Ten Things to Know Before Deploying Active Directory. written by Dmitry Sotnikov. White Paper

Size: px
Start display at page:

Download "Ten Things to Know Before Deploying Active Directory. written by Dmitry Sotnikov. White Paper"

Transcription

1 Ten Things to Know Before Deploying Active Directory written by Dmitry Sotnikov White Paper

2 Abstract Active Directory migration raises many questions about the design of your new directory. As you attempt to wade through data and details, remember that planning is the key to a successful migration. This guide addresses ten questions you should ask before deploying Active Directory. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. However, because of the possibility of human or mechanical errors, Aelita Software does not guarantee the accuracy, adequacy, or completeness of any information in this publication, and is not responsible for any errors or omissions or the results obtained from use of such information. Unless otherwise noted, the example companies, organizations, products, people, and events depicted herein are fictitious. No association with any real company, organization, product, person, or event is intended or should be inferred. Aelita Software does not endorse or accept any responsibility for the content or usage of links and references to non-aelita Web sites or technical documentation. No part of this document may be reproduced, stored or transmitted in any form, by any means, or for any purpose, without the express written permission of Aelita Software Corporation. Aelita, Aelita Software, the Aelita Software Corporation logo, and all Aelita product names and slogans are either registered trademarks or trademarks of Aelita Software Corporation. Other product or company names mentioned herein may be trademarks of their respective owners. Copyright , Aelita Software Corporation. All rights reserved. Last revised March 18, 2003 AELITA SOFTWARE CORPORATION 6500 Emerald Parkway Suite 400 Columbus, Ohio 43016, Phone: Fax: URL: info@aelita.com

3 CONTENTS TEN THINGS TO KNOW BEFORE DEPLOYING ACTIVE DIRECTORY What s in My Current Directory? How Will My Groups Change? Are Permissions Correctly Assigned? What Sites Should I Create? Where Are Services Running? Do I Need to Do any Renaming? Do I Have Unnecessary User Accounts or Groups? Are Software and Hardware Upgrades Needed? What About Exchange? How Will I Monitor My Network Configuration During Migration? CONCLUSION ABOUT AELITA SOFTWARE CORPORATION Ten Things to Know Before Deploying Active Directory 3

4

5 TEN THINGS TO KNOW BEFORE DEPLOYING ACTIVE DIRECTORY Planning is the key to migrating successfully from Windows NT to Active Directory, whether you re deploying Windows 2000 or Windows Server Planning is also necessary if you are doing any major restructuring of your existing Active Directory design. Successful planning allows you to identify all the tasks you need to perform as part of the migration and create the Active Directory design that best meets your needs. Planning also helps ensure that you avoid the many potential pitfalls often associated with Active Directory deployment. But it s often difficult to do what we know is right. Despite all the reasons to the contrary, the planning stage is often rushed, incomplete or poorly done. Many factors contribute to poor planning, including: Inability to collect adequate and accurate data Limited experience or lack of information about the issues involved in a migration Project deadlines that do not allow for proper planning For a successful migration, you need to thoroughly inventory the domains, groups, users and permission structures in your current environment. The result of this inventory can help ensure that you do not migrate unnecessary data or unknowingly grant users permissions they should not have. Since the relationships among the objects in your environment can be complex, knowing details about your existing structure will save time and resources as you plan and execute your migration to Active Directory. To take full advantage of Active Directory s features, you might need to upgrade certain hardware and software in your current environment. Before the migration, you need to identify any computers, application software or devices that need to be upgraded. Again, identifying these resources as you plan the migration will save time and money and prevent future problems. This guide examines ten things you should know about your environment before beginning your migration to Active Directory. The guide includes sample reports from Aelita Enterprise Directory Reporter that illustrate the kind of information you need to ensure a smooth project and a successful deployment. Ten Things to Know Before Deploying Active Directory 5

6 1 What s in My Current Directory? Migration provides an opportunity to examine your current environment and identify design improvements that better meet the needs of your organization. Do you have groups of users with special administrative needs? Do policies require that certain groups or departments have restricted access to resources? In Active Directory, you do not need to maintain a directory structure based solely on physical geographic boundaries. Instead, you can create a logical directory structure that represents the operational structure of your organization. As you plan your new directory structure, consider how you will take advantage of Active Directory scalability features, delegation of administration and Group Policies. For example, Group Policies can have a significant influence on how you structure your domains and organizational units. Such changes to your directory structure might require you to split or merge domains, determine new administrative boundaries and create forests. For your new directory structure, consider the following design issues: Forests Although domains provide for security isolation, total security and administrative isolation is possible only in a multi-forest deployment. (For more information, see: Protecting Active Directory from Domain Trust Vulnerability at All the domains in a forest must share the same schema. If certain domains need different schemas, you must place them in different forests. Domains Active Directory domains are far more scalable than Windows NT domains, so you will likely merge some domains during Active Directory deployment. However, Active Directory domains still have size limitations, so you must analyze domain statistics before you decide to merge domains. Users who need different security or administrative policies (such as username and password restrictions) must reside in different domains. Since your new domain structure might not be based on geography, this might affect how you assign administrative privileges. 6 Ten Things to Know Before Deploying Active Directory

7 Organizational Units Active Directory does not require separate resource and account domains. You might want to merge resource and account domains and use organizational units to create separate containers for common objects within a domain. Since domains in Active Directory can hold many more objects than in Windows NT, you might be able to merge domains and use organizational units to delegate administration. Analyzing Your Current Domains Before you can begin planning your new directory structure, you need to analyze your current environment. Knowing your existing domain structure can help you determine your Active Directory design as well as define your migration strategy. In your current environment, you need to identify all your existing domains and gather information about each domain such as: The type of each domain (resource or account) All users, groups, domain controllers and resource servers associated with each domain The trust relationships between domains Once you have a complete understanding of your current domain structure, you can begin to make decisions about the forests, trees, domains and organizational units you need to create in Active Directory and which objects from your current directory (the source domains ) to move to these containers. Ten Things to Know Before Deploying Active Directory 7

8 A thorough analysis of your current domains is an essential first step in designing your new Active Directory and planning your migration. 2 How Will My Groups Change? Groups allow you to efficiently manage users and resources in your environment and are an important part of your directory design. Active Directory introduces a new kind of group (the universal group), as well as changes to the way groups work. For example, domain local groups can be used in Active Directory to set permissions on resources throughout the domain. As a result, you might want to migrate server local groups to domain local groups when you deploy Active Directory. Also, if you had set up file/print servers as domain controllers in NT to facilitate permissioning, you might want to demote these file/print servers to member servers in Active Directory and merge their domain local groups into the domain local group of the corresponding target domain in Active Directory. 8 Ten Things to Know Before Deploying Active Directory

9 To effectively plan your new Active Directory group configuration, you need to understand how groups differ in Windows NT and Active Directory. In Windows NT: Groups are only used for security purposes, to grant permissions on NT resources such as files, shares and printers. Instead of using groups, Exchange 5.5 uses distribution lists for mail distribution. Group scope is limited to global and local groups. Domain local groups can only be used to set permissions on domain controllers. In Active Directory: A group can be used for both security and distribution, which simplifies group administration. In addition to global and local groups, there are universal groups that can include members from multiple domains of a forest. Domain local groups can be used to set permissions on resources throughout the domain. Identifying Your Groups Since groups are different in Active Directory, you need to examine your existing groups and determine if any changes are needed. Understanding your groups is critical to maintaining users resource access and mail distribution during and after a migration. Group nesting can become complex, and you need to know your complete group structure to fully understand how permissions were assigned and to determine any changes you need to make. You can then begin to make decisions about your new group structure, such as group membership and groups to be combined or deleted. In your current environment, you need to identify all your existing groups and gather information about each group such as: The type of each group All users assigned to each group All references to each group Group nesting, such as users in global groups that are nested in local groups Exchange 5.5 distribution lists Ten Things to Know Before Deploying Active Directory 9

10 To ensure users maintain appropriate access to resources, you must fully understand your existing group structure, including nesting. Identify all mail distribution list members to plan universal groups in Active Directory. 10 Ten Things to Know Before Deploying Active Directory

11 Analyze your existing server local groups to decide whether to migrate them or merge them with domain local groups in Active Directory. Ten Things to Know Before Deploying Active Directory 11

12 3 Are Permissions Correctly Assigned? Migration can provide a good opportunity to review the permissions granted in your current environment and perform any necessary cleanup. Before migration, you need to determine if any users were assigned permissions they should not have and change any incorrect assignments to prevent them from being propagated to Active Directory. To reduce the impact of the migration on users, you need to ensure that permissions are reassigned correctly on network resources such as files, folders and printers. In addition, you should consider deleting groups that have no permissions assigned or merging groups that grant the same permissions. Identifying Permission Assignments To ensure that you maintain users access to resources during and after the migration, you need to analyze your current permissions structure. In your current environment, you need to identify: File, folder, share and printer permissions granted to users and groups throughout the directory Resources from one domain that users from another domain can access Users with administrative rights 12 Ten Things to Know Before Deploying Active Directory

13 Evaluate the permissions assigned to users and groups before your migration. Ten Things to Know Before Deploying Active Directory 13

14 4 What Sites Should I Create? While you create forests and domains to represent the logical structure of your network in Active Directory, you create sites to represent the physical structure of your network. The logical structure of a Windows NT 3.x 4.0 network almost always mirrors its physical structure. In Active Directory, however, the logical and physical structure of your network do not have to match. The trees and forests forming your organization s domain namespace represent your network s logical structure. To define the physical structure of your network, you must configure one or more site objects in Active Directory. Site objects are used to define areas of good network connectivity. To configure a site object in Active Directory, you associate a site with one or more TCP/IP subnets. Each TCP/IP subnet that you define for a site should share a high-bandwidth link (512Kbps or greater). In general, you will create a site object for each area of your network that is separated by low bandwidth. Sites determine how replication traffic is routed across your network. In Active Directory, all data is replicated between all domain controllers in a domain, but only certain data is replicated between domains. You can use sites to maximize the efficiency of replication in your network. 14 Ten Things to Know Before Deploying Active Directory

15 Identifying IP Subnets To plan your site structure, you need to know about the IP subnets in your current network. Most of the existing IP subnets are likely to become site objects in Active Directory. Identify IP subnets in your current network to plan your Active Directory sites. Ten Things to Know Before Deploying Active Directory 15

16 5 Where Are Services Running? As you plan your Active Directory structure, you need to be aware of the services currently running on your network servers. Changes to your network structure as well as upgrades to your operating system can affect these services. For example, if you are changing your DHCP and WINS configuration, you need to know what servers are running those services. Information on services is important for several reasons: Services such as DNS, DHCP and WINS are mission-critical and require special care during migration. For example, you might want to disable DHCP before migrating a server running this service. Services running under user accounts need to be updated as these accounts are disabled. If a user account is being used by a service, you do not want to disable that account without reassigning the service to the corresponding account in the target domain. Some services might be incompatible with Active Directory. You need to make sure that any services running in the new environment support Active Directory. 16 Ten Things to Know Before Deploying Active Directory

17 Identifying Services Knowing the services running in your network can help prevent unexpected problems during your migration. In your current environment, you need to identify information about services such as: Each service name The account used to run each service The computer running the service Know each service running on your servers to prevent network problems. Ten Things to Know Before Deploying Active Directory 17

18 6 Do I Need to Do any Renaming? There are several situations where you might need to change the names of user accounts, groups or computers in your new Active Directory. You need to be aware of these situations to prevent problems in Active Directory: Active Directory and Windows NT have different naming standards for computers, groups and user accounts. Some NT names might be prohibited in Active Directory, and these names need to be changed. Naming issues can arise when domains that contain objects with the same name are merged. This situation can be resolved in one of the following ways: If the objects incidentally used the same name, you can rename one of the objects during the migration. If the objects represent the same person (such as a person having an account in several domains) or group (two domains having groups for the same purposes, such as Sales), you can merge these user objects or groups during the migration. If the objects represent the same person, but one of the accounts is not required for some reason (such as multiple administrator accounts), you can delete one of the objects before migration or skip the object during migration. Analyzing Names To avoid naming conflicts in Active Directory, you must know the names of your existing directory objects. You can use this information to determine if there are objects you need to rename, merge or delete/skip. In your current environment, you need to identify: User accounts with the same name Groups with same name All computers, groups or users whose names are not allowed in Active Directory 18 Ten Things to Know Before Deploying Active Directory

19 Identify duplicate user accounts and groups to merge, rename or delete/skip. Identify directory objects whose names are not allowed in Active Directory. Ten Things to Know Before Deploying Active Directory 19

20 7 Do I Have Unnecessary User Accounts or Groups? Over time, your environment can become polluted with unused and disabled user accounts or empty groups. These accounts clutter your environment and confuse your inventory. More importantly, unused accounts are a security threat because rogue administrators can use them to carry out attacks without revealing their own identity. Migration to Active Directory is an opportunity to rid your network of such outdated data and security vulnerabilities. By deleting these user accounts and groups, you can also reduce the length and work load of the migration project. Identifying Unnecessary Groups Before migration, you also need to identify empty or unused groups that should not be migrated. Identify any empty or unused groups to be deleted or skipped. Identifying Unnecessary Accounts Before migration, you need to identify accounts that should not be migrated. In your current environment, you need to identify unnecessary accounts such as: Unused accounts Disabled accounts Expired accounts 20 Ten Things to Know Before Deploying Active Directory

21 Identify any unused, disabled or expired accounts to be deleted. Ten Things to Know Before Deploying Active Directory 21

22 8 Are Software and Hardware Upgrades Needed? To take full advantage of all the features of Active Directory, you might need to upgrade software and hardware in your network. As you plan your migration, you do not want forget the extra time, effort and cost required by these upgrades. Be prepared by considering the affect of these upgrades on your existing network. If you plan to reuse the hardware for domain controllers during the migration, you need to evaluate whether the existing hardware satisfies the requirements for Windows 2000/2003 domain controllers. Windows 9x and Windows NT prior to NT4 Service Pack 4 (SP4) do not fully support Active Directory features unless the Active Directory client software is installed on them. You need to locate such computers and decide whether to upgrade the operating system or to install the Active Directory client. If you decide to upgrade a computer s operating system, you also need to check hardware compatibility for those computers. Some hardware devices such as printers, video cards and modems might not be compatible with the new operating system. To help identify incompatible devices, Microsoft provides the Hardware Compatibility List (HCL). Older versions of software applications might not be compatible with the new operating system. Hardware and software upgrades affect the cost and timeframe for your migration project. As part of your migration plan, you need to estimate upgrade costs. 22 Ten Things to Know Before Deploying Active Directory

23 Identifying Computers Operating Systems For computers running older operating systems, you need to decide whether to upgrade the operating system or install the Active Directory client. In your current environment, you need to identify computers running Windows 9x or Windows NT prior to NT4 SP4. Identify computers running older operating systems. Ten Things to Know Before Deploying Active Directory 23

24 Identifying Installed Hardware Upgrades to a computer s operating system can affect hardware devices located on that computer. Before you upgrade, you need to ensure that computer devices such as printers, video cards and modems will function with the new operating system. In your current environment, you need to identify information such as: Computers to be upgraded Type of devices located on each computer Name of the device Manufacturer of the device Evaluate hardware devices on computers whose operating systems will be upgraded. 24 Ten Things to Know Before Deploying Active Directory

25 Identifying Installed Software You might also need to upgrade application software running on workstations and servers. Older versions of software might not be compatible with newer operating systems. In your current environment, you need to identify existing versions of application software and determine if this software is compatible with the operating system you will be running. Evaluate installed software to determine if upgrades are needed. Ten Things to Know Before Deploying Active Directory 25

26 Identifying Upgrade Costs To meet the requirements or recommendations for the operating system you are deploying, you might need to upgrade the processor, memory or hard disk on certain computers. Once you identify which computers do not meet the minimum requirements for the new operating system, you can determine your upgrade costs. In your current environment, you need to gather information such as: Computers to be upgraded Amount of memory on each computer Processor on each computer Amount of disk space (total, free) on each computer Determine the minimum requirements you want servers and workstations to meet and identify computers that don t meet those requirements. Combine this information with upgrade costs to estimate costs by computer, by domain and for your overall project. 9 What About Exchange? Your plan for a new Active Directory might also affect your Exchange messaging system. As part of your migration to Active Directory, you might choose to remain in Exchange 5.5, or you might migrate to Exchange 2000/ Ten Things to Know Before Deploying Active Directory

27 Remain in Exchange 5.5 Though you can continue to use Exchange 5.5 after you migrate to Active Directory, you must make sure that all the permissions set in the Exchange 5.5 directory for source NT accounts are granted to the new Active Directory accounts. Consideration must be made for the following: Users with multiple mailboxes Mailboxes with multiple permissions Mailboxes with alias names different than the primary account Permissions on public folders Identify Exchange 5.5 permissions for mailboxes, public folders and distribution lists. Ten Things to Know Before Deploying Active Directory 27

28 Migrate to Exchange 2000/2003 Unlike Exchange 5.5, Exchange 2000/2003 uses Active Directory instead of the Exchange Directory Service. Since Exchange 2000/2003 is tightly integrated with Active Directory, your decision to migrate to Exchange 2000/2003 could affect your Active Directory design. Migration to Exchange 2000/2003 is a complex process, but detailed planning can help ensure a successful migration. For example, your design can include only one Exchange 2000/2003 organization per Active Directory forest. Identify existing Exchange organizations to plan your Exchange 2000/2003 design. 10 How Will I Monitor My Network Configuration During Migration? After migration has begun, you should regularly review Active Directory permission assignments, including the use of groups and Group Policy, to help promote network security. During a migration, the movement of users and groups at different times and by different administrators can cause unintentional rights assignments. You need to identify any migrated users who received inappropriate rights. After the migration is complete, you need to continue to analyze Active Directory permissions and confirm compliance with applicable legal regulations and your organization s security policies. 28 Ten Things to Know Before Deploying Active Directory

29 Monitoring Administrative Rights in Active Directory In Active Directory, you need to monitor the membership of the Administrators group, including accounts obtaining membership in the group via other groups. You can use membership lists to ensure that only the users who need the permissions granted to a group are members of the group. In addition, you need to make sure you understand what users have been given administrative rights. To help ensure the security of your network, monitor who has administrative rights in Active Directory. Ten Things to Know Before Deploying Active Directory 29

30 Monitoring Group Memberships in Active Directory Group memberships can be difficult to track, which can result in inappropriate permission assignments. With a detailed list of groups, you can analyze the purpose of each group and refine access permission assignments in domains. After a migration, similar groups might be consolidated. With information about group membership, you can determine if any users or groups should have their membership revoked. Keep track of your groups and group memberships in Active Directory. 30 Ten Things to Know Before Deploying Active Directory

31 Monitoring Group Policy in Active Directory Group Policy makes it easy to control settings on Active Directory objects, including user accounts. However, setting up policies can be complex and difficult, with sometimes unplanned results. To analyze and improve the security of your systems, you need to determine what policy settings are in effect and which policies are applied to users and groups. Monitor Group Policies to protect your network. Monitoring Administration Delegation in Active Directory In Active Directory, most administration delegation is accomplished at the organizational unit level. After migration to Active Directory, especially after merging domains, you need to verify the administration delegation structure in your post-migration environment. Evaluate your delegation of administrative privileges in Active Directory. Ten Things to Know Before Deploying Active Directory 31

32 CONCLUSION By performing an inventory of your current directory, both before and after migration, you gain valuable information for planning your migration and designing your new Active Directory, while avoiding major problems that can occur. Your planning efforts can be greatly improved with tools that collect and report on configuration data and software and hardware inventory, such as Aelita Enterprise Directory Reporter (EDR). EDR automates data and inventory collection, which allows you to collect more complete and accurate data. As shown throughout this guide, EDR s predefined reports represent best practices and expert knowledge of migration and security. Using a tool such as EDR can help ensure a successful deployment of Active Directory in your Windows 2000 or Windows Server 2003 environment. For more information on EDR, visit the Aelita website at Or request a free consultation by contacting Aelita at consultation_request@aelita.com for personalized assistance from the experts in Active Directory management, migration and recovery. 32 Ten Things to Know Before Deploying Active Directory

33 ABOUT AELITA SOFTWARE CORPORATION Aelita Software provides systems management solutions to organizations that rely on Microsoft Windows technologies. Aelita s proven expertise with Active Directory and Exchange helps customers improve productivity, system availability and security. IT professionals choose Aelita solutions to administer, migrate, recover and audit these critical systems. The company s customers and partners include Bristol-Myers Squibb, HMS Host (formerly known as Host Marriott Services), Kmart Corporation, Pitney Bowes, Textron, Inc., Hewlett-Packard and Microsoft. Aelita is a global organization with headquarters in Columbus, Ohio. Contact Aelita at or visit Contacting Aelita Software Corporation: Web: Technical Support: Sales: General Inquiries: support@aelita.com sales@aelita.com services@aelita.com Phone: Fax: Aelita Software Corporation 6500 Emerald Parkway Suite 400 Columbus, Ohio USA Ten Things to Know Before Deploying Active Directory 33

8 Administering Groups

8 Administering Groups 8 Administering Groups Exam Objectives in this Chapter: Plan a security group hierarchy based on delegation requirements. Plan a security group strategy. Why This Chapter Matters As an administrator, you

More information

Quest Enterprise Reporter 2.0 Report Manager USER GUIDE

Quest Enterprise Reporter 2.0 Report Manager USER GUIDE Quest Enterprise Reporter 2.0 Report Manager USER GUIDE 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

1.0. Quest Enterprise Reporter Discovery Manager USER GUIDE

1.0. Quest Enterprise Reporter Discovery Manager USER GUIDE 1.0 Quest Enterprise Reporter Discovery Manager USER GUIDE 2012 Quest Software. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Designing and Operating a Secure Active Directory.

Designing and Operating a Secure Active Directory. Designing and Operating a Secure Active Directory Introduction Gil Kirkpatrick, CTO, NetPro Architect of NetPro Active Directory products Author of Active Directory Programming from SAMS Founder of the

More information

Windows Server 2003 Network Administration Goals

Windows Server 2003 Network Administration Goals Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts relating to Windows Server 2003 network management

More information

Advanced Security Measures for Clients and Servers

Advanced Security Measures for Clients and Servers Advanced Security Measures for Clients and Servers Wayne Harris MCSE Senior Consultant Certified Security Solutions Importance of Active Directory Security Active Directory creates a more secure network

More information

Microsoft Certified Solutions Expert (MCSE)

Microsoft Certified Solutions Expert (MCSE) Microsoft Certified Solutions Expert (MCSE) Installing and Configuring Windows Server 2012 (70-410) Module 1: Deploying and Managing Windows Server 2012 Windows Server 2012 Overview Overview of Windows

More information

Quest Collaboration Services 3.6. Installation Guide

Quest Collaboration Services 3.6. Installation Guide Quest Collaboration Services 3.6 Installation Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Microsoft Windows Server Administration Fundamentals. Download Full Version :

Microsoft Windows Server Administration Fundamentals. Download Full Version : Microsoft 98-365 Windows Server Administration Fundamentals Download Full Version : http://killexams.com/pass4sure/exam-detail/98-365 installation from a master computer to the destination computers. The

More information

Identity with Windows Server 2016

Identity with Windows Server 2016 Identity with Windows Server 2016 20742B; 5 days, Instructor-led Course Description This five-day instructor-led course teaches IT Pros how to deploy and configure Active Directory Domain Services (AD

More information

MCITP CURRICULUM Windows 7

MCITP CURRICULUM Windows 7 MCITP CURRICULUM 70-680 Windows 7 Installing, Upgrading, and Migrating to Windows 7 Describe the key features, editions, and hardware requirements of Windows 7 Perform a clean installation of Windows 7

More information

MCSE Server Infrastructure. This Training Program prepares and enables learners to Pass Microsoft MCSE: Server Infrastructure exams

MCSE Server Infrastructure. This Training Program prepares and enables learners to Pass Microsoft MCSE: Server Infrastructure exams MCSE Server Infrastructure This Training Program prepares and enables learners to Pass Microsoft MCSE: Server Infrastructure exams 1. MCSE: Server Infrastructure / Exam 70-413 (Designing and Implementing

More information

Domain Isolation Planning Guide for IT Managers

Domain Isolation Planning Guide for IT Managers Domain Isolation Planning Guide for IT Managers Microsoft Corporation Published: March 28, 2005 Author: James R. Morey Editor: Rosanne Newland Abstract Designed for enterprise IT managers who are investigating

More information

Novell ZENworks Asset Management 7

Novell ZENworks Asset Management 7 Novell ZENworks Asset Management 7 w w w. n o v e l l. c o m July 2006 INSTALLATION GUIDE Table Of Contents 1. Installation Overview... 1 Upgrade/Update Matrix...1 Installation Choices...2 ZENworks Asset

More information

Overview. Business value

Overview. Business value PRODUCT SHEET CA Top Secret for z/vse CA Top Secret for z/vse CA Top Secret for z/vse provides innovative and comprehensive security for business transaction environments which enable your business to

More information

Module 3: Managing Groups

Module 3: Managing Groups Module 3: Managing Groups Contents Overview 1 Lesson: Creating Groups 2 Lesson: Managing Group Membership 20 Lesson: Strategies for Using Groups 27 Lesson: Using Default Groups 44 Lab: Creating and Managing

More information

Abstract. Introduction

Abstract. Introduction Four Steps Toward Planning a Successful Email Migration How MessageStats Can Help You Understand and Clean Up Your Source Environment to Simplify Your Move Written by Joel Blaiberg, Dell Software Abstract

More information

Managing Group Policy application and infrastructure

Managing Group Policy application and infrastructure CHAPTER 5 Managing Group Policy application and infrastructure There is far more to managing Group Policy than knowing the location of specific policy items. After your environment has more than a couple

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure Designing and Implementing a Server Infrastructure Duration: 5 Days Course Code: 20413 About this course Get hands-on instruction and practice planning, designing and deploying a physical and logical Windows

More information

Authentication Services ActiveRoles Integration Pack 2.1.x. Administration Guide

Authentication Services ActiveRoles Integration Pack 2.1.x. Administration Guide Authentication Services ActiveRoles Integration Pack 2.1.x Administration Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

WHITEPAPER A Selection Guide to Binary Tree s Directory Synchronization Software

WHITEPAPER A Selection Guide to Binary Tree s Directory Synchronization Software WHITEPAPER A Selection Guide to Binary Tree s Directory Synchronization Software Table of Contents Introduction... 3 Binary Tree Directory Synchronization Software Products... 4 Directory Sync Pro... 4

More information

Windows Server Security Best Practices

Windows Server Security Best Practices University Information Technology Services Windows Server Security Best Practices Page 1 of 13 Initial Document Created by: 2009 Windows Server Security Best Practices Committee Document Creation Date:

More information

COURSE OUTLINE: 20413C Designing and Implementing a Server Infrastructure

COURSE OUTLINE: 20413C Designing and Implementing a Server Infrastructure Course Name Course Duration Course Structure Course Overview 20413C Designing and Implementing a 5 Days Instructor-Led Get hands-on instruction and practice planning, designing and deploying a physical

More information

Identity with Windows Server 2016

Identity with Windows Server 2016 Identity with Windows Server 2016 Course 20742B - 5 Days - Instructor-led, Hands on Introduction This five-day instructor-led course teaches IT Pros how to deploy and configure Active Directory Domain

More information

One Identity Active Roles 7.2. Replication: Best Practices and Troubleshooting Guide

One Identity Active Roles 7.2. Replication: Best Practices and Troubleshooting Guide One Identity Active Roles 7.2 Replication: Best Practices and Troubleshooting Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The

More information

Microsoft Certified System Engineer

Microsoft Certified System Engineer 529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Microsoft Certified System Engineer Program Summary This instructor-led program with a combination

More information

70-742: Identity in Windows Server Course Overview

70-742: Identity in Windows Server Course Overview 70-742: Identity in Windows Server 2016 Course Overview This course provides students with the knowledge and skills to install and configure domain controllers, manage Active Directory objects, secure

More information

TestOut Server Pro 2016: Install and Storage English 4.0.x LESSON PLAN. Revised

TestOut Server Pro 2016: Install and Storage English 4.0.x LESSON PLAN. Revised TestOut Server Pro 2016: Install and Storage English 4.0.x LESSON PLAN Revised 2018-01-30 2 Table of Contents Introduction Section 1.1: Windows as a Server... 5 Section 1.2: Windows Server 2012 Interface

More information

One Identity Active Roles 7.2. Product Overview Guide

One Identity Active Roles 7.2. Product Overview Guide One Identity Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Deploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs)

Deploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs) Deploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs) Microsoft Corporation Published: June 2004 Abstract This white paper describes how to configure

More information

FREQUENTLY ASKED QUESTIONS FOR VERSION 4.0

FREQUENTLY ASKED QUESTIONS FOR VERSION 4.0 FREQUENTLY ASKED QUESTIONS FOR VERSION 4.0 SETUP What are the system requirements for Microsoft Interactive Training Version 4.0? Server Pentium II 400 processor 256 megs of RAM 4 Gigabyte Hard Drive (Mirrored)

More information

Real-time Protection for Microsoft Hyper-V

Real-time Protection for Microsoft Hyper-V Real-time Protection for Microsoft Hyper-V Introduction Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate of customer adoption. Moving resources to

More information

Table Of Contents INTRODUCTION... 6 USER GUIDE Software Installation Installing MSI-based Applications for Users...9

Table Of Contents INTRODUCTION... 6 USER GUIDE Software Installation Installing MSI-based Applications for Users...9 Table Of Contents INTRODUCTION... 6 USER GUIDE... 8 Software Installation... 8 Installing MSI-based Applications for Users...9 Installing EXE-based Applications for Users...10 Installing MSI-based Applications

More information

M20742-Identity with Windows Server 2016

M20742-Identity with Windows Server 2016 M20742-Identity with Windows Server 2016 Course Number: M20742 Category: Technical Microsoft Duration: 5 days Certification: 70-742 Overview This five-day instructor-led course teaches IT Pros how to deploy

More information

DefendX Software Control-Audit for Hitachi Installation Guide

DefendX Software Control-Audit for Hitachi Installation Guide DefendX Software Control-Audit for Hitachi Installation Guide Version 4.1 This guide details the method for the installation and initial configuration of DefendX Software Control-Audit for NAS, Hitachi

More information

Managing Group Policy application and infrastructure

Managing Group Policy application and infrastructure CHAPTER 5 Managing Group Policy application and infrastructure There is far more to managing Group Policy than knowing the location of specific policy items. After your environment has more than a couple

More information

Planning and Deploying System Center 2012 Configuration Manager

Planning and Deploying System Center 2012 Configuration Manager Planning and Deploying System Center 2012 Configuration Manager 10748C; 3 days, Instructor Led Course Description Get detailed instruction and hands-on practice planning and deploying Microsoft System

More information

CorpSystem Workpaper Manager

CorpSystem Workpaper Manager CorpSystem Workpaper Manager Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced

More information

Module 7: Implementing Sites to Manage Active Directory Replication

Module 7: Implementing Sites to Manage Active Directory Replication Module 7: Implementing Sites to Manage Active Directory Replication Contents Overview 1 Lesson: to Active Directory Replication 2 Lesson: Creating and Configuring Sites 14 Lesson: Managing Site Topology

More information

Designing and Implementing a Server 2012 Infrastructure

Designing and Implementing a Server 2012 Infrastructure Designing and Implementing a Server 2012 Infrastructure Course 20413C 5 Days Instructor-led, Hands-on Introduction This 5-day instructor-led course provides you with the skills and knowledge needed to

More information

What s in Installing and Configuring Windows Server 2012 (70-410):

What s in Installing and Configuring Windows Server 2012 (70-410): What s in Installing and Configuring Windows Server 2012 (70-410): The course provides skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment.

More information

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database MOC 6232A: Implementing a Microsoft SQL Server 2008 Database Course Number: 6232A Course Length: 5 Days Course Overview This course provides students with the knowledge and skills to implement a Microsoft

More information

PROPOSAL OF WINDOWS NETWORK

PROPOSAL OF WINDOWS NETWORK PROPOSAL OF WINDOWS NETWORK By: Class: CMIT 370 Administering Windows Servers Author: Rev: 1.0 Date: 01.07.2017 Page 1 of 10 OVERVIEW This is a proposal for Ear Dynamics to integrate a Windows Network

More information

SEVENMENTOR TRAINING PVT.LTD

SEVENMENTOR TRAINING PVT.LTD Installing and Configuring Windows Server 2012 Module 1: Deploying and Managing Windows Server 2012 This module introduces students to the editions of Windows Server 2012 and the new Windows Server 2012

More information

Campus Network Design. 2003, Cisco Systems, Inc. All rights reserved. 2-1

Campus Network Design. 2003, Cisco Systems, Inc. All rights reserved. 2-1 Campus Network Design 2003, Cisco Systems, Inc. All rights reserved. 2-1 Design Objective Business Requirement Why do you want to build a network? Too often people build networks based on technological,

More information

EMC CLARiiON CX3-40. Reference Architecture. Enterprise Solutions for Microsoft Exchange 2007

EMC CLARiiON CX3-40. Reference Architecture. Enterprise Solutions for Microsoft Exchange 2007 Enterprise Solutions for Microsoft Exchange 2007 EMC CLARiiON CX3-40 Metropolitan Exchange Recovery (MER) for Exchange Server Enabled by MirrorView/S and Replication Manager Reference Architecture EMC

More information

Gathering Information and Analyzing Requirements

Gathering Information and Analyzing Requirements 3 Gathering Information and Analyzing Requirements............................................... Terms you ll need to understand: Scope Centralized organizational model Decentralized organizational model

More information

20742: Identity with Windows Server 2016

20742: Identity with Windows Server 2016 Course Content Course Description: This five-day instructor-led course teaches IT Pros how to deploy and configure Active Directory Domain Services (AD DS) in a distributed environment, how to implement

More information

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security 10.6.0 - Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Campus Network Design

Campus Network Design Modular Network Design Campus Network Design Modules are analogous to building blocks of different shapes and sizes; when creating a building, each block has different functions Designing one of these

More information

Course 20410D: Installing and Configuring Windows Server 2012

Course 20410D: Installing and Configuring Windows Server 2012 Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course 20410D: Installing and Configuring Windows Server 2012 Course Specifications

More information

Windows Server 2008 Administration

Windows Server 2008 Administration Hands-On Course Description This course provides hands on experience installing and configuring Windows Server 2008 to work with clients including Windows Vista. Students will perform full and core CD-based

More information

Xcalibur Global Version Rev. 2 Administrator s Guide Document Version 1.0

Xcalibur Global Version Rev. 2 Administrator s Guide Document Version 1.0 Xcalibur Global Version 1.1 - Rev. 2 Administrator s Guide Document Version 1.0 September 2006 COPYRIGHT NOTICE 2006 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd. All rights reserved. This product

More information

StoneGate IPsec VPN Client Release Notes for Version 4.3.1

StoneGate IPsec VPN Client Release Notes for Version 4.3.1 StoneGate IPsec VPN Client Release Notes for Version 4.3.1 Created: October 13, 2008 Table of Contents What s New... 3 System Requirements... 4 Build Version... 4 Product Binary Checksums... 4 Compatibility...

More information

Oracle. Applications Cloud Using Functional Setup Manager. Release 13 (update 18A)

Oracle. Applications Cloud Using Functional Setup Manager. Release 13 (update 18A) Oracle Applications Cloud Release 13 (update 18A) Release 13 (update 18A) Part Number E92071-02 Copyright 2011-2018, Oracle and/or its affiliates. All rights reserved. Authors: Sandesh Posa, Mary Kalway

More information

SharePoint Migration Cleanup and Pre-Migration Checklist for Success

SharePoint Migration Cleanup and Pre-Migration Checklist for Success SharePoint Migration Cleanup and Pre-Migration Checklist for Success CONTENTS INTRODUCTION...3 PRE-MIGRATION OF USERS AND GROUPS...3 Identify Influential Users...3 Remove Orphan Users...4 Cleanup Unused

More information

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services (Course 6425A)

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services (Course 6425A) Duration Five days Introduction This five-day instructor-led course provides to teach Active Directory Technology Specialists with the knowledge and skills to configure in a distributed environment, implement

More information

Sage SQL Gateway Installation and Reference Guide

Sage SQL Gateway Installation and Reference Guide Sage SQL Gateway Installation and Reference Guide IMPORTANT NOTICE This document and the Sage 300 Construction and Real Estate software may be used only in accordance with the Sage 300 Construction and

More information

METHODOLOGY This program will be conducted with interactive lectures, PowerPoint presentations, discussions and practical exercises.

METHODOLOGY This program will be conducted with interactive lectures, PowerPoint presentations, discussions and practical exercises. CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: IDENTITY WITH WINDOWS SERVER 2016 Course 20742: 5 days; Instructor-Led INTRODUCTION This five-day instructor-led course teaches IT Pros how to deploy and configure

More information

Virtual Recovery Assistant user s guide

Virtual Recovery Assistant user s guide Virtual Recovery Assistant user s guide Part number: T2558-96323 Second edition: March 2009 Copyright 2009 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company makes no warranty of any kind

More information

An Oracle White Paper September Security and the Oracle Database Cloud Service

An Oracle White Paper September Security and the Oracle Database Cloud Service An Oracle White Paper September 2012 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database

More information

Netwrix Auditor for Active Directory

Netwrix Auditor for Active Directory Netwrix Auditor for Active Directory Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

COPYRIGHTED MATERIAL. Contents

COPYRIGHTED MATERIAL. Contents Contents Introduction... xxi Chapter 1 Installing Windows Small Business Server 2008...1 Windows Small Business Server 2008 Overview...1 What s Included in SBS 2008?...2 Limitations of Small Business Server

More information

HP Database and Middleware Automation

HP Database and Middleware Automation HP Database and Middleware Automation For Windows Software Version: 10.10 SQL Server Database Refresh User Guide Document Release Date: June 2013 Software Release Date: June 2013 Legal Notices Warranty

More information

One Identity Manager Administration Guide for Connecting to SharePoint Online

One Identity Manager Administration Guide for Connecting to SharePoint Online One Identity Manager 8.0.1 Administration Guide for Connecting to Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

One Identity Manager 8.0. Administration Guide for Connecting to Azure Active Directory

One Identity Manager 8.0. Administration Guide for Connecting to Azure Active Directory One Identity Manager 8.0 Administration Guide for Connecting to Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Lab # 5 Managing Groups

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Lab # 5 Managing Groups Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Lab # 5 Managing Groups Network Lab # 5 Managing Groups Objective: Learn about groups and where to create

More information

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide Microsoft Office Groove Server 2007 Groove Manager Domain Administrator s Guide Copyright Information in this document, including URL and other Internet Web site references, is subject to change without

More information

Installing and Configuring Windows Server 2012

Installing and Configuring Windows Server 2012 Installing and Configuring Windows Server 2012 Course 20410C - Five days - Instructor-led - Hands-on Introduction Get hands-on instruction and practice installing and configuring Windows Server 2012, including

More information

Microsoft - Configuring Windows Server 2008 Active Directory Domain Services (M6425)

Microsoft - Configuring Windows Server 2008 Active Directory Domain Services (M6425) Microsoft - Configuring Windows Server 2008 Active Directory Domain Services (M6425) Code: 6123 Lengt h: URL: 5 days View Online In this comprehensive course you will not only discuss the crucial concepts

More information

Active Directory trust relationships

Active Directory trust relationships Active Directory trust relationships A trust relationship consists of two domains and provides the necessary configuration between them to grant security principals on one side of the trust permission

More information

One Identity Manager 8.0. Administration Guide for Connecting to Cloud Applications

One Identity Manager 8.0. Administration Guide for Connecting to Cloud Applications One Identity Manager 8.0 Administration Guide for Connecting to Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

An AlgoSec Whitepaper MANAGE SECURITY AT THE SPEED OF BUSINESS

An AlgoSec Whitepaper MANAGE SECURITY AT THE SPEED OF BUSINESS An AlgoSec Whitepaper MANAGE SECURITY AT THE SPEED OF BUSINESS The Need to Reduce Complexity of Firewall Policies Firewalls continue to be the first line of defense, handling vast amounts of traffic across

More information

Technical MCSE. Content:

Technical MCSE.   Content: www.whanet.co.uk Technical MCSE Content: Foreword...1 Module Outline...2 Exchange Server 4.0 Series...2 Exchange Server 5.0 Series (Exam 70-076)...3 Exchange Server 5.5 Series...5 IIS 4 Series...7 Networking

More information

MySQL for Database Administrators Ed 4

MySQL for Database Administrators Ed 4 Oracle University Contact Us: (09) 5494 1551 MySQL for Database Administrators Ed 4 Duration: 5 Days What you will learn The MySQL for Database Administrators course teaches DBAs and other database professionals

More information

One Identity Manager Administration Guide for Connecting to SharePoint

One Identity Manager Administration Guide for Connecting to SharePoint One Identity Manager 8.0.2 Administration Guide for Connecting to Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

One Identity Manager Administration Guide for Connecting Oracle E-Business Suite

One Identity Manager Administration Guide for Connecting Oracle E-Business Suite One Identity Manager 8.0.2 Administration Guide for Connecting Oracle E- Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Four Essential Steps for Removing Risk and Downtime from Your POWER9 Migration

Four Essential Steps for Removing Risk and Downtime from Your POWER9 Migration Four Essential Steps for Removing Risk and Downtime from Your POWER9 Migration Syncsort Four Essential Steps for Removing Risk and Downtime from Your POWER9 Migration With the introduction of IBM s POWER9

More information

4.0. Quick Start Guide

4.0. Quick Start Guide 4.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished

More information

x CH03 2/26/04 1:24 PM Page

x CH03 2/26/04 1:24 PM Page 03 078973107x CH03 2/26/04 1:24 PM Page 45 3............................................. Setting Up, Managing, and Troubleshooting Security Accounts and Policies 1. You re a help desk technician for your

More information

PRAGATHI TECHNOLOGIES BTM Marathahalli Ph:

PRAGATHI TECHNOLOGIES BTM Marathahalli Ph: PRAGATHI TECHNOLOGIES BTM Marathahalli Ph: 97420-95494 Course 20413C: Designing and Implementing a Server Infrastructure Course Outline Module 1: Planning Server Upgrade and Migration This module explains

More information

Quest Migration Manager Tips and Tricks

Quest Migration Manager Tips and Tricks Quest Migration Manager 8.14 Tips and Tricks 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

CISNTWK-11. Microsoft Network Server. Chapter 4

CISNTWK-11. Microsoft Network Server. Chapter 4 CISNTWK-11 Microsoft Network Server Chapter 4 User and Group Accounts 1 Usage Notes Throughout these slides, the term Active Directory Domain implies Domains Based on Windows Server 2008 Based on Windows

More information

Identity with Windows Server 2016 (20742)

Identity with Windows Server 2016 (20742) Identity with Windows Server 2016 (20742) Formato do curso: Presencial Preço: 1630 Duração: 35 horas This five-day instructor-led course teaches IT Pros how to deploy and configure Active Directory Domain

More information

10 Hidden IT Risks That Might Threaten Your Business

10 Hidden IT Risks That Might Threaten Your Business (Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

WatchGuard XTMv Setup Guide

WatchGuard XTMv Setup Guide WatchGuard XTMv Setup Guide All XTMv Editions Copyright and Patent Information Copyright 1998 2011 WatchGuard Technologies, Inc. All rights reserved. WatchGuard, the WatchGuard logo, LiveSecurity, and

More information

Marketing List Manager 2011

Marketing List Manager 2011 Marketing List Manager 2011 i Marketing List Manager 2011 CRM Accelerators 6401 W. Eldorado Parkway, Suite 106 McKinney, TX 75070 www.crmaccelerators.net Copyright 2008-2012 by CRM Accelerators All rights

More information

NETLOGIC TRAINING CENTER

NETLOGIC TRAINING CENTER NETLOGIC TRAINING CENTER Course Training Designing Implementing a Server (70-413) Course Content This five-day course to get hs-on instruction practice planning, designing deploying a physical logical

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 General Information: info@cionsystems.com Online Support: support@cionsystems.com Copyright 2017 CionSystems Inc., All Rights Reserved

More information

One Identity Manager 8.0. Administration Guide for Connecting Unix-Based Target Systems

One Identity Manager 8.0. Administration Guide for Connecting Unix-Based Target Systems One Identity Manager 8.0 Administration Guide for Connecting Unix- Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Course 10233: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010

Course 10233: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Course 10233: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Page 1 Course 10233: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 4 days;

More information

DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE

DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE Education and Support for SharePoint, Office 365 and Azure www.combined-knowledge.com COURSE OUTLINE DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE Microsoft Course Code 20413 About this course Get

More information

Netwrix Auditor for Active Directory

Netwrix Auditor for Active Directory Netwrix Auditor for Active Directory Quick-Start Guide Version: 6.5 9/26/2014 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Copyright 2010 Digiliant, LLC. All Rights Reserved.

Copyright 2010 Digiliant, LLC. All Rights Reserved. User s Guide Copyright 2010 Digiliant, LLC. All Rights Reserved. This User s Guide is provided AS-IS and Digiliant, LLC makes no warranty as to its accuracies or use. Any use of this documentation or the

More information

At Course Completion: Course Outline: Course 20742: Identity with Windows Server Learning Method: Instructor-led Classroom Learning

At Course Completion: Course Outline: Course 20742: Identity with Windows Server Learning Method: Instructor-led Classroom Learning Course Outline: Course 20742: Identity with Windows Server 2016 Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: This five-day instructor-led course teaches IT

More information

Benefits of an Exclusive Multimaster Deployment of Oracle Directory Server Enterprise Edition

Benefits of an Exclusive Multimaster Deployment of Oracle Directory Server Enterprise Edition An Oracle White Paper February 2012 Benefits of an Exclusive Multimaster Deployment of Oracle Directory Server Enterprise Edition Disclaimer The following is intended to outline our general product direction.

More information

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Course No.10233B 5 Days Instructor-led, Hands-on Introduction This five-day, instructor-led course provides you with the

More information

Windows* 2003 Cluster Implementation Guide for the Intel RAID controller SRCU42X

Windows* 2003 Cluster Implementation Guide for the Intel RAID controller SRCU42X Windows* 2003 Cluster Implementation Guide for the Intel RAID controller SRCU42X Revision 1.0 May 2003 Enterprise Platforms and Services Marketing Disclaimers Information in this document is provided in

More information

Symantec System Recovery 2013 Management Solution FAQ

Symantec System Recovery 2013 Management Solution FAQ WHITE PAPER: SYMANTEC SYSTEM RECOVERY 2013 MANAGEMENT.............. SOLUTION......... FAQ................. Symantec System Recovery 2013 Management Solution FAQ Who should read this paper This paper answers

More information

Tanium Integrity Monitor User Guide

Tanium Integrity Monitor User Guide Tanium Integrity Monitor User Guide Version 1.2.4 February 20, 2018 The information in this document is subject to change without notice. Further, the information provided in this document is provided

More information