Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Policy Server Software  >  

Microsoft Group Policy

RSS Feed    Add to Google    Add to My Yahoo!
Microsoft Group PolicyReports
 
Presentation Transcript: The Top 10 Useful Changes in Windows Server 2008 R2
sponsored by Dell India
PRESENTATION TRANSCRIPT: This presentation transcript will discuss the top ten most useful advantages of Windows Server 2008 R2. Gain insight into improvements made to Terminal Services and Hyper-V that can provide your organization with increased flexibility.
Posted: 12 Mar 2010 | Published: 01 Dec 2009

Dell India

Presentation Transcript: Windows Server 2008 R2 - Top 10 Changes You'll Actually Care About
sponsored by Dell and Microsoft
PRESENTATION TRANSCRIPT: This presentation transcript will discuss the top ten most useful advantages of Windows Server 2008 R2. Gain insight into improvements made to Terminal Services and Hyper-V that can provide your organization with increased flexibility.
Posted: 01 Dec 2009 | Published: 01 Dec 2009

Dell and Microsoft

Presentation Transcript: Windows Server 2008 R2 - Top 10 Changes You'll Actually Care About
sponsored by Dell, Inc.
PRESENTATION TRANSCRIPT: This presentation transcript will discuss the top ten most useful advantages of Windows Server 2008 R2. Gain insight into improvements made to Terminal Services and Hyper-V that can provide your organization with increased flexibility.
Posted: 05 Feb 2010 | Published: 05 Feb 2010

Dell, Inc.

Active Directory Maintenance & Cleanup
sponsored by STEALTHbits Technologies
WHITE PAPER: Active Directory (AD) plays a central role for many organizations’ Windows Domain architecture and access control, so it’s essential to maintain a clean and correct AD to avoid any potential security and operational risks. View now to explore the risks and challenges of AD that organizations face today and uncover best practices to address them.
Posted: 23 Apr 2012 | Published: 20 Apr 2012

STEALTHbits Technologies

Oracle Database 11g Architecture on Windows
sponsored by Oracle Corporation
PRODUCT LITERATURE: Learn how Oracle continues to improve the performance, scalability, and capability of its Windows database server. This paper describes the architecture of the Oracle database on Windows and how it differs from its counterparts on UNIX and Linux.
Posted: 20 Nov 2007 | Published: 01 Jul 2007

Oracle Corporation

Make Group Policies Do More and Reach Further
sponsored by Dell Software
WHITE PAPER: This white paper introduces the latest desktop management platform that can help expand the benefits of Group Policy and overcome its various deficiencies. Explore the advantages it can provide and review the advanced features it offers.
Posted: 25 Jun 2012 | Published: 20 Jun 2012

Dell Software

Developers and Identity Services - Tackling Identity Data with Identity Hub
sponsored by Oracle Corporation
WHITE PAPER: This paper takes a closer look at the issues surrounding the patterns for accessing identity data and what an ideal Identity Hub should provide for developers.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

Oracle Corporation

What’s New in Windows Server 2008 R2: Active Directory, Group Policy and Terminal Services
sponsored by Dell and Microsoft
PRESENTATION TRANSCRIPT: In this presentation transcript, IT author Jonathan Hassell walks you through some of the key changes made to R2 in three key areas: Active Directory, Group Policy and Terminal Services.
Posted: 17 Dec 2009 | Published: 17 Dec 2009

Dell and Microsoft

Justifying an Active Directory Disaster Recovery Plan
sponsored by Dell Software
WHITE PAPER: Active Directory (AD) downtime can be disastrous to organizations. Learn the risks, costs and unexpected consequences associated with AD interruptions, the importance of an AD recovery plan and the pitfalls of relying solely on native recovery methods.
Posted: 12 Oct 2006 | Published: 09 Apr 2007

Dell Software

Network Access Control: User and Device Authentication
sponsored by Intel Corporation
WHITE PAPER: Networking has evolved to support both wired and wireless access, securing corporate networks from attack is even more essential. This white paper discusses how your organization can authenticate users and devices before they connect to the network.
Posted: 31 Aug 2007 | Published: 01 Aug 2005

Intel Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement