Skip to content

ITech

Tag: Microsoft Endpoint Manager

  • Home
  • Microsoft Endpoint Manager
Networking Systems

Essential Ports for SCCM, SCOM, and Orchestrator (Practical Guide)

For SCCM, SCOM, and Orchestrator to operate reliably, required network ports must be open end-to-end between clients, servers, SQL, and management components. This guide provides…

Editorial Team May 19, 2023April 27, 2026
Systems

Troubleshooting SCCM: Fix “No Updates Available” in Software Center

If Software Center shows “No updates available” while updates should be present, the issue is usually policy retrieval, boundary/content assignment, scan state, or client health…

Editorial Team December 20, 2022April 27, 2026
Systems

PowerShell Script: Check if an SCCM Server Needs Reboot (Software Center)

This PowerShell check helps determine whether an SCCM-managed server requires a reboot before/after Software Center deployments. It’s useful for reducing failed installs and maintenance surprises.…

Editorial Team December 20, 2022April 27, 2026
Systems

SCCM Client Cleanup with PowerShell (Safe Recovery Workflow)

When an SCCM client is unstable or carrying stale state, a structured cleanup can restore healthy policy, inventory, and deployment behavior without immediately reimaging the…

Editorial Team December 19, 2022April 27, 2026
Systems

SCCM Troubleshooting: Clear Stuck Software Center Packages

When Software Center packages are stuck in download/install states, the fix is usually to clear local cache state, refresh policy, and restart SCCM client components…

Editorial Team December 19, 2022April 27, 2026
Systems

SCCM: Clean Up the Distribution Point (DP) Safely

Distribution Points can accumulate stale or failed package content over time. Regular DP cleanup keeps content distribution healthy and reduces troubleshooting noise in SCCM/MECM. When…

Editorial Team December 19, 2022April 27, 2026

Recent Posts

  • CISA KEV Weekly Changes: 48-Hour Patch Prioritization Workflow for Security Teams
  • BGP Hijack Early Warning for IT Teams: Practical Detection with Public Feeds and Router Telemetry
  • GitHub Actions OIDC to AWS: Secretless CI/CD Hardening Checklist
  • Defender Playbook: Hardening Microsoft Entra ID Against Token Theft
  • How to Protect Your Business from Lumma Stealer (Practical Defensive Playbook)
Copyright © 2026 ITech