Major IT migrations aren’t easy. What’s especially frustrating is that while the decision to move to a new IT platform likely did not fall on the IT administrator’s plate, the responsibility for a flawless rollout does. Such is the case with an …
If you’re like most companies of any substantial size, you probably have an extensive GPO environment. Maybe you have it mostly under control; maybe you need some help getting it under control. Either way, I challenge you to think about the potential…
Did you know that 60 million monthly commercial customers run Office 365? If your organization isn’t yet among the mass, don’t rule out a pending directive sent down from the CTO, CIO or other senior IT decision maker soon.
Despite expectations…
Recovery Manager for Active Directory has long been an indispensable part of an Active Directory administrator's toolkit. Its ability to take full backups of Active Directory make it perfect for quickly reversing an ill-advised change, and its robustness…
Since starting my tenure at Quest, I have had multiple customers ask me “how can I use Change Auditor to audit DNS changes in my environment?” At first thought, this seems like an easy task to complete. Change Auditor comes with many DNS related…
The first step in migrating Notes archives with Migrator for Notes to Exchange (MNE) is to determine where the archive files are located. The location of Notes archives can vary between Notes deployments and can also vary by user or department. Most commonly…
Organizations exist either to generate revenue or to perform a service. The mere thought of securing an environment doesn’t exist until there is something of value to secure. Once you have gotten to that stage of an organizational lifecycle, people…
Encrypting Ransomware is a family of malicious software (also known as malware) designed to take files on a PC or network storage device, encrypt them, and then extort money in the form of a ransom to unlock the files. This sophisticated type of attack…
Moving data between servers can be a painful process because of the security involved over the data. Moving the same data between servers, which are in different domains, is even more troublesome. Trying to move data between forests/domains which are…