Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Policy Server Software  >  

GPO

RSS Feed    Add to Google    Add to My Yahoo!
GPOReports
 
Presentation Transcript: The Top 10 Useful Changes in Windows Server 2008 R2
sponsored by Dell India
PRESENTATION TRANSCRIPT: This presentation transcript will discuss the top ten most useful advantages of Windows Server 2008 R2. Gain insight into improvements made to Terminal Services and Hyper-V that can provide your organization with increased flexibility.
Posted: 12 Mar 2010 | Published: 01 Dec 2009

Dell India

Running A Fully Controlled Windows Desktop Environment with Application Whitelisting
sponsored by Bit9, Inc.
WHITE PAPER: Getting control over desktop PCs is fast becoming a major strategic objective of CIOs and IT departments. This whitepaper will discuss “The Five Elements of Desktop Control” and how each are required in order to fully realize the benefits of a controlled environment.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.

Ensuring High Availability for Active Directory
sponsored by Dell Software
WHITE PAPER: Every Active Directory administrator will agree that the health stability and recoverability of Active Directory is essential for the enterprise. If Active Directory fails, even in the slightest manner, one or all of the services and communications with Active Directory can also fail. Read this white paper to learn more.
Posted: 15 Sep 2010 | Published: 15 Sep 2010

Dell Software

The Active Directory Recycle Bin: The End of Third-Party Recovery Tools?
sponsored by Dell Software
WHITE PAPER: Windows Server 2008 R2 offers a number of exciting new features, including an expanded Server Core offering, new Active Directory features, and - of special interest to anyone who has ever wished Active Directory had an “undo” button - a sort of recycle bin for Active Directory objects.
Posted: 05 Oct 2009 | Published: 02 Oct 2009

Dell Software

Justifying an Active Directory Disaster Recovery Plan
sponsored by Dell Software
WHITE PAPER: Active Directory (AD) downtime can be disastrous to organizations. Learn the risks, costs and unexpected consequences associated with AD interruptions, the importance of an AD recovery plan and the pitfalls of relying solely on native recovery methods.
Posted: 12 Oct 2006 | Published: 09 Apr 2007

Dell Software

Windows Server 2008 "Starter" GPOs
sponsored by Global Knowledge
WHITE PAPER: An old Chinese proverb advises us to "preserve the old, but know the new." Microsoft's old template concept has been preserved in the Windows Server 2008 operating system, in the form of what Microsoft calls the starter GPO (Group Policy Object).
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

Active Directory Maintenance & Cleanup
sponsored by STEALTHbits Technologies
WHITE PAPER: Active Directory (AD) plays a central role for many organizations’ Windows Domain architecture and access control, so it’s essential to maintain a clean and correct AD to avoid any potential security and operational risks. View now to explore the risks and challenges of AD that organizations face today and uncover best practices to address them.
Posted: 23 Apr 2012 | Published: 20 Apr 2012

STEALTHbits Technologies

SMART Considerations for Active Directory Migrations
sponsored by BinaryTree
WEBCAST: Data migration is an important step to virtualization and cloud computing, so you need to understand how to most effectively do it.  This webinar discusses active directory migration best practices.
Posted: 01 Aug 2013 | Premiered: May 21, 2013

BinaryTree

On-demand Webcast: User Provisioning: Gaining the Most Bang for the IT Buck
sponsored by Dell Software
WEBCAST: Streamline and simplify to better manage the provisioning process. This information-packed Webcast includes tips on how to save time, decrease errors and automate your provisioning process.
Posted: 24 Jul 2007 | Premiered: Jul 24, 2007

Dell Software

Network Access Control: User and Device Authentication
sponsored by Intel Corporation
WHITE PAPER: Networking has evolved to support both wired and wireless access, securing corporate networks from attack is even more essential. This white paper discusses how your organization can authenticate users and devices before they connect to the network.
Posted: 31 Aug 2007 | Published: 01 Aug 2005

Intel Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
GPO White Papers | GPO Multimedia | GPO IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement