Active Directory Research
-
Solution Summary - Secure Cloud
Sponsored by: Radiant Logic, Inc.This paper describes how virtualization solves the issue of directory integration with an approach that is cost effective, non-intrusive, and easy to deploy. By externalizing identities into an interoperable service that can be accessed by a variety of applications, enterprises can deliver services to internal and external users at faster speeds.
-
Windows 7 and Desktop Lockdown with Privilege Management
Sponsored by: ViewfinityWith the Windows XP sunset date fast approaching, plans for Windows 7 migrations are in full swing. This has prompted most organizations to re-assess their approach to PC lockdown. Viewfinity Privilege Management allows IT professionals to provide granular, multi-level user permission control for least privilege environments.
-
Webcast: Active Directory Recovery with Windows Server 2008 R2
Sponsored by: Dell SoftwareIn this new Quest on-demand webcast, get a peek at the Active Directory Recycle Bin in action. Then, find out how a powerful third-party solution simplifies the entire recovery process to not only quickly and easily restore deleted objects, but to roll back attributes too.
-
Presentation Transcript: Integrating Cloud into Your Infrastructure Planning
Sponsored by: GoGridSo you've heard all the noise about saving capital by using public cloud computing services, but actually integrating with cloud services requires some careful planning. This transcript covers cloud integration and cloud security considerations, and it will set you up the right way to begin integrating with cloud computing services.
-
Identity and Access Management: You Have to Be Compliant, You Want Security and Efficiency. Why Not Get it All?
Sponsored by: Dell SoftwareLearn how to not only meet your compliance challenges, but improve security and operational efficiency. In this business brief by Quest Software, discover how to extend the power of Active Directory and Windows Group policy, and make it easy to achieve and prove compliance.
-
Active Directory Change Reporter Download - 20 Day Evaluation!
Sponsored by: Netwrix CorporationDownload this 20 day evaluation version of the Active Directory Change Reporter. This download includes both the standard and enterprise editions. Just select between the Basic (standard) or Full-featured (Enterprise) modes in the setup wizard or in the Start Menu.
-
Better Active Directory Auditing...Less Overhead, More Power
Sponsored by: Netwrix CorporationToday’s stringent legislative and industry requirements Windows server auditing simpler, more reliable, and better able to meet their business requirements. organizations – faced with stricter internal security policies as well as– continue to struggle to make.
-
Migrating from Netware to Active Directory
Sponsored by: Dell SoftwareIn this new Quest Software white paper, get the facts on a safe and secure migration from NetWare. Learn the reasons why now really is the best time to put a migration plan together, and discover how automated migration tools make the job easy, accurate and fast. Read this valuable white paper today.
-
Improving Identity and Access Management in an SAP Environment
Sponsored by: Dell SoftwareIn this new Quest white paper, see why splitting identity management work is not only frustrating, pointless and inefficient, but it’s also completely unnecessary. Learn how to easily manage your Active Directory and SAP environments, how to eliminate redundant work, and how automation makes security stronger and auditing simple.
-
Best Practices for Integrating Mac OS X into Active Directory
Sponsored by: CDWWatch this seminar and learn how the built-in capabilities of Mac OS® X can enable you to integrate Mac OS X and Active Directory in a way that fits best with your environment.
-
Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment
Sponsored by: Dell SoftwareThis tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs.
-
Daily Active Directory Administration: Simplified, Streamlined - and Successful
Sponsored by: Dell SoftwareIn this Quest white paper, learn how automating AD improves your efficiency and reduces mistakes, helping you to break free from the headaches and the daily AD grind. Read this white paper today.
-
Guide: Active Administrator
Sponsored by: ScriptLogic CorporationActive Directory becomes very complex to manage in Windows networks. Administrators leave, users are given elevated privileges, applications require special accounts - very soon you have an Active Directory full of security weaknesses.
-
Guide: Enterprise Security Reporter
Sponsored by: ScriptLogic CorporationIn large networks, the sheer number of permission settings makes it almost impossible to gain a clear overview of overall security, and checking that all those permission are in compliance with corporate and regulatory standards is a Herculean task.
-
SharePoint E-Zine Volume 11: Managing Documents By Content Type
Sponsored by: TechTarget Search Windows ServerSharePoint has made some parts of content management much easier, but it falls short on document classification. In this month's issue, learn different approaches to categorize documents. The best time to apply security to SharePoint is right from the start. Zero in on access control, application security and content security as part of your...
-
e-Guide: Windows Server Disaster Recovery - Planning for the Worst
Sponsored by: AppAssure Software, Inc.The impact of natural, random and man-made disasters on Windows Server applications, especially email, and their subsequent disruption can cripple an organization. This white paper offers advice for protecting your existing Windows Server infrastructure from disruptive application outages.
-
Presentation Transcript: Getting Started with Unified Communications in an Exchange 2007 Environment
Sponsored by: DellEMC and Intel®Check out this webcast transcript to learn how to implement Office Communications Server in a Microsoft Exchange environment, looking at unified communications solutions encompassing unified messaging, data web conferencing and audio conferencing.
-
Using Microsoft Active Directory in the Domino World
Sponsored by: PistolStar, Inc.Active Directory for Windows-based Lotus shops has left administrators with yet another account to manage. Learn about the password management challenges AD brings and the benefits of enabling users to use AD as a central authentication point.
-
Windows Server 2008 "Starter" GPOs
Sponsored by: Global KnowledgeAn old Chinese proverb advises us to "preserve the old, but know the new." Microsoft's old template concept has been preserved in the Windows Server 2008 operating system, in the form of what Microsoft calls the starter GPO (Group Policy Object).
-
The Top 12 Most Difficult Active Directory Management Tasks
Sponsored by: Dell SoftwareThis paper explains the top 12 Most Difficult Active Directory Management Tasks and provides solution for making them easier.
-
Shouldn't Single Sign-on Be Child's Play?
Sponsored by: Microsoft & Quest SoftwareCheck out this webcast and learn how your company can improve network efficiency, enhance security, and achieve compliance by integrating Single Sign-On (SSO) technology into the IT infrastructure.
-
Storage Networking Case Study: How Cisco IT Uses a SAN to Automate the Legal Discovery Process
Sponsored by: Cisco Systems, Inc.This case study describes Cisco IT's internal deployment of a storage area network (SAN) within the Cisco network, a leading-edge enterprise environment that is one of the largest and most complex in the world.
-
Microsoft Exchange Server 2003: Best Practices Data Storage Setup
Sponsored by: Dot Hill Systems Corp.This document is intended to be a starting point to tune and optimize the storage system within the Exchange environment.
-
Top Reasons to Upgrade to Symantec Backup Exec 12.5 and Backup Exec System Recovery 8.5
Sponsored by: Symantec CorporationDownload this whitepaper to find out the top reasons to upgrade to a more effective backup system and how to get continuous data protection and complete system recovery.
-
Leverage Active Directory with Kerberos to Eliminate HTTP Password
Sponsored by: PistolStar, Inc.This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use.