Select a technology trend
Internet of Things
Identity and Access Management
Select a solution area
Microsoft Platform Management
Select a type
Products News and Updates
All blogs RSS
Subscribe by email
Subscribe by email
By view count
By comment count
27 Feb 2017
Migrating to Archive Mailboxes with Quest On Demand Migration for Email
Both Exchange and Office 365 have the option to provide users with two separate mailboxes. First, there is the normal “User Mailbox”, which is typically used on an everyday basis and is housed on high performance storage media. Second, is the “User Archive” mailbox, which is typically used only when older data needs to be referenced and can be stored on less expensive storage media. Quest On Demand...
17 Feb 2017
Securing your Active Directory Environment from the Inside Out. (Part 4)
Step 4: Control and simplify Group Policy management . Using GPOADmin, you can be very granular with who is allowed to do what with a particular Group Policy. Much like Active Roles, GPOAdmin allows you to grant specific rights to your Administrators and make the changes through a service account. Thus greatly reducing the need to grant the rights natively. Finally, we have secured Active Directory literally from...
14 Feb 2017
Getting Organized Using Toad
Toad has so many features and RDBMS' have so many objects it can sometimes be difficult to mesh them together to accomplish the tasks at hand. Wouldn't it be great if there were ways to have these organized in the way you need vs ...
13 Feb 2017
Securing your Active Directory Environment from the Inside Out. (Part 3)
Okay, we have identified our privileged users and determined what rights are needed for them to do their jobs. Now we need a way to enforce these new roles. Step 3: Simplify the security of your Active Directory Active Roles is an AD proxy. It will sit between the user and Active Directory and determine if the user should be performing the task or not. Since the Active Roles service account is actually making the...
8 Feb 2017
Secure Automation Using Toad for Oracle
While Toad for Oracle has had Automation for a long time now it has been necessary to run it on your desktop. While this is an important feature this limitation made it not ideal for organizations where security is imperative, such as in t...
7 Feb 2017
Securing your Active Directory Environment from the Inside Out. (Part 2)
In my previous post, I touched on how you can identify users in AD with elevated rights . Now we need to determine if they're really necessary. Step 2: Identifying what rights are needed for the job. I can't begin to tell you how many companies that I've talked with who give out Domain Admin rights like candy. I've seen Sr. Admins with it, I've seen Jr. Admins with it, heck I've seen Help...
3 Feb 2017
Securing your Active Directory Environment from the Inside Out. (Part 1)
In speaking with a lot of my customers, the topic of "How can I better secure my Active Directory environment ?" always seems to come up. There are several ways to answer this question, but today I want to focus on the one that seems to be overlooked most often: privileged user accounts. I've always compared privileged users to teenagers. Can you really trust that they're using the best judgement?...
30 Dec 2016
Migrating Notes archives with Migrator for Notes to Exchange
The first step in migrating Notes archives with Migrator for Notes to Exchange (MNE) is to determine where the archive files are located. The location of Notes archives can vary between Notes deployments and can also vary by user or department. Most commonly, Notes archives are stored locally on the user’s workstation. Notes can also be configured to keep a replica copy of the user’s Notes archives on the...
13 Dec 2016
Storage Groups – The Next Weapon In Your Arsenal For Data Protection
Storage Groups: Your Next Data Protection Bullet OK – so you may now have an awesome data deduplication appliance in your environment. Using it gives you the peace of mind that data can be quickly backed up and recovered. But what ...
9 Dec 2016
How Unified Communications Analytics Can Help You
Trending upward in IT is the amount of Email data being migrated to the Cloud from On-Premise Exchange. Specifically, there are increased migrations to Microsoft Office 365 (Exchange Online), which is what we would call a “Cloud Provider”...
1 Dec 2016
Performance Monitoring from Spotlight Cloud
The Spotlight Cloud services lets you monitor your servers on the web and mobile devices. It also analyzes your server performance data and gives health checks on your servers, evaluates their capacity and provides other insights into their performan...
30 Nov 2016
New Release! Migrator for Notes to Exchange 4.14.1
We are excited to announce a new version of Migrator for Notes to Exchange 4.14.1 is now available for download. Look what's new: New configuration option for Group Email Addresses New options created for the handling of Automatic Replies Improvements for the migration of MIME based messages New configurable parameter RequireSenderAuthentication has been added for group provisioning. The full Migrator...
30 Nov 2016
Purpose Built Backup Appliance (PBBA), Not Your Father’s Backup Repository
The requirements for data protection continue to evolve with the changing IT environment as well as the need to protect an increasing amount of data. My experience in the area of data protection began in the late 1980’s when the o...
30 Nov 2016
Quest Client Profile Updating Utility 5.6.4 is Released!
Quest is proud to deliver Client Profile Updating Utility 5.6.4. In this version the following 2 known issues were fixed. For migrations to the Exchange 2013, 2016 or Office 365 target using Dell Migration Manager for Exchange 8.13 with the 20161121EX hotfix or later, CPUU fails to apply RPC over HTTP settings provided by the MMEX switch message, resulting in a profile processing failure. For migration scenarios...
30 Nov 2016
Eliminate Backup Windows with Rapid Recovery
Having worked in a Data Center, I’m familiar with the challenges IT Admins face on the daily. From security, networking, to data management and everything in between, it seems there just isn’t enough time in the day to get d...
23 Nov 2016
Performance Tuning in Capacity Director
Coming soon to Capacity Director! Select a cluster Select a host or all hosts in the cluster Review, select and automate the placement recommendations Review, select and implement the resource optimizations Done, a balanced virtual environment.
23 Nov 2016
Keep Your Pi from Burning with Foglight
On my farm, I have a fairly large irrigation system (7 zones and a pump), all controlled by a Raspberry Pi single-board computer. I also have Raspberry Pi controllers for Amateur Radio activities, including a Weak Signal transmitter that uses only th...
22 Nov 2016
Email migration is as easy as 1, 2, 3,... 4 with Quest On Demand Migration for Email!
Email is an extremely important method of communication for any size business. As business needs change, so do email infrastructure requirements. On Demand Migration for Email (ODME) is a cloud-based migration service that is able to scale to meet your migration requirements “On Demand”. Whether you have a small business with a handful of users or a large enterprise with thousands of users, ODME will allow...
21 Nov 2016
DevOps Adoption in Database Development: Make It a Reality [New Survey]
DevOps has been pervasive within Application Development for several years, but the database environment is so different and sensitive in nature, making database development a barrier to an end-to-end DevOps strategy. The most important element of De...
18 Nov 2016
You May Be Doing DevOps And Not Even Know It
By the end of the second flight, I had finished the book. The thought occurred to me that I may have been doing DevOps nearly a decade ago and didn’t realize it. Now, I am not trying to say I invented DevOps. I did not invent DevOps anymore than Al Gore’s oft misquoted statement that “he” invented the Internet. What I am saying is the story in the book was very familiar to my own story and journey.
16 Nov 2016
Prevent Spotlight on SQL Server Shenanigans with User Roles and Security
Spotlight on SQL Server Enterprise ‘s main purpose in life is to inform you of SQL Server performance problems, and then give you a quick way to diagnose their root causes so you can take action quickly. Email and mobile app notifications ...
9 Nov 2016
How to Remove Old Emails from an Unmonitored Exchange Mailbox
Just about every company has a few unmonitored mailboxes that are used to provide functionality to an application or other services like a helpdesk ticketing system. Often these mailboxes receive mail but the mail never gets deleted and the mailbox grows in size. In this post, we will take a look at how to use the Recovery Manager for Exchange PowerShell cmdlets to deal with this issue. Recovery Manager for Exchange...
7 Nov 2016
5 Easy Steps to Change Management Support with the K1000 Service Desk
Customers utilize change management support by creating a specific queue for “Change Requests”. There are many advantages to doing it this way; for instance…
3 Nov 2016
How to Pack for Your Lotus Notes to Exchange Migration
Migration from Lotus Notes to Exchange is not a task to take on lightly. One should adequately pack up their existing Lotus Notes Environment to get ready for the migration to Exchange. What have you researched in your existing environmen...
3 Nov 2016
Manage SQLServer Differential Backups with Confidence
Differential backups make perfect sense….backup only what has changed since the last Full backup. Differential backups dramatically reduce the storage needed to maintain backups, while lowering maintenance windows associated with Full backups. And, if managed properly, they do not add significant recovery time. Here is an illustration of the Differential backup concept: (Source: MSDN Developer Network) ...
Subscribe by email
Read Tech Center Blog Posts