Software  >   Systems Software  >   Middleware  >   Directory Services  >  

Active Directory

RSS Feed   
ALSO CALLED: Microsoft Active Directory
DEFINITION: Active Directory is Microsoft's trademarked directory service, an integral part of the Windows 2000 architecture. Like other directory services, such as Novell Directory Services (NDS), Active Directory is a centralized and standardized system that automates network management of user data, security, and distributed resources, and enables interoperation with other directories. Active Directory is designed  … 

Active Directory definition sponsored by SearchWindowsServer.com, powered by WhatIs.com an online computer dictionary
Active Directory Reports
1 - 25 of 85 Matches Previous Page  |  Next Page
Protecting and Monitoring Access to a State's Systems
sponsored by One Identity
CASE STUDY: Learn how this state improves security, efficiency, and insight into who accesses which systems by replacing 18 IAM systems with a comprehensive platform from One Identity.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

One Identity

Identity Analytics: A More Collective Defense
sponsored by One Identity
VIDEO: As technology evolves, access management becomes especially difficult when dealing with multiple tools to manage users, groups, computers, permissions, and more. Tune into this webcast for insights on an identity analytics and risk intelligence SaaS program that can help simplify this task.
Posted: 11 Sep 2018 | Premiered: 06 Sep 2018

One Identity

International Retailer Eliminates AD Issues with Active Roles
sponsored by One Identity
CASE STUDY: Learn how this Denmark-based international home goods retailer brought security and efficiency to its Active Directory infrastructure.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

One Identity

The 12 Essential Tasks of Active Directory Domain Services
sponsored by One Identity
WHITE PAPER: This resource outlines the 12 essential tasks of Active Directory (AD) Domain Services and how utilizing AD can help improve your security needs.
Posted: 16 Feb 2018 | Published: 16 Feb 2018

One Identity

Active Directory Management and Security
sponsored by One Identity
WHITE PAPER: Many organizations expect powerful access controls from their networking operating systems. This resource offers optimized Windows security by implementing an effective IAM approach, including, access control, password management and more.
Posted: 16 Feb 2018 | Published: 16 Feb 2018

One Identity

Top 5 Ways to Relieve the Pain of Managing Hybrid AD Environments
sponsored by One Identity
WHITE PAPER: According to One Identity, nearly 90% of organizations worldwide are using Active Directory (AD) for on-premises resources. This e-book addresses 5 challenges that organizations must overcome as they navigate the transition to a hybrid AD implementation.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

One Identity

Access Control is Easy
sponsored by One Identity
WHITE PAPER: Effective access control is a matter of well-managed groups. This resource uncovers how to implement and manage Active Directory (AD) groups and dives into why they are at the center of the access control and governance universe.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

One Identity

Automate Active Directory Jobs with PowerShell Scripts
sponsored by Goverlan
EGUIDE: Active Directory has uses ranging from password management to generating child domains, but these tasks rely on fairly repetitive processes. Fortunately, that also makes these tasks suitable for automation. In this guide, learn how automating your Active Directory tasks with PowerShell scripts can make it possible.
Posted: 03 May 2018 | Published: 30 Apr 2018

Goverlan

Identity Analytics – A more Collective Defense
sponsored by One Identity
VIDEO: As technology evolves, access management becomes especially difficult when dealing with multiple tools to manage users, groups, computers, permissions, and more. Explore this webcast to gain insight into an identity analytics and risk intelligence SaaS program that can help simplify this task.
Posted: 19 Feb 2018 | Premiered: 14 Feb 2018

One Identity

The City of Frankfurt Enables Work from Home with Two-Factor Authentication
sponsored by One Identity
CASE STUDY: Find out how the City of Frankfurt created a better work-life balance for its employees by enabling secure work from home with effective, user-friendly two-factor authentication.
Posted: 12 Feb 2018 | Published: 31 Dec 2015

One Identity

Five Quick Tips on Microsoft Azure Management
sponsored by Rackspace
EGUIDE: Since 2015, Microsoft claims its cloud service has seen an increase in adoption with more than 10,000 new customers signing up for Azure each week. This e-guide explores five resources to help you get better acquainted with some of the key features of Microsoft's cloud offering.
Posted: 01 Aug 2016 | Published: 29 Jul 2016

Rackspace

Who, What, Where? How the Cloud Complicates Identity Management
sponsored by SearchWindowsServer.com
EBOOK: In the era of consumerization, cloud computing and heightened security worries, running an effective identity management program is no small task.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

SearchWindowsServer.com

Active Directory Disasters and Tools to Prevent Them
sponsored by Quest
WHITE PAPER: Microsoft Active Directory (AD) is the source of nearly all authentication and authorization in most Windows environments, which means it's critical to keep up and running. While AD's features can protect against some failures, there are others it can't recover from on its own. So what do you do when that dreaded day of disaster arrives?
Posted: 16 May 2014 | Published: 09 Jan 2013

Quest

Recovery Manager for Active Directory
sponsored by Dell Software
WHITE PAPER: In this white paper, discover a tool that enables you to easily recover entire sections of the directory, or individual objects or attributes, without taking Active Directory offline.
Posted: 16 May 2014 | Published: 28 Oct 2013

Dell Software

Audits, Compliance and Security: IT Pros Share Their Experience
sponsored by Dell Software
WHITE PAPER: In this white paper, IT pros share how a smarter approach to auditing enabled them to strengthen their security posture and simplify their change monitoring process.
Posted: 16 May 2014 | Published: 16 May 2014

Dell Software

Mastering Active Directory Migrations: Controlling Critical Issues
sponsored by Dell Software
WHITE PAPER: This whitepaper covers the four steps to completing a successful active directory migration during a network operating system upgrade.
Posted: 05 May 2014 | Published: 06 May 2013

Dell Software

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This informative webcast discusses how you can ensure that your identity and access management (IAM) environment is prepared for Office 365, including handling authentication and managing directory requirements.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

Real-world Identity and Access Management (IAM) for Legacy Operating Systems
sponsored by Dell Software
WHITE PAPER: This white paper discusses the common challenges facing organizations that stick with legacy operating systems. Access now for easily implemented best practices and technologies that mitigate these concerns.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

Managing Risk in an Active Directory Integrated Virtualized Environment
sponsored by Dell Software
WHITE PAPER: Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Dell Software

Tech Brief (FAQ): Windows Server 2012 Recycle Bin
sponsored by Dell Software
WHITE PAPER: Among the functionality upgrades in Windows Server 2012 are improvements to Active Directory's Recycle Bin. While this addresses many previous problems, it's not the solution to all AD recovery concerns. Read the White Paper
Posted: 04 Nov 2013 | Published: 04 Nov 2013

Dell Software

Netwrix Auditor Enterprise Edition
sponsored by Netwrix Corporation
TRIAL SOFTWARE: When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Netwrix Corporation

Mastering Migration Webcast Series: Mergers and Acquisitions—Controlling Impacts on Active Directory and Exchange Infrastructures
sponsored by Dell Software
WEBCAST: Learn how the strategies for consolidating Exchange and Active Directory outlined in this webcast can help you choose the right strategy for your organization, and how combining tools and processes can ensure a successful consolidation project.
Posted: 08 Oct 2013 | Premiered: Oct 8, 2013

Dell Software

SMART Considerations for Active Directory Migrations
sponsored by BinaryTree
WEBCAST: Data migration is an important step to virtualization and cloud computing, so you need to understand how to most effectively do it.  This webinar discusses active directory migration best practices.
Posted: 01 Aug 2013 | Premiered: May 21, 2013

BinaryTree

Active Directory Forest Disaster Recovery: What You Don't Know Will Hurt You
sponsored by Dell Software
WHITE PAPER: Access this white paper to learn how to avoid the most common Active Directory disasters. Inside, examine case studies and discover strategies for handling domain controller failure, accidental bulk deletion of objects, forest failure and more.
Posted: 28 Aug 2012 | Published: 21 Aug 2012

Dell Software

Active Directory Maintenance & Cleanup
sponsored by STEALTHbits Technologies
WHITE PAPER: Active Directory (AD) plays a central role for many organizations’ Windows Domain architecture and access control, so it’s essential to maintain a clean and correct AD to avoid any potential security and operational risks. View now to explore the risks and challenges of AD that organizations face today and uncover best practices to address them.
Posted: 23 Apr 2012 | Published: 20 Apr 2012

STEALTHbits Technologies
1 - 25 of 85 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement