Here’s a few women from history that I’d to honor, because in a lot of ways they contributed to myself being where I am today – a woman in technology. I learned about of these women while reading Goodnight Stories for Rebel Girls by Elena…
Here’s a few women from history that I’d to honor, because in a lot of ways they contributed to myself being where I am today – a woman in technology. I learned about of these women while reading Goodnight Stories for Rebel Girls by Elena…
Enterprise Reporter 3.0 Hotfix #1 is a maintenance release that addresses the issues noted below as well in the attached Read Me. This release is cumulative, meaning that if version 3.0 is installed, you can safely install the version found in this solution…
Thinking of moving to Office 365? Or maybe you’re already in the process of planning an Office 365 migration? If so, you’re in good company. Microsoft reports that more than half of all its business Office users are already using Office 365…
Office 365 Groups can be a very powerful collaboration feature that lets users choose a set of people that they wish to collaborate with, and easily set up a collection of resources for those people to share, such as an Exchange Online shared mailbox…
Ladies and Gentlemen, let me introduce to you a malicious USB cable. You probably met him during your last corporate conference in that nice hotel lobby... I'm kidding of course, or am I?
https://twitter.com/_MG_/status/949684949614907395
I have a…
On April 11, 2017, Microsoft Exchange Server 2007 went End of Life and is no longer supported by Microsoft as mentioned on the Exchange Server 2007 Road Map page.
What is the impact on Quest Unified Communications Analytics (UCA) and how can you use UCA…
In Notes, there are many locations where your end-user’s contacts or Personal Address Books (PABs) could be stored. The inconsistent storage locations of Notes data can create a very challenging environment for the migration administrator. Luckily, Migrator…
Both Exchange and Office 365 have the option to provide users with two separate mailboxes. First, there is the normal “User Mailbox”, which is typically used on an everyday basis and is housed on high performance storage media. Second, is the “User Archive…
Although migrating Active Directory with a trust is ideal, there are times where this is not possible. Trusts make it possible to resolve objects’ security identifiers (SIDs), which in turn helps to distinguish objects and check that everything is going…
Purpose
This blog is designed to show you how to apply rules to users or groups and how to confirm the policies were actually applied to the users.
Pre-requisites
There are some pre-requisites that will be required for part of this testing. Listed below…
Early use of MAPI
Historically, Quest Migration Manager for Exchange had relied upon the use of MAPI connections to MS Exchange to extract and migrate mail content. This agent architecture built using MAPI as its connection to Exchange (known as the legacy…
One of the most important technologies built into InTrust is a special event repository which reduces costs and efforts required to store and manage huge volume of events. InTrust can reduce storage requirements considerably, 20:1 for indexed data…
We are excited to announce a new version of Migrator for Notes to SharePoint 6.11 is now available for download.
Look what's new:
Organizations that are undergoing mergers, acquisitions or want to consolidate Office 365 tenants need a fast, safe and easy way to migrate or merge tenants. If done manually, there is a chance that accounts, mailboxes, directories or messages could get…
Migrating to a new mail system presents a great opportunity to "clean up" old data. In support of this goal, Migrator for Notes to Exchange (MNE) provides considerable flexibility in how and where data can be migrated. MNE allows you to migrate data into…
Check out our recent webcast entitled, Preparing for the Disgruntled Privileged User — Three Ways They Can Hose Your Environment in Minutes with Brian Hymer, Strategic Systems Consultant and windows security expert, Randy Franklin Smith. Brian and…
I’ve had so many customers — and even engineering colleagues — ask me how to get the most out of their Quest Secure Copy implementation that I thought it was time to write up a few best practices.
You know that Secure Copy is an automated…
DisasterRecoveryLady here; did you miss me? The year’s only half over, and we’ve already seen a ton of ransomware and viruses being spread through email. What’s worse, the attacks keep getting more sophisticated! For example, the Ve…
Think of all the places in your environment where Windows permissions are located: Windows file servers, Exchange mailboxes, SharePoint sites, SQL Server databases, NAS/SAN filers . . . the list goes on.
Now think about the security scenarios that boil…
Every Wednesday in May, we’re hosting a live four-part webcast series, How to Overcome Common Hybrid AD and Cloud Security Challenges. The webcast series features a fictional character, Hank the Hacker, who represents hackers that appear in many…
Organizations like yours are sprinting to Microsoft cloud services, such as Office 365 and Azure Active Directory (AD). But as your cloud — and hybrid — footprint expands, so does your security risk. That’s because in a hybrid…