-related causes are common on managed systems and are often worth checking early, especially when restarts occur without clear software or hardware triggers.&lt;/p&gt;
 &lt;p&gt;For example, misconfigured Group Policies can cause reboot issues. So can policies that are not properly updated, which can occur when updating Windows or migrating from Windows 10 to Windows 11. IT must properly configure and update Group Policies on managed computers as necessary.&lt;/p&gt;
 &lt;p&gt;A Windows 11 computer can also run into reboot issues if Secure Boot has been disabled for any reason. You can verify whether Secure Boot is enabled through the system summary available in the &lt;b&gt;System Information&lt;/b&gt; app (Figure 4). The &lt;b&gt;Secure Boot State&lt;/b&gt; feature should be set to &lt;b&gt;On&lt;/b&gt;. If it's not, you'll need to update the Unified Extensible Firmware Interface settings.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_11_restart_4.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_11_restart_4_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_11_restart_4_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/windows_11_restart_4.png 1280w" alt="The 'System Information' screen, with the 'Secure Boot State' option and its status highlighted." data-credit="Robert Sheldon"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 4. Under 'System Information,' you can enable the 'Secure Boot State' feature. 
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Another troubleshooting option is to disable the automatic restart feature on the &lt;b&gt;Startup and Recovery&lt;/b&gt; screen (Figure 5). The &lt;b&gt;Automatically restart&lt;/b&gt; option is enabled by default, so restart issues might occur no matter what the underlying problem is, making it difficult to diagnose. If you disable this feature, the computer might instead display an error message or perform some other behavior that can help isolate the problem.&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_11_restart_5.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_11_restart_5_half_column_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_11_restart_5_half_column_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/windows_11_restart_5.png 1280w" alt="The 'Startup and Recovery' screen, showing different options to check off for 'System startup' and 'System failure.' " data-credit="Robert Sheldon" height="368" width="280"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 5. You can disable the 'Automatically restart' option under 'Startup and Recovery.'
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;You can also disable fast startup, which enables Windows to boot up more quickly after the computer shuts down. This feature sometimes causes issues, including repeated bootups. By disabling it, you can at least determine whether this might be part of the problem.&lt;/p&gt;
 &lt;p&gt;Additionally, check whether users have configured &lt;a href="https://www.techtarget.com/whatis/definition/clock-speed"&gt;overclocking&lt;/a&gt; on any of the hardware. If so, you should disable it. On laptop computers, you should review the power management settings, particularly as they pertain to the battery. In some cases, such as when performing resource-intensive operations, the power options might be causing the reboot issue.&lt;/p&gt;
 &lt;p&gt;When reviewing the configuration settings, make one change at a time and check whether it alters the restart behavior. If it doesn't, revert the setting and move on. This strategy helps isolate the cause while minimizing unintended effects on managed systems.&lt;/p&gt;
 &lt;p&gt;More often than not, restart loops in Windows 11 don't just have one obvious cause. A targeted, symptom-driven approach to troubleshooting can reduce downtime and limit unnecessary escalation.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt;&lt;i&gt;&amp;nbsp;This article was updated in February 2026 to reflect technology changes and to improve the reader experience.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Robert Sheldon is a freelance technology writer. He has written numerous books, articles and training materials on a wide range of topics, including big data, generative AI, 5D memory crystals, the dark web and the 11th dimension.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>When a Windows 11 desktop keeps restarting, there are a few factors that might be behind the issue. IT administrators should understand all the possible causes and how to solve them.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/check_g1199243271.jpg</image>
            <link>https://www.techtarget.com/searchenterprisedesktop/tip/How-to-fix-Windows-11-when-it-keeps-restarting</link>
            <pubDate>Thu, 05 Feb 2026 17:00:00 GMT</pubDate>
            <title>How to fix Windows 11 when it keeps restarting</title>
        </item>
        <item>
            <body>&lt;p&gt;Outdated IT systems are one of the biggest sources of cybersecurity risk for modern organizations. These assets often contain security weaknesses that make businesses susceptible to a wide range of attacks. Many attacks involve the exploitation of unpatched vulnerabilities.&lt;/p&gt; 
&lt;p&gt;To minimize the risk of security incidents, IT teams must ensure that the software running on their managed infrastructure receives security patches and updates promptly and regularly. Patching is critical to minimize app disruptions and ensure business continuity. Additionally, patching helps ensure consistency and compatibility of systems across the environment, strengthen data governance and align IT ops with regulatory requirements.&lt;/p&gt; 
&lt;p&gt;That said, manual patch management can be a challenging endeavor. It's labor-intensive and time-consuming. It also increases the potential for errors, thus leading to system breakdowns and operational interruptions. These errors might also introduce new vulnerabilities into the organization's IT ecosystem. IT teams can mitigate these challenges by using tools that fully automate the&amp;nbsp;&lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/Use-this-10-step-patch-management-process-to-ensure-success"&gt;patch management process&lt;/a&gt;&amp;nbsp;without adding undue complexity to their endpoint and network management responsibilities.&lt;/p&gt; 
&lt;p&gt;There are many patch management products on the market today, so finding the right one can be difficult. Here are 12 patch management products chosen partly because of their popularity and because they represent diverse approaches to endpoint management. Comparing the different approaches can help organizations identify which ones align best with their unique structures and workflows. The descriptions are based on vendor documentation. This list is not a ranking; companies appear in alphabetical order.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="1. Absolute Security Cyber Resilience Platform"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;1. Absolute Security Cyber Resilience Platform&lt;/h2&gt;
 &lt;p&gt;Absolute Security Cyber Resilience is an endpoint management and security platform that combines IT administration, security vulnerability scanning and patch management into a single cloud-based system. Formerly known as Syxsense, the platform was &lt;a target="_blank" href="https://www.channelfutures.com/mergers-acquisitions/absolute-security-gets-additional-capabilities-with-syxsense-purchase" rel="noopener"&gt;acquired&lt;/a&gt; by Absolute Security in 2024. Cyber Resilience can patch Windows, macOS and Linux systems, whether on-premises, connected remotely or in the cloud. It supports both physical and virtual environments. It can also patch third-party software such as Java, Google Chrome or Adobe products -- all from a single console.&lt;/p&gt;
 &lt;p&gt;With the Cyber Resilience patch management software, IT can scan and prioritize patching based on exposed security risks. Admins have full access to information about device health, enabling them to quickly address potential gaps. They can also access information about which patches have been released and their severity, then determine which devices are vulnerable and need updating. Cyber Resilience patch deployments are fully automated. However, admins can choose which patches to deploy, when to deploy them and which devices to patch.&lt;/p&gt;
 &lt;p&gt;Cyber Resilience records all patching activity for reviewing and auditing purposes. The platform also provides extensive reporting capabilities that range from high-level overviews to detailed reports that can be filtered and customized. For example, admins can generate reports about the security health of their third-party apps or virtualized server farms. Potential customers should contact Absolute directly for details about its subscription plans and how the products are licensed.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Suitable for: &lt;/i&gt;Organizations looking for a unified endpoint security platform that can automatically identify and address risks and vulnerabilities.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="2. Atera"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;2. Atera&lt;/h2&gt;
 &lt;p&gt;Atera is a cloud-based&amp;nbsp;remote monitoring and management&amp;nbsp;(&lt;a href="https://www.techtarget.com/searchitchannel/definition/RMM-software-remote-monitoring-and-management-software"&gt;RMM&lt;/a&gt;) platform that comes in separate versions for IT departments and&amp;nbsp;MSPs. The platform provides services such as IT automation, custom scripting, network discovery, ticketing, reporting, real-time alerts and patch management. Administrators can automatically identify and deploy patches on macOS and&amp;nbsp;Windows servers and workstations&amp;nbsp;from a centralized interface. They can also reboot remote systems if necessary.&lt;/p&gt;
 &lt;p&gt;Atera can patch OSes, apps and hardware drivers. It supports common third-party software such as Chrome, Zoom, Java, Dropbox, Microsoft Office and Adobe products. IT can create automation profiles for installing or updating patches at scale, while excluding specific patches when necessary. A single profile can also include other tasks along with patching, such as installing a software bundle, upgrading a Windows version or managing storage disks.&lt;/p&gt;
 &lt;p&gt;The Atera platform offers several comprehensive reports specific to patching. For example, IT can generate a report based on Microsoft knowledge bases and then install missing patches with a single click directly from that report. Admins can also view details about patch statuses and logged actions.&lt;/p&gt;
 &lt;p&gt;Atera offers four subscription plans for the IT department version -- Professional, Expert, Master and Enterprise -- the first three of which are available as either monthly or annual subscriptions. The Enterprise plan requires a discussion with Atera's sales department. All four plans support patch management.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Suitable for:&lt;/i&gt; SMBs and MSPs looking to automatically apply Windows, macOS, other OS and other software patches on an unlimited number of end-user devices.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="3. Automox"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;3. Automox&lt;/h2&gt;
 &lt;p&gt;Automox is a cloud-native&amp;nbsp;systems management&amp;nbsp;platform that automates patching, compliance and configuration of local, remote and cloud-hosted endpoints. The platform supports Windows, macOS and Linux systems and provides a single console for managing OS and third-party app patching and updates. In addition, Automox can automatically inventory hardware and software, offering full visibility into both authorized and unauthorized apps installed on managed devices.&lt;/p&gt;
 &lt;p&gt;The platform can identify missing patches in the three OSes and a wide range of applications. It provides native support for products such as Adobe Acrobat Reader, Citrix Workspace, Dropbox, Inkscape, Office 365, Notepad++, Slack and more. Admins can view pending patches and then approve or reject them. They can also access details about individual patches.&lt;/p&gt;
 &lt;p&gt;Automox enables admins to create custom scripts that provide granular control over configuration and patch management processes. IT can schedule patching for specific times or configure it to occur automatically every time a device connects to the internet. Automox also includes notification and reporting capabilities, which IT can set up according to its organization's specific requirements.&lt;/p&gt;
 &lt;p&gt;Automox is available in three subscription plans: Patch, for patch management; Essentials, which adds IT automation for endpoint device configurations; and Enterprise, which augments the Essentials package with multi-organization management, plug-and-play automation scripts and other advanced features.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Suitable for: &lt;/i&gt;Distributed organizations looking to securely patch and manage their Windows, macOS and Linux devices on hundreds of software titles from a single pane of glass.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="4. GFI LanGuard"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;4. GFI LanGuard&lt;/h2&gt;
 &lt;p&gt;GFI LanGuard is&amp;nbsp;endpoint protection&amp;nbsp;software that enables admins to &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/Patch-management-vs-vulnerability-management-Key-differences"&gt;assess vulnerabilities&lt;/a&gt; and patch software on local and remote desktops, servers and VMs. Admins can also scan their networks for missing patches and other vulnerabilities. LanGuard supports Windows, macOS and Linux devices, as well as third-party apps from over 50 vendors, including Adobe, Apple, Google, Microsoft, Mozilla and Oracle.&lt;/p&gt;
 &lt;p&gt;Admins can set up LanGuard to scan their networks automatically or perform scans on demand. Other IT capabilities include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Deploy patches from the central interface or deploy agents to individual machines that carry out the patching operations, thereby distributing the processing load.&lt;/li&gt; 
  &lt;li&gt;Control which patches to install.&lt;/li&gt; 
  &lt;li&gt;Automatically download missing patches.&lt;/li&gt; 
  &lt;li&gt;Roll back patch updates if problems occur.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;LanGuard also provides a web-based reporting interface that lets admins export reports to formats such as PDF, RTF or CSV. They can also schedule reports to be automatically sent by email. For large networks, IT can deploy multiple LanGuard instances and generate aggregated reports based on data from those instances.&lt;/p&gt;
 &lt;p&gt;GFI licenses LanGuard on an annual, per-node basis, with pricing dependent on the number of nodes and whether the product is purchased with other GFI products. The per-node price drops substantially at the 50- and 250-node thresholds.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Suitable for&lt;/i&gt;: SMBs with on-premises or hybrid infrastructure looking for a user-friendly patch management and network auditing tool that provides deep visibility into the entire IT network and its vulnerabilities.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="5. ITarian"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5. ITarian&lt;/h2&gt;
 &lt;p&gt;ITarian is a cloud-based IT management&amp;nbsp;platform for MSPs. It offers four primary services: RMM, IT service management, service desk and patch management. Admins can also use it for IT automation and scripting, remote access and control, and asset and inventory management. The patch management feature supports both the Windows and Linux OSes, as well as over 400 third-party apps. IT can scan devices for missing patches and automate each stage of the patch management process, including patch downloads.&lt;/p&gt;
 &lt;p&gt;ITarian makes it possible to identify which endpoints contain vulnerabilities, tag those endpoints and create policies for automatically deploying patches at scheduled times to specific endpoint groups. Admins have the following capabilities:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Create custom tags to organize endpoints according to business requirements.&lt;/li&gt; 
  &lt;li&gt;Deploy patches based on severity, vendor or type.&lt;/li&gt; 
  &lt;li&gt;Schedule deployments by time, group, computer or other criteria.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchsecurity/answer/Testing-a-security-patch"&gt;Test patches&lt;/a&gt; before approving them for deployment.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;ITarian provides in-depth reports on the hardware, software and patch update history of managed devices. The central interface offers a single-pane view of endpoint statistics and patch statuses and identifies which endpoints contain vulnerabilities so they can be quickly patched. ITarian tracks and manages patches on endpoint systems in real time and provides reports about applied or missing patches, as well as failed deployments.&lt;/p&gt;
 &lt;p&gt;Organizations can use ITarian for up to 50 endpoints for free. After that, subscription fees are on a per-device basis.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Suitable for: &lt;/i&gt;SMBs and MSPs looking for a cloud-based, policy-driven patch management platform for Windows and Linux endpoints, bundled with other IT management capabilities.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="6. Kaseya VSA"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;6. Kaseya VSA&lt;/h2&gt;
 &lt;p&gt;Kaseya VSA is&amp;nbsp;RMM software&amp;nbsp;with features such as alerting, discovery, automation and patch management. Admins can use the platform to deploy, update and patch Windows, macOS and Linux computers and third-party apps. VSA provides fully automated patch management. Its approach is configurable, policy-driven, location-independent and optimized for bandwidth. VSA uses agent-executed scripts to automate patching operations and other processes.&lt;/p&gt;
 &lt;p&gt;The policy-based approach helps standardize software maintenance through profiles, which enable IT to manage patch approvals, scheduling and installation. Admins also can do the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Use scripts to automate software and patch deployment across all endpoints, whether on or off the network.&lt;/li&gt; 
  &lt;li&gt;Override patches.&lt;/li&gt; 
  &lt;li&gt;View patch histories.&lt;/li&gt; 
  &lt;li&gt;Prevent patches from being applied during certain time windows.&lt;/li&gt; 
  &lt;li&gt;Deny specific patches to a subset of machines.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;As part of the patch update process, admins can schedule regular network scans and analyses to identify software vulnerabilities. VSA supports over 100 third-party applications out of the box, such as Citrix Workspace, FileZilla Client, Inkscape, TeamViewer and many others. IT can patch endpoints across multiple locations and domains, including home-based user devices. Potential customers should contact Kaseya for licensing information.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Suitable for:&lt;/i&gt; MSPs and medium to large organizations looking to remotely and continuously monitor and patch distributed endpoints with policy-driven automation and rapid auto-remediation.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="7. ManageEngine Patch Manager Plus"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;7. ManageEngine Patch Manager Plus&lt;/h2&gt;
 &lt;p&gt;ManageEngine Patch Manager Plus is a comprehensive patch management platform available as a cloud service or on-premises. It provides automated &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/The-Microsoft-patch-management-guide-for-admins"&gt;patch deployment on Windows&lt;/a&gt;, macOS and Linux endpoints, with support for both server and desktop systems, including VMs and roaming devices. Patch Manager Plus supports over 1,100 third-party applications. Although most of these are Windows software, the platform can also handle many macOS and Linux apps.&lt;/p&gt;
 &lt;p&gt;IT can use the centralized web interface to scan endpoints to detect missing patches, as well as test patches before deploying them. ManageEngine also provides prebuilt, tested and ready-to-deploy packages to help simplify patching of third-party apps. In addition, admins can customize deployment policies to meet their specific business requirements. They can specify which installation and reboot options to perform on an endpoint when deploying a patch, software update or service pack.&lt;/p&gt;
 &lt;p&gt;Patch Manager Plus includes auditing and dynamic reporting capabilities to help analyze and fix vulnerabilities. The platform provides real-time metrics that IT can view through patch status dashboards and patch management reports.&lt;/p&gt;
 &lt;p&gt;Patch Manager Plus is available in two editions: Professional and Enterprise. The cost for both depends on the number of devices and whether it is the on-premises or cloud edition. For the most part, the two deployment options offer similar functionality. Specifically, the Enterprise edition includes everything provided with the Professional edition, plus features like scheduled remote shutdowns, automated patch testing and updates for drivers, BIOS and antivirus. A free 30-day trial for both editions is also available.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Suitable for: &lt;/i&gt;Organizations looking to scalably and automatically patch multiple servers, OSes, laptops, workstations and apps with flexibility for cloud or on-premises deployment.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="8. Microsoft Configuration Manager"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;8. Microsoft Configuration Manager&lt;/h2&gt;
 &lt;p&gt;Microsoft Configuration Manager -- formerly System Center Configuration Manager -- is now &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/SCCM-vs-Intune-A-closer-look-at-the-capabilities-of-each"&gt;part of the Microsoft Intune brand&lt;/a&gt;, which also includes Intune, Endpoint Analytics and Autopilot. Configuration Manager is an on-premises system for managing desktops, laptops and servers on the local network or connected through the internet. Among its other capabilities, Configuration Manager can perform software updates.&lt;/p&gt;
 &lt;p&gt;Configuration Manager contains tools and resources for tracking and applying software updates to client computers. It integrates with&amp;nbsp;Windows Server Update Services&amp;nbsp;(&lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Windows-Server-Update-Services-WSUS"&gt;WSUS&lt;/a&gt;) to manage updates, and it connects to Microsoft Update to retrieve update metadata. Admins can schedule or manually start synchronizations with Microsoft Update. They can also scan for update compliance on client computers before deploying any updates. Configuration Manager provides a wizard for easily implementing deployment packages that contain the software updates.&lt;/p&gt;
 &lt;p&gt;The updating capabilities in Configuration Manager are geared primarily to Microsoft software. However, admins can use the Third-Party Software Update&amp;nbsp;Catalogs&amp;nbsp;feature in the Configuration Manager console to subscribe to third-party catalogs, publish their updates to a software update point and then deploy the software to client computers.&lt;/p&gt;
 &lt;p&gt;Configuration Manager licensing can be somewhat confusing, and organizations should carefully review Microsoft's licensing requirements or talk to a Microsoft representative before deciding how to proceed.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Suitable for: &lt;/i&gt;Medium to large Windows-centric organizations looking for on-premises patch management and update deployment for corporate-connected PCs, Macs and mobile devices, including cloud-based endpoints.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="9. NinjaOne Patch Management"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;9. NinjaOne Patch Management&lt;/h2&gt;
 &lt;p&gt;NinjaOne Patch Management is part of the NinjaOne IT ops platform, which includes a suite of cloud-based services that support remote management and monitoring. With NinjaOne Patch Management, admins can patch Windows, macOS and Linux operating systems, as well as over 135 third-party Windows apps. Managed endpoints can be on or off the corporate network, as long as they have an internet connection.&lt;/p&gt;
 &lt;p&gt;NinjaOne Patch Management automates patch ID, approval, deployment and reporting. Admins have complete control over how each endpoint is patched. They can approve and schedule patch deployments to meet their specific needs. They can also define patch policies that help to optimize and automate endpoint patching at scale. Additionally, IT can perform ad hoc deployments when needed. The platform offers a single pane of glass for identifying and remediating software vulnerabilities.&lt;/p&gt;
 &lt;p&gt;With NinjaOne Patch Management, admins get real-time visibility into patch statuses so they can quickly determine which devices are vulnerable. They can also generate and share reports with detailed information about endpoint compliance.&lt;/p&gt;
 &lt;p&gt;NinjaOne subscription fees are monthly, per-device, with subscribers charged only for what they need. Prospective customers should contact the company directly for a customized quote.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Suitable for: &lt;/i&gt;SMBs and MSPs looking for a cloud-based patch management tool with real-time reporting and automated workflows for multi-platform patching.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="10. SecPod Saner Patch Management"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;10. SecPod Saner Patch Management&lt;/h2&gt;
 &lt;p&gt;SecPod Saner Patch Management is one of the components included in the Saner endpoint security platform, a suite of cloud-based tools that provide vulnerability and compliance management, asset exposure, endpoint controls, patch management and other services. Saner Patch Management makes it possible to automatically patch Windows, macOS and Linux servers and workstations, as well as update over 550 third-party apps. Admins access these capabilities from a centralized, cloud-based console &lt;a href="https://www.techtarget.com/searchsecurity/tip/Types-of-access-control"&gt;with role-based access control&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;With Saner Patch Management, IT can automate end-to-end patch-related tasks such as scanning endpoints, prioritizing patches, downloading patches and scheduling deployments. The service provides new patches from supported vendors within 24 hours after release, helping minimize security risks. The patches are pretested and ready for deployment. Admins can also test new patches or roll back deployments if there are problems with a patch.&lt;/p&gt;
 &lt;p&gt;Saner Patch Management can perform continuous scans to verify real-time patch compliance. Admins can customize the scans to meet the needs of their specific environments. The centralized console provides a unified view of the managed endpoints, making it easier to identify noncompliant systems. The console also offers auto-generated reports and an integrated audit log. For information about subscription rates and plans, interested parties should contact SecPod directly.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Suitable for&lt;/i&gt;: SMBs looking for continuous, automated and precise Windows patch management, plus patching for Linux, macOS and third-party apps from a single console.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="11. SolarWinds Patch Manager"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;11. SolarWinds Patch Manager&lt;/h2&gt;
 &lt;p&gt;SolarWinds Patch Manager is patch management software that targets Microsoft products and third-party apps. It works with and extends Microsoft WSUS and&amp;nbsp;Configuration Manager&amp;nbsp;to patch both physical and virtual servers and workstations, including offline machines. The tool provides prebuilt and pretested packages for applications, including third-party apps. This enables IT to automate patching operations, which helps simplify patch management processes, from researching updates to deploying them in endpoint environments.&lt;/p&gt;
 &lt;p&gt;Patch Manager gives admins extensive control over the patching process. Using the software, IT can perform the following actions:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Specify which servers and workstations need patches, targeting endpoint systems based on criteria such as OSes or IP ranges.&lt;/li&gt; 
  &lt;li&gt;Control which patches to deploy and when to deploy them.&lt;/li&gt; 
  &lt;li&gt;Create different patching schedules for different endpoint groups.&lt;/li&gt; 
  &lt;li&gt;Create packages that define specific actions to take before or after patch deployment.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Patch Manager offers a centralized web interface for all patch management tasks. The interface includes a patch status dashboard and built-in reports. For example, admins can view details about patch compliance, the latest available patches, the top missing patches or a general health overview. They can also build custom reports to meet specific business needs. SolarWinds does not publicly list the pricing for Patch Manager. However, organizations can contact a sales representative to receive a customized quote.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Suitable for: &lt;/i&gt;Medium to large Windows-centric organizations looking for centralized, automated patch management with advanced scheduling and reboot control for Microsoft and third-party apps on physical and virtual servers and workstations.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="12. SysAid"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;12. SysAid&lt;/h2&gt;
 &lt;p&gt;SysAid Patch Management is an asset manager feature integrated into SysAid's line of&amp;nbsp;IT service management&amp;nbsp;(&lt;a href="https://www.techtarget.com/searchitoperations/definition/ITSM"&gt;ITSM&lt;/a&gt;) software products, which includes Help Desk, ITSM and ITSM AI. The patch management feature uses OEM technology to support Windows server and desktop computers, as well as third-party apps such as Mozilla Firefox, Google Chrome, Java and 7-Zip.&lt;/p&gt;
 &lt;p&gt;The SysAid Patch Management software is a fully automated patch manager that's configurable and highly scalable. It uses a formal change management process to&amp;nbsp;&lt;a href="https://www.techtarget.com/searchsecurity/tip/Security-patch-validation-and-verification"&gt;approve patch deployment and audit the patching process&lt;/a&gt;, which helps to ensure that patching operations are documented and that security patches and updates are properly applied. Admins can also customize the Patch Management policies and manually manage patches for individual assets or groups of assets.&lt;/p&gt;
 &lt;p&gt;IT teams can use Patch Management in both on-premises and cloud environments. A SysAid agent collects the scan results from the OEM agent's patch and transfers them to the SysAid server through Windows Server's&amp;nbsp;Remote Desktop Services. Patch Management is an optional component in SysAid Help Desk, ITSM and ITSM AI that requires its own annual subscription license. It can only be used for assets with active licenses.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Suitable for:&lt;/i&gt; SMBs -- particularly those that already use or plan to use SysAid ITSM tools -- looking to keep Windows-based servers and PCs up to date and audit the patching process.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="How to choose a patch management tool"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to choose a patch management tool&lt;/h2&gt;
 &lt;p&gt;Many patch management products are now available, and choosing one is no small task. IT admins and decision-makers can find the most suitable tool for their organization by considering four key factors.&lt;/p&gt;
 &lt;p&gt;The first factor to consider is fleet size. Fleet size refers to the total number of endpoints to patch and maintain, including client devices, servers and VMs. More endpoints means greater patching complexity and higher potential for security exposure. To minimize complexity and risk, it's crucial to select a patch management tool that can support a diverse and growing environment without performance degradation.&lt;/p&gt;
 &lt;p&gt;The next important factor is integration with the organization's existing security ecosystem. The tool should be compatible with existing vulnerability scanners, antivirus software, endpoint detection and response and other tools. Seamless integration and compatibility across these tools can streamline patch management and other security processes.&lt;/p&gt;
 &lt;p&gt;Another crucial factor is &lt;a href="https://www.techtarget.com/searchsecurity/tip/Automated-patch-management-Best-practices-for-success"&gt;automation capabilities&lt;/a&gt;. The best tools automate a major part of the patch management process, including patch discovery, testing and deployment. These capabilities simplify patching across environments and ease the burden on busy IT teams.&lt;/p&gt;
 &lt;p&gt;IT teams should also consider a tool's reporting and analytics features. The chosen tool should include dashboards and customizable reports that provide real-time visibility into patching status and pending patches. These insights can help teams identify and address issues before they can escalate. Additionally, audit trails and compliance reports are useful to highlight and remediate compliance issues.&lt;/p&gt;
 &lt;h3&gt;Implementing a new patch management tool&lt;/h3&gt;
 &lt;p&gt;Before introducing a tool into the broader IT ecosystem, it's a good idea to &lt;a href="https://www.techtarget.com/searchcio/feature/How-to-run-a-successful-IT-pilot-program"&gt;run a pilot&lt;/a&gt;. Running a pilot before a full-scale rollout enables IT teams and decision-makers to test the tool's functionality, drive user adoption and minimize compatibility issues across the environment.&lt;/p&gt;
 &lt;p&gt;To maximize the chances of a successful pilot, define clear objectives, create a detailed test plan and get real users to test-run the product. By adopting these practices, IT can ensure that the tool will work well in the future and deliver tangible security benefits.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt;&amp;nbsp;&lt;i&gt;This article was originally written by Robert Sheldon in February 2020. Rahul Awati updated this article in February 2026 to reflect technology changes.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Rahul Awati is a PMP-certified project manager with IT infrastructure experience spanning storage, compute and enterprise networking.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Robert Sheldon is a freelance technology writer. He has written numerous books, articles and training materials on a wide range of topics, including big data, generative AI, 5D memory crystals, the dark web and the 11th dimension.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>These 12 tools approach patching from different perspectives. Understanding their various approaches can help you find the right product for your needs.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/security_a299192530.jpg</image>
            <link>https://www.techtarget.com/searchenterprisedesktop/tip/12-best-patch-management-software-and-tools</link>
            <pubDate>Thu, 05 Feb 2026 15:30:00 GMT</pubDate>
            <title>12 best patch management software and tools for 2026</title>
        </item>
        <item>
            <body>&lt;p&gt;When CIOs embark on desktop modernization, desktop as a service, or &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/desktop-as-a-service-DaaS"&gt;DaaS&lt;/a&gt;, often looks like the most flexible foundation. Abstract the desktop from the device, centralize management and deliver a consistent user experience regardless of hardware or operating system.&lt;/p&gt; 
&lt;p&gt;In Windows-centric environments, that flexibility largely holds. Virtual desktops can be pooled, scaled and adjusted over time without forcing early architectural commitments. Desktop modernization remains something leaders can evolve incrementally.&lt;/p&gt; 
&lt;p&gt;Once Macs enter the picture, that flexibility narrows quickly -- and often irreversibly.&lt;/p&gt; 
&lt;p&gt;As detailed in &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Understanding-the-DaaS-options-for-Macs"&gt;&lt;i&gt;Understanding the DaaS options for Macs&lt;/i&gt;&lt;/a&gt;, Apple devices can easily access Windows-based virtual desktops through native clients or browser-based access, but delivering macOS itself as a virtual desktop is another matter. The constraint isn't performance or cloud maturity. It's licensing.&lt;/p&gt; 
&lt;p&gt;Apple's macOS licensing tightly couples the OS to Apple hardware and restricts shared, service-provider-style use. That immediately undermines the economics that make DaaS attractive in the first place. Centralization and resource sharing -- the core cost levers of desktop modernization -- only work when desktops can be pooled, reused and scaled efficiently.&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;What CIOs often assume about desktop modernization&lt;/h3&gt; 
  &lt;p&gt;Before committing to DaaS as the foundation for desktop modernization, many CIOs bring a familiar mental model with them. Endpoint choice doesn't feel like it should meaningfully affect the virtual desktop approach. Desktop OSes are assumed to be largely interchangeable. Licensing considerations tend to follow architecture decisions, not drive them. That framing usually holds in Windows-heavy environments. It breaks down much faster once Macs are part of the equation.&lt;/p&gt;
 &lt;/div&gt;
&lt;/div&gt; 
&lt;section class="section main-article-chapter" data-menu-title="When desktop modernization turns into early lock-in"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;When desktop modernization turns into early lock-in&lt;/h2&gt;
 &lt;p&gt;This is where desktop modernization hardens earlier than many CIOs expect.&lt;/p&gt;
 &lt;p&gt;Bringing Macs into the environment doesn't just add another endpoint. It quietly splits the desktop strategy in two. Windows users can be folded into centralized DaaS models, while Mac users stay anchored to physical devices, different support paths and a separate cost structure.&lt;/p&gt;
 &lt;p&gt;There are ways to work around that split, but none of them really put the genie back in the bottle. &lt;a href="https://www.techtarget.com/searchenterprisedesktop/feature/Why-2026-might-bring-more-Linux-desktops-to-the-enterprise"&gt;Linux-based virtual desktops&lt;/a&gt; sidestep some licensing issues, but they're still a stretch for most nontechnical users. Browser-based access helps Macs reach Windows desktops, but it doesn't change the underlying reality that macOS itself sits outside the shared virtual desktop pool.&lt;/p&gt;
 &lt;p&gt;None of this suggests Macs don't belong in the enterprise. But CIOs should recognize what they are deciding when Macs are widely deployed as part of a desktop modernization initiative. Once that choice is made, part of the workforce is effectively segmented away from the broader virtual desktop strategy.&lt;/p&gt;
 &lt;p&gt;Desktop modernization still matters. But in mixed environments, the window for flexibility closes sooner -- and more quietly -- than many leaders anticipate.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;James Alan Miller is a veteran technology editor and writer who leads Informa TechTarget's Enterprise Software group. He oversees coverage of ERP &amp;amp; Supply Chain, HR Software, Customer Experience, Communications &amp;amp; Collaboration and End-User Computing topics.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Desktop modernization looks flexible at the outset, but Macs introduce constraints that lock organizations into parallel desktop models far earlier than CIOs typically anticipate.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/strategy_a56806043.jpg</image>
            <link>https://www.techtarget.com/searchenterprisedesktop/feature/Desktop-decisions-harden-earlier-than-CIOs-expect</link>
            <pubDate>Wed, 04 Feb 2026 14:07:00 GMT</pubDate>
            <title>Desktop decisions harden earlier than CIOs expect</title>
        </item>
        <item>
            <body>&lt;p&gt;A black screen is a frustrating issue for Windows 11 users to encounter, and it can create cascading delays for IT support teams responsible for restoring access quickly.&lt;/p&gt; 
&lt;p&gt;Black screen issues in Windows 11 can be difficult to resolve. It's not because the fixes themselves are particularly complicated, but because of the time it can take to try different troubleshooting methods. Black screen errors, sometimes known as the black screen of death, can occur for many reasons, such as Windows updates, faulty applications, outdated drivers or malware infections.&lt;/p&gt; 
&lt;p&gt;As an IT administrator or desktop support professional, you'll have to narrow down the possible causes and prioritize fixes based on how and when the black screen appears.&lt;/p&gt; 
&lt;p&gt;The steps below are not strictly linear. In many enterprise environments, the fastest resolution comes from matching the troubleshooting step to when the black screen occurs -- for example, before login, after login or only when using an external display. Use the steps that best fit the symptoms you're seeing, rather than working through each one sequentially.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What can cause a Windows 11 black screen?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What can cause a Windows 11 black screen?&lt;/h2&gt;
 &lt;p&gt;A black screen in Windows 11 can sometimes resolve itself before you ever figure out the cause. It might take many instances of trial and error to resolve the issue. When trying to identify what's behind Windows 11 black screens, you should consider the following possibilities:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Windows OS.&lt;/b&gt; The operating system itself can be the cause of Windows 11 black screens. This is usually the result of &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/Windows-11-upgrade-issues-that-desktop-admins-should-know"&gt;faulty Windows updates&lt;/a&gt;, but corrupt or missing system files can also play a role.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Applications and drivers.&lt;/b&gt; An outdated or malfunctioning application or driver can lead to black screen errors. Graphics drivers are particularly suspect when it comes to these errors.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Configurations.&lt;/b&gt; Misconfigured settings can sometimes cause black screen issues. For example, the projection settings might be incorrect, or there might be a problem with the boot configuration data (BCD) store.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Hardware.&lt;/b&gt; Internal components and peripheral devices can also cause black screens. For instance, a physical connection such as a monitor's cable might be loose, or the graphics card might not be in the right position.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Malware.&lt;/b&gt; A &lt;a href="https://www.techtarget.com/searchsecurity/tip/10-common-types-of-malware-attacks-and-how-to-prevent-them"&gt;malware infection&lt;/a&gt; might cause a system to behave erratically, and that erratic behavior can include black screens.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;At best, black screen errors are an inconvenience that wastes time and causes user frustration. But it seldom stops there. Black screens can lead to lower productivity, the loss of unsaved work and even the permanent loss of data. To prevent these risks, be sure to troubleshoot and solve black screen issues as soon as possible.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="How to troubleshoot and fix a Windows 11 black screen"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to troubleshoot and fix a Windows 11 black screen&lt;/h2&gt;
 &lt;p&gt;If the system cannot reach the Windows login screen, most advanced troubleshooting steps require access to the Windows Recovery Environment (WinRE).&lt;/p&gt;
 &lt;p&gt;If the black screen prevents you from logging in normally, accessing the system &lt;a target="_blank" href="https://support.microsoft.com/en-us/windows/windows-recovery-environment-0eb14733-6301-41cb-8d26-06a12b42770b" rel="noopener"&gt;through the WinRE&lt;/a&gt; provides advanced recovery options such as Safe Mode and Startup Repair. In fact, many of the black screen troubleshooting steps are easiest to accomplish within WinRE.&lt;/p&gt;
 &lt;p&gt;The WinRE is a companion OS installed alongside the regular Windows 11 OS. It provides options for accessing, controlling and repairing the Windows 11 environment. However, getting to the WinRE can be difficult when you can't access the PC through the normal means. In this situation, you must use a workaround. Turn the computer off and then on several times. Each time you turn it off, hold the power button for about 10 seconds. After it's off, turn it back on. As soon as Windows launches, turn it off again. After the third restart, the computer should display the WinRE &lt;b&gt;Automatic Repair&lt;/b&gt; screen. From there, click &lt;b&gt;Advanced options&lt;/b&gt;, which takes you to the &lt;b&gt;Choose an option&lt;/b&gt; screen (Figure 1).&lt;/p&gt;
 &lt;p&gt;The &lt;b&gt;Choose an option&lt;/b&gt; screen lets you choose from the various options available for working within WinRE.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_1.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_1_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_1_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_1.jpg 1280w" alt="The 'Choose an option' screen in WinRE, showing options to continue to Windows 11, use a device, troubleshoot or turn off the PC." data-credit="Robert Sheldon" height="383" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 1. You can open troubleshooting options from the 'Choose an option' screen in WinRE. 
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;In most cases, you should select &lt;b&gt;Troubleshoot&lt;/b&gt; to access the features you need when dealing with Windows 11 black screens. Clicking this option opens the &lt;b&gt;Troubleshoot&lt;/b&gt; screen, where you can choose to either reset the PC or access more advanced features.&lt;/p&gt;
 &lt;p&gt;Next, select &lt;b&gt;Advanced&lt;/b&gt; &lt;b&gt;options&lt;/b&gt;. At the &lt;b&gt;Advanced&lt;/b&gt; &lt;b&gt;options&lt;/b&gt; screen, you can access startup settings, open the command prompt, uninstall updates and more (Figure 2).&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_2.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_2_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_2_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_2.jpg 1280w" alt="The 'Advanced options' screen in WinRE, showing 'Startup Repair,' 'Startup Settings' and other troubleshooting options." data-credit="Robert Sheldon" height="401" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 2. From the 'Advanced options' screen, you can access many of the troubleshooting strategies for fixing a black screen error.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Clicking the &lt;b&gt;Startup Settings&lt;/b&gt; option opens the first &lt;b&gt;Startup Settings&lt;/b&gt; screen, which includes only one option: &lt;b&gt;Restart&lt;/b&gt;.&lt;/p&gt;
 &lt;p&gt;Clicking &lt;b&gt;Restart&lt;/b&gt; launches the second &lt;b&gt;Startup Settings&lt;/b&gt; screen (Figure 3). This screen presents the three Safe Mode options, as well as options to enable or disable functions such as debugging and automatic restart.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_3.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_3_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_3_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_3.jpg 1280w" alt="The second 'Startup Settings' screen, showing a numbered list of startup options." data-credit="Robert Sheldon" height="426" width="558"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 3. The second 'Startup Settings' screen lists various startup options with the corresponding number keys from which to choose.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;In most cases with black screen errors, you should go to Safe Mode from here. Safe Mode provides a pared-down operating environment for diagnosing and resolving performance issues such as black screens.&lt;/p&gt;
 &lt;p&gt;WinRE is one of the best tools available for troubleshooting Windows 11 black screen issues and other problems with the underlying computer. When attempting to address black screen errors, you should try these seven steps, performing them in the order that seems most appropriate to your circumstances.&lt;/p&gt;
 &lt;h3&gt;1. Restart the computer&lt;/h3&gt;
 &lt;p&gt;Whether the black screen issue began before or after login, you should first try to restart the computer. Sometimes all it takes is a simple reboot to get the system back on track. This step is most useful when the black screen appears intermittently or immediately after a recent update or restart.&lt;/p&gt;
 &lt;p&gt;If you can't restart the computer the normal way, try to access the power button by pressing &lt;b&gt;Ctrl + Alt + Delete&lt;/b&gt;. This should bring up a mostly blank screen showing a list of options, with the power button in the bottom right corner (Figure 4).&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_4.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_4_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_4_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_4.jpg 1280w" alt="A black screen with a list of menu options in the center and icons in the bottom right corner." data-credit="Robert Sheldon" height="342" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 4. The power button icon should be in the bottom right corner of the screen that appears after you press Ctrl + Alt + Delete.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;If this approach doesn't work, press and hold the power button until the computer shuts down. After that, try booting the computer normally. If this doesn't resolve the problem, work through the other steps.&lt;/p&gt;
 &lt;h3&gt;2. Update, reset or remove applications&lt;/h3&gt;
 &lt;p&gt;Black screens that occur after login -- especially when a cursor is visible -- often point to File Explorer, a startup application or a recently updated app.&lt;/p&gt;
 &lt;p&gt;In some cases, an application is the cause of black screen errors. However, it's not always third-party applications. &lt;a href="https://www.techtarget.com/searchenterprisedesktop/news/252526389/Latest-Windows-11-update-adds-tabbed-File-Explorer"&gt;File Explorer in Windows 11&lt;/a&gt; can also cause black screen issues. For this reason, you should try to restart Explorer, especially if the black screen appears after login. For this, you'll need to open Task Manager, which you might be able to access by pressing &lt;b&gt;Ctrl + Alt + Delete&lt;/b&gt;.&lt;/p&gt;
 &lt;p&gt;If you can reach Task Manager, you can restart Explorer by selecting &lt;b&gt;Windows Explorer&lt;/b&gt; in the Task Manager window and moving your cursor to click &lt;b&gt;Restart &lt;/b&gt;(Figure 5). Another option is to open &lt;b&gt;explorer.exe &lt;/b&gt;as a new task in Task Manager.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_5.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_5_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_5_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_5.png 1280w" alt="The Task Manager in Windows 11, with 'Windows Explorer' and its process information highlighted." data-credit="Robert Sheldon"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 5. Windows Explorer has been a common source of problems in the new OS, so you might need to restart the app in Task Manager.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;If restarting Explorer doesn't work or isn't possible, confirm that Explorer is properly included in the Winlogon settings in the registry. You can do this in Safe Mode, if necessary. &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Command-line-options-for-Regeditexe"&gt;Open the Registry Editor&lt;/a&gt; and navigate to &lt;b&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon&lt;/b&gt;. From there, make sure that the &lt;b&gt;Value data&lt;/b&gt; for the &lt;b&gt;Shell&lt;/b&gt; value under the Winlogon subkey is set to &lt;b&gt;explorer.exe &lt;/b&gt;(Figure 6).&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_6.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_6_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_6_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_6.png 1280w" alt="The Windows 11 Registry Editor, with the Winlogon subkey selected and 'Edit String' prompt open." data-credit="Robert Sheldon"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 6. You can check the 'Shell' value for Winlogon in the Registry Editor.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;If the black screen issue started after the installation of a new app, you might need to uninstall the app in Safe Mode. You should be able to launch Safe Mode even if a faulty application is causing black screen errors. Once in Safe Mode, use the &lt;b&gt;Apps &amp;amp; features&lt;/b&gt; option to remove the application.&lt;/p&gt;
 &lt;h3&gt;3. Verify system configurations and settings&lt;/h3&gt;
 &lt;p&gt;On systems that use multiple displays, docking stations or custom boot configurations, it's common for black screen issues to stem from misconfigurations.&lt;/p&gt;
 &lt;p&gt;Incorrect projection settings are a possible reason for black screen errors. If the black screen doesn't prevent the PC from displaying the projection settings, you can access them with the command &lt;b&gt;Win + P&lt;/b&gt; (Figure 7). Correcting any misconfigured settings might fix the black screen problem.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_7.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_7_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_7_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_7.png 1280w" alt="A close-up of the projection settings menu in Windows 11." data-credit="Robert Sheldon"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 7. Changing the projection settings might resolve the black screen issue. 
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;You might also be able to resolve black screen issues by rebuilding the BCD store, which can sometimes become misconfigured or corrupted. The BCD contains information about boot applications and boot application settings. Microsoft provides the &lt;b&gt;bootrec&lt;/b&gt; command-line utility to troubleshoot and repair Windows BCD (Figure 8). This includes rebuilding the BCD store. However, you should be familiar with the &lt;b&gt;bootrec&lt;/b&gt; utility and how the command options work before rebuilding the BCD.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_8.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_8_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_8_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_8.jpg 1280w" alt="The command prompt window for bootrec." data-credit="Robert Sheldon" height="308" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 8. You can use the bootrec command-line utility to rebuild the BCD store.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;The Deployment Image Servicing and Management (&lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Microsoft-Windows-Deployment-Image-Servicing-and-Management-DISM"&gt;DISM&lt;/a&gt;) tool and the System File Checker (SFC) can also be helpful when troubleshooting Windows 11 black screen issues. You should run the DISM scan first, and then run the SFC scan. Together, these tools can help identify and replace missing or corrupted Windows 11 system files, which can sometimes cause black screen problems.&lt;/p&gt;
 &lt;h3&gt;4. Examine the hardware devices and their connections&lt;/h3&gt;
 &lt;p&gt;In managed Windows environments, problems with hardware or drivers -- display drivers, in particular -- are one of the most common causes of persistent black screen issues.&lt;/p&gt;
 &lt;p&gt;You should update, disable or uninstall drivers wherever you suspect they might be causing problems. To do this, use Device Manager when in Safe Mode. If you're updating a driver, you'll likely need to use Safe Mode with Networking.&lt;/p&gt;
 &lt;p&gt;The display driver is often behind black screen errors, so it's usually a good place to start when evaluating hardware drivers. In some cases, you might be able to resolve black screen issues by simply restarting the graphics driver in a normal Windows environment. To do this, press &lt;b&gt;Win + Ctrl + Shift + B&lt;/b&gt;.&lt;/p&gt;
 &lt;p&gt;If you don't think a driver is the cause of the black screen, you should look to the hardware itself. First, unplug any peripherals that aren't necessary and then restart the computer to see if that helps. If that doesn't work, check all physical connections, unplugging them and then reconnecting them as necessary. Make sure that all graphics cards sit firmly in their respective slots and that all internal components are free from dirt and dust. If a spare is available, you can try replacing the monitor as well. It can also be useful to run diagnostics against the memory, storage and other components to verify that they're operating properly.&lt;/p&gt;
 &lt;h3&gt;5. Scan for malware&lt;/h3&gt;
 &lt;p&gt;If the desktop has been exhibiting other unusual behavior besides the black screen, malware is a likely cause.&lt;/p&gt;
 &lt;p&gt;Computers sometimes experience black screen problems because of a malware infection. For this reason, you should scan the system to ensure that there are no signs of infection. Malware can cause far more damage than just black screens, so you must identify and &lt;a href="https://www.techtarget.com/searchsecurity/Ultimate-guide-to-incident-response-and-management"&gt;deal with any possible malware infections&lt;/a&gt; as quickly as possible.&lt;/p&gt;
 &lt;h3&gt;6. Add or remove Windows updates&lt;/h3&gt;
 &lt;p&gt;In some cases, you can address black screen issues by applying a Windows update that might have failed or been deferred. If you have direct access to the computer that's experiencing problems, you can use the &lt;b&gt;Windows Update&lt;/b&gt; feature in Settings to view the update history and check and install any pending updates (Figure 9).&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_9.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_9_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_9_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/windows_11_black_screen_9.png 1280w" alt="The 'Windows Update' screen in the Windows 11 system settings." data-credit="Robert Sheldon"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 9. You can install pending updates through the 'Windows Update' screen in settings. You can only uninstall updates through 'Advanced options' in WinRE, however.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;If you're using Safe Mode for troubleshooting, you won't be able to run Windows Update in that environment. Instead, install the updates after restarting Windows normally.&lt;/p&gt;
 &lt;p&gt;Black screen errors might be the result of a recent Windows update. If the problems started after an update, you can use the &lt;b&gt;Uninstall Updates&lt;/b&gt; option in WinRE to roll back the update.&lt;/p&gt;
 &lt;p&gt;From WinRE, you can choose to roll back the last quality update or feature update. If you want to do both, you should do only one at a time and restart the computer normally after each one to see whether it fixed the problem.&lt;/p&gt;
 &lt;p&gt;IT support teams should also be sure to align update installation and rollback with organizational patching and change management policies.&lt;/p&gt;
 &lt;h3&gt;7. Repair, restore or roll back Windows&lt;/h3&gt;
 &lt;p&gt;You can use other WinRE options to try to address black screen issues as well. One of these is Startup Repair, which can help fix problems with the Master Boot Record, partition table or boot sector. It will also remove the most recent update if it immediately preceded a startup failure. When you click the &lt;b&gt;Startup Repair&lt;/b&gt; option in WinRE, the repair feature automatically starts diagnosing the system.&lt;/p&gt;
 &lt;p&gt;You can also use WinRE to roll the computer back to a specific point in time, assuming that there are restore points on the computer. The &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/System-Restore"&gt;System Restore&lt;/a&gt; utility makes it possible to revert the system to a restore point that was created before the black screen issues started. This won't remove any personal data, but it will remove any updates, drivers or apps that users have installed since the time of the restore point.&lt;/p&gt;
 &lt;p&gt;If you're unable to resolve black screen issues through other approaches, you might need to reset Windows 11, which returns the OS to its original factory settings. To get started, select &lt;b&gt;Reset this PC&lt;/b&gt; in WinRE, which will take you to the &lt;b&gt;Choose an option&lt;/b&gt; screen. Here, you can choose to either retain personal files or remove all personal files, settings and applications.&lt;/p&gt;
 &lt;p&gt;If resetting the OS doesn't work, the last troubleshooting option is to reinstall Windows 11, which means reinstalling all applications and reconfiguring all settings. It might be possible to roll back to Windows 10, but only if the Windows 11 upgrade occurred within the past 10 days. However, you might still be able to install Windows 10 rather than Windows 11 if you determine that reinstallation is the only viable option.&lt;/p&gt;
 &lt;p&gt;When troubleshooting Windows 11 black screen issues, the goal is to restore user access as quickly as possible while minimizing unnecessary disruption. Matching the troubleshooting approach to the symptoms enables IT teams to prioritize the most effective actions under real-world constraints. This further helps reduce downtime, standardize response and lower the likelihood of recurrence across managed environments.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt;&lt;i&gt;&amp;nbsp;This article was updated in February 2026 to reflect technology changes and to improve the reader experience.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Robert Sheldon is a freelance technology writer. He has written numerous books, articles and training materials on a wide range of topics, including big data, generative AI, 5D memory crystals, the dark web and the 11th dimension.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>A black screen can be a symptom of several issues with a Windows 11 desktop. Knowing where to look for the source of the problem can simplify the troubleshooting process.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/strategy_a268589527.jpg</image>
            <link>https://www.techtarget.com/searchenterprisedesktop/tip/Steps-to-fix-a-black-screen-in-Windows-11</link>
            <pubDate>Mon, 02 Feb 2026 14:00:00 GMT</pubDate>
            <title>7 steps to fix a black screen in Windows 11</title>
        </item>
        <item>
            <body>&lt;p&gt;&lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/unified-endpoint-management-UEM"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;Unified endpoint management&amp;nbsp;(&lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/unified-endpoint-management-UEM"&gt;UEM&lt;/a&gt;) products have become necessary in nearly all larger organizations as they incorporate more types of endpoints into their workflows.&lt;/p&gt; 
&lt;p&gt;UEM systems are the only realistic option for coping with device sprawl, especially in organizations that allow users to work from personal devices. While capabilities vary from one product to the next, UEM products enable organizations to manage and secure various device types -- even if those devices are running different&amp;nbsp;&lt;a href="https://www.techtarget.com/whatis/definition/operating-system-OS"&gt;OSes&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;A single UEM product can potentially manage a variety of laptops, desktops, phones and tablets. This device management consolidation helps maintain identity and access management (&lt;a href="https://www.techtarget.com/searchsecurity/definition/identity-access-management-IAM-system"&gt;IAM&lt;/a&gt;) consistency and ensures that policies are applied to devices in a uniform manner. Applying detailed audit trails, device health checks and automated policy enforcement across corporate-owned and BYOD devices is essential for maintaining regulatory compliance.&lt;/p&gt; 
&lt;p&gt;UEM software can also improve help desk efficiency by enabling capabilities such as automated patching and app deployment while also enabling remote access to devices.&lt;/p&gt; 
&lt;p&gt;Explore the six leading UEM products of 2026, chosen for their popularity and appearance in rating reports from Gartner and similar market studies. This list is not ranked and appears in alphabetical order.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Compare key UEM tool features and capabilities"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Compare key UEM tool features and capabilities&lt;/h2&gt;
 &lt;p&gt;When choosing a UEM product, there are several important factors to consider:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;OS support.&lt;/b&gt;&amp;nbsp;One of the most important considerations is what OSes the tool supports. A UEM product will only be useful if it supports the devices and OSes the organization uses. For example, if an organization uses Windows PCs and&amp;nbsp;&lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/Android-OS"&gt;Google Android&lt;/a&gt;&amp;nbsp;phones, then, at a minimum, the chosen UEM tool needs Windows and Android management capabilities. Otherwise, the organization will have to adopt an additional management tool that can handle the unsupported OS, thereby increasing both cost and management complexity.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Security and privacy.&lt;/b&gt;&amp;nbsp;The product's security and privacy features are critical factors to consider. Nearly all UEM products keep managed devices secure, but the actual&amp;nbsp;&lt;a href="https://www.techtarget.com/searchsecurity/tip/Types-of-endpoint-security"&gt;security capabilities vary&lt;/a&gt;&amp;nbsp;from one UEM product to another.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Device management.&lt;/b&gt;&amp;nbsp;A UEM tool must also provide a consistent management experience across all devices. If an organization has a policy requiring a certain password length, for example, the UEM software should enable the organization to define that policy in one place and apply the policy to all relevant devices, regardless of OS. Creating one policy for iOS devices and a separate policy that does the same thing for Android devices makes device management more difficult and costly.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;App and software management.&lt;/b&gt;&amp;nbsp;Most UEM products enable IT to deploy apps to managed devices. However, not all UEM tools support all types of applications. Ideally, an organization should look for a UEM product that will let it automatically push applications to all its managed devices. Additionally, some UEM software lets organizations create their own enterprise app store from which users can deploy apps to their devices without IT intervention.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Deployment and enrollment.&lt;/b&gt; Before a UEM product can manage a device, that device needs to be enrolled. IT should closely examine what's involved in the enrollment process, as users will likely register their own devices. Most modern UEM products provide a simple web portal through which users can answer a few basic questions and have their devices enrolled automatically. This approach can help reduce costs, since users won't need to contact the help desk for assistance.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;IAM.&lt;/b&gt;&amp;nbsp;Organizations should consider whether a product&amp;nbsp;relies on its own proprietary identity provider&amp;nbsp;or if it can integrate with the existing directory service. It's also important to consider whether a product supports role-based access control (&lt;a href="https://www.techtarget.com/searchsecurity/definition/role-based-access-control-RBAC"&gt;RBAC&lt;/a&gt;) and the granularity of permissions. If a UEM product requires a proprietary identity provider, the organization must maintain separate, parallel identities for its users. This increases cost and complexity.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Pricing.&lt;/b&gt;&amp;nbsp;It's important to know what a UEM product costs. UEM tools are typically subscription-based, but ancillary products might be necessary to get the most use out of a UEM product.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="1. IBM Security MaaS360"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;1. IBM Security MaaS360&lt;/h2&gt;
 &lt;p&gt;IBM Security MaaS360 with Watson helps secure and manage various device types, from desktops to wearables. MaaS360 heavily emphasizes helping organizations with their &lt;a href="https://www.techtarget.com/whatis/definition/BYOD-bring-your-own-device"&gt;BYOD&lt;/a&gt; efforts. It also uses&amp;nbsp;&lt;a href="https://www.techtarget.com/searchenterpriseai/definition/AI-Artificial-Intelligence"&gt;AI&lt;/a&gt;&amp;nbsp;to detect and surface actionable insights.&lt;/p&gt;
 &lt;h3&gt;Supported OSes&lt;/h3&gt;
 &lt;p&gt;IBM's list of supported operating systems includes the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/iOS"&gt;Apple iOS&lt;/a&gt;, macOS and iPadOS.&lt;/li&gt; 
  &lt;li&gt;Google Android and ChromeOS.&lt;/li&gt; 
  &lt;li&gt;Microsoft Windows.&lt;/li&gt; 
  &lt;li&gt;Various ruggedized, wearable and IoT devices.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Security and privacy&lt;/h3&gt;
 &lt;p&gt;MaaS360 uses an AI-powered tool to identify and generate security insights and&amp;nbsp;&lt;a href="https://www.techtarget.com/searchsecurity/definition/threat-detection-and-response-TDR"&gt;detect and remediate threats&lt;/a&gt; like malware, risky device configuration settings and malicious apps. It can also detect when an end-user device has been jailbroken or rooted.&lt;/p&gt;
 &lt;h3&gt;Device management&lt;/h3&gt;
 &lt;p&gt;IBM Security MaaS360 is a cloud-based SaaS tool for managing endpoint devices. Like other UEM offerings, MaaS360 provides a dashboard that lets various devices be managed side by side through a&amp;nbsp;single-pane-of-glass&amp;nbsp;interface.&lt;/p&gt;
 &lt;h3&gt;App and software management&lt;/h3&gt;
 &lt;p&gt;IT can use MaaS360 to create an app catalog to deploy apps to managed devices. Supported app types include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Internal applications that the organization develops for internal use.&lt;/li&gt; 
  &lt;li&gt;Purchased applications bought from an app store for the organization's use.&lt;/li&gt; 
  &lt;li&gt;Public apps listed in a public app store.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Deployment and enrollment&lt;/h3&gt;
 &lt;p&gt;IBM Security MaaS360 supports several common types of device enrollment. These &lt;a target="_blank" href="https://www.ibm.com/docs/en/maas360?topic=portal-configuring-directory-enrollment-settings-in-maas360" rel="noopener"&gt;include&lt;/a&gt; Apple Configurator, Apple Automated Device Enrollment (ADE), Samsung Knox Mobile Enrollment, Android Enterprise zero-touch and QR code enrollment, Windows Out-Of-Box Experience and others.&lt;/p&gt;
 &lt;h3&gt;IAM&lt;/h3&gt;
 &lt;p&gt;MaaS360 works with IBM Security Verify, IBM's IAM service, with options for&amp;nbsp;single sign-on (&lt;a href="https://www.techtarget.com/searchsecurity/definition/single-sign-on"&gt;SSO&lt;/a&gt;)&amp;nbsp;and conditional access management.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;IBM uses subscription-based pricing for its MaaS360 software. In addition to a 30-day free trial, the company offers four different pricing plans, each charged per device, per month. The Essentials plan starts at $2.80 per client device, per month, with the price increasing to $3.50 for the Deluxe plan. IBM's Premier plan starts at $4.38, and the Enterprise plan sells for $6.30.&lt;/p&gt;
 &lt;h3&gt;Use case&lt;/h3&gt;
 &lt;p&gt;IBM's MaaS360 is a good option for organizations that want AI-driven analytics and advice. IBM also tends to focus on vertical industries, including financial services, healthcare, retail, and distribution and supply chain management.&lt;/p&gt;
&lt;/section&gt;                    
&lt;section class="section main-article-chapter" data-menu-title="2. Ivanti UEM"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;2. Ivanti UEM&lt;/h2&gt;
 &lt;p&gt;Ivanti UEM is designed to help organizations with a diverse collection of devices operate at scale. The software lets IT perform management actions, such as policy enforcement or software deployment, across many devices with a few clicks. The right reporting capabilities can help admins more easily spot issues needing their attention.&lt;/p&gt;
 &lt;h3&gt;Supported OSes&lt;/h3&gt;
 &lt;p&gt;Ivanti's ability to manage a device depends on the availability of a management agent for the device's OS. The product has a long list of supported OSes and broadly covers the following platforms:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Apple iOS and macOS.&lt;/li&gt; 
  &lt;li&gt;Google Android and ChromeOS.&lt;/li&gt; 
  &lt;li&gt;Microsoft Windows.&lt;/li&gt; 
  &lt;li&gt;Linux.&lt;/li&gt; 
  &lt;li&gt;Rugged devices.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Security and privacy&lt;/h3&gt;
 &lt;p&gt;Ivanti delivers endpoint security through Ivanti Endpoint Security, which is licensed separately. While Ivanti Endpoint Security is probably best known for its&amp;nbsp;&lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/patch-management"&gt;patch management&lt;/a&gt;&amp;nbsp;and antivirus capabilities, it can do much more. For example, the software can prevent unauthorized apps from running on devices and can even prevent the use of removable media.&lt;/p&gt;
 &lt;p&gt;Ivanti also has another tool to protect mobile devices. Ivanti Neurons for Mobile Threat Defense guards against&amp;nbsp;&lt;a href="https://www.techtarget.com/searchsecurity/definition/zero-day-vulnerability"&gt;zero-day vulnerabilities&lt;/a&gt; and more common threats, such as phishing attacks and malicious URLs.&lt;/p&gt;
 &lt;h3&gt;Device management&lt;/h3&gt;
 &lt;p&gt;Ivanti's preferred tool for device management is Ivanti Endpoint Manager. It provides a single view that shows all managed devices, regardless of type, OS migrations, patch management, software deployment and other similar tasks. The dashboard also includes rich reporting capabilities and a remote-control feature that can control&amp;nbsp;&lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/6-steps-for-when-remote-desktop-credentials-are-not-working"&gt;remote device troubleshooting&lt;/a&gt;.&lt;/p&gt;
 &lt;h3&gt;App and software management&lt;/h3&gt;
 &lt;p&gt;The Ivanti UEM platform deploys AppConnect apps to managed devices. AppConnect apps are containerized apps packaged using the AppConnect SDK, AppConnect Cordova Plugin or App Wrapper for iOS and Android. Another Ivanti product, AppStation, provides application access for both managed and unmanaged devices.&lt;/p&gt;
 &lt;h3&gt;Deployment and enrollment&lt;/h3&gt;
 &lt;p&gt;Ivanti supports common device enrollment types, including Apple's ADE, Android Enterprise zero-touch enrollment and Knox Mobile Enrollment. Additionally, Ivanti enables its customers to restrict devices based on enrollment type.&lt;/p&gt;
 &lt;h3&gt;IAM&lt;/h3&gt;
 &lt;p&gt;Ivanti regulates access to its software by using RBAC, which Ivanti refers to as&amp;nbsp;&lt;i&gt;role-based administration&lt;/i&gt;. Ivanti lets IT create custom roles that can restrict admins based on factors such as geographic location or department. While the software does allow the use of local users and groups on &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/SCCM-vs-Intune-A-closer-look-at-the-capabilities-of-each"&gt;Windows machines&lt;/a&gt;, IT can also configure it to work with Active Directory (AD) users and groups.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;Ivanti uses a subscription-based licensing model with three plans available -- Secure UEM Professional, Secure UEM Professional Plus and Secure UEM Premium -- but requires potential customers to contact its sales department for a quote. Ivanti is known for its a la carte pricing model, where the overall licensing cost is determined by what tools and features are needed.&lt;/p&gt;
 &lt;h3&gt;Use case&lt;/h3&gt;
 &lt;p&gt;Ivanti UEM is notable for its simplicity-focused design. It's a good choice for organizations that want to minimize mouse clicks as they manage devices.&lt;/p&gt;
&lt;/section&gt;                    
&lt;section class="section main-article-chapter" data-menu-title="3. ManageEngine Endpoint Central"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;3. ManageEngine Endpoint Central&lt;/h2&gt;
 &lt;p&gt;ManageEngine Endpoint Central is a UEM tool that can assist with device management, device patching, data security, remote intelligence and ransomware protection.&lt;/p&gt;
 &lt;h3&gt;Supported OSes&lt;/h3&gt;
 &lt;p&gt;Endpoint Central supports a variety of OSes, including iOS, macOS, iPadOS and tvOS. Additionally, the software supports Windows, Linux, ChromeOS and Android.&lt;/p&gt;
 &lt;h3&gt;Security and privacy&lt;/h3&gt;
 &lt;p&gt;To &lt;a href="https://www.techtarget.com/searchsecurity/tip/Insider-threat-hunting-best-practices-and-tools"&gt;prevent insider threats&lt;/a&gt; and other types of security incidents, Endpoint Central offers privilege management and app monitoring. The software can also control access to sensitive data at the device level. Additionally, the software includes threat detection and remediation capabilities as well as a data loss prevention feature.&lt;/p&gt;
 &lt;h3&gt;Device management&lt;/h3&gt;
 &lt;p&gt;Endpoint Central is designed for centralized MDM, but it goes a step beyond the basics. Unlike some of the other UEM products, Endpoint Central can perform automated OS deployment and can even deploy device drivers.&lt;/p&gt;
 &lt;h3&gt;App and software management&lt;/h3&gt;
 &lt;p&gt;Endpoint Central can deploy apps to devices and gives admins the ability to allow or block specific apps and use rule-based filtering.&lt;/p&gt;
 &lt;h3&gt;Deployment and enrollment&lt;/h3&gt;
 &lt;p&gt;Endpoint Central supports bulk enrollment using a CSV file, or users can enroll their own devices. Admins can invite users to enroll their devices by email or text message.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;Manage Engine does not publicly disclose pricing for its Endpoint Central software. The company does, however, offer a 30-day free trial.&lt;/p&gt;
 &lt;h3&gt;Use case&lt;/h3&gt;
 &lt;p&gt;ManageEngine's Endpoint Central is a feature-rich product that incorporates numerous security and management tools. It's well-suited to organizations that want to handle all device-related tasks with a single tool.&lt;/p&gt;
&lt;/section&gt;                
&lt;section class="section main-article-chapter" data-menu-title="4. Microsoft Intune"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;4. Microsoft Intune&lt;/h2&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchitchannel/definition/Microsoft-Intune"&gt;Intune&lt;/a&gt;&amp;nbsp;is Microsoft's cloud-based UEM platform that lets organizations&amp;nbsp;&lt;a href="https://www.techtarget.com/searchmobilecomputing/tip/How-to-create-a-mobile-device-management-policy-for-your-org"&gt;manage corporate and personally owned devices&lt;/a&gt;&amp;nbsp;of various types. Admins can use Intune to apply security policies to devices and manage the apps installed on them.&lt;/p&gt;
 &lt;h3&gt;Supported OSes&lt;/h3&gt;
 &lt;p&gt;Microsoft Intune supports a wide range of device OSes, including the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Apple iOS, macOS and iPadOS.&lt;/li&gt; 
  &lt;li&gt;Google Android and ChromeOS.&lt;/li&gt; 
  &lt;li&gt;Microsoft Windows.&lt;/li&gt; 
  &lt;li&gt;Linux.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Security and privacy&lt;/h3&gt;
 &lt;p&gt;Microsoft Intune contains an Endpoint Security node that serves as a collection of tools for device security. These tools can check the status of devices or configure devices based on established security baselines. These baselines are collections of security best practices that IT can apply as a policy to devices. The Endpoint Security node can also apply tightly focused policies -- such as antivirus and encryption -- to devices. Additionally, these tools enable admins to set user and device requirements through a compliance policy.&lt;/p&gt;
 &lt;h3&gt;Device management&lt;/h3&gt;
 &lt;p&gt;Like other UEM tools, Intune provides a consolidated view of managed devices. The management console lets IT perform various management actions, such as synchronizing the device, resetting its passcode or performing a&amp;nbsp;&lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/remote-wipe"&gt;remote wipe&lt;/a&gt;. Notably, some of the available device actions are device-type-specific.&lt;/p&gt;
 &lt;h3&gt;App and software management&lt;/h3&gt;
 &lt;p&gt;Microsoft Intune works with four different types of apps. These include custom applications, apps from the store, built-in apps and apps on the web.&lt;/p&gt;
 &lt;h3&gt;Deployment and enrollment&lt;/h3&gt;
 &lt;p&gt;Microsoft Intune supports several different types of device enrollments. These include Android Enterprise zero-touch enrollment,&amp;nbsp;Apple Configurator and Knox Mobile Enrollment.&lt;/p&gt;
 &lt;h3&gt;IAM&lt;/h3&gt;
 &lt;p&gt;Microsoft Intune is designed to work with AD and Entra ID (formerly known as Azure AD), so it recognizes AD users and groups. Access to Microsoft Intune is provided through RBAC. And while IT can define custom roles, nine built-in roles provide various levels of access.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;Microsoft Intune is subscription-based, but Microsoft's licensing options for Intune are somewhat complex. Intune is currently offered in three plans -- Plan 1, Plan 2 and Intune Suite -- with Plan 2 and Intune Suite acting as add-ons to Intune Plan 1 with additional subscription fees. Additionally, Intune is bundled and included in several Microsoft 365 subscription plans.&lt;/p&gt;
 &lt;h3&gt;Use case&lt;/h3&gt;
 &lt;p&gt;Microsoft Intune is a good all-around UEM tool. While it does support cross-platform device management, it's especially suitable for organizations that have standardized around the Microsoft ecosystem.&lt;/p&gt;
&lt;/section&gt;                   
&lt;section class="section main-article-chapter" data-menu-title="5. NinjaOne"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5. NinjaOne&lt;/h2&gt;
 &lt;p&gt;NinjaOne offers a suite of products that can help organizations manage all their devices, servers and VMs through a single interface. The platform specializes in scalability and helps automate common IT device management tasks.&lt;/p&gt;
 &lt;h3&gt;Supported OSes&lt;/h3&gt;
 &lt;p&gt;NinjaOne supports cross-platform management for Windows, macOS and Linux devices. The company offers a separate tool for MDM.&lt;/p&gt;
 &lt;h3&gt;Security and privacy&lt;/h3&gt;
 &lt;p&gt;Organizations can use NinjaOne to increase their security by using the software's native patch management and auto-remediation capabilities. The company's MDM software offers additional security capabilities, such as remote wipe and passcode reset.&lt;/p&gt;
 &lt;h3&gt;Device management&lt;/h3&gt;
 &lt;p&gt;NinjaOne's Endpoint Management software provides capabilities such as hardware and software inventory, software and OS deployment, monitoring and alerting for support issues, and endpoint task automation.&lt;/p&gt;
 &lt;h3&gt;App and software management&lt;/h3&gt;
 &lt;p&gt;IT can use NinjaOne for OS and app deployment to devices. While the software distribution capabilities can be tied to onboarding or device setup, it can also be used for managing software upgrades.&lt;/p&gt;
 &lt;h3&gt;Deployment and enrollment&lt;/h3&gt;
 &lt;p&gt;For the organization's MDM software, zero-touch deployment, QR code-based enrollment or bulk enrollment are all device enrollment options.&lt;/p&gt;
 &lt;h3&gt;IAM&lt;/h3&gt;
 &lt;p&gt;NinjaOne provides IAM through RBAC, letting IT assign permissions based on administrator roles. The platform supports integration with external identity providers through SSO and &lt;a href="https://www.techtarget.com/searchsecurity/tip/Must-know-IAM-standards"&gt;System for Cross-domain Identity Management for user provisioning&lt;/a&gt;. NinjaOne also supports multifactor authentication to help secure administrative access.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;NinjaOne doesn't publicly disclose pricing for its products, requiring prospective customers to fill out a form to request a quote. However, a free trial is available.&lt;/p&gt;
 &lt;h3&gt;Use case&lt;/h3&gt;
 &lt;p&gt;NinjaOne is a good choice for organizations seeking to gain additional visibility into their devices. It's also a compelling option for those that want to automate tedious IT tasks.&lt;/p&gt;
&lt;/section&gt;                  
&lt;section class="section main-article-chapter" data-menu-title="6. Omnissa Workspace One"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;6. Omnissa Workspace One&lt;/h2&gt;
 &lt;p&gt;Omnissa Workspace One, formerly VMware Workspace One, is a UEM tool for managing devices and the apps running on them, regardless of where those devices reside. Workspace One also has security features that make it easy to identify devices that don't comply with an organization's security policies.&lt;/p&gt;
 &lt;h3&gt;Supported OSes&lt;/h3&gt;
 &lt;p&gt;Supported OSes for Omnissa Workspace One include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Apple iOS and macOS.&lt;/li&gt; 
  &lt;li&gt;Google Android and ChromeOS.&lt;/li&gt; 
  &lt;li&gt;Linux.&lt;/li&gt; 
  &lt;li&gt;Microsoft Windows.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Security and privacy&lt;/h3&gt;
 &lt;p&gt;Omnissa Workspace One provides a foundation for&amp;nbsp;&lt;a href="https://www.techtarget.com/searchsecurity/definition/zero-trust-model-zero-trust-network"&gt;zero-trust security&lt;/a&gt;. In addition to enabling end-to-end security across devices, users and apps, Omnissa supports conditional access and generates machine learning based on insights and automations.&lt;/p&gt;
 &lt;h3&gt;Device management&lt;/h3&gt;
 &lt;p&gt;Like other UEM tools, Omnissa Workspace One uses a single-pane-of-glass interface to manage devices. This dashboard makes it easy to identify devices suffering from a particular problem. For example, the dashboard shows compromised devices, devices with no passcode and devices that aren't encrypted.&lt;/p&gt;
 &lt;h3&gt;App and software management&lt;/h3&gt;
 &lt;p&gt;Omnissa's tools can manage various application types on managed devices, including internal, purchased and public apps.&lt;/p&gt;
 &lt;h3&gt;Deployment and enrollment&lt;/h3&gt;
 &lt;p&gt;Workspace One supports several different enrollment workflows. For example, there are two main options for mobile devices. The first option is for users to download the Workspace One Intelligent Hub app from the Android, iOS or Windows app store and then use the app to complete enrollment. The second option is an email-based auto-discovery process that completes the enrollment by directing the user to a self-service portal.&lt;/p&gt;
 &lt;h3&gt;IAM&lt;/h3&gt;
 &lt;p&gt;Like other UEM products, Omnissa Workspace One uses RBAC to manage administrative access. Omnissa supplies numerous predefined administrative roles as a way of helping organizations ensure that admins are assigned exactly the permissions they need. If necessary, administrators can define custom roles.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;Omnissa offers various subscription plans for Workspace One. There are three Essentials plans -- Mobile, Desktop and UEM -- along with an Enterprise Edition. The Enterprise Edition is the most expensive option and costs $10 per device or $15 per user, per month. The mobile Essentials plan is the cheapest at $3.00 per device or $5.40 per user, per month.&lt;/p&gt;
 &lt;h3&gt;Use case&lt;/h3&gt;
 &lt;p&gt;Omnissa is ideal for organizations that support a mixture of corporate-owned and BYOD devices and need to be able to manage any app on any device.&lt;/p&gt;
&lt;/section&gt;                   
&lt;section class="section main-article-chapter" data-menu-title="How to choose a UEM provider"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to choose a UEM provider&lt;/h2&gt;
 &lt;p&gt;With so many tools to choose from, an organization might be hard-pressed to decide on one. Fortunately, there are ways to narrow down the choices.&lt;/p&gt;
 &lt;p&gt;First, make sure that the tool works with the organization's existing identity stack and aligns with any &lt;a href="https://www.techtarget.com/searchsecurity/tip/IT-security-frameworks-and-standards-Choosing-the-right-one"&gt;cybersecurity requirements&lt;/a&gt;. The centralized management console should be easy to use and designed to reduce the administrative load. Additionally, the tool should support all the devices and OSes in use throughout the organization.&lt;/p&gt;
 &lt;p&gt;Once an IT leader has narrowed down the list of devices by examining these criteria, they can sign up for product demos or free trials to better determine which product is the best fit for their organization's unique needs.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt;&lt;i&gt; This article was updated in January 2026 to reflect technology changes and to improve the reader experience.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Brien Posey is a 15-time Microsoft MVP with two decades of IT experience. He has served as a lead network engineer for the U.S. Department of Defense and as a network administrator for some of the largest insurance companies in America.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>UEM software is vital for helping IT manage every type of endpoint an organization uses. Explore some of the top vendors and how their features compare.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/strategy_a268589527.jpg</image>
            <link>https://www.techtarget.com/searchenterprisedesktop/tip/Top-unified-endpoint-management-software-vendors</link>
            <pubDate>Thu, 29 Jan 2026 15:30:00 GMT</pubDate>
            <title>Top 6 unified endpoint management software vendors in 2026</title>
        </item>
        <item>
            <body>&lt;p&gt;&lt;b&gt;Executive summary:&lt;/b&gt; End-user computing has become a material driver of business risk and operational resilience. Decisions once treated as tactical -- endpoint management, access control and desktop platforms -- now have long-term security, cost and governance implications. As disruption accelerates across infrastructure, identity and workforce models, EUC leaders must align technology choices with a more resilient, risk-aware operating model heading into 2026.&lt;/p&gt; 
&lt;p&gt;End-user computing (EUC) is entering a transformative phase, shaped by rapid advances in AI, identity-centric architectures and the aftershocks of major platform shifts such as the VMware acquisition.&lt;/p&gt; 
&lt;p&gt;As organizations move beyond Windows 10 end of support and adapt to Windows 11, the EUC landscape is fragmenting into specialized tracks. These tracks demand tailored strategies for knowledge workers, frontline teams and regulated environments. Meanwhile, identity governance, observability and app modernization are moving from best practice to baseline requirements. For CIOs and EUC leaders, the year ahead is less about incremental upgrades and more about making foundational decisions that will define operational resilience, security posture and UX for years to come.&lt;/p&gt; 
&lt;p&gt;Technology leaders should know these four key EUC trends for 2026, why they matter and how to adapt their strategies to drive future-ready outcomes.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="1. AI-driven EUC operations become the default"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;1. AI-driven EUC operations become the default&lt;/h2&gt;
 &lt;p&gt;In 2026, AI copilots, agentic workflows, digital employee experience (DEX) analytics and automated remediation will fundamentally reshape EUC. The most significant shift is from reactive troubleshooting to predictive operations that anticipate and resolve problems before they affect users.&lt;/p&gt;
 &lt;p&gt;AI copilots now serve as embedded assistants for both end users and IT teams, providing real-time guidance and automating routine tasks. &lt;a href="https://www.techtarget.com/searchenterpriseai/tip/A-technical-guide-to-agentic-AI-workflows"&gt;Agentic workflows&lt;/a&gt; are reducing manual intervention and streamlining support processes.&lt;/p&gt;
 &lt;p&gt;Advanced DEX analytics platforms continuously monitor endpoint health, user sentiment and app performance. When they detect anomalies, automated remediation tools can resolve issues instantly or escalate only the most complex cases to human engineers.&lt;/p&gt;
 &lt;p&gt;The transition to predictive operations means fewer break/fix incidents and a more resilient EUC environment. AI models use historical and real-time data to forecast device failures, app crashes or performance bottlenecks.&lt;/p&gt;
 &lt;p&gt;This shift can provide benefits in the following areas:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Support volume.&lt;/b&gt; Automated remediation and predictive analytics can reduce ticket volumes, freeing IT resources for higher-value work.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Operational costs.&lt;/b&gt; Fewer escalations and faster resolution translate to significant cost savings, especially for organizations with large, distributed workforces.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;DEX/UX.&lt;i&gt; &lt;/i&gt;&lt;/b&gt;Proactive support and self-healing endpoints drive higher user satisfaction, lower downtime and improved productivity.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;IT teams will also need to reevaluate how they manage security and access. Traditional role-based access control is static and often grants persistent administrative rights, increasing risk. In contrast, AI-driven agent orchestration &lt;a href="https://www.techtarget.com/searchsecurity/tip/Benefits-and-challenges-of-zero-standing-privileges"&gt;enforces zero standing privileges&lt;/a&gt; (ZSP) and just-in-time (JIT) credential access. Privileges are granted dynamically, only for the duration and scope necessary for the remediation task. Then, they're revoked. This substantially reduces the attack surface and aligns EUC operations with modern security frameworks.&lt;/p&gt;
 &lt;h3&gt;Decision points for EUC leaders&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Evaluate AI and automation capabilities in the organization's current EUC tool set.&lt;/li&gt; 
  &lt;li&gt;Prioritize platforms that offer integrated DEX analytics and automated remediation.&lt;/li&gt; 
  &lt;li&gt;Plan for operational change management and retrain support teams for AI-augmented workflows.&lt;/li&gt; 
  &lt;li&gt;Update security policies to use ZSP and JIT access models.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="2. Identity-first EUC with Microsoft Entra as the control plane"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;2. Identity-first EUC with Microsoft Entra as the control plane&lt;/h2&gt;
 &lt;p&gt;As organizations diversify their device portfolios and embrace hybrid work, identity has emerged as the primary architecture layer for EUC. Rather than anchoring security and access around devices or OSes, EUC leaders are shifting to &lt;a href="https://www.techtarget.com/searchsecurity/feature/identity-new-perimeter-enterprise-security"&gt;identity-centric models&lt;/a&gt; that unify access, governance and compliance across all endpoints and platforms.&lt;/p&gt;
 &lt;p&gt;The proliferation of cloud apps, remote work and BYOD has made traditional perimeter-based security and OS-specific controls insufficient. Identity provides a consistent, scalable way to manage who gets access to what, regardless of device type, location or platform.&lt;/p&gt;
 &lt;p&gt;Microsoft Entra has become the de facto control plane for identity-driven EUC, extending far beyond basic authentication. Capabilities include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Conditional access.&lt;/b&gt; Dynamic, &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Test-conditional-access-with-Microsoft-Entra-ID-What-If-tool"&gt;context-aware policies&lt;/a&gt; that grant or block access based on user risk, device health, location and session context.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Device trust.&lt;/b&gt; Integration with device management tools to ensure only compliant, trusted devices can access sensitive resources, regardless of OS.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Compliance evaluation.&lt;/b&gt; Continuous assessment of device posture, app usage and user behavior against organizational policies and regulatory requirements.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Access governance.&lt;/b&gt; Centralized management of permissions, entitlements and lifecycle events across Windows 11, Android Enterprise, ChromeOS Flex, macOS and VDI/DaaS environments.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Entra's architecture is built for zero trust. Identity-based controls ensure that every access request is authenticated, authorized and continuously evaluated. This minimizes lateral movement and reduces the blast radius of potential breaches.&lt;/p&gt;
 &lt;p&gt;&lt;iframe title="Identity-based vs. OS-specific EUC controls" aria-label="Table" id="datawrapper-chart-4FsLP" src="https://datawrapper.dwcdn.net/4FsLP/1/" scrolling="no" frameborder="0" style="width: 0; min-width: 100% !important; border: none;" height="754" data-external="1"&gt;&lt;/iframe&gt;&lt;/p&gt;
 &lt;p&gt; &lt;script type="text/javascript"&gt;window.addEventListener("message",function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r,i=0;r=e[i];i++)if(r.contentWindow===a.source){var d=a.data["datawrapper-height"][t]+"px";r.style.height=d}}});&lt;/script&gt; &lt;/p&gt;
 &lt;p&gt;AI agents also present a new layer of risk. As organizations deploy AI copilots and automated workflows, these agents gain access to sensitive data, systems and decision-making authority. However, traditional identity and access management systems were designed for human users, not autonomous software agents.&lt;/p&gt;
 &lt;p&gt;This creates the following issues:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;AI sprawl.&lt;/b&gt; The proliferation of AI agents can lead to &lt;a href="https://www.techtarget.com/searchsecurity/tip/What-is-identity-sprawl-and-how-can-it-be-managed"&gt;identity sprawl&lt;/a&gt;, where each agent requires its own credentials, permissions and governance, thereby multiplying the attack surface.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Rogue AI threats.&lt;/b&gt; Malicious or poorly governed AI agents can act as insider threats, exfiltrating data or making unauthorized changes at machine speed.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Governance gaps.&lt;/b&gt; Without comprehensive identity governance for non-human actors, organizations risk losing visibility and control over what AI agents can access and do.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;To protect against these threats, extend identity governance frameworks to cover both human and AI/automation identities. Enforce least privilege principles and ZSP for all agents, using JIT access and continuous monitoring. IT teams should audit and review AI agent activity as rigorously as they would for privileged end users.&lt;/p&gt;
 &lt;h3&gt;Decision points for EUC leaders&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Center EUC architecture around identity, not device or OS.&lt;/li&gt; 
  &lt;li&gt;Use Microsoft Entra for unified conditional access, device trust and compliance management.&lt;/li&gt; 
  &lt;li&gt;Align access policies with zero-trust principles such as continuous verification, least privilege and adaptive controls.&lt;/li&gt; 
  &lt;li&gt;Extend identity governance and monitoring to all AI and automation agents, not just humans.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;              
&lt;section class="section main-article-chapter" data-menu-title="3. Post-VMware EUC replatforming"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;3. Post-VMware EUC replatforming&lt;/h2&gt;
 &lt;p&gt;Broadcom's acquisition of VMware has triggered a seismic shift in the EUC landscape. Once a stable pillar for VDI and unified endpoint management, VMware's EUC portfolio -- particularly Horizon and Workspace One -- now faces major strategic and financial headwinds.&lt;/p&gt;
 &lt;p&gt;Organizations are reevaluating VMware EUC -- &lt;a href="https://www.techtarget.com/searchvirtualdesktop/opinion/Who-owns-Omnissa-and-whats-next-for-this-vendor"&gt;now named Omnissa&lt;/a&gt; -- for the following reasons:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Licensing model upheaval.&lt;/b&gt; Under Omnissa, licensing costs for Horizon and Workspace One have increased significantly. Organizations accustomed to predictable Capex now face volatile, usage-based Opex. This makes budgeting and cost control more complex.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Reduced flexibility.&lt;/b&gt; Many customers &lt;a target="_blank" href="https://arstechnica.com/information-technology/2024/10/a-year-after-broadcoms-vmware-buy-customers-eye-exit-strategies/" rel="noopener"&gt;report&lt;/a&gt; less favorable contract terms, limited support tiers and fewer customization options.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Strategic uncertainty.&lt;/b&gt; The rebranding process has created uncertainty about long-term support and investment.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;As the company recalibrates, displaced customers might consider other cloud-based competitors, including Citrix, Azure Virtual Desktop, Amazon WorkSpaces and niche VDI/DaaS providers.&lt;/p&gt;
 &lt;p&gt;The move to hybrid environments requires platforms that can manage and secure endpoints across multiple domains. IT leaders should look at their existing infrastructure to assess the current state and compare Omnissa pricing to alternative platforms. Be sure to factor hidden migration costs into this comparison. Calculate business continuity, compliance and support risks of staying versus leaving. Shortlist competitive tools based on feature fit, ecosystem compatibility, scalability and future roadmaps.&lt;/p&gt;
 &lt;p&gt;Plan for 2026 migration and execution in the following areas:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Profile moves.&lt;/b&gt; Plan and execute user profile migrations to new platforms.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;App packaging.&lt;/b&gt; Repackage and validate applications for the target VDI or DaaS environment. Consider platform compatibility for legacy apps.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;VDI image rebuilds.&lt;/b&gt; Develop, test and deploy new desktop images to ensure security and performance.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Support retraining.&lt;/b&gt; Upskill IT and support teams for new tools and workflows.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Compliance resets.&lt;/b&gt; Revalidate compliance posture and update audit processes for the new environment.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Integration considerations.&lt;/b&gt; Ensure seamless integration with backup tools, automation workflows and networking models to avoid operational blind spots.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Resolving the post-VMware EUC challenge is a complex, multi-year journey. Quick lifts might be possible for non-critical workloads. Large-scale migrations demand careful planning, phased execution and ongoing optimization.&lt;/p&gt;
 &lt;h3&gt;Decision points for EUC leaders&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Treat 2025 as the strategic evaluation year. Don't rush, but don't delay foundational analysis.&lt;/li&gt; 
  &lt;li&gt;Allocate resources for a 2026 migration/execution phase, including budget for hidden costs and retraining.&lt;/li&gt; 
  &lt;li&gt;Build a migration playbook that addresses technical, operational and compliance requirements.&lt;/li&gt; 
  &lt;li&gt;Engage stakeholders early -- especially security, compliance and end-user support teams.&lt;/li&gt; 
  &lt;li&gt;Prioritize platforms with strong integration ecosystems for backup, automation and networking.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="4. Windows 11 hardening after Windows 10 end of support"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;4. Windows 11 hardening after Windows 10 end of support&lt;/h2&gt;
 &lt;p&gt;Windows 10 devices &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/When-is-Windows-10-end-of-life-How-to-extend-support"&gt;stopped receiving support&lt;/a&gt; and, therefore, security updates after October 2025. These devices expose organizations to escalating risk from unpatched vulnerabilities. Attackers are quick to target unsupported OS versions. Organizations must migrate to Windows 11 endpoints and harden them to maintain compliance and reduce exposure.&lt;/p&gt;
 &lt;p&gt;Key security measures for Windows 11 include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Baselining.&lt;/b&gt; Establish and enforce a secure configuration baseline. Use tools like Microsoft Security Baselines to ensure consistency and compliance across all Windows 11 devices.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Secure Boot.&lt;/b&gt; Enable Secure Boot to prevent unauthorized code from running during the boot process.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Virtualization-based security.&lt;/b&gt; Use virtualization-based security and hypervisor-protected code integrity to isolate critical processes and defend against advanced malware.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Passwordless adoption.&lt;/b&gt; &lt;a href="https://www.techtarget.com/searchsecurity/post/Migrate-to-passwordless-to-enhance-security-and-UX"&gt;Transition to passwordless authentication&lt;/a&gt; to reduce credential theft risk.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Memory integrity.&lt;/b&gt; Activate memory integrity features to prevent attackers from injecting malicious code into high-security processes.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;App compatibility validation.&lt;/b&gt; Carefully test and validate app compatibility to avoid disruptions and support UX.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Conditional access alignment.&lt;/b&gt; Integrate device compliance with identity-driven conditional access policies for a unified zero-trust approach.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;OS hardening often increases short-term support volume as users adapt to new security controls, authentication methods and device policies. Proactive communication and user training are essential to minimize friction. Security improvements, such as passwordless logins and memory integrity, can enhance UX, but only if change management is prioritized.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    Device segmentation planning is another important part of the OS hardening process.
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;Additionally, IT should ensure governance and drift control are in place. Automated configuration management and continuous compliance monitoring are necessary to prevent drift from secure baselines and maintain regulatory alignment.&lt;/p&gt;
 &lt;p&gt;Device segmentation planning is another important part of the OS hardening process. A one-size-fits-all approach is no longer viable. Segmenting devices by user role, risk profile and behavioral patterns enables targeted security controls and operational policies. For frontline workers, prioritize simplicity, &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/Setting-up-Windows-10-kiosk-mode-with-4-different-methods"&gt;kiosk modes&lt;/a&gt; and strong device lockdown. Regulated or specialized environments, on the other hand, demand thorough hardening, audit trails and strict enforcement of compliance.&lt;/p&gt;
 &lt;h3&gt;Decision points for EUC leaders&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Treat Windows 11 hardening as a continuous process, not a one-time project.&lt;/li&gt; 
  &lt;li&gt;Invest in automation for baseline enforcement, drift detection and compliance reporting.&lt;/li&gt; 
  &lt;li&gt;Align OS security with identity and conditional access for a unified zero-trust model.&lt;/li&gt; 
  &lt;li&gt;Segment device management and policy enforcement by user role and behavioral risk.&lt;/li&gt; 
  &lt;li&gt;Plan for increased support needs during transition, with clear user training and communication.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="Conclusion"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Conclusion&lt;/h2&gt;
 &lt;p&gt;As end-user computing enters a period of accelerated change, CIOs and EUC leaders must move decisively to future-proof their environments. Cybersecurity is not only a technical expense, but a financial and legal liability. &lt;a href="https://www.techtarget.com/searcherp/feature/5-supply-chain-cybersecurity-risks-and-best-practices"&gt;Compromised supply chains&lt;/a&gt; are an immediate risk, and the executive mindset must shift to recognize and address governance blind spots.&lt;/p&gt;
 &lt;p&gt;"In a landscape of total disruption, security is the ability to fail gracefully. Move from bloated defense to a minimum viable operational model," said Andy de Clerck, director of IT consultancy firm Blue Nebula. "Protect your core 20%&amp;nbsp;with sovereign control and automated recovery, or risk losing everything."&lt;/p&gt;
 &lt;p&gt;Organizations' focus should be on resilience in the coming year.&lt;/p&gt;
 &lt;p&gt;"In 2026, total protection is a myth. Resilience is the reality," de Clerck said.&lt;/p&gt;
 &lt;p&gt;The goal is to rationalize the tool landscape into a leaner, better-integrated stack, centered around the secure agentic control plane. By adapting to change early, EUC leaders can position their organizations to navigate disruption, control risk and deliver a secure, seamless digital experience in 2026 and beyond.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Helen Searle-Jones holds a group head of IT position in the manufacturing sector. She draws on 30 years of experience in enterprise and end-user computing, utilizing cloud and on-premise technologies to enhance IT performance.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>AI, identity-first security, Windows 10 end of support  and VMware's rebranding as Omnissa are reshaping EUC as CIOs make critical decisions for 2026 and beyond.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/keyboard_g164210754.jpg</image>
            <link>https://www.techtarget.com/searchenterprisedesktop/feature/End-user-computing-trends-to-watch</link>
            <pubDate>Thu, 22 Jan 2026 12:24:00 GMT</pubDate>
            <title>4 end-user computing trends to watch in 2026</title>
        </item>
        <item>
            <body>&lt;p&gt;Enterprise access decisions are starting earlier than many organizations expect. Not because of a new security framework or architectural shift, but because of the everyday workflows people use to start work.&lt;/p&gt; 
&lt;p&gt;This shows up most clearly at the points where users first enter enterprise systems. Browsers, mobile applications and hiring processes now act as common entry paths, and each one introduces access decisions before governance and ownership are fully settled. When those early decisions are not well understood or clearly owned, risk has a way of showing up later.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Browser-based entry is becoming routine"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Browser-based entry is becoming routine&lt;/h2&gt;
 &lt;p&gt;Browser-based workflows now act as a &lt;a href="https://www.techtarget.com/searchenterprisedesktop/opinion/How-AI-and-the-browser-will-change-end-user-IT-in-2026"&gt;primary access point for many enterprise systems&lt;/a&gt;. Identity checks, session controls and policy decisions often occur as soon as a browser session begins, especially as AI-driven tools and browser-based productivity environments become more central to end-user IT.&lt;/p&gt;
 &lt;p&gt;As the browser takes on a larger role in daily operations, teams are increasingly treating it as a managed environment rather than just another application. That shift is shaping how organizations think about browser management, AI agents and security boundaries inside everyday workflows.&lt;/p&gt;
 &lt;p&gt;QR-driven access makes this especially visible. These workflows are designed to be fast and intuitive, which is why they are common in onboarding, shared environments and temporary setups. At the same time, &lt;a href="https://www.techtarget.com/searchmobilecomputing/tip/Understanding-QR-code-security-issues-for-enterprise-devices"&gt;QR codes can obscure destination details&lt;/a&gt; and remove many of the cues users rely on to assess trust.&lt;a&gt;&lt;/a&gt;&lt;/p&gt;
 &lt;p&gt;The access decision happens immediately. Ownership questions tend to follow later.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    Access arrives first. Alignment tends to follow later.
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Mobile access follows the same pattern"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Mobile access follows the same pattern&lt;/h2&gt;
 &lt;p&gt;Mobile applications introduce similar timing challenges. Phones and tablets are no longer secondary endpoints. They function as direct gateways to enterprise email, collaboration tools and business applications.&lt;/p&gt;
 &lt;p&gt;As mobile apps become routine access paths, they increasingly serve as &lt;a href="https://www.techtarget.com/searchmobilecomputing/tip/Preventing-attacks-on-mobile-applications-in-the-enterprise"&gt;front doors into core systems&lt;/a&gt; rather than isolated endpoints. That reality pulls authentication, authorization and governance decisions forward into architecture and platform planning, as a single compromised app can quickly create broader enterprise exposure.&lt;/p&gt;
 &lt;p&gt;This mirrors what is happening in browser-based workflows. Access is being decided closer to where work actually happens.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Hiring workflows add another early access path"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Hiring workflows add another early access path&lt;/h2&gt;
 &lt;p&gt;Hiring processes introduce another early access vector. Automated workflows often create identities and system access before employment decisions are finalized. That efficiency is valuable, but it also creates additional exposure.&lt;/p&gt;
 &lt;p&gt;When &lt;a href="https://www.techtarget.com/searchhrsoftware/tip/How-HR-leaders-can-spot-and-stop-fake-job-applicants"&gt;AI-generated or synthetic identities enter the hiring pipeline&lt;/a&gt;, what initially looks like a recruiting issue can quickly become an access and governance problem. Addressing it typically requires coordination across HR, IT and security teams earlier than many organizations expect, especially as fraudulent applicants look for ways to exploit internal systems.&lt;/p&gt;
 &lt;p&gt;Here again, access arrives first. Alignment follows later.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="What this points to"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What this points to&lt;/h2&gt;
 &lt;p&gt;Taken together, these entry points highlight the same pattern. Access decisions are being embedded at the front of enterprise workflows, where speed matters and governance is easiest to defer.&lt;/p&gt;
 &lt;p&gt;Individually, each case feels manageable. Combined, they help explain why access ownership feels harder to pin down than it used to. Decisions are happening earlier, in more places, and often without a single clear owner.&lt;/p&gt;
 &lt;p&gt;For organizations tracking identity, risk and enterprise architecture, these front-door access paths deserve close attention. They show where control is shifting -- and why responding after the fact is becoming harder.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;James Alan Miller is a veteran technology editor and writer who leads Informa TechTarget's Enterprise Software group. He oversees coverage of ERP &amp;amp; Supply Chain, HR Software, Customer Experience, Communications &amp;amp; Collaboration and End-User Computing topics.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>As work consolidates in browsers and quick-entry paths, access decisions are shifting to the front door of enterprise systems, often without clear ownership or centralized control.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/security_g1185245180.jpg</image>
            <link>https://www.techtarget.com/searchenterprisedesktop/feature/How-enterprise-access-decisions-are-starting-to-show-up-earlier</link>
            <pubDate>Fri, 16 Jan 2026 09:00:00 GMT</pubDate>
            <title>How enterprise access decisions are starting to show up earlier</title>
        </item>
        <item>
            <body>&lt;p&gt;Linux is poised for growth as an enterprise workstation option in 2026. With the end of Windows 10 and the continued development of modern, user-friendly desktop environments, the OS is increasingly viable for this use case. It is suitable for both desktop and laptop hardware platforms.&lt;/p&gt; 
&lt;p&gt;Its global desktop &lt;a target="_blank" href="https://gs.statcounter.com/os-market-share/desktop/worldwide/" rel="noopener"&gt;market share&lt;/a&gt; was roughly 4% in 2025, reflecting a modest rise over time. Some tech environments see higher Linux desktop deployment rates, driven by DevOps integration, app development and cloud administration requirements. In 2023, it &lt;a target="_blank" href="https://www.statista.com/statistics/869211/worldwide-software-development-operating-system/" rel="noopener"&gt;represented&lt;/a&gt; 43% of PC operating systems used for software development worldwide.&lt;/p&gt; 
&lt;p&gt;To understand why Linux could rise in popularity as a desktop OS in 2026, IT leaders should understand how Linux desktop systems address enterprise concerns around privacy and sustainability. They should also understand the importance of SaaS and cloud app deployments in driving Linux migrations for enterprise desktop systems.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Factors driving Linux adoption in 2026"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Factors driving Linux adoption in 2026&lt;/h2&gt;
 &lt;p&gt;In 2026, the Linux ecosystem reaches a crossroads where ease of use, app availability, cost and technical support intersect to offer a practical alternative to traditional desktop platforms. This makes it a credible option for organizations evaluating their desktop strategies.&lt;/p&gt;
 &lt;p&gt;The following factors contribute to Linux's viability in today's enterprise desktop market:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;The end of Windows 10, as well as &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/The-Windows-11-system-requirements-and-what-they-indicate"&gt;Windows 11's restrictive hardware requirements&lt;/a&gt; and associated upgrade costs.&lt;/li&gt; 
  &lt;li&gt;Sustained growth of Linux adoption across server, cloud and developer-focused environments.&lt;/li&gt; 
  &lt;li&gt;Increasing availability of Linux-first hardware. This improves desktop performance, support and compatibility for organizations deploying Linux systems.&lt;/li&gt; 
  &lt;li&gt;Improved and quicker security updates for organizations compared to other platforms.&lt;/li&gt; 
  &lt;li&gt;Free, easy licensing under the GPL. Licensing includes optional paid technical support plans that provide enterprise Linux workstation deployments with a lower total cost of ownership.&lt;/li&gt; 
  &lt;li&gt;Easier scalability without restrictive licensing, enabling organizations to adapt quickly to end-user deployments.&lt;/li&gt; 
  &lt;li&gt;Widespread adoption of Linux for containerization and VM platforms. This makes it an apt choice for developers, DevOps engineers, cloud administrators and IT support staff.&lt;/li&gt; 
  &lt;li&gt;Widespread adoption of Linux &lt;a href="https://www.techtarget.com/searchdatacenter/feature/Infrastructure-for-machine-learning-AI-requirements-examples"&gt;for AI and machine learning platforms&lt;/a&gt;, including training, inference and large-scale deployment.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;These factors make Linux desktops a more feasible option today. However, being feasible doesn't necessarily mean it's worth the cost and effort associated with migration. What makes Linux appealing to businesses now is that it offers enhanced privacy, sustainability and OS-agnostic desktops through SaaS.&lt;/p&gt;
 &lt;h3&gt;Enhanced privacy&lt;/h3&gt;
 &lt;p&gt;User and IT frustration with privacy and telemetry in other OSes leads many teams to consider Linux.&lt;/p&gt;
 &lt;p&gt;Linux's advantages for privacy-aware environments include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Support for user autonomy over privacy and identity settings.&lt;/li&gt; 
  &lt;li&gt;Transparent visibility into any data collection or telemetry capabilities.&lt;/li&gt; 
  &lt;li&gt;Easier control over data localization and &lt;a href="https://www.techtarget.com/searchsecurity/tip/Data-sovereignty-compliance-challenges-and-best-practices"&gt;data sovereignty&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Reduced risk of adware and bloatware.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Simplified sustainability&lt;/h3&gt;
 &lt;p&gt;Sustainable IT practices are a growing priority for enterprise organizations. Linux aligns with these initiatives through its hardware requirements and configurability.&lt;/p&gt;
 &lt;p&gt;Linux's sustainability benefits include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchDataCenter/tip/Linux-kernel-patch-reduces-data-center-energy-use"&gt;Increased energy efficiency with Linux kernel 6.13&lt;/a&gt;, delivering significant results, even with desktop deployments.&lt;/li&gt; 
  &lt;li&gt;Decreased and customizable hardware requirements, independent of vendor-imposed restrictions. This enables organizations to define the hardware lifecycle with practical and environment-specific end-of-life dates.&lt;/li&gt; 
  &lt;li&gt;Increased hardware flexibility, with repairability, compatibility and customization available across a wide range of devices. This avoids limitations such as forced hardware upgrades, restricted driver support or vendor-tied licensing.&lt;/li&gt; 
  &lt;li&gt;Support for &lt;a href="https://www.techtarget.com/sustainability/feature/Top-ESG-reporting-frameworks-explained-and-compared"&gt;environmental, social and governance mandates&lt;/a&gt; that set compliance requirements for organizations.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;SaaS-enabled OS independence&lt;/h3&gt;
 &lt;p&gt;Many organizations have concerns about software compatibility and daily-use productivity platforms when deploying Linux workstations. The OS-agnostic nature of SaaS apps helps address these concerns. SaaS provides common workplace tools -- including word processors, presentation software and spreadsheet apps -- regardless of the end user's OS of choice. It often also reduces hardware requirements on user workstations, extending the hardware lifecycle.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/pLsdKM57CP8?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;p&gt;Other benefits of SaaS include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Reduced app deployment costs.&lt;/li&gt; 
  &lt;li&gt;Immediate software availability for new clients.&lt;/li&gt; 
  &lt;li&gt;Reduced operational complexity.&lt;/li&gt; 
  &lt;li&gt;Improved app updates and patches.&lt;/li&gt; 
  &lt;li&gt;Simpler hardware, OS and &lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Understanding-SaaS-migration-benefits-and-best-practices"&gt;app migrations&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Reduced app infrastructure management effort and costs.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Linux has long held popularity as a developer platform, a trend that continues amid today's cloud-first and DevOps-oriented initiatives. The improved app and SaaS options make Linux accessible for non-technical users.&lt;/p&gt;
&lt;/section&gt;                   
&lt;section class="section main-article-chapter" data-menu-title="Challenges for Linux desktops in 2026"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Challenges for Linux desktops in 2026&lt;/h2&gt;
 &lt;p&gt;A move to Linux desktops for mainstream enterprise users is more feasible than ever in 2026. Hardware and app compatibility issues are far less common today than they were years ago, when Linux was less prevalent. Still, a successful deployment requires careful planning.&lt;/p&gt;
 &lt;p&gt;IT leaders must address the following challenges before deploying Linux desktops:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Hardware compatibility.&lt;/b&gt; Repurposing existing hardware can present compatibility challenges. However, Linux offers compatibility with most standard devices.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;App compatibility.&lt;/b&gt; SaaS and Linux-specific software can only carry an organization so far. Custom line-of-business apps and OS-specific programs might not run on Linux.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Technical support.&lt;/b&gt; Enterprise organizations need efficient technical support from their OS vendor. IT decision-makers must shop around for a distribution that provides the necessary level of support.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Staff training.&lt;/b&gt; In-house help desk and desktop support teams must resolve Linux issues quickly and effectively for users. This requires &lt;a href="https://www.techtarget.com/searchdatacenter/tip/Top-5-options-for-Linux-certifications"&gt;training and experience&lt;/a&gt;.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Planning a Linux migration in 2026"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Planning a Linux migration in 2026&lt;/h2&gt;
 &lt;p&gt;The End-of-10 initiative and other Windows-to-Linux migration guides have prompted comprehensive migration frameworks. The primary migration steps include the following:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Preliminary migration assessment.&lt;/b&gt; Evaluate existing apps, hardware, drivers and critical workloads.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Planning.&lt;/b&gt; Select a distribution, select hardware, prepare deployment methods and verify hardware compatibility. Planning user support also occurs at this stage.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Migration.&lt;/b&gt; Deploy the OS and &lt;a href="https://www.techtarget.com/searchunifiedcommunications/tip/Install-Zoom-on-Linux-Best-practices-and-troubleshooting-tips"&gt;supporting business applications&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Post-migration validation.&lt;/b&gt; Confirm data transfers, app functionality and user support.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;Additionally, IT must ensure the migration satisfies the organization's standard &lt;a href="https://www.techtarget.com/searchcio/definition/change-management"&gt;change management&lt;/a&gt; framework.&lt;/p&gt;
 &lt;h3&gt;Linux hardware for the enterprise&lt;/h3&gt;
 &lt;p&gt;Many hardware vendors offer desktop and laptop systems that are either certified for Linux use or provide strong support for one or more distributions. Major Linux vendors often have certification data &lt;a target="_blank" href="https://ubuntu.com/certified/laptops" rel="noopener"&gt;available&lt;/a&gt; to help organizations choose the best hardware platform for a given distribution.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    Linux typically consumes far fewer resources than more bloated OSes.
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;Common options to consider include the Dell Latitude Series and Lenovo ThinkPad Series, as well as laptops from Framework and System76.&lt;/p&gt;
 &lt;p&gt;Sustainability measures can also factor into hardware provisioning. Repurposing existing hardware is also a viable option for many organizations, especially those that need to migrate from platforms that aren't Windows 11-compatible. Linux typically consumes far fewer resources than more bloated OSes. While 64-bit processors are certainly preferred, plenty of Linux distributions offer 32-bit versions. Mac hardware also offers broad Linux compatibility.&lt;/p&gt;
 &lt;h3&gt;Linux distributions for the enterprise&lt;/h3&gt;
 &lt;p&gt;Thousands of Linux distributions exist, but some stand out as suitable choices for enterprise workstations. When &lt;a href="https://www.techtarget.com/searchDataCenter/tutorial/A-guide-to-switch-from-Windows-to-Linux"&gt;migrating to Linux&lt;/a&gt; for end users, decision-makers should consider the following distributions:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Fedora Workstation.&lt;/b&gt; Closely related to Red Hat Enterprise Linux (&lt;a href="https://www.techtarget.com/searchdatacenter/definition/Red-Hat-Enterprise-Linux-RHEL"&gt;RHEL&lt;/a&gt;), this is a good fit for environments where RHEL is already the preferred server platform.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Linux Mint.&lt;/b&gt; This option is optimized for ease of use, making it well-suited to enterprise end users who need an interface that resembles Windows. It offers software support through Canonical's app repositories.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;SUSE Linux Enterprise Desktop.&lt;/b&gt; In addition to strong security and maintenance capabilities, this option provides a comprehensive suite of productivity apps. Organizations should also consider openSUSE Leap for enterprise workstations.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Ubuntu Desktop.&lt;/b&gt; This is a transparent, community-driven and accessible distribution with extensive support.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Expect 2026 to be a turning point for Linux desktop deployments in enterprise environments. Linux aligns well with many of today's top IT issues, including Windows 10's retirement, sustainability, data sovereignty, privacy and the continued growth of OS-agnostic SaaS and cloud-based apps.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Damon Garn owns Cogspinner Coaction and provides freelance IT writing and editing services. He has written multiple CompTIA study guides, including the Linux+, Cloud Essentials+ and Server+ guides, and contributes extensively to Informa TechTarget, The New Stack and CompTIA Blogs.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Linux desktops are increasingly viable for enterprise use cases in 2026, offering privacy, sustainability and SaaS-ready workflows amid Windows 10's retirement.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/ai_g1183318665.jpg</image>
            <link>https://www.techtarget.com/searchenterprisedesktop/feature/Why-2026-might-bring-more-Linux-desktops-to-the-enterprise</link>
            <pubDate>Thu, 15 Jan 2026 14:59:00 GMT</pubDate>
            <title>Why 2026 might bring more Linux desktops to the enterprise</title>
        </item>
        <item>
            <body>&lt;p&gt;Vendors like Dell, HP and Lenovo spend all year planning releases around CES 2026, and while I'm not at the event -- it's huge and mostly consumer-oriented -- I do have my eyes on what's going on with enterprise PCs, laptops and peripherals. With that in mind, I thought I'd round up a few of the announcements that stuck out to me.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Dell"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Dell&lt;/h2&gt;
 &lt;p&gt;Last summer, Dell's COO and vice chairman, Jeff Clarke, &lt;a target="_blank" href="https://www.bloomberg.com/news/articles/2025-07-22/dell-operating-chief-takes-over-pc-unit-in-face-of-slow-demand" rel="noopener"&gt;took over&lt;/a&gt; the Client Solutions Group, in large part to rebuild the struggling consumer business. This has caused acceleration among internal product teams, and several roadmap items that were planned for future dates were pulled into the 2026 release window. Given its renewed focus on the consumer market, and the fact that this is the first CES since the leadership change, this is undoubtedly a big deal for Dell.&lt;/p&gt;
 &lt;p&gt;In a nutshell, the announcements are related to Alienware (not something that moves the needle in enterprise, but should be interesting to the gaming community), UltraSharp monitors and, perhaps most importantly, the return of the XPS line.&lt;/p&gt;
 &lt;p&gt;You might recall that last year's CES saw Dell introduce its new naming scheme that hoped to simplify the word salad that all the Dell brands had become. Vostro, Inspiron, Latitude, XPS, Optiplex, etc. all gave way to Dell, Dell Pro, Dell Premium, etc. While this made sense in some respects (Just what is a "Vostro," anyway?), the XPS enthusiasts lost their collective minds that Dell would scuttle such a beloved brand. As a result, Dell brought back XPS, doubling down on the devices, the look and feel and the capabilities.&lt;/p&gt;
 &lt;p&gt;With respect to the monitors, CES brings the introduction of a 52-inch monitor capable of 6K resolution with features that reduce blue light, as well as a 32-inch &lt;a href="https://www.techtarget.com/searchcio/tip/The-6-different-types-of-quantum-computing-technology"&gt;quantum dot&lt;/a&gt; OLED (QD-OLED) display that prioritizes color accuracy. The 52-inch displays are aimed at delivering a lot of screen real estate without a multi-monitor setup, while the QD-OLED displays are targeted at creative users.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="HP"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;HP&lt;/h2&gt;
 &lt;p&gt;HP made announcements across both products and services. Its Workforce Experience Platform (WXP) is a digital employee experience tool that offers visibility into all the devices that can be considered part of the workspace -- PCs, laptops, Macs, printers, meeting rooms, etc. -- &lt;a href="https://www.techtarget.com/searchitoperations/tip/How-DEX-metrics-help-build-a-better-digital-workplace"&gt;alerting IT to issues&lt;/a&gt; and minimizing response time and downtime.&lt;/p&gt;
 &lt;p&gt;HP has expanded WXP to include Out-of-Band Remote Connect, which uses Intel vPro capabilities to provide remote Kernel-based VM support at the BIOS level, which works even if the OS won't boot. (Seriously, if you have vPro devices, this is a very cool feature that you can take advantage of, even without WXP.)&lt;/p&gt;
 &lt;p&gt;WXP will also feature printer support (even for non-HP printers), meeting space insights, and custom alerts.&lt;/p&gt;
 &lt;p&gt;On the device side, HP announced a unique device called the HP EliteBoard G1a, which doesn't really fit the desktop or laptop form factors. It's a keyboard with a built-in computer. Plug it into any monitor, and you've got a 50-trillion-operations-per-second AI PC -- CoPilot+ PC, if you're keeping track of that -- running on the AMD Ryzen AI 300 Series processor. It even has a battery so you can move from one display to another. It's like a Commodore 64's super cool grandchild.&lt;/p&gt;
 &lt;p&gt;&amp;nbsp;&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/Myg4EP3AU0E?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;p&gt;I'm honestly not sure what to think about this. I've panned devices that plug into the back of monitors before, and in some way, this seems no different. Then again, why have another box on a desk if all you need is the keyboard and mouse? Will this catch on? Time will tell, but it's an interesting form factor that seems worth a look.&lt;/p&gt;
 &lt;p&gt;HP also announced a new 31.5-inch 4K monitor that features "Neo:LED pixels," which doesn't mean a lot to me, but is allegedly a new technology developed by LG. I'm sure they pair well with the EliteBoard G1a, though!&lt;/p&gt;
&lt;/section&gt;         
&lt;section class="section main-article-chapter" data-menu-title="Lenovo"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Lenovo&lt;/h2&gt;
 &lt;p&gt;Lenovo, as you might expect, made &lt;a target="_blank" href="https://news.lenovo.com/pressroom/press-releases/lenovo-at-ces-2026-smarter-ai-for-more-intuitive-and-connected-pc-experiences/" rel="noopener"&gt;many announcements&lt;/a&gt; around CES, and, honestly, it's kind of hard to keep them all straight. A few devices stood out, though.&lt;/p&gt;
 &lt;p&gt;The Yoga Pro 9i Aura is available in 16-inch and 11-inch versions. From an enterprise perspective, these are seen as the "cool" device compared to the more corporate-feeling ThinkPad line. There's also a new companion monitor in the Yoga Pro line that's specifically made to share the same color space between the external display and the one in the laptop. It's the first time I've seen this approach. And at only 27", I'll be curious to see if this catches on beyond creative personas that care about color matching.&lt;/p&gt;
 &lt;p&gt;The other notable device features a different unique form factor: a cylinder. Resembling something like a large aluminum hockey puck, the Yoga Mini I crams a speaker, microphone, touch sensor, accelerometer and an Intel Core Ultra X7 processor into a relatively small package aimed for portability. As with HP, the need for a portable device without a display is unknown. Unlike the HP device, the Yoga Mini I lacks a battery, so its portability is only as good as its user's patience for powering it on and off.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Conclusion"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Conclusion&lt;/h2&gt;
 &lt;p&gt;CES is mostly about speeds and feeds, so hopefully this was a helpful rundown of what's there without getting into the weeds. I'm anxious to hear how Dell's investments in the consumer market pay off, how HP fares with both WXP and their new form factor device and what else Lenovo might be doing that I missed.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Gabe Knuth is the principal analyst covering end-user computing for Omdia.&lt;br&gt;&lt;br&gt;Omdia is a division of Informa TechTarget. Its analysts have business relationships with technology vendors.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>At CES 2026, the annual consumer electronics show, Dell, HP and Lenovo unveiled announcements in enterprise PCs, creative monitors and new device form factors.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/iot_g1226985345.jpg</image>
            <link>https://www.techtarget.com/searchenterprisedesktop/opinion/New-PCs-laptops-and-unique-form-factors-at-CES-2026</link>
            <pubDate>Thu, 08 Jan 2026 13:26:00 GMT</pubDate>
            <title>New PCs, laptops and unique form factors at CES 2026</title>
        </item>
        <item>
            <body>&lt;p&gt;My job is interesting.&lt;/p&gt; 
&lt;p&gt;Sometimes I describe myself as the "all things end-user-facing" analyst because nothing seems to accurately capture the breadth of topics that I cover in a given year. &lt;i&gt;Digital workspace&lt;/i&gt; could describe it. &lt;i&gt;End-user computing&lt;/i&gt; would work. Endpoint management, VDI and DaaS, endpoint security, email security, productivity apps, even communications and collaboration -- all these things fall under what I'd call a normal day's work.&lt;/p&gt; 
&lt;p&gt;So, when brainstorming a post to look ahead to 2026, I couldn't really pinpoint any one area to focus on. The reality is that anyone who deals with end users must be a sort of generalist. End users brush up against so many areas of IT, and while we in IT have our specialties, it's rare to find someone focused on end users who doesn't have a broad background.&lt;/p&gt; 
&lt;p&gt;Trying to predict the next 12 months in the "all things end-user" area is like trying to predict what will happen on a long, cross-country road trip. Ninety percent will be the same old stuff, but 10% is going to be wildly different -- and you don't know when or where it will happen. All you know is that it could shape the direction of the trip, and that you need to be ready when it does.&lt;/p&gt; 
&lt;p&gt;With that in mind, here's a look at a few things that I think will fit into that 10%. Even if they don't affect you in 2026, I'm reasonably confident that they will at some point.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Agentic AI"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Agentic AI&lt;/h2&gt;
 &lt;p&gt;Agentic AI needs no introduction, as it's already the hottest topic around. However, on the end-user side, &lt;i&gt;agentic&lt;/i&gt; means something different from the bigger-picture autonomous, AI-native agents redefining back-end business processes and reshaping the nature of business. This area is interesting, but it's also rife with challenges that need to be solved before the technology is in use everywhere.&lt;/p&gt;
 &lt;p&gt;In the end-user world, agentic AI is far more practical, and it's here right now.&lt;/p&gt;
 &lt;p&gt;In the hands of end users, agentic AI can take a few different forms. There are computer control agents from all the frontier models. There are AI browsers that can interact directly with websites and web apps on a user's behalf. AI assistants can run scheduled tasks and autonomously make decisions based on user input. And, frankly, &lt;a href="https://www.techtarget.com/searchcio/feature/Vibe-coding-What-IT-leaders-need-to-know"&gt;AI-based vibe coding&lt;/a&gt; means we can create any agent we want using one of these tools.&lt;/p&gt;
 &lt;p&gt;So, if you hear &lt;i&gt;agentic AI&lt;/i&gt; and think, "That's not an end-user thing," think again. In fact, we're finally starting to see this play out among key desktop and app virtualization vendors.&lt;/p&gt;
 &lt;p&gt;Consider the challenges that "big-picture" agentic AI poses around identity, security, visibility, etc. We've solved all of those for end-user environments. We can deploy virtual desktops to agentic AI users, knowing that the desktop environment and network are locked down, user privileges are appropriately configured and they have only the apps they need to accomplish their tasks. We can stand up VMs and shut them down at will, and they can run 24/7 using all the existing tools and processes our end users currently work with. And crucially (to borrow an AI word), we get full observability into what the agent is doing because we can literally watch the interactions.&lt;/p&gt;
 &lt;p&gt;I have no doubt this will take off in 2026. Microsoft has already &lt;a target="_blank" href="https://learn.microsoft.com/en-us/windows-365/agents/introduction-windows-365-for-agents" rel="noopener"&gt;released&lt;/a&gt; a public preview of Windows 365 for Agents, and it is likely that other desktop and app virtualization vendors will do the same. There will be a learning curve, but learning the benefits, challenges and best practices for implementation will be a key area to watch in the coming months. I think it will drive many conversations, particularly at the RSAC Conference and Black Hat in 2026, around how endpoint detection and response (EDR) platforms, patch and vulnerability management platforms and the burgeoning prompt security space will react.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Prompt security"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Prompt security&lt;/h2&gt;
 &lt;p&gt;On that note, prompt security has been growing larger on my radar, and it will also undoubtedly be a huge topic at RSAC in 2026. It's certainly applicable in the agentic context, where it adds oversight and governance over users' prompts, but it can also be employed more broadly, in both end-user and big-picture agentic contexts.&lt;/p&gt;
 &lt;p&gt;Within the larger agentic frame of reference, prompt security will add oversight to inter-agent or agent-to-model communications. This is something SentinelOne was clearly thinking about when it &lt;a href="https://www.techtarget.com/searchenterprisedesktop/opinion/Eye-catching-vendor-announcements-from-Black-Hat"&gt;acquired the company Prompt Security&lt;/a&gt; at Black Hat this past year. Security at this layer can help prevent threats such as prompt injection attacks, sensitive data leakage and unauthorized workflow triggers.&lt;/p&gt;
 &lt;p&gt;In the end-user area, prompt security comes up in both EDR and browser security contexts. In particular, browser security companies tout their ability to see and intercept the entry of personally identifiable information or confidential data into AI assistants as a form of data loss prevention. While this might be a simple regex-based detection model, it can still be helpful in end-user AI tool adoption. It can also reduce risk from unsanctioned AI use, also known as shadow AI.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Shadow AI"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Shadow AI&lt;/h2&gt;
 &lt;p&gt;In my role, I conduct a lot of research, and my favorite research project over the past few years was dubbed "AI at the Endpoint." The &lt;a target="_blank" href="https://research.esg-global.com/reportaction/515202002/Marketing" rel="noopener"&gt;study&lt;/a&gt; served as an early look into how end users were interacting with AI tools, the devices they deployed and what the challenges and outcomes were of using AI. The aspect that I found most exciting was that I was able to poll both end users and IT on the use of shadow AI to learn about the disconnect between the two.&lt;/p&gt;
 &lt;p&gt;Some of the numbers were surprising. For example, 53% of end users reported using unsupported AI tools to do their job, and 45% of end users said they believe their coworkers are at least occasionally entering privileged, private or confidential data into unsanctioned tools.&lt;/p&gt;
 &lt;p&gt;IT respondents had a different perspective. In the IT group, 55% said they actively monitor shadow AI usage, and 53% said their enforcement of AI usage policies is strict and consistent. In contrast, this number was 36% for end users.&lt;/p&gt;
 &lt;p&gt;Perhaps most telling is the fact that just 13% of IT respondents said they trust their employees to adhere to AI policies with minimal oversight, while 30% of end users believe that IT trusts them to do so.&lt;/p&gt;
 &lt;p&gt;There's a significant disconnect that I think will likely widen as AI usage grows and its capabilities increase. While this is a scary proposition for many organizations, the data shows that when given the right tools, end users stop using shadow AI. I've written about how draconian &lt;a href="https://www.techtarget.com/searchenterprisedesktop/opinion/With-shadow-AI-sometimes-the-cure-is-worse-than-the-disease"&gt;"block everything" AI policies can cause more harm than good&lt;/a&gt;, and I look forward to researching this topic further in 2026.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Productivity apps and collaboration"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Productivity apps and collaboration&lt;/h2&gt;
 &lt;p&gt;It's difficult to talk about AI in the hands of end users without looking at productivity apps and collaboration. This space was once easy to carve up into different buckets -- office suites, creative suites and unified communications platforms -- but the last few years have seen an incredible amount of overlap and consolidation. This was already happening in the pre-AI era (think of the Office-like integrations in Teams, or Zoom's email and note-taking features), but AI has whipped it into a frenzy.&lt;/p&gt;
 &lt;p&gt;Sure, Microsoft Office is still dominant, and that dominance has given it some runway to learn how to best use Copilot. Google, meanwhile, has been incredibly successful with Gemini and its integration with Google Workspace and Google Chrome. But just when the race appeared to have the same two horses as usual, we're starting to see some new entrants to the race that don't have the same pedigree. Top of mind for me is Canva.&lt;/p&gt;
 &lt;p&gt;Already well-known to creative users and students, &lt;a href="https://www.techtarget.com/searchenterprisedesktop/opinion/Canva-The-business-productivity-app-flying-under-ITs-radar"&gt;Canva has been adding enterprise features&lt;/a&gt; that threaten to upset the Microsoft/Google status quo. It's not a direct competitor at the moment, but Canva is an easy-to-use platform that seamlessly uses AI to build assets, presentations, websites and more, underpinned by a growing data set that can include business and operational data. It will be very difficult to displace existing systems, especially Excel. However, Canva makes it easy enough to interact with the data using natural language that I think the next generation of workers could want to make that their primary way of using productivity apps, not just for creative purposes.&lt;/p&gt;
 &lt;p&gt;Add to this app integrations directly into AI assistants -- like Adobe's &lt;a target="_blank" href="https://news.adobe.com/news/2025/12/adobe-photoshop-express-acrobat-chatgpt" rel="noopener"&gt;integration&lt;/a&gt; into ChatGPT -- and you can see how things might be further disrupted.&lt;/p&gt;
 &lt;p&gt;Long story short, productivity and the way end users work are poised to change significantly. There won't be a wholesale shift in 2026, but it's worth keeping your eyes open. What we see today is certainly going to shape the future.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Autonomous IT"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Autonomous IT&lt;/h2&gt;
 &lt;p&gt;If you're in IT operations, no doubt you've already heard about autonomous IT or some derivation of that phrase, such as &lt;i&gt;autonomous endpoint management&lt;/i&gt; or &lt;i&gt;autonomous workspace&lt;/i&gt;. The companies that use that language on my radar include Action1, Adaptiva, HCL BigFix, NinjaOne, Omnissa and Tanium, though I'm sure I've left a few out.&lt;/p&gt;
 &lt;p&gt;What's interesting about autonomous IT is that it sits at the same place I do: the intersection of endpoint management and security. It can automate patch and vulnerability management, using AI to help progress along the deployment chain from when a vulnerability is discovered through deployment. How much AI is in use (and what is "automated" versus what is "autonomous") differs in execution and marketing between vendors. The end result is the same, though. They remove repetitive tasks that are getting harder in environments that feature more devices, OSes, apps and user locations.&lt;/p&gt;
 &lt;p&gt;While most conversations about autonomous IT today revolve around patch and vulnerability management, the vision extends to service desk, user self-service and even incident response. I tend to think of autonomous IT as a direction rather than a product. To be successful, it will need to adapt to existing tools and processes, using integrations with multiple vendors and data sets. Interest is extremely high, and my sense is that 2026 will be the year we see a jump in adoption that will show us what works and what still needs work.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Browser management and security"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Browser management and security&lt;/h2&gt;
 &lt;p&gt;The shift away from Windows apps and toward browser-based applications means that browsers have long been a critical component of enterprise IT. While the browser used to be just one app among many, it now represents the primary interface that users work from, and organizations are starting to treat it that way. As the primary app that serves as the window to so many corporate apps and so much critical data, a &lt;a href="https://www.techtarget.com/searchenterprisedesktop/opinion/Your-browser-is-an-AI-enabled-OS-so-secure-it-like-one"&gt;modern browser is the target of a slew of new threats&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;With ties to everything we've talked about so far -- agentic AI, prompt security, shadow AI and productivity apps -- vendors across IT and cybersecurity are trying to address browser management and security. Examples include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Standalone enterprise browser vendors, such as Island and Palo Alto Networks.&lt;/li&gt; 
  &lt;li&gt;Desktop and application virtualization vendors, such as Citrix, Dizzion, Omnissa and Parallels.&lt;/li&gt; 
  &lt;li&gt;Remote browser isolation vendors, such as Kasm and Menlo.&lt;/li&gt; 
  &lt;li&gt;OS and traditional browser vendors, such as Google and Microsoft.&lt;/li&gt; 
  &lt;li&gt;Secure browser extensions, such as Browsium and Seraphic.&lt;/li&gt; 
  &lt;li&gt;Zero-trust network access and network security vendors, such as Checkpoint, Netskope and Zscaler.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Given all this activity, it's interesting to me that browser management and security typically fall within some other area of responsibility, rather than as a standalone priority or budgetary line item. In 2026, I expect browser management and security to become a top priority within enterprise IT and security operations.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Conclusion"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Conclusion&lt;/h2&gt;
 &lt;p&gt;What started as a light and breezy look toward 2026 turned into a rather lengthy article that I hope had something for everyone. I'm fortunate to be able to cover such a wide array of topics. I find them endlessly fascinating because even though they're not the bleeding-edge, AI frontier topics that make all the headlines, they're where the rubber meets the road in IT.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Gabe Knuth is the principal analyst covering end-user computing for Omdia.&lt;br&gt;&lt;br&gt;Omdia is a division of Informa TechTarget. Its analysts have business relationships with technology vendors.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Looking ahead to 2026, the end-user IT landscape will shift in subtle but critical ways. Here's what to expect, from prompt security to browsers, productivity and autonomous IT.</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/technology-digital-ai-robot-adobe.jpeg</image>
            <link>https://www.techtarget.com/searchenterprisedesktop/opinion/How-AI-and-the-browser-will-change-end-user-IT-in-2026</link>
            <pubDate>Tue, 06 Jan 2026 16:17:00 GMT</pubDate>
            <title>How AI and the browser will change end-user IT in 2026</title>
        </item>
        <item>
            <body>&lt;p&gt;In addition to UI changes and new features, Microsoft has promised enhanced security in Windows 11. With capabilities like Secure Boot, virtualization-based security and Microsoft Defender built into the platform, many IT leaders might wonder: Do enterprise endpoints still need third-party antivirus?&lt;/p&gt; 
&lt;p&gt;The short answer is yes, enterprise endpoints need an IT-managed antivirus tool. In the changing threat landscape, advanced security technology is essential. To manage threats, IT pros must integrate the right tools into their organizations' security strategies.&lt;/p&gt; 
&lt;p&gt;Given that &lt;a href="https://www.techtarget.com/searchsecurity/definition/Windows-Defender-Advanced-Threat-Protection-ATP"&gt;Microsoft Defender for Endpoint&lt;/a&gt; is already included for most organizations, the question isn't really whether endpoints should have antivirus or not. It's whether Defender is enough to protect enterprise data.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="How does Microsoft Defender affect Windows 11 security?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How does Microsoft Defender affect Windows 11 security?&lt;/h2&gt;
 &lt;p&gt;Microsoft's security platform has improved significantly over time. With strong integration into the complete Microsoft 365 stack, it handles firewall, antivirus and security settings for endpoints. Organizations that have Microsoft 365 with Intune and Entra ID can get quite granular in how they deploy security policies and track compliance. From this unified system, IT can also configure telemetry and enforcement points to work within a zero-trust framework.&lt;/p&gt;
 &lt;p&gt;Microsoft Defender for Endpoint includes the following security features:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Real-time protection against malware, ransomware and phishing.&lt;/li&gt; 
  &lt;li&gt;Firewall management integrated into Intune.&lt;/li&gt; 
  &lt;li&gt;Application control and allowlisting.&lt;/li&gt; 
  &lt;li&gt;Endpoint detection and response (&lt;a href="https://www.techtarget.com/searchsecurity/definition/endpoint-detection-and-response-EDR"&gt;EDR&lt;/a&gt;) can be built in, depending on the organization's Microsoft subscription plan.&lt;/li&gt; 
  &lt;li&gt;Automatic updates.&lt;/li&gt; 
  &lt;li&gt;Centralized correlation of security signals across the Microsoft ecosystem.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="When do organizations need a third-party antivirus tool?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;When do organizations need a third-party antivirus tool?&lt;/h2&gt;
 &lt;p&gt;In some scenarios, it's imperative for organizations to use a third-party antivirus tool. High-risk or highly regulated environments might require extra security controls, compliance reporting or specialized features that Defender doesn't offer.&lt;/p&gt;
 &lt;h3&gt;Regulatory compliance&lt;/h3&gt;
 &lt;p&gt;Sectors like defense, government, healthcare and finance often require specific security vendor certifications or reporting. These requirements might be outside of Defender's capabilities or just too difficult to manage within the platform.&lt;/p&gt;
 &lt;h3&gt;EDR requirements&lt;/h3&gt;
 &lt;p&gt;While Defender for Endpoint &lt;a target="_blank" href="https://learn.microsoft.com/en-us/azure/defender-for-cloud/endpoint-detection-response" rel="noopener"&gt;features&lt;/a&gt; EDR, organizations still might want third-party tools that offer automated remediation or increased protection. Software like Sophos Intercept X, Huntress or CrowdStrike can provide additional protection over the built-in tool.&lt;/p&gt;
 &lt;h3&gt;SIEM integration&lt;/h3&gt;
 &lt;p&gt;Some organizations need to retain logs or use a security information and event management (&lt;a href="https://www.techtarget.com/searchsecurity/definition/security-information-and-event-management-SIEM"&gt;SIEM&lt;/a&gt;) system to store and analyze security events. An organization with these requirements might be better suited to an antivirus tool that integrates with its SIEM platform. This helps simplify management and ensure consistent monitoring.&lt;/p&gt;
 &lt;h3&gt;Multi-OS environments&lt;/h3&gt;
 &lt;p&gt;If an organization uses macOS, Linux, mobile or other non-Windows devices, Defender can't provide fully unified protection. Rather than using different tools for different OSes, find an antivirus platform that enables IT to manage security for all devices from a single console.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/security-computer_virus-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/security-computer_virus-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/security-computer_virus-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/security-computer_virus-f.png 1280w" alt="Chart showing the different types of viruses." data-credit="Informa TechTarget" height="374" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Organizations have to protect against several kinds of viruses on enterprise computers.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="Cost considerations for third-party antivirus"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Cost considerations for third-party antivirus&lt;/h2&gt;
 &lt;p&gt;Third-party antivirus licensing can cost anywhere from $30 to over $100 per endpoint per year. For organizations that have hundreds or even thousands of endpoints, the costs can quickly add up.&lt;/p&gt;
 &lt;p&gt;When searching for endpoint antivirus tools, organizations should consider not only the cost of the actual product but also the cost of labor for monitoring and managing it. Decision-makers must weigh that against the possible costs of not having antivirus protection as well.&lt;/p&gt;
 &lt;h3&gt;Licensing and feature value&lt;/h3&gt;
 &lt;p&gt;IT leaders should evaluate what they get out of the license, as well as what features they'll realistically use from it. Some organizations purchase a security stack but never actually configure it or use all its capabilities. In other words, they waste a portion of what they're paying for. Organizations must assess the &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-implement-security-control-rationalization"&gt;total value of a security investment&lt;/a&gt;, factoring in usability and operational efficiency.&lt;/p&gt;
 &lt;h3&gt;Support and management costs&lt;/h3&gt;
 &lt;p&gt;Another key consideration is support and management costs. If the security tool demands a lot of administration time to monitor and manage it, it can become a burden on IT, and there might be unrealized soft costs.&lt;/p&gt;
 &lt;h3&gt;Implementation and integration overhead&lt;/h3&gt;
 &lt;p&gt;Change can be expensive. Competing timelines and priorities can often make these types of projects go over time and over budget. Expect over 20 hours of engineering time to learn and deploy a new tool. This number increases as the number of endpoints or complexity of the environment increases.&lt;/p&gt;
 &lt;p&gt;When looking for an antivirus tool, executives should consider the effort and potential disruption alongside the security and compliance benefits.&lt;/p&gt;
 &lt;h3&gt;Risk reduction implications&lt;/h3&gt;
 &lt;p&gt;There are also financial benefits to consider. Third-party antivirus tools can contribute to risk reduction and lower insurance premiums.&lt;/p&gt;
 &lt;p&gt;Certain security standards, such as &lt;a href="https://www.techtarget.com/healthtechsecurity/feature/Breaking-Down-the-NIST-Cybersecurity-Framework-How-It-Applies-to-Healthcare"&gt;NIST CSF&lt;/a&gt; or ISO 27001, might require dedicated EDR tools and incident response capabilities. Failing to meet these requirements can raise an organization's insurance premiums or lead to denied coverage during a security incident.&lt;/p&gt;
 &lt;p&gt;Microsoft Defender for Endpoint provides strong baseline protection for Windows 11, but it can't meet enterprise management and security needs. Investing in third-party antivirus tools helps organizations protect data, stay compliant and reduce business risk.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Jake Gardner works with regional organizations, helping them to use technology to provide practical, functional solutions. &lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Windows 11's security framework offers solid protection but has limits. To ensure operational security, organizations must supplement built-in defenses with third-party antivirus.</description>
            <image>https://cdn.ttgtmedia.com/Editorial/2020/07/Security_lock.jpg</image>
            <link>https://www.techtarget.com/searchenterprisedesktop/answer/Do-enterprise-endpoints-need-antivirus-for-Windows-11</link>
            <pubDate>Wed, 24 Dec 2025 10:30:00 GMT</pubDate>
            <title>Do enterprise endpoints need antivirus for Windows 11?</title>
        </item>
        <item>
            <body>&lt;p&gt;Unexpected disk failures aren't just technical issues. They represent business risk, downtime and unnecessary recovery costs. Depending on the type of failure, an error on a disk can indicate a condition that could cause irretrievable loss of any stored data.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.techtarget.com/searchdatabackup/feature/The-7-critical-backup-strategy-best-practices-to-keep-data-safe"&gt;Backups can mitigate the fallout&lt;/a&gt;, but restoring data can be time-consuming and expensive for organizations. Instead, an organization can reduce the risk of a disk failure by ensuring that users and IT keep an eye out for key indicators and know how to use built-in utilities such as Windows Check Disk (CHKDSK).&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Signs of disk failure"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Signs of disk failure&lt;/h2&gt;
 &lt;p&gt;Disk failure can occur for several reasons. These can be catastrophic, such as dropping the computer and damaging the drive, or something as simple as firmware that can no longer detect the drive. Disks wear out like most physical entities, so they can also fail gradually as sectors on the disk become unreadable to the read/write mechanism. Other indications of impending disk failure include&amp;nbsp;poor performance&amp;nbsp;while opening or saving files, computer boot failure or errors accessing data.&lt;/p&gt;
 &lt;p&gt;These signs are usually easily detected through errors and warnings in the&amp;nbsp;&lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Windows-event-log"&gt;Windows event log&lt;/a&gt;. Included in all versions of Windows, the event log records warnings and error events associated with the hard disk. Open the log by either searching for "event viewer" or entering&amp;nbsp;&lt;b&gt;Eventvwr.msc&lt;/b&gt;&amp;nbsp;in the&amp;nbsp;command line.&lt;/p&gt;
 &lt;p&gt;Once opened, expand the Windows logs and click on&amp;nbsp;&lt;b&gt;System&lt;/b&gt;&amp;nbsp;in the Event Viewer (Figure 1). This shows informational events, warnings and critical errors for all system components such as the CPU, controllers, memory, network and disk.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/figure_1_event_viewer.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/figure_1_event_viewer_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/figure_1_event_viewer_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/figure_1_event_viewer.jpg 1280w" alt="Screenshot of the Windows 10 Event Viewer pane." data-credit="Gary Olsen" height="268" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 1. The Event Viewer logs and displays informational events, warnings and errors.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Diagnosing disk errors"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Diagnosing disk errors&lt;/h2&gt;
 &lt;p&gt;Most OEMs include a hardware diagnostic tool, available in the BIOS or &lt;a href="https://www.techtarget.com/whatis/definition/Unified-Extensible-Firmware-Interface-UEFI"&gt;UEFI&lt;/a&gt;, that is useful for checking the health of the disk. These tools typically don't repair errors, though a few models include limited repair or reallocation capabilities. In any case, running these checks across all devices helps identify failing drives early and avoid service interruptions.&lt;/p&gt;
 &lt;p&gt;The&amp;nbsp;BIOS/UEFI utility functions&amp;nbsp;vary by manufacturer but should be the first step to resolving disk issues. Each manufacturer has a unique way of opening the utility on boot. Pressing the F10, F2 or Escape key immediately after pressing the power button usually works. Look for a text line on the screen that indicates what to do.&lt;/p&gt;
 &lt;p&gt;There are also Windows internal tools and third-party tools that can assist in this diagnostic warning of failure.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="What is CHKDSK?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is CHKDSK?&lt;/h2&gt;
 &lt;p&gt;The Windows CHKDSK command-line utility is reliable for finding and addressing file system errors by scanning the disk looking for bad sectors. A disk is divided into a sort of grid with concentric tracks and sectors, and the read/write head reads data in these sectors. If the disk is physically damaged and Windows has difficulty reading it, the system logs the error or warning. CHKDSK can find those bad sectors, write the data to a new sector and mark the old one so the disk won't use it again.&lt;/p&gt;
 &lt;p&gt;CHKDSK has been a Windows core utility since the earliest disk operating system and Windows versions, and it's gone through several changes both in operation and fundamental functionality. While it doesn't repair disk failure, it's a useful tool for identifying file system errors that could be a result of impending disk failure. This enables the user to back up the data and restore it to a new drive, preventing data loss.&lt;/p&gt;
 &lt;p&gt;On Windows 10 and 11, Check Disk includes the following features:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;/spotfix.&lt;/b&gt; This command skips the whole disk scan, which can be lengthy with large disks, and applies a targeted file system fix during a reboot.&amp;nbsp;&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;/forceofflinefix.&lt;/b&gt; This command scans the disk online but does not perform repairs immediately. Instead, it queues the repairs to happen offline during the next reboot.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Common CHKDSK switches&lt;/h3&gt;
 &lt;p&gt;The CHKDSK utility has several switches that perform various tasks indicated by the CHKDSK /? command, as shown in Figure 2. The most common switches include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;CHKDSK /?&lt;/b&gt;&amp;nbsp;displays the help file.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;CHKDSK /F &lt;/b&gt;fixes logical file system errors.&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;CHKDSK /R&amp;nbsp;&lt;/b&gt;locates bad sectors and attempts to recover readable information. This process also fixes logical file system errors in the same way as /f. On solid-state drives (SSDs), this command still checks for &lt;a href="https://www.techtarget.com/searchstorage/tip/4-causes-of-SSD-failure-and-how-to-deal-with-them"&gt;unreadable sectors&lt;/a&gt;, but it does not perform physical surface scans the way it does on hard disk drives (HDDs).&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;CHKDSK&lt;/b&gt;&amp;nbsp;(no switches) runs an analysis utility on the System drive (C:), which checks the file system, security descriptors, file name linkage and file system structure.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;CHKDSK (volume/file path)&amp;nbsp;&lt;/b&gt;runs against a specific volume, file or directory. This command quickly tests if a file or directory can't be accessed or has other performance issues.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/figure_2_chkdsk_help.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/figure_2_chkdsk_help_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/figure_2_chkdsk_help_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/figure_2_chkdsk_help.jpg 1280w" alt="Screenshot of the Command Prompt window displaying the chkdsk /? help screen." data-credit="Gary Olsen" height="556" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 2. Using the chkdsk /? command displays a list of common CHKDSK commands.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Other switches might shorten the execution time by using more system resources or limiting the operations. These include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;/perf&lt;/b&gt;&amp;nbsp;allocates more system resources for faster execution at the cost of active applications.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;/scan /forceofflinefix&lt;/b&gt;&amp;nbsp;provides an online scan and queues the repair for offline work.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;/i&lt;/b&gt;&amp;nbsp;does a faster, but not thorough, check.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="How to use CHKDSK"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to use CHKDSK&lt;/h2&gt;
 &lt;p&gt;A user can run the CHKDSK command from a command prompt. First, search for "Command Prompt" in the Windows search bar.&amp;nbsp;After it opens, select the&amp;nbsp;&lt;b&gt;Run as Administrator&lt;/b&gt;&amp;nbsp;option on the right. At that point, the user can enter&amp;nbsp;&lt;b&gt;CHKDSK&lt;/b&gt;&amp;nbsp;and any switches they wish to execute. If needed, the command CHKDSK /? generates a list of switches.&lt;/p&gt;
 &lt;p&gt;Additionally, Windows 10 and 11 include File Explorer integration. This feature provides access to the CHKDSK utility through the File Explorer UI rather than through the command line.&lt;/p&gt;
 &lt;p&gt;Right-click on the C: drive in File Explorer and choose &lt;b&gt;Properties&lt;/b&gt;. Then, select the &lt;b&gt;Tools&lt;/b&gt; tab and click on the &lt;b&gt;Check&lt;/b&gt; button.&lt;/p&gt;
 &lt;h3&gt;Running CHKDSK before Windows boots&lt;/h3&gt;
 &lt;p&gt;CHKDSK can run without starting Windows. If Windows doesn't boot, try running CHKDSK before Windows loads to check the disk and hopefully resolve the problem.&lt;/p&gt;
 &lt;p&gt;Boot the computer from a Windows installation USB or OEM-supplied recovery disk. Alternatively, engage the recovery environment by holding the &lt;b&gt;Shift&lt;/b&gt; key and clicking &lt;b&gt;Restart&lt;/b&gt;. Then, take the following steps:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;On the "Install Windows" screen, click &lt;b&gt;Repair Your Computer&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;Select Troubleshoot &amp;gt; Advanced Options &amp;gt; Command Prompt.&lt;/li&gt; 
  &lt;li&gt;Run CHKDSK C: /r&amp;nbsp;to check the system drive.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;h3&gt;Considerations when using CHKDSK&lt;/h3&gt;
 &lt;p&gt;While CHKDSK is intuitive and easy to use, it's important to keep the following points in mind:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;CHKDSK typically runs from the command-line utility (CMD) or from File Explorer.&lt;/li&gt; 
  &lt;li&gt;CHKDSK will not damage a healthy computer or disk. However, it's possible for the /f and /r to burden a failing drive and risk data loss on a damaged drive. Before running either command on a suspected failing drive, consider creating a backup first or &lt;a href="https://www.techtarget.com/searchdatabackup/definition/ghost-imaging"&gt;using disk imaging tools&lt;/a&gt; instead.&lt;/li&gt; 
  &lt;li&gt;CHKDSK can run against any&amp;nbsp;physical hard disk.&lt;/li&gt; 
  &lt;li&gt;CHKDSK requires the target volume to be offline when using the /f or /r options. If the target is the C: drive, CHKDSK queues the scan request and runs it automatically on the next restart. This can be helpful, as scheduling scans during maintenance windows reduces disruption and limits unplanned support tickets.&lt;/li&gt; 
  &lt;li&gt;CHKDSK can run on other volumes live.&lt;/li&gt; 
  &lt;li&gt;CHKDSK supports offline use through boot media such as USBs or recovery disks.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="Additional disk scan and repair processes"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Additional disk scan and repair processes&lt;/h2&gt;
 &lt;p&gt;In addition to CHKDSK, IT teams should be familiar with other Windows options for diagnosing disk errors. And in the event of disk failure, they should know what their options are for system repair.&lt;/p&gt;
 &lt;p&gt;Performing self-monitoring, analysis and reporting technology (SMART) checks and using image files to restore the system are also important processes for scanning and repairing disks.&lt;/p&gt;
 &lt;h3&gt;Diagnosing disk errors with SMART&lt;/h3&gt;
 &lt;p&gt;SMART is a built-in monitoring system on HDDs and SSDs that detects and reports signs of hardware failure. Some of the metrics it reports on include read/write error rates, spin-up time &lt;a href="https://www.techtarget.com/searchstorage/answer/Whats-the-best-way-to-protect-against-HDD-failure"&gt;for HDDs&lt;/a&gt;, bad sector blocks, remaining lifespan, wear-leveling count and temperature. SMART's job is to try to predict imminent hard disk failure so users can back it up and restore it before the drive becomes unusable.&lt;/p&gt;
 &lt;p&gt;Just like CHKDSK, SMART can't repair but warns of impending failure. For IT leaders, this data provides early-warning signals that support predictive maintenance.&lt;/p&gt;
 &lt;p&gt;HP's UEFI system test performs a SMART check on a hard drive. Users can also access SMART through PowerShell or the Windows Management Instrumentation Command-line (WMIC) utility. Use one of the following methods:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Execute the PowerShell command &lt;span style="font-family: 'courier new', courier, monospace;"&gt;Get-PhysicalDisk&lt;/span&gt;. This shows the status of each drive.&lt;/li&gt; 
  &lt;li&gt;Execute the WMIC command&amp;nbsp;&lt;span style="font-family: 'courier new', courier, monospace;"&gt;wmic diskdrive get status&lt;/span&gt;. This is a legacy command, but it still works on Windows 10. It might not be available on Windows 11, as the WMIC utility is deprecated and has been removed by default from Windows 11 installations.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Third-party tools also provide SMART diagnostics. These include tools from Seagate, Western Digital, Hard Disk Sentinel and CrystalDiskInfo.&lt;/p&gt;
 &lt;h3&gt;Using image files for system repair&lt;/h3&gt;
 &lt;p&gt;When restoring systems and system files after a disk has been replaced, it's critical to get them to a usable state as quickly as possible. This includes user settings, applications, data and the OS, with options as configured and customized by the organization.&amp;nbsp;The use of a full disk or system image file -- either from a physical device such as a USB drive, CD/DVD or a network-accessible file -- has been a standard procedure for system restoration for many years.&lt;/p&gt;
 &lt;p&gt;Organizations build a &lt;a href="https://www.techtarget.com/searchitoperations/definition/golden-image"&gt;golden image&lt;/a&gt; to use for restoration. This image has corporate-approved security configurations, applications, settings and even corporate logo wallpaper.&amp;nbsp;There might be multiple images to accommodate the needs of different departments, with some images more secure than others. From a business continuity standpoint, maintaining standardized image files shortens recovery time and helps meet compliance targets.&lt;/p&gt;
 &lt;p&gt;There are also several ways image files can be used in system recovery. Each method corresponds to different recovery requirements.&lt;/p&gt;
 &lt;p&gt;&lt;u&gt;&lt;iframe title="Windows system imaging and recovery options" aria-label="Table" id="datawrapper-chart-pOfvg" src="https://datawrapper.dwcdn.net/pOfvg/1/" scrolling="no" frameborder="0" style="width: 0; min-width: 100% !important; border: none;" height="716" data-external="1"&gt;&lt;/iframe&gt; &lt;script type="text/javascript"&gt;window.addEventListener("message",function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r,i=0;r=e[i];i++)if(r.contentWindow===a.source){var d=a.data["datawrapper-height"][t]+"px";r.style.height=d}}});&lt;/script&gt; &lt;/u&gt;&lt;/p&gt;
 &lt;p&gt;Problems such as hard disk failure or OS corruption might require a full system recovery. However, it's also possible to do a partial system recovery from a type of image file called a &lt;i&gt;snapshot&lt;/i&gt; or &lt;i&gt;restore point&lt;/i&gt;. A user can take a snapshot of the system state, then restore the system as if going back in time.&amp;nbsp;Note that this doesn't &lt;a href="https://www.techtarget.com/searchdatabackup/feature/Image-based-vs-file-based-backup-Key-comparisons"&gt;back up documents or user data&lt;/a&gt; -- it just protects system files, drivers, registry settings and configurations.&lt;/p&gt;
 &lt;p&gt;For instance, a user can save a snapshot of the system as an image file on disk. An app installation or security update could then take place. If that update or installation caused the system to fail or exhibit poor performance, the user can apply the snapshot to restore the system to the previous state. Users can take multiple snapshots and choose which one they want to restore the system to.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;To create a snapshot and restore the system to it on Windows 10 and 11, take the following steps:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;From the Windows Search bar, search for and select &lt;b&gt;Create a restore point&lt;/b&gt;. This opens the System Properties screen.&lt;/li&gt; 
  &lt;li&gt;Under Protection Settings, select the drive the snapshot should be saved onto. Then, click on the &lt;b&gt;Configure… &lt;/b&gt;button.&lt;/li&gt; 
  &lt;li&gt;A pop-up screen should then show basic configuration parameters such as limiting the amount of disk space to store snapshots. On this screen, make sure &lt;b&gt;Turn on system protection &lt;/b&gt;is selected, and configure any desired disk space usage settings. Once the settings look correct, click &lt;b&gt;Apply&lt;/b&gt; and &lt;b&gt;OK&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;On the System Properties screen, select the &lt;b&gt;Create…&lt;/b&gt; button. This prompts another pop-up, where the user should type in a description for the restore point and then click &lt;b&gt;Create&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;Once the system is done creating the restore point, select &lt;b&gt;Close&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;To restore the system, click on the &lt;b&gt;System Restore…&lt;/b&gt; button. The user can then choose to revert the system to one of the available restore points.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;It's also possible to script this process in PowerShell for Windows 10 and 11.&lt;/p&gt;
&lt;/section&gt;                   
&lt;section class="section main-article-chapter" data-menu-title="Managing disk health in a corporate environment"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Managing disk health in a corporate environment&lt;/h2&gt;
 &lt;p&gt;In the enterprise, disk health management directly affects data integrity, compliance, uptime and costs. Beyond individual repairs, it plays a key role in risk mitigation and &lt;a href="https://www.techtarget.com/searchstorage/tip/7-steps-to-retiring-storage-hardware-safely-and-efficiently"&gt;lifecycle planning&lt;/a&gt;. It's crucial for organizations to monitor disk health on a consistent basis, and to use the right tools and strategies to do it.&lt;/p&gt;
 &lt;p&gt;Windows CHKDSK is a fundamental tool that performs a quick check on disk read/write errors. It's often the initial step in resolving disk-related performance problems and errors listed in event logs. However, it's better used for general maintenance instead of repairing a known issue, as it's impractical to run it on every computer in an organization.&lt;/p&gt;
 &lt;p&gt;For enterprise environments, advanced tools using SMART monitoring and logging to a centralized location are more effective and practical. These tools include Windows Admin Center, System Center Operations Manager and third-party applications.&lt;/p&gt;
 &lt;p&gt;Many third-party programs enable an administrator to&amp;nbsp;&lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Filter-and-query-Windows-event-logs-with-PowerShell"&gt;manage event logs&lt;/a&gt;, including the system event log, and identify computers that need attention. Some of the more popular options are Manage Engine EventLog Analyzer, Sematext Logs, Graylog and Datadog Log Management.&amp;nbsp;These tools provide advanced features such as compliance analysis, real-time monitoring, scalability and custom dashboards.&lt;/p&gt;
 &lt;p&gt;IT staff should use the following best practices to prevent and handle issues like disk failure:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Monitor SMART data with tools such as PowerShell, Windows and third-party programs to detect early signs of disk failure.&lt;/li&gt; 
  &lt;li&gt;Monitor event logs for disk &lt;a target="_blank" href="https://learn.microsoft.com/en-us/troubleshoot/windows-server/backup-and-storage/troubleshoot-data-corruption-and-disk-errors" rel="noopener"&gt;warning events&lt;/a&gt;. Use centralized log management tools to collect and analyze enterprise-wide data.&lt;/li&gt; 
  &lt;li&gt;Prepare system images for use in restoring failed systems quickly and reducing downtime.&amp;nbsp;&lt;/li&gt; 
  &lt;li&gt;Create images for various system requirements in the enterprise, such as kiosks, test and development, general users, power users and executives.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Provide full disk or system image files on backed-up, readily available network locations.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Protect computers with system restore points. This is especially useful for testing and development, and prior to installing software on specific machines.&lt;/li&gt; 
  &lt;li&gt;Educate end users on disk failure warning signs and how to contact IT support&amp;nbsp;for resolution.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Additionally, executives and managers should adopt the following practices to ensure proper disk management in their organizations:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Ask administrators what percentage of endpoints have had CHKDSK or SMART scans in the past quarter.&lt;/li&gt; 
  &lt;li&gt;Include disk health metrics in quarterly &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-perform-a-data-risk-assessment-step-by-step"&gt;IT risk reviews&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Make sure staff are trained in proactive maintenance and image-based recovery.&lt;/li&gt; 
  &lt;li&gt;Budget for preventive diagnostics instead of emergency replacements.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt; &lt;i&gt;Gary Olsen originally wrote this article in December 2021. He updated and expanded it in December 2025 to reflect changes in Windows management processes and improve the reader experience.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Gary Olsen has worked in the IT industry since 1983 and holds a Master of Science in computer-aided manufacturing from Brigham Young University. He was on Microsoft's Windows 2000 beta support team for Active Directory from 1998 to 2000 and has written two books on Active Directory and numerous technical articles for magazines and websites.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Using built-in Windows tools such as Check Disk and SMART helps organizations reduce risks associated with disk errors, extend hardware life and maintain operational continuity.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/disaster_recovery_a267084312.jpg</image>
            <link>https://www.techtarget.com/searchenterprisedesktop/tip/How-to-scan-and-repair-disks-with-Windows-10-Check-Disk</link>
            <pubDate>Wed, 10 Dec 2025 18:00:00 GMT</pubDate>
            <title>How to use Windows Check Disk to maintain disk health</title>
        </item>
        <item>
            <body>&lt;p&gt;Up-to-date BIOS and Unified Extensible Firmware Interface (&lt;a href="https://www.techtarget.com/whatis/definition/Unified-Extensible-Firmware-Interface-UEFI"&gt;UEFI&lt;/a&gt;) firmware is critical for enterprise security, device reliability and seamless Windows 11 adoption.&lt;/p&gt; 
&lt;p&gt;In enterprise environments, firmware directly affects security posture, hardware stability and compatibility with modern platforms like Windows 11. Outdated versions can introduce vulnerabilities, disrupt performance and complicate &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/Three-PC-lifecycle-management-options-IT-should-consider"&gt;device lifecycle planning&lt;/a&gt;. Clear visibility into BIOS/UEFI versions helps organizations maintain secure, compliant and consistent endpoint environments.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What are BIOS versions?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are BIOS versions?&lt;/h2&gt;
 &lt;p&gt;BIOS and its more modern replacement, UEFI, are the low-level software that initializes hardware before the OS loads. This software is responsible for booting the computer, managing hardware-level communication and providing the interface between the OS and the hardware. Modern computers don't use a traditional BIOS. They use UEFI instead. Still, people commonly refer to this software as BIOS.&lt;/p&gt;
 &lt;p&gt;So, what does it mean to look for a computer's BIOS version? The BIOS version essentially refers to the system firmware version, even on UEFI-based machines. When people ask about the BIOS version, they are likely referring to the firmware version of the UEFI on the computer.&lt;/p&gt;
 &lt;h3&gt;What is the difference between BIOS and UEFI?&lt;/h3&gt;
 &lt;p&gt;BIOS is the older, legacy system. It has a text-based interface and uses the keyboard for navigation. BIOS uses the &lt;a href="https://www.techtarget.com/whatis/definition/Master-Boot-Record-MBR"&gt;Master Boot Record&lt;/a&gt; partitioning system, which only supports drives up to 2.2 TB and is limited to four primary partitions.&lt;/p&gt;
 &lt;p&gt;UEFI was designed to overcome the limitations of BIOS. It offers a graphical interface and supports not only keyboard input but also navigation with a mouse. UEFI also supports enterprise-grade features such as the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Secure Boot.&lt;/li&gt; 
  &lt;li&gt;Remote diagnostics.&lt;/li&gt; 
  &lt;li&gt;Network booting.&lt;/li&gt; 
  &lt;li&gt;Firmware updates from inside the OS.&lt;/li&gt; 
  &lt;li&gt;Support for the GUID Partition Table standard, which enables the use of larger drives and partitions.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;While older PCs might still use BIOS, UEFI has become the standard for modern computers over the past several years. In fact, UEFI and Secure Boot are &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/The-Windows-11-system-requirements-and-what-they-indicate"&gt;requirements to run Windows 11&lt;/a&gt;.&lt;/p&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="Why the BIOS version matters for IT admins"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why the BIOS version matters for IT admins&lt;/h2&gt;
 &lt;p&gt;OEMs and hardware vendors often release updates to BIOS to support new features, fix bugs and update security flaws that might exist on the previous firmware version. IT might need to check the BIOS version in the following instances:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Troubleshooting hardware and performance issues.&lt;/li&gt; 
  &lt;li&gt;Ensuring that the hardware is supported on new OSes.&lt;/li&gt; 
  &lt;li&gt;Ensuring that hardware has the latest security updates.&lt;/li&gt; 
  &lt;li&gt;Deploying updates and verifying that they have applied correctly.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;While Microsoft provides Windows updates, the hardware manufacturer handles BIOS updates. This is because the BIOS/UEFI versions are model-specific. Manufacturers release these updates to fix security flaws or compatibility issues, or to improve hardware performance.&lt;/p&gt;
 &lt;p&gt;At scale, visibility into firmware versions across all devices is essential. Centralized tracking, automated updates through &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/Top-unified-endpoint-management-software-vendors"&gt;endpoint management tools&lt;/a&gt; and adherence to OEM support timelines reduce operational risk and administrative overhead. Integrating firmware management into broader IT governance ensures that devices remain reliable throughout their lifecycle, while supporting cost-effective, predictable operations across the organization.&lt;/p&gt;
 &lt;h3&gt;Does the BIOS version depend on the OS?&lt;/h3&gt;
 &lt;p&gt;The BIOS version doesn't depend on the OS. It's the firmware version that is running independent of the operating system.&lt;/p&gt;
 &lt;p&gt;This means that the firmware version doesn't change when users install a new version of Windows. However, the process for checking the firmware version might change depending on the OS, and some firmware features only work in a supported OS.&lt;/p&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="How to check your BIOS Version on Windows 11"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to check your BIOS Version on Windows 11&lt;/h2&gt;
 &lt;p&gt;When using a Windows 11 PC, there are a few different ways to check the BIOS/UEFI version, depending on the use case.&lt;/p&gt;
 &lt;h3&gt;Checking the BIOS version using System Information&lt;/h3&gt;
 &lt;p&gt;IT can use Windows System Information to check the firmware version. This method also works on Windows 10. It shows the BIOS version string, OEM or motherboard manufacturer, and the release date of the BIOS/UEFI firmware. To use this method, take the following steps:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;Press the &lt;b&gt;Windows&lt;/b&gt; and &lt;b&gt;R&lt;/b&gt; keys to open the Run dialogue.&lt;/li&gt; 
  &lt;li&gt;Type in &lt;i&gt;MSInfo32&lt;/i&gt; and hit the &lt;b&gt;Enter&lt;/b&gt; key.&lt;/li&gt; 
  &lt;li&gt;In the system summary window, look for the entry labelled &lt;i&gt;BIOS Version/Date&lt;/i&gt;.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;h3&gt;Checking the BIOS version in Windows using command-line tools&lt;/h3&gt;
 &lt;p&gt;Sometimes it's easier for an IT administrator to use command-line tools to find the BIOS version. This makes it easier to collect BIOS data through scripting or enable bulk queries across multiple systems through management platforms.&lt;/p&gt;
 &lt;p&gt;PowerShell is ideal for scripting or collecting BIOS info across multiple devices. To find the BIOS version through PowerShell, use the following steps:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;Press the &lt;b&gt;Windows&lt;/b&gt; and &lt;b&gt;R&lt;/b&gt; keys to open the Run dialogue.&lt;/li&gt; 
  &lt;li&gt;Type in&lt;i&gt; PowerShell&lt;/i&gt; and hit &lt;b&gt;Enter&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;In the PowerShell window, type in the following command:&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;pre class="language-powershell"&gt;&lt;code&gt;Get-CimInstance -ClassName Win32_BIOS | Select-Object SMBIOSBIOSVersion, Manufacturer, ReleaseDate&lt;/code&gt;&lt;/pre&gt;
 &lt;ol type="1" start="4" class="default-list"&gt; 
  &lt;li&gt;Press the &lt;b&gt;Enter&lt;/b&gt; key.&lt;/li&gt; 
  &lt;li&gt;The screen should then show the OEM, BIOS version and its release date.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;To find the BIOS version in Windows using the &lt;span style="font-family: 'courier new', courier, monospace;"&gt;systeminfo&lt;/span&gt; command in the Command Prompt, take the following steps:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;Press the &lt;b&gt;Windows&lt;/b&gt; and &lt;b&gt;R&lt;/b&gt; keys to open the Run dialogue.&lt;/li&gt; 
  &lt;li&gt;Type in &lt;i&gt;cmd&lt;/i&gt; and hit &lt;b&gt;Enter&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;In the Command Prompt window, type in the following command:&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;pre&gt;&lt;span style="font-family: 'courier new', courier, monospace;"&gt;systeminfo | findstr /I "BIOS"&lt;/span&gt;&lt;/pre&gt;
 &lt;ol type="1" start="4" class="default-list"&gt; 
  &lt;li&gt;Press the &lt;b&gt;Enter&lt;/b&gt; key.&lt;/li&gt; 
  &lt;li&gt;The screen should display the OEM, BIOS version and its release date.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;One option that works in Windows 10 but might not be available in Windows 11 is the command &lt;span style="font-family: 'courier new', courier, monospace;"&gt;wmic bios get smbiosbiosversion&lt;/span&gt;. The Windows Management Instrumentation Command-line utility is &lt;a target="_blank" href="https://support.microsoft.com/en-us/topic/windows-management-instrumentation-command-line-wmic-removal-from-windows-e9e83c7f-4992-477f-ba1d-96f694b8665d" rel="noopener"&gt;deprecated&lt;/a&gt; and has been removed by default from many Windows 11 installations.&lt;/p&gt;
 &lt;h3&gt;Checking the BIOS version by booting into UEFI/BIOS&lt;/h3&gt;
 &lt;p&gt;Rather than checking the BIOS version from inside the OS, it's also possible to boot directly into the UEFI interface and check directly. This process varies depending on the OEM.&lt;/p&gt;
 &lt;p&gt;First, boot the device. During the startup process, the screen should specify which button to press to enter the BIOS/UEFI setting. It's typically &lt;b&gt;F1&lt;/b&gt;, &lt;b&gt;F2&lt;/b&gt;, &lt;b&gt;F10&lt;/b&gt;, &lt;b&gt;F12&lt;/b&gt; or the &lt;b&gt;DEL&lt;/b&gt; key.&lt;/p&gt;
 &lt;p&gt;After booting into the UEFI/BIOS system, the home screen should display the system information, including the system's model number, BIOS/UEFI version and date of the last update.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Jake Gardner works with regional organizations, helping them use technology to provide practical, functional solutions.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Firmware, such as BIOS or UEFI, plays a crucial role in how securely a Windows device starts and operates. Organizations need to know what versions are running on their endpoints.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/folder-files13.jpg</image>
            <link>https://www.techtarget.com/searchenterprisedesktop/tip/How-IT-admins-can-check-BIOS-or-UEFI-versions-in-Windows-11</link>
            <pubDate>Mon, 17 Nov 2025 14:32:00 GMT</pubDate>
            <title>How IT admins can check BIOS or UEFI versions in Windows 11</title>
        </item>
        <item>
            <body>&lt;p&gt;AI took center stage at Microsoft Ignite 2025, this year's installment of the tech giant's annual conference.&lt;/p&gt; 
&lt;p&gt;From Nov. 18-21, conference-goers gathered at San Francisco's Moscone Center for hundreds of live sessions, demonstrations and labs focusing on key topic areas. Key topics this year included cloud and AI platforms, AI-powered security and AI business tools.&lt;/p&gt; 
&lt;p&gt;In a shakeup from years past, Microsoft CEO Satya Nadella did not make an appearance at this year's event. Judson Althoff, CEO of Microsoft's commercial business, delivered the opening keynote -- where he highlighted the company's AI innovations -- alongside senior Microsoft engineering leaders.&lt;/p&gt; 
&lt;p&gt;Dive into our editorial coverage below to catch up on the major announcements and news analysis from this year's Microsoft Ignite conference, and stay tuned for future updates.&lt;/p&gt;</body>
            <description>Our guide to Microsoft Ignite 2025 has everything you need to know about the annual conference, including live news updates, expert analysis and highlights from last year's show.</description>
            <link>https://www.techtarget.com/searchwindowsserver/conference/Microsoft-Ignite-conference-coverage</link>
            <pubDate>Mon, 10 Nov 2025 00:00:00 GMT</pubDate>
            <title>Microsoft Ignite 2025 conference coverage</title>
        </item>
        <item>
            <body>&lt;p&gt;Here's where agentic AI hype hits the desktop: Low-code agent builders enable rank-and-file office workers to automate their own daily drudgery.&lt;/p&gt; 
&lt;p&gt;That's the idea behind generative AI agent builders from companies such as &lt;a href="https://www.techtarget.com/whatis/feature/ChatGPT-agents-explained"&gt;OpenAI&lt;/a&gt;, Zapier, MindStudio and &lt;a href="https://www.techtarget.com/searchcustomerexperience/news/366626538/Salesforce-Agentforce-3-lifts-the-hood-on-observability"&gt;Salesforce&lt;/a&gt;, to name a few. They spread agentic AI outside the developer tribe and give frontline office workers the ability to automate manual processes. The builders can typically create agents from a chat prompt, and they plug into enterprise security policies that govern their use and access to sensitive data.&lt;/p&gt; 
&lt;p&gt;Microsoft has also entered this competitive fray, having released &lt;a href="https://www.techtarget.com/searchcustomerexperience/news/366614232/Microsoft-adds-Copilot-agents-design-tools-for-365-Dynamics"&gt;Copilot Studio&lt;/a&gt; in October 2024. Last week, the company released a no-code agent builder called Copilot Studio lite to its Microsoft Copilot users in the Frontier beta program. In Copilot Studio lite, users can make what Microsoft characterizes as "lightweight" agents. Full Copilot Studio is required for advanced workflows, &lt;a href="https://www.techtarget.com/whatis/definition/large-language-model-LLM"&gt;large language model&lt;/a&gt; selection and other features.&lt;/p&gt; 
&lt;p&gt;Also included in the Frontier &lt;a href="https://www.microsoft.com/en-us/microsoft-365/blog/2025/10/28/microsoft-365-copilot-now-enables-you-to-build-apps-and-workflows/" target="_blank" rel="noopener"&gt;beta release&lt;/a&gt;, along with Copilot Studio lite, is Workflows, a Copilot agent that can automate tasks such as sending updates to teammates and managing calendars in Outlook, Teams, SharePoint and Planner. App Builder, another generative AI agent in Copilot, can track project milestones and deadlines, in addition to visualizing data.&lt;/p&gt; 
&lt;p&gt;"Microsoft is really trying to differentiate and distinguish itself from its closest rival, which is ChatGPT Enterprise," said Gartner analyst Jason Wong. "This Copilot app resembles a lot of what ChatGPT and ChatGPT Enterprise is -- so Microsoft is trying to build in hooks into this Copilot app to differentiate it. Part of that is integrating it into their existing set of applications like SharePoint."&lt;/p&gt; 
&lt;p&gt;Microsoft's Copilot Studio lite also provides users with an environment in which to build their agents without developer overhead. It takes the leap from the low-code environment of the Microsoft Apps (formerly Power Apps) and Power Automate platforms fully into the no-code realm.&lt;/p&gt; 
&lt;p&gt;"Microsoft Apps and Power Automate have been part of this &lt;a href="https://www.techtarget.com/searchsoftwarequality/definition/citizen-development"&gt;citizen development movement&lt;/a&gt;, where companies would stand up the environments and allow business users to create applications, workflows, bots, automations. It took effort for organizations to stand this up and to track what's happening," Wong said. "[Microsoft's] app builder and workflow builder tool gets away from having to formally set up environments for citizen development -- [they're] just very simple agent-building tools inside the environment that [users are already] familiar with."&lt;/p&gt; 
&lt;p&gt;Richard Riley, general manager of low-code and agents marketing at Microsoft, said that agent designers are now table stakes for office software; it's not a situation where just OpenAI is competing with Copilot. Companies will compete not on the agents' building capability itself, he believes, but on the tooling that comes with them.&lt;/p&gt; 
&lt;p&gt;Microsoft's agentic AI tools enable users to create simple -- at least for now -- automations. Giving end users such tools has been foundational to the success of Microsoft's productivity suite in the past.&lt;/p&gt; 
&lt;p&gt;"If you think about it in the context of history, if you look back to what made Office the thing it is, a lot of that came with extensibility," Riley said. "With things like Visual Basic, things like macros, people built things on Office that you'd never have expected to be able to build."&lt;/p&gt; 
&lt;p&gt;&lt;i&gt;Don Fluckinger is a senior news writer for Informa TechTarget. He covers customer experience, digital experience management and end-user computing. Got a tip? &lt;/i&gt;&lt;a href="mailto:don.fluckinger@informatechtarget.com?subject=Tip%20from%20article" target="_blank" rel="noopener"&gt;&lt;i&gt;Email him&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;</body>
            <description>The battle for desktop agent mindshare heats up. Microsoft is the latest to arm everyday office workers with tools to make their own, taking on OpenAI, Google and Salesforce.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/ai_a205627811.jpg</image>
            <link>https://www.techtarget.com/searchenterprisedesktop/news/366633987/Microsoft-opens-Copilot-agent-building-to-office-rank-and-file</link>
            <pubDate>Tue, 04 Nov 2025 14:57:00 GMT</pubDate>
            <title>Microsoft opens Copilot agent building to office rank and file</title>
        </item>
        <title>Search Enterprise Desktop Resources and Information from TechTarget</title>
        <ttl>60</ttl>
        <webMaster>webmaster@techtarget.com</webMaster>
    </channel>
</rss>
