ComputerWeekly.com Research Library

Powered by Bitpipe.com

Active Directory White Papers

  • Comparing Azure Active Directory options

    Sponsored by: TechTarget ComputerWeekly.com

    Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.

  • Step-by-step Guide to Migrating from Exchange 2003 to Exchange 2010

    Sponsored by: TechTarget Data Center

    While Exchange 2010 promises to offer enhanced communication and collaboration capabilities, the migration process can still be a challenge for even the most diligent IT professional. Take a look at this e-book from the editors at SearchExchange.com for a top-to-bottom, expert analysis of the Exchange migration process.

  • Easy Active Directory Clean-Up Tips

    Sponsored by: One Identity

    Inside this E-Guide, read through some Active Directory organization strategies designed to minimize the headaches that often accompany user group restructuring projects – and ultimately reduce the time spent sifting through messy group architectures.

  • Azure Active Directory vs. Classic AD

    Sponsored by: One Identity

    Jump into this E-Guide to find out how to pinpoint the differences between the Microsoft Azure edition of Active Directory and the classic Windows Active Directory – and how to use those differences to your enterprise's advantage.

  • Go Back to the Basics with Active Directory

    Sponsored by: One Identity

    Despite your level of familiarity, it never hurts to keep up-to-date on basic Active Directory best practices. Inside this E-Guide, brush up on some basic Active Directory tips and tricks around domain controllers, cloud AD interactions, and more.

  • Automate Active Directory Jobs with PowerShell Scripts

    Sponsored by: Goverlan

    Active Directory has uses ranging from password management to generating child domains, but these tasks rely on fairly repetitive processes. Fortunately, that also makes these tasks suitable for automation. In this guide, learn how automating your Active Directory tasks with PowerShell scripts can make it possible.

  • Five Quick Tips on Microsoft Azure Management

    Sponsored by: Rackspace Technology

    Since 2015, Microsoft claims its cloud service has seen an increase in adoption with more than 10,000 new customers signing up for Azure each week. This e-guide explores five resources to help you get better acquainted with some of the key features of Microsoft's cloud offering.

  • Who, What, Where? How the Cloud Complicates Identity Management

    Sponsored by: TechTarget Search Windows Server

    In the era of consumerization, cloud computing and heightened security worries, running an effective identity management program is no small task.

  • Active Directory Disasters and Tools to Prevent Them

    Sponsored by: Quest

    Microsoft Active Directory (AD) is the source of nearly all authentication and authorization in most Windows environments, which means it's critical to keep up and running. While AD's features can protect against some failures, there are others it can't recover from on its own. So what do you do when that dreaded day of disaster arrives?

  • Recovery Manager for Active Directory

    Sponsored by: Dell Software

    In this white paper, discover a tool that enables you to easily recover entire sections of the directory, or individual objects or attributes, without taking Active Directory offline.

  • Audits, Compliance and Security: IT Pros Share Their Experience

    Sponsored by: Dell Software

    In this white paper, IT pros share how a smarter approach to auditing enabled them to strengthen their security posture and simplify their change monitoring process.

  • Mastering Active Directory Migrations: Controlling Critical Issues

    Sponsored by: Dell Software

    This whitepaper covers the four steps to completing a successful active directory migration during a network operating system upgrade.

  • Real-world Identity and Access Management (IAM) for Legacy Operating Systems

    Sponsored by: Dell Software

    This white paper discusses the common challenges facing organizations that stick with legacy operating systems. Access now for easily implemented best practices and technologies that mitigate these concerns.

  • Managing Risk in an Active Directory Integrated Virtualized Environment

    Sponsored by: Dell Software

    Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization.

  • Tech Brief (FAQ): Windows Server 2012 Recycle Bin

    Sponsored by: Dell Software

    Among the functionality upgrades in Windows Server 2012 are improvements to Active Directory's Recycle Bin. While this addresses many previous problems, it's not the solution to all AD recovery concerns. Read the White Paper

  • Active Directory Forest Disaster Recovery: What You Don't Know Will Hurt You

    Sponsored by: Dell Software

    Access this white paper to learn how to avoid the most common Active Directory disasters. Inside, examine case studies and discover strategies for handling domain controller failure, accidental bulk deletion of objects, forest failure and more.

  • Active Directory Maintenance & Cleanup

    Sponsored by: STEALTHbits Technologies

    Active Directory (AD) plays a central role for many organizations’ Windows Domain architecture and access control, so it’s essential to maintain a clean and correct AD to avoid any potential security and operational risks. View now to explore the risks and challenges of AD that organizations face today and uncover best practices to address them.

  • Simplifying and Securing Group Policy Management

    Sponsored by: Dell Software

    Discover key tips for protecting, maintaining and recovering your Group Policy infrastructure in this essential resource. Find out how you can secure every desktop and server in your Windows environment with these best practices.

  • E-Guide: Top Considerations for Migrating to Exchange 2010

    Sponsored by: Metalogix

    In this expert e-guide, discover what you need to know before migrating to Exchange Server 2010. Explore the new features and tools that Exchange boasts, and which features will not longer be supported. Find out the important prerequisites you'll need before making the transition.

  • The Seven Common Challenges of Administering Active Directory

    Sponsored by: NetIQ Europe

    This white paper will out line the 7 common challenges you might face while trying to implement Active Directory securely. You will also learn some helpful tips that will assist you with these difficulties.

  • Guide for migrating to Exchange 2010

    Sponsored by: Microsoft

    Before migrating to any email server, it is important to confirm that you meet the prerequisites, including having sufficient hardware—and this holds true when considering migrating to Exchange Server 2010. Ensure you are prepared for this migration and learn more here.

  • A Guide for Enterprise VMware ThinApp Deployments

    Sponsored by: VMware, Inc.

    This guide provides the insight you need to ensure a successful enterprise implementation of ThinApp, with guidance on deployment of virtualized applications in the enterprise, addressing multiple use cases for physical and virtual desktops, with design considerations of multiple components for each use case.

  • Solution Summary  - Secure Cloud

    Sponsored by: Radiant Logic, Inc.

    This paper describes how virtualization solves the issue of directory integration with an approach that is cost effective, non-intrusive, and easy to deploy. By externalizing identities into an interoperable service that can be accessed by a variety of applications, enterprises can deliver services to internal and external users at faster speeds.

  • Windows 7 and Desktop Lockdown with Privilege Management

    Sponsored by: Viewfinity

    With the Windows XP sunset date fast approaching, plans for Windows 7 migrations are in full swing. This has prompted most organizations to re-assess their approach to PC lockdown.  Viewfinity Privilege Management allows IT professionals to provide granular, multi-level user permission control for least privilege environments.

  • Presentation Transcript: Integrating Cloud into Your Infrastructure Planning

    Sponsored by: GoGrid

    So you've heard all the noise about saving capital by using public cloud computing services, but actually integrating with cloud services requires some careful planning. This transcript covers cloud integration and cloud security considerations, and it will set you up the right way to begin integrating with cloud computing services.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.