Device & Application Management

Secure and enforce policies on you workforces’ mobile devices, providing the team with the ultimate management capabilities.

Systems Center

Managing your IT infrastructure has become less about what’s happening within a company’s firewall and more about managing data and applications wherever they are. Without the right technology and tools, these complex environments can quickly become costly and inefficient.

System Center delivers a simplified datacenter management experience to keep you in control—whether on-premises, in the cloud, or across platforms.

Faster time-to-value

Realise value quickly with simple installations, in-place upgrades, and automated workflows.

Efficient operations

Quickly get things done with one-click features and a straightforward console.

Support for multiple systems

Manage and monitor heterogeneous and open systems, including Linux, Hyper-V, and VMware.

Servers + desktops

Deploy and manage Windows Server and Windows 10—configuration, health, and compliance.

Cloud integration

Get visibility and control of data and apps with Azure security and management integration.

Cloud App Security (Applocker)

AppLocker is a cloud application that helps you control which apps and files users can run. It  advances the app control features and functionality of Software Restriction Policies. AppLocker contains new capabilities and extensions that allow you to create rules to allow or deny apps from running based on unique identities of files and to specify which users or groups can run those apps.

AppLocker rules are organized into collections based on file format. If no AppLocker rules for a specific rule collection exist, all files with that file format are allowed to run. However, when an AppLocker rule for a specific rule collection is created, only the files explicitly allowed in a rule are permitted to run.

Control the following types of apps: executable files (.exe and .com), scripts (.js, .ps1, .vbs, .cmd, and .bat), Windows Installer files (.mst, .msi and .msp), and DLL files (.dll and .ocx), and packaged apps and packaged app installers (appx).

Define rules based on file attributes derived from the digital signature, including the publisher, product name, file name, and file version.

Assign a rule to a security group or an individual user.

Create exceptions to rules. For example, you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).

Use audit-only mode to deploy the policy and understand its impact before enforcing it.

Import and export rules affecting the entire policy.

Streamline creating and managing AppLocker rules by using Windows PowerShell cmdlets.

AppLocker helps reduce administrative overhead and helps reduce the organization's cost of managing computing resources by decreasing the number of help desk calls that result from users running unapproved apps

Microsoft Intune

With bring-your-own device (BYOD) now so prevalent within the modern workplace, coupled with the use of corporate owned devices within Enterprise organisations, there is a growing challenge for IT teams around keeping sensitive corporate data and information secure. Microsoft Intune enables you to define a mobile management strategy that fits the requirements of your organisation.

Ensuring that your organisation has a clearly defined Mobile Application Management (MAM) and Mobile Device Management (MDM) solution to minimise the complexities of securing your sensitive information is now imperative. With capabilities in the cloud and on-premises, Intune allows you to control all the devices and apps on your network from one single console.

Apply device configuration

Apply and enforce device configuration settings, such as Wifi and VPN across iOS, Android, and Windows via Intune MDM.

Enforce device security

Encrypt devices, enabling an extra layer of protection with passcodes and set a minimum version of OS required to each device.

Deploy a range of applications

Deploy Applications as mandatory applications or make them available as self service via the Intune company portal.

Wipe devices

Wipe the whole device, or selective apps, once an employee leaves the organisation, keeping your sensitive data protected.

let's talk!

    The difference between managed services and traditional ICT support is comparable to the difference between having a doctor monitoring your health and buying a box of bandages.

    Stay in the know

    We pride ourselves in our industry knowledge and would love to share it with you. Sign up to our newsletter for all the latest in IT.

    1/666 Doncaster Rd, Doncaster VIC 3108
    Jasco Consulting 2020