ComputerWeekly.com Research Library

Powered by Bitpipe.com

Active Directory Research

  • Step-by-step Guide to Migrating from Exchange 2003 to Exchange 2010

    Sponsored by: SearchDataCenter.com

    While Exchange 2010 promises to offer enhanced communication and collaboration capabilities, the migration process can still be a challenge for even the most diligent IT professional. Take a look at this e-book from the editors at SearchExchange.com for a top-to-bottom, expert analysis of the Exchange migration process.

  • Easy Active Directory Clean-Up Tips

    Sponsored by: One Identity

    Inside this E-Guide, read through some Active Directory organization strategies designed to minimize the headaches that often accompany user group restructuring projects – and ultimately reduce the time spent sifting through messy group architectures.

  • Azure Active Directory vs. Classic AD

    Sponsored by: One Identity

    Jump into this E-Guide to find out how to pinpoint the differences between the Microsoft Azure edition of Active Directory and the classic Windows Active Directory – and how to use those differences to your enterprise's advantage.

  • Go Back to the Basics with Active Directory

    Sponsored by: One Identity

    Despite your level of familiarity, it never hurts to keep up-to-date on basic Active Directory best practices. Inside this E-Guide, brush up on some basic Active Directory tips and tricks around domain controllers, cloud AD interactions, and more.

  • Automate Active Directory Jobs with PowerShell Scripts

    Sponsored by: Goverlan

    Active Directory has uses ranging from password management to generating child domains, but these tasks rely on fairly repetitive processes. Fortunately, that also makes these tasks suitable for automation. In this guide, learn how automating your Active Directory tasks with PowerShell scripts can make it possible.

  • Five Quick Tips on Microsoft Azure Management

    Sponsored by: Rackspace

    Since 2015, Microsoft claims its cloud service has seen an increase in adoption with more than 10,000 new customers signing up for Azure each week. This e-guide explores five resources to help you get better acquainted with some of the key features of Microsoft's cloud offering.

  • Who, What, Where? How the Cloud Complicates Identity Management

    Sponsored by: SearchWindowsServer.com

    In the era of consumerization, cloud computing and heightened security worries, running an effective identity management program is no small task.

  • Active Directory Disasters and Tools to Prevent Them

    Sponsored by: Quest

    Microsoft Active Directory (AD) is the source of nearly all authentication and authorization in most Windows environments, which means it's critical to keep up and running. While AD's features can protect against some failures, there are others it can't recover from on its own. So what do you do when that dreaded day of disaster arrives?

  • Recovery Manager for Active Directory

    Sponsored by: Dell Software

    In this white paper, discover a tool that enables you to easily recover entire sections of the directory, or individual objects or attributes, without taking Active Directory offline.

  • Audits, Compliance and Security: IT Pros Share Their Experience

    Sponsored by: Dell Software

    In this white paper, IT pros share how a smarter approach to auditing enabled them to strengthen their security posture and simplify their change monitoring process.

  • Mastering Active Directory Migrations: Controlling Critical Issues

    Sponsored by: Dell Software

    This whitepaper covers the four steps to completing a successful active directory migration during a network operating system upgrade.

  • Real-world Identity and Access Management (IAM) for Legacy Operating Systems

    Sponsored by: Dell Software

    This white paper discusses the common challenges facing organizations that stick with legacy operating systems. Access now for easily implemented best practices and technologies that mitigate these concerns.

  • Managing Risk in an Active Directory Integrated Virtualized Environment

    Sponsored by: Dell Software

    Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization.

  • Tech Brief (FAQ): Windows Server 2012 Recycle Bin

    Sponsored by: Dell Software

    Among the functionality upgrades in Windows Server 2012 are improvements to Active Directory's Recycle Bin. While this addresses many previous problems, it's not the solution to all AD recovery concerns. Read the White Paper

  • Netwrix Auditor Enterprise Edition

    Sponsored by: Netwrix Corporation

    When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.

  • Mastering Migration Webcast Series: Mergers and Acquisitions—Controlling Impacts on Active Directory and Exchange Infrastructures

    Sponsored by: Dell Software

    Learn how the strategies for consolidating Exchange and Active Directory outlined in this webcast can help you choose the right strategy for your organization, and how combining tools and processes can ensure a successful consolidation project.

  • SMART Considerations for Active Directory Migrations

    Sponsored by: BinaryTree

    Data migration is an important step to virtualization and cloud computing, so you need to understand how to most effectively do it.  This webinar discusses active directory migration best practices.

  • Active Directory Forest Disaster Recovery: What You Don't Know Will Hurt You

    Sponsored by: Dell Software

    Access this white paper to learn how to avoid the most common Active Directory disasters. Inside, examine case studies and discover strategies for handling domain controller failure, accidental bulk deletion of objects, forest failure and more.

  • Active Directory Maintenance & Cleanup

    Sponsored by: STEALTHbits Technologies

    Active Directory (AD) plays a central role for many organizations’ Windows Domain architecture and access control, so it’s essential to maintain a clean and correct AD to avoid any potential security and operational risks. View now to explore the risks and challenges of AD that organizations face today and uncover best practices to address them.

  • Simplifying and Securing Group Policy Management

    Sponsored by: Dell Software

    Discover key tips for protecting, maintaining and recovering your Group Policy infrastructure in this essential resource. Find out how you can secure every desktop and server in your Windows environment with these best practices.

  • E-Guide: Top Considerations for Migrating to Exchange 2010

    Sponsored by: Metalogix

    In this expert e-guide, discover what you need to know before migrating to Exchange Server 2010. Explore the new features and tools that Exchange boasts, and which features will not longer be supported. Find out the important prerequisites you'll need before making the transition.

  • The Seven Common Challenges of Administering Active Directory

    Sponsored by: NetIQ Europe

    This white paper will out line the 7 common challenges you might face while trying to implement Active Directory securely. You will also learn some helpful tips that will assist you with these difficulties.

  • Guide for migrating to Exchange 2010

    Sponsored by: Microsoft

    Before migrating to any email server, it is important to confirm that you meet the prerequisites, including having sufficient hardware—and this holds true when considering migrating to Exchange Server 2010. Ensure you are prepared for this migration and learn more here.

  • A Guide for Enterprise VMware ThinApp Deployments

    Sponsored by: VMware, Inc.

    This guide provides the insight you need to ensure a successful enterprise implementation of ThinApp, with guidance on deployment of virtualized applications in the enterprise, addressing multiple use cases for physical and virtual desktops, with design considerations of multiple components for each use case.

  • Solution Summary  - Secure Cloud

    Sponsored by: Radiant Logic, Inc.

    This paper describes how virtualization solves the issue of directory integration with an approach that is cost effective, non-intrusive, and easy to deploy. By externalizing identities into an interoperable service that can be accessed by a variety of applications, enterprises can deliver services to internal and external users at faster speeds.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.