Critical Design Associates

Tech Blog

Our technology experts provide you with industry research and their perspective on the world of IT

Reducing Logon Times Using Ivanti UWM Environment Manager

Learn how Ivanti User Workspace Manager (UWM) Environment Manager (EM) can help optimize your logon times to increase your company’s productivity.

Whitelisting & Blacklisting Made Easy with Ivanti Application Control

Did you know that 81% of CIOs ranked endpoint security as their top spending priority? Hackers almost exclusively target the endpoint for ransomware attacks because end users can easily be fooled.
Unleash Security Potential DevSecOps

SecOps and DevSecOps Automation

We are always looking for a better way to validate security solutions for customers and help them realize where the gaps are in their existing security infrastructure. We focus on the people, the processes, and the platforms in place.

Improve your Security, Compliance, and Performance

We love firewalls and we hate firewalls. We love the protection they provide but hate the level of scrutiny and administration required to keep them compliant. Firewalls are a critical part of any corporate IT environment.

Privileged Account Discovery Script: Reduce Privilege Escalation Attacks

After conducting research on managing privileged accounts, I could not find what I was looking for so I decided to write a custom script that helps reduce Privilege Escalation Attacks.

Optimizing Windows 10 Upgrades with Ivanti Endpoint Manager (EPM)

In a recent customer engagement, the client had requested to upgrade Windows 10 workstations within their environment using Ivanti Endpoint Manager (EPM.)

Using PowerShell to Deploy Ivanti UWM Agents

The Ivanti Management Center provides a simple interface to deploy Ivanti UWM agents and configurations. When installed, it exposes web services that are used by the Ivanti Management Center console to perform various functions.

Application Control for Enhanced Endpoint Security

Application Control has many key features but today I'd like to focus on trusted ownership which is based on the core of Microsoft NTFS security permissions. Simply stated trusted ownership is a feature that prohibits

Ivanti UWM Application Network Access Control (ANAC)

Today we’re going to go over Application Control Application Network Access Control or ANAC. Application Network Access Control or ANAC is part of the UWM suite from Ivanti and we’re going to present a very specific use case.

Using PowerShell and Ivanti UWM API for Machine Polling

I was working on a project where we built a complex Environment Manager config. It made sense to have this config start doing its magic on the workstation during the SCCM build Task sequence, but we didn’t want to have to maintain a config package in SCCM.

Ivanti ISM Workshop Part 7 - Using Xtraction for Enhanced Reporting

In this section we assume have installed Xtraction and would like to configure Ivanti Service Manager (ISM) in your Xtraction Application. The following workshop will detail the procedures you will need to follow to accomplish this goal.

Ivanti ISM Workshop Part 6 - Updating and Upgrading

In this portion of our workshop series, we assume your production environment is live and will be in need of changes to the configuration or upgrade to new software versions. We will detail the processes for updating or upgrading your Ivanti ISM environment.

Ivanti ISM Workshop Part 5 - Preparation for Going Live

This document outlines the recommended steps to prepare for go-live. The installation is much the same as the production installation but here we will enable the OPS Console. Ivanti Service Manager (ISM) is powered by HEAT, the most complete cloud-optimized ITSM solution available today.

Ivanti ISM Workshop Part 4 - Application Configuration and Testing

The intent of this blog is to provide detail on how to configure and test the Ivanti ISM platform after the initial installation is complete. The configuration process is the same for both SaaS and on-premise installations.

Ivanti ISM Workshop Part 3 - Build Your On-Premise Production Installation

The overall installation of Ivanti ISM includes a production environment containing a production tenant and a development environment containing a staging and UAT tenant.

Ivanti ISM Workshop Part 2 - Design Considerations

The intent of this article is to outline the necessary design considerations relative to the implementation of ISM. The design phase is used for planning the deployment and developing a blueprint to build the environment.

Ivanti ISM Workshop Part 1 - Analysis and Requirements Gathering

The intent of this article is to outline the analysis and requirements gathering phase of an ISM Implementation. The Analysis and Requirements Gathering phase assures that the capabilities of ISM and the needs of the customer are fully explored and understood.

CDA Receives Award as Ivanti New Partner of the Year

Ivanti partners throughout the Americas continue to play a vital role in the growth of Ivanti's continued success and reach," said Reza Parsia, vice president, channel at Ivanti. "It's an honor to recognize this distinguished list of stand-out partners.

Migrating from Heat Classic to Ivanti Service Manager

Planning on moving from HEAT Classsic to Ivanti ISM? Until now there has not been a clear upgrade path for migrating from HEAT Classic to Ivanti Service Manager. Read part 1 of our latest series identifying the requirements to migrate from HEAT Classic to Ivanti ISM.

Increasing Visibility to Ivanti Application Control Events with Xtraction

Ivanti’s Application Control has great built-in auditing features that provide insight to actions controlled within Application Control. Although historical auditing is useful, sometimes it can become overwhelming and noisy.

Tips and Tricks When Using Ivanti Environment Manager’s “GeoSync”

Since we published our previous blog, GeoSync has certainly improved and, when implemented correctly, can do a great job keeping the Personalization database synchronized between multiple datacenters.

Automating Lab Buildouts with XenServer PowerShell - Part 4 Roles, Features, and Other Components

Creating an automated lab has its benefits, but what about the additional configuration of roles and features after all the servers are built? Building out all of these components can take some time, time that you may not have.

How to Create an MSI with SCCM Standalone Remote Control Viewer Components

While Microsoft has provided an excellent tool for full remote viewing and control, the administrative components are only provided by Microsoft as a part of the SCCM administrative console.

Automating Lab Builds with XenServer PowerShell – Part 3 Unlimited VM Creation

Once you have all the necessary files and have created a custom ISO to complete an unattended installation of Windows, the next step will be to automate the creation of VMs.

Creating Configured Deployment Packages with Ivanti Package Studio

This product is specifically designed to take the guesswork out of creating configured deployment packages by leveraging a collection of downloadable source software which has already been verified and reviewed by the software vendor.

Deploying Office 365 using SCCM

The deployment of Office 365 applications (Word, Excel, PowerPoint, Outlook, etc..) just became much easier. Beginning with SCCM version 1702, from the Office 365 Client Management dashboard, the Office 365 application Installer can be automated.

Automating Lab Builds with XenServer PowerShell – Part 2 Creating a Custom ISO

After reviewing and staging the required files and folders in Part 1, it’s time to start the custom ISO creation process. The custom ISO is just one part to the whole, but it is probably the most important.

Securing an Existing ADFS Environment with Okta MFA

Since the introduction of Active Directory Federation Services (ADFS) in 2015, companies have been widely adopting the idea of using this technology to leverage claims-based authentication...

Checking System Readiness for the Bromium Platform

The Bromium Platform has several hardware and software requirements to fully function on an endpoint. Since the Bromium Client itself does not check many of these requirements until after installation...

Automating Lab Builds with XenServer PowerShell - Part 1 Understanding the Requirements

With all of the manual steps required to build a lab multiplied by the number of virtual machines being built repeatedly, I decided to create a tool, called Automated XenServer Labs (“AXL”),

SWIFT Wire Transfer Security for the Banking Industry

  Banks and financial institutions across the world…

Did Ivanti Add “Layering” to Environment Manager FR4?

So layering and "VHD containers" seem to be a hot topic. Everyone…

Is Ivanti Environment Manager’s “GeoSync” feature Ready for Prime Time?

Let’s face it… SQL replication is a must for many Ivanti…

How Ivanti Development Broke My Start Menu

There was a post on the Ivanti forums that I started reviewing…

SCCM Video: Creating a Device Collection from a list of Users

Most of the time, requests for deployments come in as vague…
cyber security protect yourself

Deflect Cyber Threats

With the tremendous amount of information aggregating online…
Critical Design Relaunches New Website

Critical Design relaunches website

Hello IT World, We are excited to announce the relaunching…