Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Policy Server Software  >  

Windows Server 2003 Group Policy

RSS Feed    Add to Google    Add to My Yahoo!
Windows Server 2003 Group PolicyWhite Papers (View All Report Types)
 
Using Classification to Manage Email Policy for the Enterprise
sponsored by TITUS
WHITE PAPER: Email has historically been a weak link in organizational security. Classification and policy based strategies enable email to be managed more securely and effectively. Email classification is a technique for adding metadata and visual labels to email.
Posted: 09 Nov 2007 | Published: 01 Jan 2006

TITUS

Simplifying and Securing Group Policy Management
sponsored by Dell Software
WHITE PAPER: Discover key tips for protecting, maintaining and recovering your Group Policy infrastructure in this essential resource. Find out how you can secure every desktop and server in your Windows environment with these best practices.
Posted: 13 Apr 2012 | Published: 31 Dec 2011

Dell Software

Network Access Control: User and Device Authentication
sponsored by Intel Corporation
WHITE PAPER: Networking has evolved to support both wired and wireless access, securing corporate networks from attack is even more essential. This white paper discusses how your organization can authenticate users and devices before they connect to the network.
Posted: 31 Aug 2007 | Published: 01 Aug 2005

Intel Corporation

Developers and Identity Services - Tackling Identity Data with Identity Hub
sponsored by Oracle Corporation
WHITE PAPER: This paper takes a closer look at the issues surrounding the patterns for accessing identity data and what an ideal Identity Hub should provide for developers.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

Oracle Corporation

Recovery Manager for Active Directory
sponsored by Dell Software
WHITE PAPER: In this white paper, discover a tool that enables you to easily recover entire sections of the directory, or individual objects or attributes, without taking Active Directory offline.
Posted: 16 May 2014 | Published: 28 Oct 2013

Dell Software

Identity and Access Management: You Have to Be Compliant, You Want Security and Efficiency. Why Not Get it All?
sponsored by Dell Software
WHITE PAPER: Learn how to not only meet your compliance challenges, but improve security and operational efficiency. In this business brief by Quest Software, discover how to extend the power of Active Directory and Windows Group policy, and make it easy to achieve and prove compliance.
Posted: 26 Jul 2010 | Published: 26 Jul 2010

Dell Software

Running A Fully Controlled Windows Desktop Environment with Application Whitelisting
sponsored by Bit9, Inc.
WHITE PAPER: Getting control over desktop PCs is fast becoming a major strategic objective of CIOs and IT departments. This whitepaper will discuss “The Five Elements of Desktop Control” and how each are required in order to fully realize the benefits of a controlled environment.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.

The Truth About MPLS Security
sponsored by Certes Networks
WHITE PAPER: If you are sending data over a “private” Wide Area Network (WAN) there is a dirty little secret your service provider doesn’t want you to know about. The truth is that these so-called private WANs offer no inherent security and they aren't really even private.
Posted: 07 Jun 2011 | Published: 07 Jun 2011

Certes Networks

Microsoft Active Directory Backup and Recovery in Windows Server 2008
sponsored by Dell Software
WHITE PAPER: How will Windows Server 2008 affect your Active Directory environment? This white paper details backup and recovery in Windows Server 2008 and offers tips on how to protect your Active Directory.
Posted: 09 Nov 2007 | Published: 01 Nov 2007

Dell Software

Comparing Approaches for Desktop Software Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: The variety of stability, security and legal risks with the installation and execution of unauthorized software is a huge burden for organizations. This paper will compare and contrast techniques for detecting and preventing unauthorized code.
Posted: 30 Aug 2006 | Published: 30 Aug 2006

Bit9, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement