Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Policy Server Software  >  

Group Policy Objects

RSS Feed    Add to Google    Add to My Yahoo!
Group Policy Objects White Papers (View All Report Types)
 
Windows Server 2008 "Starter" GPOs
sponsored by Global Knowledge
WHITE PAPER: An old Chinese proverb advises us to "preserve the old, but know the new." Microsoft's old template concept has been preserved in the Windows Server 2008 operating system, in the form of what Microsoft calls the starter GPO (Group Policy Object).
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

Automating Group Policy Management
sponsored by SDM Software
WHITE PAPER: Group policy objects (GPOs) are used to secure and lockdown your Windows environment. Learn how you can ensure that GPOs are available, manageable and automated.
Posted: 03 Mar 2008 | Published: 27 Feb 2008


The Active Directory Recycle Bin: The End of Third-Party Recovery Tools?
sponsored by Dell Software
WHITE PAPER: Windows Server 2008 R2 offers a number of exciting new features, including an expanded Server Core offering, new Active Directory features, and - of special interest to anyone who has ever wished Active Directory had an “undo” button - a sort of recycle bin for Active Directory objects.
Posted: 05 Oct 2009 | Published: 02 Oct 2009

Dell Software

The Truth About MPLS Security
sponsored by Certes Networks
WHITE PAPER: If you are sending data over a “private” Wide Area Network (WAN) there is a dirty little secret your service provider doesn’t want you to know about. The truth is that these so-called private WANs offer no inherent security and they aren't really even private.
Posted: 07 Jun 2011 | Published: 07 Jun 2011

Certes Networks

Make Group Policies Do More and Reach Further
sponsored by Dell Software
WHITE PAPER: This white paper introduces the latest desktop management platform that can help expand the benefits of Group Policy and overcome its various deficiencies. Explore the advantages it can provide and review the advanced features it offers.
Posted: 25 Jun 2012 | Published: 20 Jun 2012

Dell Software

Justifying an Active Directory Disaster Recovery Plan
sponsored by Dell Software
WHITE PAPER: Active Directory (AD) downtime can be disastrous to organizations. Learn the risks, costs and unexpected consequences associated with AD interruptions, the importance of an AD recovery plan and the pitfalls of relying solely on native recovery methods.
Posted: 12 Oct 2006 | Published: 09 Apr 2007

Dell Software

Running A Fully Controlled Windows Desktop Environment with Application Whitelisting
sponsored by Bit9, Inc.
WHITE PAPER: Getting control over desktop PCs is fast becoming a major strategic objective of CIOs and IT departments. This whitepaper will discuss “The Five Elements of Desktop Control” and how each are required in order to fully realize the benefits of a controlled environment.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.

Optimizing WAN Performance for the Global Enterprise
sponsored by Intel Corporation
WHITE PAPER: WAN performance is critical to enterprise business around the globe. Read this white paper to learn the latest WAN optimization technologies, market products available for optimizations and analyst recommended WAN best practices.
Posted: 31 Aug 2007 | Published: 01 May 2006

Intel Corporation

Active Directory Maintenance & Cleanup
sponsored by STEALTHbits Technologies
WHITE PAPER: Active Directory (AD) plays a central role for many organizations’ Windows Domain architecture and access control, so it’s essential to maintain a clean and correct AD to avoid any potential security and operational risks. View now to explore the risks and challenges of AD that organizations face today and uncover best practices to address them.
Posted: 23 Apr 2012 | Published: 20 Apr 2012

STEALTHbits Technologies

Network Access Control: User and Device Authentication
sponsored by Intel Corporation
WHITE PAPER: Networking has evolved to support both wired and wireless access, securing corporate networks from attack is even more essential. This white paper discusses how your organization can authenticate users and devices before they connect to the network.
Posted: 31 Aug 2007 | Published: 01 Aug 2005

Intel Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement