• 19 Apr 2017

    One-Size-Fits-All Migration: Pay for what you don’t need

    Wait a minute…pay for what you don’t need? One bundled license per end user to migrate mailboxes, documents, personal archives, configure Outlook, etc…sounds simple enough. One price regardless of the migration scenario…hmmm. Isn’t that like paying for a migration buffet when you really just wanted a few a la carte migration options? We are well into April so this couldn’t still...
    • 17 Apr 2017

    Hank the Hacker webcast series: How to Overcome Hybrid AD Security Breaches and Insider Threats

    Hank the Hacker is coming for your data. Organizations are racing to Microsoft cloud services, such as Office 365 and Azure Active Directory (AD). Some organizations will be 100% cloud, but many are too heavily invested in legacy infrastructure and are forced to stay hybrid for the foreseeable future. In either scenario, it’s easy to see why Office 365 is Microsoft’s fastest-growing commercial product ever...
    • 14 Apr 2017

    One-Size-Fits-All Migration: Use what you need, leave the rest.

    By now you’ve probably heard of one-size-fits-all pricing for migration solutions. You take on the financial burden up front and charge your customers one high price regardless of their migration scenario. And they use the migration option that they actually needed. And the rest goes unused in the form of shelfware, even though you paid for it. It’s a great approach…really. April Fools…again...
    • 11 Apr 2017

    One-Size-Fits-All Migration: More profitability for you (maybe)

    Finally an approach to meeting your customers’ migration needs that will let you be more profitable. No need for a la carte options, just bundle all migration options into one price regardless of your customers’ migration situation. Your customer pays more; you make more. You may have heard about this ground-breaking new approach in a webinar this week. April Fools! If trying to jam your customers into...
    • 10 Apr 2017

    Hank the Hacker is Coming for Your Active Directory

    Hank the Hacker is coming. Organizations like yours are sprinting to Microsoft cloud services, such as Office 365 and Azure Active Directory (AD). But as your cloud — and hybrid — footprint expands, so does your security risk. That’s because in a hybrid AD environment, you face all the security limitations of native AD plus those of Azure AD. That means you need to manage double the surface area to...
    • 3 Apr 2017

    A new version of Migrator for Notes to SharePoint, 6.9, is now available!

    We are excited to announce a new version of Migrator for Notes to SharePoint , 6.9, is now available for download. Look what's new: Integrated support - Search for knowledge base solutions right from the error in the log entry details dialog box Migrating failed items – Easily load items that failed to migrate from the log file and retry the failed items again Remote database repository support –...
    • 28 Mar 2017

    Investigating and Recovering from a Security Breach in Your Hybrid AD and Azure AD

    Most organizations that migrate to Office 365 have done so in a hybrid environment—on-premises AD and Azure AD. Perhaps the most challenging aspect is managing and securing the entire surface area. Many organizations begin the process by creating systems that allow them to: Continually assess access privileges Detect and report suspicious activity Remediate access issues and mitigate repeat occurrences ...
    • 23 Mar 2017

    Quest On Demand Migration for Email, 1.10 is now available!

    We are excited to announce a new version of On Demand Migration for Email (ODME), 1.10 has been released. Look what's new: New features and enhancements Release 1.10.0.6134 (03/16/2017) PT130294827 Support for Microsoft Exchange 2016 as a source. Release 1.10.0.5883 (03/02/2017) Rebranding On Demand Migration for Email has been rebranded as a Quest® product and is now called...
    • 22 Mar 2017

    Remediating and Mitigating Privileged Access Issues in Your Hybrid AD and Azure AD

    The challenges associated with securing data in Office 365 , whether completely cloud based or a hybrid AD iteration, are numerous, and addressing them requires a solid plan to ensure your risk of a data breach or accidental exposure is minimized. That plan begins with continually assessing permissions to ensure data is only available to those who should have access. It also requires implementation of a system that...
    • 17 Mar 2017

    Detecting and Reporting Security Issues in Hybrid AD and Azure AD—Visibility is Key

    If your organization is running Office 365 in a completely cloud-based or hybrid AD environment, it’s critical to make sure the proper security protocols are in place in both your on-premises AD and Azure AD. The first step is continuously assessing the hybrid AD to determine who has access to permissions, privileged groups, sensitive business groups, Group Policy Objects (GPO) and data at all times. Are you familiar...
    • 13 Mar 2017

    Hybrid AD and Azure AD Security Begins with Continuous Permissions Assessment

    If your organization made the jump to Office 365 and are now completely cloud based or in a hybrid AD environment, you probably spent a lot of time getting your on-premises AD ready for the move . Now that your new cloud or hybrid environment is in place and in good shape, how do you keep it secure? Maintaining security in a cloud or hybrid AD environment is no easy task. Download the Quest e-book Surviving Common...
    • 9 Mar 2017

    Securing Your On-Premises AD for Office 365 Migration

    As we previously discussed, migrating to Office 365 doubles the surface area you’ll need to manage and secure. As a result, it’s critical that any issues with data stored in your on-premises AD are corrected prior to migration. The good news is that making the move to Office 365 offers the opportunity to address any problems that exist while also creating policies that will keep it that way moving forward...
    • 8 Mar 2017

    Automate Active Directory Health Checks with the New Release of Active Administrator

    When Active Directory (AD) goes down or is unavailable for any stretch of time, consequences can be severe. AD issues can lead to end user frustration, loss of productivity, and significant burden on the IT and help desk staff while they attempt to identify and fix the issue. One would think since AD is such a business-critical system that there would be plenty of easy-to-use tools and methods available for keeping AD...
    • 7 Mar 2017

    Office 365 Security: Is On-Premises AD Your Weakest Link?

    Office 365 has more than 60 million active monthly users, and adoption of the platform is increasing—for good reason. It allows organizations to reduce infrastructure and costs related to licensing and maintenance, while expanding storage efficiencies. Additionally, Office 365 empowers workforces to operate from anywhere and from any device, while increasing scalability and business continuity. However, moving...
    • 27 Feb 2017

    Migrating to Archive Mailboxes with Quest On Demand Migration for Email

    Both Exchange and Office 365 have the option to provide users with two separate mailboxes. First, there is the normal “User Mailbox”, which is typically used on an everyday basis and is housed on high performance storage media. Second, is the “User Archive” mailbox, which is typically used only when older data needs to be referenced and can be stored on less expensive storage media. Quest On Demand...
    • 17 Feb 2017

    How to limit the amount of Cache memory used by Exchange Servers using PowerShell with applications to Rapid Recovery

    A few days ago, I was working with a MSP customer that had the same issue on multiple Exchange servers hosted by his own customers. Specifically, in that particular setup, due to the memory-hog behavior of Exchange, other applications including our own Rapid Recovery agent were not performing properly. I suggested that we may attempt reducing the Exchange memory consumption and he offered me his own company environment...
    • 13 Feb 2017

    Securing your Active Directory Environment from the Inside Out. (Part 3)

    Okay, we have identified our privileged users and determined what rights are needed for them to do their jobs. Now we need a way to enforce these new roles. Step 3: Simplify the security of your Active Directory Active Roles is an AD proxy. It will sit between the user and Active Directory and determine if the user should be performing the task or not. Since the Active Roles service account is actually making the...
    • 7 Feb 2017

    Securing your Active Directory Environment from the Inside Out. (Part 2)

    In my previous post, I touched on how you can identify users in AD with elevated rights . Now we need to determine if they're really necessary. Step 2: Identifying what rights are needed for the job. I can't begin to tell you how many companies that I've talked with who give out Domain Admin rights like candy. I've seen Sr. Admins with it, I've seen Jr. Admins with it, heck I've seen Help...
    • 3 Feb 2017

    Securing your Active Directory Environment from the Inside Out. (Part 1)

    In speaking with a lot of my customers, the topic of "How can I better secure my Active Directory environment ?" always seems to come up. There are several ways to answer this question, but today I want to focus on the one that seems to be overlooked most often: privileged user accounts. I've always compared privileged users to teenagers. Can you really trust that they're using the best judgement?...
    • 3 Feb 2017

    Investigating Account Lockouts with IT Security Search

    One of the tools that Active Directory administrators have to help mitigate brute force hacking attempts is the account lockout. Typically configured in a Group Policy, the account lockout policy tallies the number of failed authentication attempts for an account, and if it exceeds a threshold locks the account and prevents it from being used. Typically account lockouts are caused by an end user forgetting a password...
    • 31 Jan 2017

    Active Directory Management and Azure AD: A Perfect Match

    It just seemed to me a perfect superhero team like the Wonder Twins could also represent Quest Active Administrator and Microsoft Azure AD . The Quest Active Administrator is a single plane of glass tool for DNS, GPO, and AD management . The tool combines typical and advanced functions for these objects plus auditing and alerting, backup and recovery, and DC management. Just like the Wonder Twins; Quest Active Administrator...
    • 31 Jan 2017

    What's a Mailbox Collection?

    In Migration Manager for Exchange we use a collection to manage the mailboxes to be migrated. Depending on your migration plan you can use these collections for specific tasks or stages. To provide flexibility, the mailboxes to be synchronized are grouped into mailbox synchronization collections. A mailbox synchronization job can handle multiple collections. Each of these collections has its settings, including the mailbox...
    • 31 Jan 2017

    We’re Up on Office 365. What’s Next?

    Perhaps it wasn’t your decision for your organization to migrate to Office 365. Yet, the decision was made, and what followed was a significant amount of planning and heavy lifting to get your IT environment optimized (specifically Active Directory) for a cloud migration . Congratulations – you survived. What’s next? Post-migration, I generally get questions from IT professionals about the security...
    • 31 Jan 2017

    The Often Overlooked Functionality of Change Auditor

    For those who are unfamiliar with Change Auditor , it is the auditing solution offered by Quest. The solution offers a wide range of auditing capabilities to help provide a view into what changes are occurring within your environment. Unfortunately, the more I interact with my customers, the more I start to realize that very few are using the product to its full potential. I wanted to take some time to inform Change Auditor...
    • 27 Jan 2017

    Insider Threats: The Unknowns of Active Directory Security

    There are known knowns. These are things we know that we know. There are known unknowns. That is to say, there are things that we know we don't know. But there are also unknown unknowns. There are things we don't know we don't know. Donald Rumsfeld At one point in my career the security boundary was defined by the outside of the network vs the inside. We setup domains and forests with a particular architecture...