Active Directory Research
-
Comparing Azure Active Directory options
Sponsored by: TechTarget ComputerWeekly.comLike Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.
-
Step-by-step Guide to Migrating from Exchange 2003 to Exchange 2010
Sponsored by: TechTarget Data CenterWhile Exchange 2010 promises to offer enhanced communication and collaboration capabilities, the migration process can still be a challenge for even the most diligent IT professional. Take a look at this e-book from the editors at SearchExchange.com for a top-to-bottom, expert analysis of the Exchange migration process.
-
Azure Active Directory vs. Classic AD
Sponsored by: One IdentityJump into this E-Guide to find out how to pinpoint the differences between the Microsoft Azure edition of Active Directory and the classic Windows Active Directory – and how to use those differences to your enterprise's advantage.
-
Easy Active Directory Clean-Up Tips
Sponsored by: One IdentityInside this E-Guide, read through some Active Directory organization strategies designed to minimize the headaches that often accompany user group restructuring projects – and ultimately reduce the time spent sifting through messy group architectures.
-
Go Back to the Basics with Active Directory
Sponsored by: One IdentityDespite your level of familiarity, it never hurts to keep up-to-date on basic Active Directory best practices. Inside this E-Guide, brush up on some basic Active Directory tips and tricks around domain controllers, cloud AD interactions, and more.
-
Automate Active Directory Jobs with PowerShell Scripts
Sponsored by: GoverlanActive Directory has uses ranging from password management to generating child domains, but these tasks rely on fairly repetitive processes. Fortunately, that also makes these tasks suitable for automation. In this guide, learn how automating your Active Directory tasks with PowerShell scripts can make it possible.
-
Five Quick Tips on Microsoft Azure Management
Sponsored by: Rackspace TechnologySince 2015, Microsoft claims its cloud service has seen an increase in adoption with more than 10,000 new customers signing up for Azure each week. This e-guide explores five resources to help you get better acquainted with some of the key features of Microsoft's cloud offering.
-
Who, What, Where? How the Cloud Complicates Identity Management
Sponsored by: TechTarget Search Windows ServerIn the era of consumerization, cloud computing and heightened security worries, running an effective identity management program is no small task.
-
Active Directory Disasters and Tools to Prevent Them
Sponsored by: QuestMicrosoft Active Directory (AD) is the source of nearly all authentication and authorization in most Windows environments, which means it's critical to keep up and running. While AD's features can protect against some failures, there are others it can't recover from on its own. So what do you do when that dreaded day of disaster arrives?
-
Recovery Manager for Active Directory
Sponsored by: Dell SoftwareIn this white paper, discover a tool that enables you to easily recover entire sections of the directory, or individual objects or attributes, without taking Active Directory offline.
-
Audits, Compliance and Security: IT Pros Share Their Experience
Sponsored by: Dell SoftwareIn this white paper, IT pros share how a smarter approach to auditing enabled them to strengthen their security posture and simplify their change monitoring process.
-
Mastering Active Directory Migrations: Controlling Critical Issues
Sponsored by: Dell SoftwareThis whitepaper covers the four steps to completing a successful active directory migration during a network operating system upgrade.
-
Real-world Identity and Access Management (IAM) for Legacy Operating Systems
Sponsored by: Dell SoftwareThis white paper discusses the common challenges facing organizations that stick with legacy operating systems. Access now for easily implemented best practices and technologies that mitigate these concerns.
-
Managing Risk in an Active Directory Integrated Virtualized Environment
Sponsored by: Dell SoftwareRead this exclusive resource to find out about the security risks of Active Directory integrated virtualization.
-
Tech Brief (FAQ): Windows Server 2012 Recycle Bin
Sponsored by: Dell SoftwareAmong the functionality upgrades in Windows Server 2012 are improvements to Active Directory's Recycle Bin. While this addresses many previous problems, it's not the solution to all AD recovery concerns. Read the White Paper
-
Netwrix Auditor Enterprise Edition
Sponsored by: Netwrix CorporationWhen diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
-
Mastering Migration Webcast Series: Mergers and Acquisitions—Controlling Impacts on Active Directory and Exchange Infrastructures
Sponsored by: Dell SoftwareLearn how the strategies for consolidating Exchange and Active Directory outlined in this webcast can help you choose the right strategy for your organization, and how combining tools and processes can ensure a successful consolidation project.
-
SMART Considerations for Active Directory Migrations
Sponsored by: BinaryTreeData migration is an important step to virtualization and cloud computing, so you need to understand how to most effectively do it. This webinar discusses active directory migration best practices.
-
Active Directory Forest Disaster Recovery: What You Don't Know Will Hurt You
Sponsored by: Dell SoftwareAccess this white paper to learn how to avoid the most common Active Directory disasters. Inside, examine case studies and discover strategies for handling domain controller failure, accidental bulk deletion of objects, forest failure and more.
-
Active Directory Maintenance & Cleanup
Sponsored by: STEALTHbits TechnologiesActive Directory (AD) plays a central role for many organizations’ Windows Domain architecture and access control, so it’s essential to maintain a clean and correct AD to avoid any potential security and operational risks. View now to explore the risks and challenges of AD that organizations face today and uncover best practices to address them.
-
Simplifying and Securing Group Policy Management
Sponsored by: Dell SoftwareDiscover key tips for protecting, maintaining and recovering your Group Policy infrastructure in this essential resource. Find out how you can secure every desktop and server in your Windows environment with these best practices.
-
E-Guide: Top Considerations for Migrating to Exchange 2010
Sponsored by: MetalogixIn this expert e-guide, discover what you need to know before migrating to Exchange Server 2010. Explore the new features and tools that Exchange boasts, and which features will not longer be supported. Find out the important prerequisites you'll need before making the transition.
-
The Seven Common Challenges of Administering Active Directory
Sponsored by: NetIQ EuropeThis white paper will out line the 7 common challenges you might face while trying to implement Active Directory securely. You will also learn some helpful tips that will assist you with these difficulties.
-
Guide for migrating to Exchange 2010
Sponsored by: MicrosoftBefore migrating to any email server, it is important to confirm that you meet the prerequisites, including having sufficient hardware—and this holds true when considering migrating to Exchange Server 2010. Ensure you are prepared for this migration and learn more here.
-
A Guide for Enterprise VMware ThinApp Deployments
Sponsored by: VMware, Inc.This guide provides the insight you need to ensure a successful enterprise implementation of ThinApp, with guidance on deployment of virtualized applications in the enterprise, addressing multiple use cases for physical and virtual desktops, with design considerations of multiple components for each use case.