• 24 Jul 2017

    How to fight back against ransomware

    DisasterRecoveryLady here; did you miss me? The year’s only half over, and we’ve already seen a ton of ransomware and viruses being spread through email. What’s worse, the attacks keep getting more sophisticated! For example, the Verge reported in May that Google Docs users were targeted in a phishing scheme that sends them an email invitation from someone they may know. Clicking on the link takes them...
    • 20 Jul 2017

    Bungled access control spills data on 200 million Americans. Maybe you?

    Once again, let’s all learn the lesson about improper access control being at the root of yet another information leak, shall we? As reported by the BBC and many others, the personal data of 200 million U.S. citizens was accidentally exposed online due to an improperly configured security setting. Here’s my favorite comment/quote from the story: "Since this event has come to our attention, we...
    • 19 Jul 2017

    Three Reasons I’m Inspired by Microsoft Inspire

    What a week! More than 17,000 attendees packed a convention center in Washington D.C. to hear Microsoft’s latest direction and connect with partners and ISVs from around the globe. Microsoft wasted no time getting down to business and delivered a week full of new initiatives and reinforced strategic direction for partners to execute. I walked away convinced Microsoft has the right vision to help customers –...
    • 18 Jul 2017

    Advantages of an Active Directory Auditing Agents

    Understanding the architecture of a product is vital for a customer in deciding if it is a good fit for their organization. Over the years, we've seen debates on whether agent-based or agent-less solutions are a better fit for organizations. A decision needs to be made whether or not the benefits of an agent merit its use. In my 15+ year tenure at Quest, we have released both agent-based and agent-less Active Directory...
    • 17 Jul 2017

    Windows Permissions and Security – Four Kinds of Dull Tasks We’ve Automated for You

    “It's easier to ask forgiveness than it is to get permission.” Maybe Rear Admiral Grace Hopper was first to say that , and maybe she wasn’t. She certainly knew a thing or two about permission . I think that if she’d known what network administrators go through, she’d have said that almost anything is easier than managing Windows permissions across an entire IT environment. In my previous...
    • 14 Jul 2017

    WWE Data Leak Lesson - Tighten Data Security or Face the Sweet Chin Music

    Data leaks and security breaches can happen to anyone, at any time. You never know when some jabroni is hiding under the wrestling ring with a steel chair, ready to attack and steal your data! The most recent example is the July 6 story from Forbes.com citing the massive WWE data leak, exposing 3 million global wrestling fans’ personal information, including home addresses, educational background, earnings and ethnicity...
    • 14 Jul 2017

    Windows Permissions and Access Control – Stick Shift or Automatic?

    If managing Windows permissions is like driving a car, would you rather have a stick shift or an automatic transmission? A stick shift is cool, and it makes you feel like a teenager again. Kind of like the Microsoft security tools you get inside Windows. “Looks like the guys in Finance are having trouble with inherited permissions,” you tell your colleagues importantly. “I’ll run subinacl on...
    • 14 Jul 2017

    GDPR Compliance FAQ

    Thank you to everyone who joined the June 22 webcast, GDPR Compliance Planning for Microsoft Environments . Microsoft MVP Greg Schulz and Quest principal technology strategist Colin Truran led a great, interactive session where they discussed: Why GDPR and other regulations impact your environment How to assess and identify compliance risks How to discover who has access to sensitive resources Why real-time...
    • 13 Jul 2017

    Managing Windows Permissions and Security from a Single Console

    Think of all the places in your environment where Windows permissions are located: Windows file servers, Exchange mailboxes, SharePoint sites, SQL Server databases, NAS/SAN filers . . . the list goes on. Now think about the security scenarios that boil down to Windows permissions management : “The new marketing team moved in upstairs and they can’t connect to their new printer.” “A system...
    • 10 Jul 2017

    Who’s in the cloud? Quest On Demand is – and it’s available now!

    We are proud to unveil Quest On Demand , our first Microsoft Platform Management SaaS solution -- to better serve our customers who are rapidly adopting Azure AD and Office 365. Yes, you heard that right, it’s Software-as-a-Service! Our expandable design means we can very quickly grow our cloud portfolio while keeping it easy for customers and partners to adopt just the modules they want. Our preview customers...
    • 6 Jul 2017

    A new version of Migrator for Notes to Exchange is now available!

    We are excited to announce a new version of Migrator for Notes to Exchange 4.15 is now available for download. Look what's new: Completely re-engineered folder mapping and filtering algorithm - The folder mapping and filtering algorithm has been completely re-designed to provide a much cleaner migration experience using default settings, without any [Filters] defined. Windows Server 2016 is now supported ...
    • 3 Jul 2017

    A new version of Migrator for Notes to SharePoint is now available!

    We are excited to announce a new version of Migrator for Notes to SharePoint 6.9.1 is now available for download. Look what's new: Support new license type for the Discovery edition of Migrator for Notes to SharePoint If you need additional services to assist you with upgrading Migrator for Notes to SharePoint or ensuring your solution is running optimally, please visit our Migrator for Notes to SharePoint...
    • 27 Jun 2017

    Hangry in DC? Top places to stuff your pie hole during #MSInspire

    Listen: Nothing’s more dangerous than a severely empty stomach on a work trip. You’re gonna be drinking. You’re off your time zone. You’ve got the nerves from dealing with strangers all up in your biz – it’s too m...
    • 22 Jun 2017

    Simplifying Active Directory management with One Identity Active Roles

    Active Directory management is a double-edged sword: it’s a big part of security and compliance in your organization, but it’s not the simplest of tasks. First, native tools are not very powerful, especially when you’re managing a hybrid environment of on-premises Active Directory and Azure Active Directory . Then, you spend a lot of time and effort ensuring that requests to create, remove or change...
    • 22 Jun 2017

    All you can eat Unified Communications

    Last weekend I went to an all you can eat Chinese food buffet. Every time I go to one of these places I usually end up going through the buffet a total of three times(first time to sample different foods, second to get more of the foods that I like, and third is for dessert). I feel like I should indulge in everything to get the maximum amount of value for my money. In regards to Unified Communications, many people...
    • 21 Jun 2017

    Active Directory management – Restoring deleted objects with IT Security Search

    Active Directory management is usually straightforward, but on the days when it isn’t, you may need to restore a deleted AD user. Did you see my previous post, about removing all access, groups and permissions of former employees from servers, groups and AD? That makes it easy to delete objects, but what happens when you make a mistake? Suppose HR tells you that Jeffrey Lebowski has left the company, and that...
    • 21 Jun 2017

    Microsoft Inspire Tip of the Day: Visit Quest at Booth #1309

    My feet hurt. I’m tired of wandering the floor. Who’s got the best giveaways and Microsoft expertise at Inspire? We don’t want to toot our own horn, but…toot, toot! Our giveaways are on point! We’re talking absurd amo...
    • 20 Jun 2017

    Windows reporting and deep dives into your environment with IT Security Search

    “Can you run a Windows report on Edgar Mann for security purposes? We need to know about his access, groups and permissions.” Do you ever get requests like that from HR? It’s gratifying to play a role in buttoning down your organization, isn’t it? At least, it’s gratifying if you can run that Windows report without spending your entire day on it. Even though the search is limited to Windows...
    • 19 Jun 2017

    Active Directory management and security breaches – What changed and who changed it?

    If your Active Directory objects aren’t constantly changing, then something is probably wrong with your company. There’s a continuous process of creating, modifying and deleting almost everything in a normal organization, like users, shares, group memberships, policies, resources and computers. Worse than all the changes is the nagging likelihood of an AD audit , when an auditor will walk up to your desk...
    • 16 Jun 2017

    Log management and security breaches – What’s the best way to search through a zillion event logs?

    “That security breach didn’t happen by magic,” your boss growls. “Someone had privileges they shouldn’t have had and they got unauthorized access to a file or folder. Check all the logs and find out what happened.” “Whew,” you say after your boss leaves your office. “At least I don’t have magic to contend with.” Your boss is right, though. Somewhere...
    • 15 Jun 2017

    Use Cases for IT Forensics – Deep Investigation into Your Windows Environment

    “Which files and folders can Dave in Tech Support modify?” “HR just gave us a heads-up on these former employees. Find out which servers they had access to.” “Check to see who changed permissions on any of the folders in Marketing in the last 24 hours.” “Ravi says he’s lost cloud access. See what’s going on.” Do you like responding to IT issues like these...
    • 14 Jun 2017

    Data breach forensics – Get an Intelligent Looking Glass into Your Environment

    What’s worse than a data breach, when you’re in IT? Figuring out where to start your search for root causes. It’s a drag to dig into log files, events, permissions, groups and Active Directory (AD) objects across workstations, Windows servers, SQL servers, Linux servers and cloud servers. Even if you know what you’re looking for, you can burn up a lot of time on the hunt. For example, suppose...
    • 12 Jun 2017

    A new version of Coexistence Manager for GroupWise 1.7 is now available!

    We are excited to announce a new version of Coexistence Manager for GroupWise , 1.7, is now available for download. Look what's new: New configuration option for Group Email Addresses New options created for the handling of Automatic Replies Improvements for the migration of MIME based messages The full Coexistence Manager for GroupWise Release Notes can be found on the technical documentation site . ...
    • 7 Jun 2017

    A new version of Coexistence Manager for Notes 3.8 is now available!

    We are excited to announce a new version of Coexistence Manager for Notes 3.8 is now available for download. Look what's new: Support for Exchange 2016 CU3 and Domino 9.0.1 Pack 7 Rebranded from Dell to Quest The full Coexistence Manager for Notes Release Notes can be found on the technical documentation site . For current customers, you can download the new release on the product support page . ...
    • 7 Jun 2017

    Your GDPR Compliance Wake-Up Call – Don’t Hit the Snooze Button

    Did you see my post a couple of weeks ago about our upcoming webcast and the one-year countdown for GDPR compliance ? Did that get you thinking about complying with EU GDPR (General Data Protection Regulations) in your Microsoft environment? Or did you just hit the snooze button? Maybe GDPR compliance isn’t on your list of priorities yet. Maybe you think you can procrastinate until, say, a week or two before...