• Products
    • View all products
    • Free trials
    • Buy online
  • Solutions
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Services
    • Consulting Services
      • Overview
      • Microsoft Platform Services
      • Data Protection Services
      • Unified Endpoint Management
      • Performance Monitoring Services
      • Database Management Services
    • Educational Services
    • Support Services
  • Support
    • Support Home
    • By Product
      • All Products
      • AppAssure
      • Archive Manager
      • Change Auditor
      • Desktop Authority
      • DR Series
      • Foglight
      • KACE
      • Migration Manager
      • NetVault
      • Rapid Recovery
      • SharePlex
      • Toad
      • vRanger
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Consulting Services
      • Microsoft Platform Management
      • Data Protection
      • Unified Endpoint Management
      • Performance Monitoring
      • Database Management
    • Technical Documentation
    • Educational Services
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Technology Partners
    • Partner Community
    • Deal Alert
  • Blogs
    • IT Industry Insights
    • Quest Solution Blogs
      • Data Protection
      • Database Management
      • ITNinja
      • Microsoft Platform Management
      • Performance Monitoring
      • Toad World Blog
      • Unified Endpoint Management
  • Forums
  • 製品情報
    • すべての製品情報%E3%82%92見る
    • Change Auditor
    • Foglight
    • KACE
    • Metalogix
    • Migration Manager
    • Migrator for Notes to SharePoint
    • NetVault Backup
    • On Demand Migration for Email
    • QoreStor
    • Rapid Recovery
    • Recovery Manager
    • SharePlex
    • Spotlight
    • Toad
  • ソリューション
    • すべてのプラットフォームを見る
    • クラウド管理
    • GDPRコンプライアンス
    • データ保護
      • 概要
      • クラウド管理
      • ディザスタリカバリ
      • バックアップとリカバリ
      • Office 365 データ保護
      • 仮想化管理
      • 重複除外と複製
    • データベース管理
      • 概要
      • DevOps
      • データの準備と分析
      • データベースのクラウド移行
      • データベースパフォーマンス監視
      • データベース管理
      • データベース複製ソフトウェアツール
    • 統合エンドポイント管理
      • 概要
      • エンドポイントコンプライアンス
      • エンドポイントセキュリティ
      • エンドポイントの可視化
    • Microsoftプラットフォーム管理
      • 概要
      • ハイブリッドActive Directoryのセキュリティとガバナンス
      • Microsoftプラットフォームの移行計画と統合
      • セキュリティとコンプライアンス
      • 情報アーカイブおよびストレージ管理ソリューション
      • Windowsのバックアップとリカバリ
      • Microsoft Serverのパフォーマンスと可用性
      • レポート作成機能
      • グループポリシーと権限
    • パフォーマンス監視
  • サービス
    • コンサルティングサービス
      • 概要
      • Microsoftプラットフォーム管理
      • データ保護
      • 統合エンドポイント管理
      • パフォーマンス監視
      • データベース管理
    • トレーニングと認定資格
    • サポートサービス
  • サポート
    • サポートホーム
    • 製品で検索
      • All Products
      • AppAssure
      • Archive Manager
      • Change Auditor
      • Desktop Authority
      • DR Series
      • Foglight
      • KACE
      • Migration Manager
      • NetVault
      • Rapid Recovery
      • SharePlex
      • Toad
      • vRanger
    • お問い合わせ
      • すべて
      • カスタマサービス
      • ライセンス アシスタンス
      • 更新のアシス%E3%82%BFンス
      • 技術サポート
    • コミュ%E3%83%8Bティフォーラム
    • ソフトウェアのダウン%E3%83%ADード
    • ナ%E3%83%AC%E3%83%83ジ%E3%83%99ース
    • マイアカウント
      • マイ プロダクト
      • Myサービスリクエスト
      • マイ ライセンス
      • マイ グループ
      • マイ プ%E3%83%ADフ%E3%82%A1イル
    • ポリ%E3%82%B7ーおよび手順
    • コンサル%E3%83%86ィングサー%E3%83%93ス
      • Microsoftプラットフォーム管理
      • データ保護
      • 統合エンドポイント管理
      • パフォーマンス監視
      • データベース管理
    • リリースノートおよびガイド
    • 教育サービス
    • ビデオチュートリアル
  • トライアル
  • パートナー
    • 概要
    • Partner Circleへのログイン
    • パートナーになる
    • Find a Partner
    • パートナーコミュニティ
    • Deal Alert
  • コミュニティ
Quest Community
Quest Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
  • Data Protection
  • Database Management
  • Microsoft Platform Management
  • Performance Monitoring
  • Unified Endpoint Management
  • Quest
  • More
  • Cancel
  • New
  • All tags
  • Data Protection
  • Rapid Recovery
  • archive
  • Backup and Diaster Recovery Suite
  • Backup and Recovery
  • Cloud
  • cyber security
  • Disaster Recovery
  • endpoint systems management
  • Event
  • foglight for virtualization enterprise edition
  • granular restore
  • Microsoft Platform Management
  • Modernization
  • Pain Point
  • Partners
  • Proteção de Dados
  • Quest Portal
  • Ransomware
  • replication
  • Security
  • Systems Management
  • Thought Leadership
  • Troubleshoot
  • Virtualization
  • VROOM
  • wannacry
  • How to limit the amount of Cache memory used by Exchange Servers using PowerShell with applications to Rapid Recovery (Part 1 of 2)

    How to limit the amount of Cache memory used by Exchange Servers using PowerShell with applications to Rapid Recovery (Part 1 of 2)

    Tudor.Popescu
    Tudor.Popescu

    Part two of this blog series may be found here

    A few days ago, I was working with a MSP customer that had the same issue on multiple Exchange servers hosted by his own customers. Specifically, in that particular setup, due to the memory-hog behavior of…

    • over 8 years ago
    • Blogs
    • Data Protection
  • Speedbumps on the Road to Disaster Recovery and Data Protection

    Speedbumps on the Road to Disaster Recovery and Data Protection

    John.OBoyle
    John.OBoyle

    Chico: “You call this a barn? This looks like a stable.”

    Groucho: “Well, if you look at it, it’s a barn; if you smell it, it’s a stable.”

    From “Monkey Business,” by the Marx Brothers

     

    That’s the way I feel…

    • over 7 years ago
    • Blogs
    • Data Protection
  • Holistically Manage Your Virtual Environment

    Holistically Manage Your Virtual Environment

    Bennett.Klein
    Bennett.Klein

    Did you think virtualizing your IT infrastructure would put an end to your systems management woes? If so, you are not alone. While it’s true that you now have less hardware, less storage housed on actual servers and less physical infrastructure overall…

    • over 7 years ago
    • Blogs
    • Data Protection
  • Quest Rapid Recovery 6.2 is now available!

    Bennett.Klein
    Bennett.Klein

    Announcing Quest Rapid Recovery 6.2 is now available

    As all technologies evolve and change, Rapid Recovery evolves to keep pace — and to keep them better protected. Based on valuable customer and partner feedback, Quest is proud to announce Rapid Recovery…

    • over 7 years ago
    • Blogs
    • Unified Endpoint Management
  • Archive, Rapid Recovery Style

    Archive, Rapid Recovery Style

    Bennett.Klein
    Bennett.Klein

    First things first. What is data archiving?  Simply put, it’s a process that takes data that’s no longer in use or has lost its relevance and moves it to lesser expensive storage such as magnetic tape or cheap disk storage.  Archived data is…

    • over 7 years ago
    • Blogs
    • Data Protection
  • New Cloud Based Quest Data Protection Portal Now Available for Rapid Recovery

    Efrain.Viscarolasaga
    Efrain.Viscarolasaga

    Gain end-to-end visibility of all data protection activities across your entire IT environment anywhere, anytime. The Quest Data Protection Portal is an intuitive, cloud-based data protection management solution that enables you to monitor all your backup…

    • over 7 years ago
    • Blogs
    • Data Protection
  • New Cloud Based Quest Data Protection Portal Now Available for Rapid Recovery

    Efrain.Viscarolasaga
    Efrain.Viscarolasaga

    The new Quest Data Protection Portal is now online and available!

    Gain end-to-end visibility of all data protection activities across your entire IT environment anywhere, anytime. The Quest Data Protection Portal is an intuitive, cloud-based data pro…

    • over 7 years ago
    • Blogs
    • Data Protection
  • See a Real Show When You’re in Vegas for VMworld 2017

    See a Real Show When You’re in Vegas for VMworld 2017

    Chad.Bower
    Chad.Bower

    Rod Stewart. Jay Leno. Jennifer Lopez. Blue Man Group. Cirque du Soleil. Quest Software.

    What do these have in common? They’re all be putting on shows in Las Vegas during August. And while you may not go home bragging to your friends about seeing the…

    • over 7 years ago
    • Blogs
    • Data Protection
  • Microsoft Inspire Tip of the Day: Visit Quest at Booth #1309

    Microsoft Inspire Tip of the Day: Visit Quest at Booth #1309

    Ryan McKinney
    Ryan McKinney

     

    My feet hurt. I’m tired of wandering the floor. Who’s got the best giveaways and Microsoft expertise at Inspire?

    We don’t want to toot our own horn, but…toot, toot! Our giveaways are on point! We’re talking absurd amounts of…

    • over 7 years ago
    • Blogs
    • Microsoft Platform Management
  • No sea la próxima víctima de ransomware

    No sea la próxima víctima de ransomware

    Raul.Morales
    Raul.Morales

    Acabamos de presenciar uno de los ataques de ransomware más devastador y público jamás registrado.  El viernes 12 de mayo de 2017, aproximadamente 200.000 damnificados en 150 países fueron víctimas de un ataque de ransomware…

    • over 7 years ago
    • Blogs
    • Unified Endpoint Management
  • How Not to Be the Next Ransomware Victim

    How Not to Be the Next Ransomware Victim

    John.OBoyle
    John.OBoyle

    We’ve just witnessed one of the most devastating ransomware attacks ever recorded.  Last Friday, an estimated 200,000 computers across 150 countries were victims of a global ransomware attack on an unprecedented scale. 

    The UK National Health Service…

    • over 7 years ago
    • Blogs
    • Unified Endpoint Management
  • How to limit the amount of Cache memory used by Exchange Servers with applications to Rapid Recovery using PowerShell (part 2 of 2)

    How to limit the amount of Cache memory used by Exchange Servers with applications to Rapid Recovery using PowerShell (part 2 of 2)

    Tudor.Popescu
    Tudor.Popescu

    Part one of this blog series may be found here

    Note: This blog series was supposed to be divided in 3 parts. However, some readers were gracious enough to ask me to publish all remaining material in one post and argued that an excessively long post should…

    • over 8 years ago
    • Blogs
    • Data Protection
  • Backups, the bridge to the DR plan

    Matthew.Raymond
    Matthew.Raymond

    In today's business, demand for a complete Disaster Recovery solution is becoming the norm.  The days of backup discussions are gone, DR is the focus and backup is the bridge to bigger conversations in today's modern world.  

    Proper DR planning…

    • over 8 years ago
    • Blogs
    • Data Protection
  • Ransomware: O custo de não fazer nada

    Ransomware: O custo de não fazer nada

    Marcio Silverio
    Marcio Silverio

    Quase metade das invasões residenciais ocorrem sem o uso da força, de acordo com artigo publicado em Protected Home (em inglês). Isto é: alguém deixou uma porta ou uma janela destravada. Ladrões gostam de coisas fáceis e se gostassem de…

    • over 8 years ago
    • Blogs
    • Unified Endpoint Management
  • Leveraging Microsoft Azure for Offsite Data Storage and Disaster Recovery

    Leveraging Microsoft Azure for Offsite Data Storage and Disaster Recovery

    Andy Puckett
    Andy Puckett

    How do I get my data offsite?

    One of the most important items in a good backup and disaster recovery strategy is making sure that data is redundantly stored at a location beyond just the primary site. It’s important because, if something happens to our…

    • over 8 years ago
    • Blogs
    • Data Protection
  • Eliminate Backup Windows with Rapid Recovery

    Edward.Binion.III
    Edward.Binion.III

     

    Having worked in a Data Center, I’m familiar with the challenges IT Admins face on the daily.  From security, networking, to data management and everything in between, it seems there just isn’t enough time in the day to get done what needs to.…

    • over 8 years ago
    • Blogs
    • Blog
  • Data Protection: The Cost of Doing Nothing

    Peter de Vente
    Peter de Vente

    Life is about making decisions. Every decision will start with a simple question and assessing the options. What will I wear today? Will I travel by car or by train for my meeting this morning? Simple questions with potentially, a massive impact. You…

    • over 8 years ago
    • Blogs
    • Blog
  • Storage Snapshots vs Backup Software: The Key to True Data Reliability

    Storage Snapshots vs Backup Software: The Key to True Data Reliability

    Sam.Peck
    Sam.Peck

    In a world where data availability and integrity are paramount to the success of an organization, IT administrators are always looking for the best way to secure their data and keep the business running. One essential component of this strategy is backup…

    • over 8 years ago
    • Blogs
    • Blog
  • How to Write Simple, Scalable HTML Powershell Graphic User Interfaces for managing Rapid Recovery (1 of 3)

    How to Write Simple, Scalable HTML Powershell Graphic User Interfaces for managing Rapid Recovery (1 of 3)

    Tudor.Popescu
    Tudor.Popescu

    Part two of this series may be found here.

    Part three of this series may be found here.

    Over the years I have written hundreds of PowerShell scripts for RapidRecovery/AppAssure Management and Automation. One of the constant requests I have heard from…

    • over 8 years ago
    • Blogs
    • Blog
  • Four Essential Steps to Ensuring Data Protection and Rapid Recovery

    Jmeyer
    Jmeyer

    We’ve been talking a lot about effective software deployment and management throughout this blog series. But there’s one critical element we have yet to discuss: data protection and data recovery.  

    Today, everyone wants be connected 24 hours…

    • over 9 years ago
    • Blogs
    • Blog
  • UK Data Protection Awards Shortlist - Take 2! We'd love to have your vote

    UK Data Protection Awards Shortlist - Take 2! We'd love to have your vote

    Vee.Baker
    Vee.Baker

    Hot on the heels of our recent shortlist success in the V3 awards, Data Protection is again on the awards trail.

    Our full Data Protection portfolio of scalable and cross platform solutions, which helps businesses of any size to keep delivering services…

    • over 8 years ago
    • Blogs
    • Blog
  • The End Of The World As We Know It!

    The End Of The World As We Know It!

    Shannon.Wood
    Shannon.Wood

    'The server room has been hit by an out of control drone carrying fireworks from the nearby scout hut and wiped out the entire estate!'

    As scary (albeit unlikely) as that sounds, there’s more to restoring data than recovering from complete…

    • over 8 years ago
    • Blogs
    • Blog
  • Real-world Heroes: Is Rapid Recovery Verified Recovery a Superpower?

    Real-world Heroes: Is Rapid Recovery Verified Recovery a Superpower?

    Carol.Buckley
    Carol.Buckley

     

    Suppose you could be a superhero – what superpower would you want? X-ray vision? Flying? Mind-reading? In a survey conducted by a European film rental service, accelerated healing ability like that possessed by the X-Men character Wolverine topped…

    • over 8 years ago
    • Blogs
    • Blog
  • How to Become a Data Protection Hero

    How to Become a Data Protection Hero

    Chad.Bower
    Chad.Bower

    You don’t have to be faster than a speeding bullet or more powerful than a locomotive to become a data protection hero. You simply need to address the when, where, why and how of protecting your organization’s applications and data against various threats…

    • https://www.quest.com/documents/
    • View
    • Hide
    • over 8 years ago
    • Blogs
    • Blog
  • Ransomware: The Cost of Doing Nothing

    Ransomware: The Cost of Doing Nothing

    Carol.Buckley
    Carol.Buckley

     

    Nearly half of home break-ins occur without use of force, according to this article. Meaning: Somebody left a door or window unlocked. Thieves like it easy. If they liked to work, they’d get a job rather than try to rob you. In fact, cops will tell…

    • over 8 years ago
    • Blogs
    • Blog
  • View related content from anywhere
  • More
  • Cancel
  • Company
    • About Us
    • Buy
    • Contact Us
    • Careers
    • News
  • Resources
    • Industry Insights Blog
    • Communities
    • Customer Stories
    • Documents
    • Events
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • Training & Certification
    • Support Services
  • Social Networks
    • Facebook
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 Quest Software Inc. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center
  • 会社名
    • 会社情報
    • 購入
    • お問い合わせ
    • 採用情報
    • ニュース
  • リソース
    • ブログ
    • お客様の事例
    • ドキュメント
    • イベント
    • ビデオ
  • サポート
    • プロフェッショナルサービス
    • サポートの更新
    • テクニカルサポート
    • トレーニングと認定資格
    • サポートサービス
  • ソーシャルネットワーク
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 Quest Software Inc. ALL RIGHTS RESERVED.
  • 「法務」
  • ご利用規約
  • 個人情報保護方針
  • コミュニティのフィードバックとサポート