In this era of remote working, the adoption and popularity of Microsoft Teams is soaring. Unfortunately, many organizations enable Teams sprawl by allowing users to create Teams with no oversight or planning. This lack of governance leads to seldom-used or dead Teams, empty channels, and data scattered all over chats, channels and files tabs. In this white paper, you’ll learn:• […]
Read more ›Articles By: Quest
How to Migrate Exchange to Office 365: Step by Step
If you’re planning an Exchange to Office 365 migration, it can be quite confusing to determine which steps you need to take and in what order. In this guide, we’ll walk you through the steps and decisions you will need to take when migrating to Exchange Online in the Office 365 cloud. In this E-book, you’ll learn:• The key planning […]
Read more ›Managing Remote Workstations With Active Directory Domain Joins
Active Directory domain joins are an integral part of many IT modernization and security initiatives. These projects are complex and technically challenging. This is especially the case in enterprises with domain-joined devices that are remote to the corporate network. Recently, with the rapid advance of employees working from home intensifying this issue, the net result is that remote machines pose […]
Read more ›Maintaining the Health of Your Active Directory Infrastructure
Maintaining the health of your production AD environment is key to its performance, availability and security. The health of your AD infrastructure is also crucial for preventing roadblocks to significant IT changes like adding new applications, network upgrades, cloud migrations, or supporting a merger, acquisition or divestiture. This white paper is intended to provide insights on how to identify and […]
Read more ›Simplify Critical GPO Management and Governance Tasks
Group Policy Objects (GPOs) are critical for successful Microsoft Active Directory environments. One wrong GPO can inflict massive damage to the security of your network within minutes, and you have up to thousands of GPOs deployed across your environment. There’s huge potential for insider threat without the proper compensating security controls. Join this on-demand webcast, where Quest experts Matthew Vinton, […]
Read more ›Lessons Learned From a Recent Ransomware Recovery
Today’s headlines are filled with harrowing stories of successful ransomware attacks — and less than successful ransomware recovery efforts. However, some organizations do restore operations swiftly. What are their secrets? Read this white paper to learn about a ransomware attack on a global manufacturing company. Even though 17 Active Directory domain controllers across multiple continents were impacted and the passwords […]
Read more ›Exchange Server Exploits: How to Spot and Stop Vulnerabilities Resulting From HAFNIUM Attacks
True, false or maybe? • If you use Exchange Online, then HAFNIUM and the Exchange Server exploit do not affect you.• The most likely consequence of the exploit is credential dumping.• If you’ve been attacked through the exploit, the best practice is to rebuild Active Directory. Attacks against multiple vulnerabilities in Exchange Server have left system administrators like you scrambling […]
Read more ›Nine Best Practices to Improve Active Directory Security and Cyber Resilience
A little digging into the many recent, headline-grabbing data breaches reveals one common thread: It was often a lapse in internal security that enabled the attack to succeed, despite robust external security. Employees can use their access permissions to steal your data deliberately or put it in danger accidentally, and stolen credentials and weak passwords turn outside attackers into insiders […]
Read more ›