Welcome to the Recovery Manager Community!

 Read Blog  Watch Videos  Get Support  Learn More
Recovery Manager Forum Posts
Recovery Manager Blog Posts
    • 17 Aug 2017

    Combat GDPR with Quest's Microsoft Platform Management Tools

    As we become ever more reliant on technology we are seeing more and more threats to our data. These threats are not only coming from the “bad guys” out there knows as hackers like Hank . They can also come from malicious employee who feel hard done by and want to get their own back. The negligent new IT admin making changes to their Active Directory without thinking of the repercussions to the business, followed...
    • 4 Aug 2017

    Simplify Healthcare M&A with Automated AD and Exchange Tools

    Simplify your healthcare mergers and acquisitions with secure and automated tools for Active Directory and Exchange consolidations.
    • 1 Aug 2017

    Healthcare Mergers and Acquisitions: A Prescription to Improve Security Before Migration

    Several forces are combining to create a historic period of consolidation in the healthcare industry. Increased competition, a shift to outcomes-based reimbursement models, and an overall need to widen the scope of care while reducing costs are driving more and bigger M&A deals. In fact, according to Thomson Reuters, healthcare M&A deals totaled US$672.9 billion during 2015, which was a 71% increase from 2014...
    • 24 Jul 2017

    How to fight back against ransomware

    DisasterRecoveryLady here; did you miss me? The year’s only half over, and we’ve already seen a ton of ransomware and viruses being spread through email. What’s worse, the attacks keep getting more sophisticated! For example, the Verge reported in May that Google Docs users were targeted in a phishing scheme that sends them an email invitation from someone they may know. Clicking on the link takes them...
    • 20 Jul 2017

    Bungled access control spills data on 200 million Americans. Maybe you?

    Once again, let’s all learn the lesson about improper access control being at the root of yet another information leak, shall we? As reported by the BBC and many others, the personal data of 200 million U.S. citizens was accidentally exposed online due to an improperly configured security setting. Here’s my favorite comment/quote from the story: "Since this event has come to our attention, we...
    • 19 Jul 2017

    Three Reasons I’m Inspired by Microsoft Inspire

    What a week! More than 17,000 attendees packed a convention center in Washington D.C. to hear Microsoft’s latest direction and connect with partners and ISVs from around the globe. Microsoft wasted no time getting down to business and delivered a week full of new initiatives and reinforced strategic direction for partners to execute. I walked away convinced Microsoft has the right vision to help customers –...
    • 18 Jul 2017

    Advantages of an Active Directory Auditing Agents

    Understanding the architecture of a product is vital for a customer in deciding if it is a good fit for their organization. Over the years, we've seen debates on whether agent-based or agent-less solutions are a better fit for organizations. A decision needs to be made whether or not the benefits of an agent merit its use. In my 15+ year tenure at Quest, we have released both agent-based and agent-less Active Directory...
    • 17 Jul 2017

    Windows Permissions and Security – Four Kinds of Dull Tasks We’ve Automated for You

    “It's easier to ask forgiveness than it is to get permission.” Maybe Rear Admiral Grace Hopper was first to say that , and maybe she wasn’t. She certainly knew a thing or two about permission . I think that if she’d known what network administrators go through, she’d have said that almost anything is easier than managing Windows permissions across an entire IT environment. In my previous...
    • 14 Jul 2017

    WWE Data Leak Lesson - Tighten Data Security or Face the Sweet Chin Music

    Data leaks and security breaches can happen to anyone, at any time. You never know when some jabroni is hiding under the wrestling ring with a steel chair, ready to attack and steal your data! The most recent example is the July 6 story from Forbes.com citing the massive WWE data leak, exposing 3 million global wrestling fans’ personal information, including home addresses, educational background, earnings and ethnicity...
    • 14 Jul 2017

    Windows Permissions and Access Control – Stick Shift or Automatic?

    If managing Windows permissions is like driving a car, would you rather have a stick shift or an automatic transmission? A stick shift is cool, and it makes you feel like a teenager again. Kind of like the Microsoft security tools you get inside Windows. “Looks like the guys in Finance are having trouble with inherited permissions,” you tell your colleagues importantly. “I’ll run subinacl on...
More Content