WHITE PAPER:
Microsoft Active Directory (AD) is the source of nearly all authentication and authorization in most Windows environments, which means it's critical to keep up and running. While AD's features can protect against some failures, there are others it can't recover from on its own. So what do you do when that dreaded day of disaster arrives?
WHITE PAPER:
This paper takes a closer look at the issues surrounding the patterns for accessing identity data and what an ideal Identity Hub should provide for developers.
WHITE PAPER:
Networking has evolved to support both wired and wireless access, securing corporate networks from attack is even more essential. This white paper discusses how your organization can authenticate users and devices before they connect to the network.
WEBCAST:
Are you using Quest Recovery Manager for Active Directory to its full potential? We have a Webcast that will show you some of the great things that Recovery Manager has to offer.
WEBCAST:
Data migration is an important step to virtualization and cloud computing, so you need to understand how to most effectively do it. This webinar discusses active directory migration best practices.
WHITE PAPER:
An old Chinese proverb advises us to "preserve the old, but know the new." Microsoft's old template concept has been preserved in the Windows Server 2008 operating system, in the form of what Microsoft calls the starter GPO (Group Policy Object).
WHITE PAPER:
This paper illustrates how you can now centrally administer database users and role memberships leveraging your existing LDAP directories.
WHITE PAPER:
Discover key tips for protecting, maintaining and recovering your Group Policy infrastructure in this essential resource. Find out how you can secure every desktop and server in your Windows environment with these best practices.
ESSENTIAL GUIDE:
Jump into this E-Guide to find out how to pinpoint the differences between the Microsoft Azure edition of Active Directory and the classic Windows Active Directory – and how to use those differences to your enterprise's advantage.
EGUIDE:
It takes time and money to adjust IT security in response to evolving attack tactics. As defenders gradually update their security measures, attackers respond accordingly. Such arms-race dynamics lead to threats of increasing sophistication and efficiency.