Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Policy Server Software  >  

GPO

RSS Feed    Add to Google    Add to My Yahoo!
GPOReports
 
Technical Guide on Emerging Threats
sponsored by SearchSecurity.com
EGUIDE: It takes time and money to adjust IT security in response to evolving attack tactics. As defenders gradually update their security measures, attackers respond accordingly. Such arms-race dynamics lead to threats of increasing sophistication and efficiency.
Posted: 16 Feb 2011 | Published: 16 Feb 2011

SearchSecurity.com

What’s New in Windows Server 2008 R2: Active Directory, Group Policy and Terminal Services
sponsored by Dell and Microsoft
PRESENTATION TRANSCRIPT: In this presentation transcript, IT author Jonathan Hassell walks you through some of the key changes made to R2 in three key areas: Active Directory, Group Policy and Terminal Services.
Posted: 17 Dec 2009 | Published: 17 Dec 2009

Dell and Microsoft

Recovery Manager for Active Directory
sponsored by Dell Software
WHITE PAPER: In this white paper, discover a tool that enables you to easily recover entire sections of the directory, or individual objects or attributes, without taking Active Directory offline.
Posted: 16 May 2014 | Published: 28 Oct 2013

Dell Software

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory
sponsored by Oracle Corporation
WHITE PAPER: This paper illustrates how you can now centrally administer database users and role memberships leveraging your existing LDAP directories.
Posted: 13 Feb 2009 | Published: 01 Aug 2008

Oracle Corporation

Justifying an Active Directory Disaster Recovery Plan
sponsored by Dell Software
WHITE PAPER: Active Directory (AD) downtime can be disastrous to organizations. Learn the risks, costs and unexpected consequences associated with AD interruptions, the importance of an AD recovery plan and the pitfalls of relying solely on native recovery methods.
Posted: 12 Oct 2006 | Published: 09 Apr 2007

Dell Software

SMART Considerations for Active Directory Migrations
sponsored by BinaryTree
WEBCAST: Data migration is an important step to virtualization and cloud computing, so you need to understand how to most effectively do it.  This webinar discusses active directory migration best practices.
Posted: 01 Aug 2013 | Premiered: May 21, 2013

BinaryTree

Active Directory Maintenance & Cleanup
sponsored by STEALTHbits Technologies
WHITE PAPER: Active Directory (AD) plays a central role for many organizations’ Windows Domain architecture and access control, so it’s essential to maintain a clean and correct AD to avoid any potential security and operational risks. View now to explore the risks and challenges of AD that organizations face today and uncover best practices to address them.
Posted: 23 Apr 2012 | Published: 20 Apr 2012

STEALTHbits Technologies

Identity and Access Management: You Have to Be Compliant, You Want Security and Efficiency. Why Not Get it All?
sponsored by Dell Software
WHITE PAPER: Learn how to not only meet your compliance challenges, but improve security and operational efficiency. In this business brief by Quest Software, discover how to extend the power of Active Directory and Windows Group policy, and make it easy to achieve and prove compliance.
Posted: 26 Jul 2010 | Published: 26 Jul 2010

Dell Software

Optimizing WAN Performance for the Global Enterprise
sponsored by Intel Corporation
WHITE PAPER: WAN performance is critical to enterprise business around the globe. Read this white paper to learn the latest WAN optimization technologies, market products available for optimizations and analyst recommended WAN best practices.
Posted: 31 Aug 2007 | Published: 01 May 2006

Intel Corporation

Active Directory Disasters and Tools to Prevent Them
sponsored by Dell Software
WHITE PAPER: Microsoft Active Directory (AD) is the source of nearly all authentication and authorization in most Windows environments, which means it's critical to keep up and running. While AD's features can protect against some failures, there are others it can't recover from on its own. So what do you do when that dreaded day of disaster arrives?
Posted: 16 May 2014 | Published: 09 Jan 2013

Dell Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
GPO White Papers | GPO Multimedia | GPO IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement