5 Group Policy Management Capabilities You re Missing

Size: px
Start display at page:

Download "5 Group Policy Management Capabilities You re Missing"

Transcription

1 5 Group Policy Management Capabilities You re Missing Don Jones w w w. s c r i p t l o g i c. c o m / s m b I T

2 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic Corporation in the United States of America and other countries. All other trademarks and registered trademarks are property of their respective owners. 2 5 Group Policy Management Capabilities You re Missing

3 I like to refer to Group Policy as insidious. Not because it s bad! Actually, it s quite the opposite: Group Policy provides such a useful and unmatched set of management capabilities that we all started using it almost as soon as it was available, and in many cases without putting any kind of management practices or capabilities in place first. Sure, today many companies have things like change control processes wrapped around Group Policy, but those processes often went into place after - sometimes long after - Group Policy was already a mission-critical part of the business. While Microsoft has done a great job of enhancing Group Policy s reach and scope with each new version of Windows, they haven t focused on providing the business-class management tools we need to support best practices in managing and supporting Group Policy. That simply means that you ll often need to look outside the box for tools that help provide and enforce those best practices. Here are five distinct capabilities you should add to your Group Policy tool belt: Backup and Recovery It should go without saying that you should be backing up your GPOs - but let s say it anyway: You ought to be backing up your GPOs. Keep in mind that a normal Active Directory backup won t grab your actual GPOs; it just grabs the links between the GPOs and the OUs, sites, and domains within Active Directory. The GPOs themselves live in separate files, and must be backed up independently. There s a bit more to a good backup and recovery plan than just backing up the GPO files. In general, I like to see solutions that can do so automatically, and that can break open the GPO files to analyze the individual settings within. I want to be able to compare backups of a GPO to another backup, or to the active version of the GPO (see more under Comparison, below) so that I can tell what s changed. Before performing any kind of recovery, I always want to see a full report of exactly what I m recovering, so that there aren t any surprises. For example, one time I ran into a problem where another administrator had improperly made a ton of changes to a GPO, and I needed to roll them back. I knew we d pulled a backup of that particular GPO three or four days prior, so I pulled the backup and restored it. What I didn t know is that another administrator had been tinkering with the GPO before the backup was made, so while I was undoing one set of unwanted changes, I was restoring another set. Cue gnashing of teeth and yelling at colleagues. The only solution was to stick with the backup - which was marginally less messed-up than where I d started - and manually edit out all of the unwanted settings. Of course, it took us a few weeks to actually discover all of the unwanted settings, but that s another story. Restoring a GPO shouldn t require you to take a domain controller offline or anything else impactful, so shy away from solutions and techniques that might require you to do so. And yes, the Group Policy Management Console (GPMC) can backup and restore GPOs, but it doesn t do so automatically, so I don t like to use it. Anything you have to remember to use, won t get used when you need it most. As of Windows Server 2008 R2, you could also use a scheduled Windows PowerShell script to run GPO backups - and even to initiate a GPO restore. That s fine, except for two things: First, it s not a managed process. If it fails to run, you won t know unless you check, which you ll forget to do at some point. Second, it s just a backup, without the additional capabilities for managing and comparing backups that you really ought to have in place. 3 5 Group Policy Management Capabilities You re Missing

4 Change Control Workflow Saying that you have a change management process for GPOs is fine - but does everyone really follow it, all the time, every time they need to change a GPO? Possibly not. And, without the right tools in place, a manuallymanaged change control process is not only a pain in the neck, it s incredibly error-prone. Administrator proposes a change - perhaps in an , or in a help desk ticket. Another administrator reviews the change and approves it, or whatever your process requires. First administrator implements the change - but sneaks in another one, or makes an error in implementing the change. Boom: Problems occur, and your change management process didn t do a thing to stop them, which is supposed to be the whole point of the process! No, the only way to properly manage change in Group Policy is to have a set of management tools that can be customized to enforce your desired process, while automating the error-prone bits. With the right tools, an administrator proposes changes by actually making them. The management software intercepts those changes before they re applied to a live GPO, and runs them through your workflow. Other people review, approve, and so forth, and when the final approval is given the change is implemented automatically - so the change is exactly what was proposed, with no extra bits stuck in, and with no errors. Good tools may even let you schedule an approved change for implementation during a maintenance window, and a really good tool will provide one-click rollback to the previous version of the GPO in case it turns out you don t like the change after all. Version control is an implicit part of change management for me, but it s not something you ll find in every tool. Whether a tool achieves version control through some fancy database or by simply making and indexing GPO backups doesn t matter. The point is that a change management tool must automate the process of maintaining versions of each approved GPO, and should make it easy to rollback to any previous version at any time. Comparison Part of version control, of course, is being able to compare versions to see what s changed between them. There are numerous uses for this, including auditing (which I ll discuss in the next section). It s true that you can do this kind of comparison using the Group Policy PowerShell cmdlets in Windows Server 2008 R2, but it s a bit complicated, and the results aren t necessarily attractive or conducive to the management uses you ll be employing. I prefer to use tools that can produce an easy-to-read report that lists all of the differences between any two GPOs. I want to be able to compare an active GPO, a backup, or a previous version of a GPO (which may in fact just be a backup file, which is fine). I might want to compare two live GPOs - such as in a merger situation, where I need to produce a new GPO that combines elements of two existing ones - and I might need to compare two GPOs from entirely different domains. There s nothing inherently domain-specific about a GPO (keep in mind that it s just a file, not actually stored in the directory), so a good tool should provide that kind of cross-domain capability. While I m always appreciative of any easy-to-read comparison report, I ve seen tools that produce really neat interactive HTML reports that are very cool. By using simple embedded Javascript to create expandable and collapsible sections, these reports make it a bit easier to browse through a lot of differences, much as if you were looking at a delta GPO in the GPMC itself. Some comparison tools don t use a report per se, but rather provide you with a graphical user interface that can be used to explore the differences between a couple of GPOs. Some tools go even further, allowing you to copy specific differences from one GPO to the other (when the other is a live GPO, of course, and not a backup or previous version), although I only like that kind of capability when it s 4 5 Group Policy Management Capabilities You re Missing

5 integrated with a change management system. In other words, I don t want to just copy settings from one GPO to another; I want to propose changes that then go through my normal change review-and-approval workflow. Frankly, I m usually satisfied with (and get the most use from) a straightforward, easy-to-use comparison tool. Change Auditing This is my number one, must-have GPO feature - and one that very few companies actually think about at first. If you think about how GPOs are physically implemented, you ll realize that there s almost no auditing whatsoever on the GPO itself. Auditing occurs entirely within Active Directory, and only for the bits that are stored in the directory: GPO links. Change a setting in a GPO, however, and there s no record of who made the change, what was changed, what things looked like before the change, and so on. Yes, version control and comparisons are a great way to audit the changes made between two version of a GPO, but you still won t find out who made a change or even necessarily when the change was made - you ll just see the differences between the two. There are two main reasons to want setting-level auditing in your environment: Security auditing and troubleshooting. Security auditing is probably the first reason that comes to most folks minds, because GPOs are increasingly being used to implement security-sensitive configuration settings. Want to make sure a server is communicating over a secure channel? Implement a GPO that provides an IPSec policy. Need to make sure user workstations automatically lock after a few minutes of inactivity? GPO. Need to display legally-mandated logon notices? GPO. Any rule or regulation that requires you to implement these configurations usually also requires you to audit any changes to the configuration, which means you need to dig into the GPOs and track who changes each setting. The other reason, troubleshooting, is one you typically only think of when a GPO has broken something. Monday morning, everyone logs in fine. Tuesday, nobody can log in. What s the first question you ask yourself? What the heck changed?!?! An audit log can provide you with the answer to that question: Ah, somebody edited the domain-wide GPO! Most problems come from change, and once you can identify what changed, you have a much better chance of quickly undoing it and getting everything working again. A good GPO auditing solution should suit both needs, by collecting four important pieces of information: What setting was changed? When was it changed? Who changed it? What did the setting look like before it was changed? GPO tools that provide automated version control - meaning they grab a backup copy of a GPO each time it changes - and comparison reports can often provide this level of auditing detail. Provided the tool can access information on who made the change, then it simply has to provide comparisons to show you what changed, what that setting looked like before the change, and when the change happened. With a good toolset, you might even be able to click on a roll back button for an individual change to have that setting revert to its previous state. 5 5 Group Policy Management Capabilities You re Missing

6 Offline Editing This is a capability that I ve only come to appreciate in the past year or so, but it s quickly becoming something I can t live without. Normally, when you re editing a GPO, you re working against the live file. A tool like the GPMC loads the GPO into memory, you edit it, and any change is automatically active. With a change management system in place, that change might be intercepted, compared, and put into an approval workflow, but ultimately you were working against the real GPO. Tools exist, however, that provide a slightly different editing experience. They basically cache all of your live GPOs into an offline repository, which you can then work against. You often see this capability as part of a larger suite of features, meaning you can treat the offline GPOs just like real ones: Run comparisons, generate Resultant Set of Policy calculations, and so forth. I used to achieve this the hard way: I actually kept a virtual machine (VM) running a copy of one of our domain controllers. The VM wasn t connected to the main company network, so that DC was basically an offline, standalone copy. I would then edit GPOs on that machine, run all my tests and reports and stuff, and then copy the differences over to the production environment when I was satisfied. Keeping the VM in sync with the production environment was, as you might expect, a major hassle, but it provided me with a safe sandbox in which I could play with GPOs. Once I discovered tools that offered their own offline editing capabilities, I was sold. In fact, I ve seen some companies use offline editing capabilities as an ersatz, inexpensive adjunct to a change management process. Basically, they propose changes in the offline sandbox, have someone review and sign off on the changes, and then push the change from the sandbox into the production environment. Tremendously effective, although it s not technically a software-enforced workflow (at least, not in the tools I ve seen). When combined with version control capabilities, the effects are awesome: You edit a GPO offline (which in effect copies it to the sandbox repository and then opens it for editing). You compare it, run policy reports, or whatever. When you re happy, you check it into a version-controlled repository, saving it to the live environment and retaining a copy of the previous version in the version control history. What s not to love? More Than Five? Yes, there are actually some other capabilities you ll probably need for solid GPO management, but it s quite possible that you already have them. Solid Resultant Set of Policy (RSoP) reports, for example, are a must-have - but the native tools do an okay job of producing them, and many third-party tools exist that can provide better ones. Friendlier and more powerful third-party versions of the GPMC are popular, too, and I have several clients who already have them in place (one even developed their own). But the five capabilities I ve discussed here are the ones I most often see missing, and they re the ones that can provide the most positive impact to your day-today GPO management. 6 5 Group Policy Management Capabilities You re Missing

When the Active Directory Recycling Bin Isn t Enough

When the Active Directory Recycling Bin Isn t Enough When the Active Directory Recycling Bin Isn t Enough Don Jones 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the

More information

What s New Guide: Version 5.6

What s New Guide: Version 5.6 What s New Guide: Version 5.6 A QUEST SOFTWARE COMPANY 1. 8 0 0. 4 2 4. 9 4 1 1 w w w. s c r i p t l o g i c. c o m WHAT S NEW IN ACTIVE ADMINISTRATOR 5.6? Contents...3 Active Administrator Product Overview...3

More information

What s New Guide. Active Administrator 6.0

What s New Guide. Active Administrator 6.0 What s New Guide Active Administrator 6.0 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Active Directory Auditing: What It Is, and What It Isn t

Active Directory Auditing: What It Is, and What It Isn t Active Directory Auditing: What It Is, and What It Isn t Abstract What s wrong with Active Directory s native audit logging? More importantly, what functionality do you really need in an AD auditing solution,

More information

Blackbird Management Suite Blackbird Group, Inc. www.blackbird-group.com

Blackbird Management Suite Blackbird Group, Inc. www.blackbird-group.com PRODUCT ANALYSIS Blackbird Management Suite Blackbird Group, Inc. www.blackbird-group.com Analysis by Don Jones Senior Partner and Principal Technologist, Concentrated Technology www.concentratedtechnology.com

More information

14 Ways to More Secure and Efficient Active Directory Administration

14 Ways to More Secure and Efficient Active Directory Administration 14 Ways to More Secure and Efficient Active Directory Administration The Right Tool Makes All the Difference Abstract Microsoft Active Directory is critical to the health of your network and your business.

More information

Active Directory Recovery: What It Is, and What It Isn t

Active Directory Recovery: What It Is, and What It Isn t Active Directory Recovery: What It Is, and What It Isn t Abstract Does your Active Directory recovery plan address all of the most common failure scenarios? This white paper explains how to handle each

More information

Creating and Managing Shared Folders

Creating and Managing Shared Folders Creating and Managing Shared Folders Microsoft threw all sorts of new services, features, and functions into Windows 2000 Server, but at the heart of it all was still the requirement to be a good file

More information

The Social Accelerator Setup Guide

The Social Accelerator Setup Guide The Social Accelerator Setup Guide Welcome! Welcome to the Social Accelerator setup guide. This guide covers 2 ways to setup SA. Most likely, you will want to use the easy setup wizard. In that case, you

More information

Group Policy for Beginners

Group Policy for Beginners Group Policy for Beginners Microsoft Corporation Published: April 2011 Abstract Group Policy is the essential way that most organizations enforce settings on their computers. This white paper introduces

More information

The Guide to Building an Active Directory Auditing Script

The Guide to Building an Active Directory Auditing Script The Guide to Building an Active Directory Auditing Script Don Jones 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic,

More information

Two Ways to Use Group Policy Delegation

Two Ways to Use Group Policy Delegation Two Ways to Use Group Policy Delegation Jeremy Moskowitz 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic

More information

Managing Windows Environments with Group Policy

Managing Windows Environments with Group Policy 3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: rwhitney@discoveritt.com Web: www.discoveritt.com Managing Windows Environments with Group Policy Course: MS50255C

More information

Track User Password Expiration using Active Directory

Track User Password Expiration using Active Directory Track User Password Expiration using Active Directory Jeff Hicks 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic,

More information

Introducing ZENworks 11 SP4. Experience Added Value and Improved Capabilities. Article. Article Reprint. www.novell.com. Endpoint Management

Introducing ZENworks 11 SP4. Experience Added Value and Improved Capabilities. Article. Article Reprint. www.novell.com. Endpoint Management Introducing ZENworks 11 SP4 Experience Added Value and Improved Capabilities Article Article Reprint Endpoint Management Endpoint Management Article Introducing ZENworks 11 SP4 Addressing Key Usability

More information

THE POWER OF GROUP POLICY

THE POWER OF GROUP POLICY Specops Software presents: THE POWER OF GROUP POLICY By Danielle Ruest and Nelson Ruest The Power of Group Policy... 3 The Inner Workings of GPOs... 4 The Ideal Tool for Systems Management... 7 Your Next

More information

Dell Active Administrator 7.5. User Guide

Dell Active Administrator 7.5. User Guide Dell Active Administrator 7.5 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

What s New in Windows Server 2008 R2: Active Directory, Group Policy and Terminal Services

What s New in Windows Server 2008 R2: Active Directory, Group Policy and Terminal Services What s New in Windows Server 2008 R2: Active Directory, Group Policy and Terminal Services Speaker: Jonathan Hassell Jonathan Hassell: Hello, and welcome to the TechTarget.com webcast, What s New in Windows

More information

10 How to Accomplish SaaS

10 How to Accomplish SaaS 10 How to Accomplish SaaS When a business migrates from a traditional on-premises software application model, to a Software as a Service, software delivery model, there are a few changes that a businesses

More information

MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy. Course Objectives. Required Exam(s) Price.

MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy. Course Objectives. Required Exam(s) Price. MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy Discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy. In this four-day instructor

More information

If you re a business owner looking for information on the cost of developing your own

If you re a business owner looking for information on the cost of developing your own What Does a Website Cost? This is a question that we field all day, every day. If you re a business owner looking for information on the cost of developing your own site (either using a service, or hiring

More information

Group Policy Objects: What are They and How Can They Help Your Firm?

Group Policy Objects: What are They and How Can They Help Your Firm? Group Policy Objects: What are They and How Can They Help Your Firm? By Sharon Nelson and John Simek 2011 Sensei Enterprises, Inc. The obvious first question: What is a Group Policy Object? Basically,

More information

5 barriers to database source control and how you can get around them

5 barriers to database source control and how you can get around them WHITEPAPER DATABASE CHANGE MANAGEMENT 5 barriers to database source control and how you can get around them 91% of Fortune 100 companies use Red Gate Content Introduction We have backups of our databases,

More information

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative

More information

How to Convince Your Boss it s Time HOW TO CONVINCE YOUR BOSS IT S TIME. 2013 BambooHR LLC. All Rights Reserved.

How to Convince Your Boss it s Time HOW TO CONVINCE YOUR BOSS IT S TIME. 2013 BambooHR LLC. All Rights Reserved. 1 HOW TO CONVINCE YOUR BOSS IT S TIME IT S OFFICIAL Your company needs HR software. You know how it will simplify HR by cutting out the busywork. Because most days, you feel isolated, holed up in your

More information

Introduction to Open Atrium s workflow

Introduction to Open Atrium s workflow Okay welcome everybody! Thanks for attending the webinar today, my name is Mike Potter and we're going to be doing a demonstration today of some really exciting new features in open atrium 2 for handling

More information

Business Virtualization

Business Virtualization Business Virtualization Why should I consider server virtualization? Save money. Often servers are dedicated to just one or two applications. As a result servers in many organizations are only using 15

More information

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,

More information

Chapter 11. The Forex Trading Coach Is Born

Chapter 11. The Forex Trading Coach Is Born Chapter 11 The Forex Trading Coach Is Born The Forex Trading Coach company was officially launched in May 2009 and I decided to go ahead and establish the company and the website as a result of the tremendous

More information

Key Elements of a Successful Disaster Recovery Strategy: Virtual and Physical by Greg Shields, MS MVP & VMware vexpert

Key Elements of a Successful Disaster Recovery Strategy: Virtual and Physical by Greg Shields, MS MVP & VMware vexpert ebook Key Elements of a Successful Disaster Recovery Strategy: Virtual and Physical by Greg Shields, MS MVP & VMware vexpert Greg Shields MS MVP & VMware vexpert Greg Shields is a Senior Partner with Concentrated

More information

Group Policy 21/05/2013

Group Policy 21/05/2013 Group Policy Group Policy is not a new technology for Active Directory, but it has grown and improved with every iteration of the operating system and service pack since it was first introduced in Windows

More information

Controlling and Managing Security with Performance Tools

Controlling and Managing Security with Performance Tools Security Management Tactics for the Network Administrator The Essentials Series Controlling and Managing Security with Performance Tools sponsored by Co ntrolling and Managing Security with Performance

More information

These guidelines can dramatically improve logon and startup performance.

These guidelines can dramatically improve logon and startup performance. Managing Users with Local Security and Group Policies 573. Disable user or computer settings in GPOs Each GPO consists of a user and a computer section. If there are no settings in either of those sections,

More information

How to monitor AD security with MOM

How to monitor AD security with MOM How to monitor AD security with MOM A article about monitor Active Directory security with Microsoft Operations Manager 2005 Anders Bengtsson, MCSE http://www.momresources.org November 2006 (1) Table of

More information

Understanding Group Policy Basics to Manage Windows Vista Systems

Understanding Group Policy Basics to Manage Windows Vista Systems CHAPTER 22 Understanding Group Policy Basics to Manage Windows Vista Systems What Are Group Policy Objects (GPOs)? Group Policy describes the Microsoft implementation of a methodology of managing computers

More information

CEFNS Web Hosting a Guide for CS212

CEFNS Web Hosting a Guide for CS212 CEFNS Web Hosting a Guide for CS212 INTRODUCTION: TOOLS: In CS212, you will be learning the basics of web development. Therefore, you want to keep your tools to a minimum so that you understand how things

More information

I m Graydon Trusler and I ve been doing all the Marketing for my wife s divorce law firm in Austin for 8 years or so.

I m Graydon Trusler and I ve been doing all the Marketing for my wife s divorce law firm in Austin for 8 years or so. I m Graydon Trusler and I ve been doing all the Marketing for my wife s divorce law firm in Austin for 8 years or so. I m going to take the same approach with you that I have with our marketing aimed at

More information

Role Based Access Control: Why Groups Aren t Enough

Role Based Access Control: Why Groups Aren t Enough Role Based Access Control: Why Groups Aren t Enough Don Jones 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2012 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the

More information

How to Start Your Own Hosting Company for Free!

How to Start Your Own Hosting Company for Free! How to Start Your Own Hosting Company for Free! Starting your own hosting company for free is nice, but it gets even better. Imagine that your hosting company only takes a couple hours to set up. Imagine

More information

Managing Windows Environments with Group Policy 50255D; 5 Days, Instructor-led

Managing Windows Environments with Group Policy 50255D; 5 Days, Instructor-led Managing Windows Environments with Group Policy 50255D; 5 Days, Instructor-led Course Description In this course you will learn how to reduce costs and increase efficiencies in your network. You will discover

More information

Case Study: Dance Recital Ticketing with Studio Owner Becky Pinero of Elite Dance Studio

Case Study: Dance Recital Ticketing with Studio Owner Becky Pinero of Elite Dance Studio Case Study: Dance Recital Ticketing with Studio Owner Becky Pinero of Elite Dance Studio Suzanne Gerety: Josh Olson: Good afternoon, everyone. This is Suzanne Blake Gerety, from dancestudioowner.com and

More information

Troubleshoot Using Event Log Mining

Troubleshoot Using Event Log Mining Troubleshoot Using Event Log Mining Jeff Hicks 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo

More information

Enable Backup and Restore for Group Policy

Enable Backup and Restore for Group Policy Enable Backup and Restore for Group Policy Jeremy Moskowitz 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic

More information

Selecting the Right Active Directory Security Reports for Your Business

Selecting the Right Active Directory Security Reports for Your Business Selecting the Right Active Directory Security Reports for Your Business Avril Salter 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED.

More information

The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones

The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones The Definitive Guide tm To Active Directory Troubleshooting, Auditing, and Best Practices 2011 Edition Don Jones Ch apter 6: Active Directory Best Practices... 77 Should You Rethink Your Forest and Domain

More information

In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well.

In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well. QuickBooks 2008 Software Installation Guide Welcome 3/25/09; Ver. IMD-2.1 This guide is designed to support users installing QuickBooks: Pro or Premier 2008 financial accounting software, especially in

More information

7 Tips for Achieving Active Directory Compliance. By Darren Mar-Elia

7 Tips for Achieving Active Directory Compliance. By Darren Mar-Elia 7 Tips for Achieving Active Directory Compliance By Darren Mar-Elia Contents 7 Tips for Achieving Active Directory Compliance...2 Introduction...2 The Ups and Downs of Native AD Auditing...2 The Ups!...3

More information

WHITE PAPER. SharePoint Permissions. Management. Centralized permissions management with SPDocKit ADIS JUGO

WHITE PAPER. SharePoint Permissions. Management. Centralized permissions management with SPDocKit ADIS JUGO WHITE PAPER SharePoint Permissions Management Centralized permissions management with SPDocKit ADIS JUGO Content About Adis... 2 Introduction to SharePoint Permission Management... 3 Centralized Permission

More information

Ad Sales Scripts. Would you be willing to meet with me in person to discuss this great opportunity?

Ad Sales Scripts. Would you be willing to meet with me in person to discuss this great opportunity? Successful Cold Call to Business Hi, this is Steve at Waterway Car Wash. Good afternoon, Steve. My name is (first and last name) and I am calling on behalf of (name of yearbook), the yearbook publication

More information

Introducing ZENworks 11 SP4

Introducing ZENworks 11 SP4 Introducing ZENworks 11 SP4 Experience Added Value and Improved Capabilities Article Reprint ZENworks Article Reprint Introducing ZENworks 11 SP4 Addressing Key Usability and Supportability Issues Micro

More information

Don t Be a Puppet of Your Backup Strategy. Are you in control of your backup strategy or is your backup strategy in control of you?

Don t Be a Puppet of Your Backup Strategy. Are you in control of your backup strategy or is your backup strategy in control of you? Don t Be a Puppet of Your Backup Strategy Are you in control of your backup strategy or is your backup strategy in control of you? 7 Technology Circle Suite 100 Columbia, SC 29203 Phone: 866.359.5411 E-Mail:

More information

Top 10 Best Practices for Windows Server Backup on Virtual and Physical Servers

Top 10 Best Practices for Windows Server Backup on Virtual and Physical Servers WHITE PAPER Top 10 Best Practices for Windows Server Backup on Virtual and Physical Servers by Don Jones, Microsoft MVP Backup. Disaster recovery. Business continuity. Almost nobody likes to talk about

More information

Tips & Tricks for Protecting User Data on Windows 7

Tips & Tricks for Protecting User Data on Windows 7 Tips & Tricks for Protecting User Data on Windows 7 Jeff Hicks 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2012 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the

More information

INTRODUCING AZURE SEARCH

INTRODUCING AZURE SEARCH David Chappell INTRODUCING AZURE SEARCH Sponsored by Microsoft Corporation Copyright 2015 Chappell & Associates Contents Understanding Azure Search... 3 What Azure Search Provides...3 What s Required to

More information

ZCorum s Ask a Broadband Expert Series:

ZCorum s Ask a Broadband Expert Series: s Ask a Broadband Expert Series: The Advantages of Network Virtualization An Interview with Peter Olivia, Director of Systems Engineering ZCorum 1.800.909.9441 4501 North Point Parkway, Suite 125 Alpharetta,

More information

Resolving Active Directory Backup and Recovery Requirements with Quest Software

Resolving Active Directory Backup and Recovery Requirements with Quest Software Resolving Active Directory Backup and Recovery Requirements with Quest Software By Mike Danseglio Sponsored by Table of Contents Backing Up Effectively... 1 Identifying an Incident... 2 Recovering from

More information

Deploying the DisplayLink Software using the MSI files

Deploying the DisplayLink Software using the MSI files How to deploy DisplayLink MSI files in a corporate environment with GPO or SCCM Go to: http://support.displaylink.com/knowledgebase/articles/615840 Introduction Or This article is intended to give a Windows

More information

Sponsored by: Speaker: Brian Madden, Independent Industry Analyst and Blogger

Sponsored by: Speaker: Brian Madden, Independent Industry Analyst and Blogger THIN CLIENT OPTIONS Sponsored by: Speaker: Brian Madden, Independent Industry Analyst and Blogger Brian Madden: Hello. My name is Brian Madden, and welcome to Part 2 of our threepart video series about

More information

What Are Certificates?

What Are Certificates? The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form

More information

From Installing Satellites To Internet Marketing Consultant In 3.5 Weeks

From Installing Satellites To Internet Marketing Consultant In 3.5 Weeks From Installing Satellites To Internet Marketing Consultant In 3.5 Weeks Kyle Tully Interviews Consulting Tycoon Student Rob Rawlings www.consultingtycoon.com I ve got Rob here on the line. Rob is one

More information

The Beginner s Guide to CRM

The Beginner s Guide to CRM The Beginner s Guide to CRM Customer relationship management can sound intimidating to small- and mid-sized businesses. After all, if your company only has a handful of customers, why do you need a dedicated

More information

Hospitality Cloud+Plus. How Technology Can Benefit Your Hotel LIMOTTA IT. LIMOTTAIT.com/hospitality 888 884 6278

Hospitality Cloud+Plus. How Technology Can Benefit Your Hotel LIMOTTA IT. LIMOTTAIT.com/hospitality 888 884 6278 Hospitality Cloud+Plus How Technology Can Benefit Your Hotel LIMOTTA IT LIMOTTAIT.com/hospitality 888 884 6278 Content + + About Us PCI Compliance + Virtualization + + + Unified Technology Single Sign

More information

GAcollege411 Site Overview Transcript

GAcollege411 Site Overview Transcript GAcollege411 Site Overview Transcript College Student Hey little man. High School Student What!!? UGH! Don t call me that! So, home for Spring Break, how s college going? College Student Oh, pretty good,

More information

Clickfree The Effortless Backup Solution

Clickfree The Effortless Backup Solution Reprint from May 2009 Clickfree The Effortless Backup Solution By Joel P. Bruckenstein One of the fundamental rules of computing is: Back up your data. To that fundamental rule we, at T3 add a few more:

More information

Insight Guide. E-Learning Compliance. www.kineo.com

Insight Guide. E-Learning Compliance. www.kineo.com Insight Guide E-Learning Compliance LAST MENU BACK NEXT Insight Guide Overview The challenges of compliance training Questions to ask before you begin your design 20 minutes A new generation of design

More information

4 Critical Risks Facing Microsoft Office 365 Implementation

4 Critical Risks Facing Microsoft Office 365 Implementation 4 Critical Risks Facing Microsoft Office 365 Implementation So, your organization has chosen to move to Office 365. Good choice. But how do you implement it AND deal with the following issues: Keep email

More information

Maintaining AD: An Ounce of Prevention or Pound of Cure?

Maintaining AD: An Ounce of Prevention or Pound of Cure? Maintaining AD: An Ounce of Prevention or Pound of Cure? Abstract This technical brief reviews three tasks critical to Active Directory (AD) maintenance: Monitoring AD replication Recovering AD objects

More information

using version control in system administration

using version control in system administration LUKE KANIES using version control in system administration Luke Kanies runs Reductive Labs (http://reductivelabs.com), a startup producing OSS software for centralized, automated server administration.

More information

MS 50255B: Managing Windows Environments with Group Policy (4 Days)

MS 50255B: Managing Windows Environments with Group Policy (4 Days) www.peaklearningllc.com MS 50255B: Managing Windows Environments with Group Policy (4 Days) Introduction In course you will learn how to reduce costs and increase efficiencies in your network. You will

More information

F Cross-system event-driven scheduling. F Central console for managing your enterprise. F Automation for UNIX, Linux, and Windows servers

F Cross-system event-driven scheduling. F Central console for managing your enterprise. F Automation for UNIX, Linux, and Windows servers F Cross-system event-driven scheduling F Central console for managing your enterprise F Automation for UNIX, Linux, and Windows servers F Built-in notification for Service Level Agreements A Clean Slate

More information

7 Best Practices When SAP Must Run 24 x 7

7 Best Practices When SAP Must Run 24 x 7 Panaya Inc. 7 Best Practices When SAP Must Run 24 x 7 Maintenance windows are all but non-existent and infrastructure upgrades are a fact of life, but you can still keep SAP running around the clock by

More information

Would You Like To Earn $1000 s With The Click Of A Button?

Would You Like To Earn $1000 s With The Click Of A Button? Would You Like To Earn $1000 s With The Click Of A Button? (Follow these easy step by step instructions and you will) This Version of the ebook is for all countries other than the USA. If you need the

More information

Windows Application and Server Backup 2.0

Windows Application and Server Backup 2.0 The Definitive Guide tm To Windows Application and Server Backup 2.0 HOME OF BACKUP 2.0 Ch apter 7: Virtualization Server Backups... 113 Native Solutions... 113 Problems and Challenges... 113 In the Old

More information

Possible Configurations

Possible Configurations Possible Configurations Turns your Contacts into a Business Network focussed on you GEM can be configured to run in many different ways. From simple stand-alone PC s or Mac s, through Client Server on

More information

Business Success Blueprints Choosing and using a CRM

Business Success Blueprints Choosing and using a CRM Business Success Blueprints Choosing and using a CRM YOUR BLUEPRINT TO SUPER SUCCESS The definitive Entrepreneurs Circle Guide to managing your customer data. Choosing and Using a CRM Still trying to

More information

Securing Active Directory:

Securing Active Directory: Securing Active Directory: An Ounce of Prevention or a Pound of Cure? Abstract This technical brief reviews three tasks that should be a part of your proactive Active Directory (AD) security routine: Establishing

More information

Interviewer: Sonia Doshi (So) Interviewee: Sunder Kannan (Su) Interviewee Description: Junior at the University of Michigan, inactive Songza user

Interviewer: Sonia Doshi (So) Interviewee: Sunder Kannan (Su) Interviewee Description: Junior at the University of Michigan, inactive Songza user Interviewer: Sonia Doshi (So) Interviewee: Sunder Kannan (Su) Interviewee Description: Junior at the University of Michigan, inactive Songza user Ad Preferences Playlist Creation Recommended Playlists

More information

Made for MSPs by an MSP

Made for MSPs by an MSP Made for MSPs by an MSP features & Pricing Guide THE END OF STICKY NOTE SECURITY www.passportalmsp.com lower costs improve security increase sales A cloud-based identity and password management solution

More information

How to Outsource Without Being a Ninnyhammer

How to Outsource Without Being a Ninnyhammer How to Outsource Without Being a Ninnyhammer 5 mistakes people make when outsourcing for profit By Jason Fladlien 2 Introduction The way everyone does outsourcing is patently wrong, and this report is

More information

The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones

The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones The Definitive Guide tm To Active Directory Troubleshooting, Auditing, and Best Practices 2011 Edition Don Jones Ch apter 5: Active Directory Auditing... 63 Goals of Native Auditing... 63 Native Auditing

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Team Foundation Server 2013 Installation Guide

Team Foundation Server 2013 Installation Guide Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day benday@benday.com v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide

More information

Windows Server 2008: www.netpro.com. What s New in Active Directory Auditing and Recovery. Your IT infrastructure. Simplified.

Windows Server 2008: www.netpro.com. What s New in Active Directory Auditing and Recovery. Your IT infrastructure. Simplified. What s New in Active Directory Auditing and Recovery www.netpro.com TABLE OF CONTENTS Windows Server 2008: What s New in Active Directory Auditing and Recovery Active Directory Auditing 3 What s New in

More information

DriveLock Quick Start Guide

DriveLock Quick Start Guide Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

A review of BackupAssist within a Hyper-V Environment

A review of BackupAssist within a Hyper-V Environment A review of BackupAssist within a Hyper-V Environment By Brien Posey Contents Introduction... 2 An Introduction to BackupAssist... 3 Testing Methodologies... 4 Test 1: Restore a Virtual Machine s Configuration...

More information

DAZZLE INTEGRATED DATA BACKUP FEATURE.

DAZZLE INTEGRATED DATA BACKUP FEATURE. DAZZLE INTEGRATED DATA BACKUP FEATURE. To simplify the backup process and to make sure even the busiest (or laziest) shops have no excuse not to make data backups, we have created a simple on-screen backup

More information

7 Secrets To Websites That Sell. By Alex Nelson

7 Secrets To Websites That Sell. By Alex Nelson 7 Secrets To Websites That Sell By Alex Nelson Website Secret #1 Create a Direct Response Website Did you know there are two different types of websites? It s true. There are branding websites and there

More information

Using SQL Monitor at Interactive Intelligence

Using SQL Monitor at Interactive Intelligence Using SQL Monitor at Robbie Baxter 93% of Fortune 100 companies use Red Gate's software Using SQL Monitor at Robbie Baxter Database Administrator Summary Business communications software company has used

More information

MEDIABURST: SMS GUIDE 1. SMS Guide

MEDIABURST: SMS GUIDE 1. SMS Guide MEDIABURST: SMS GUIDE 1 SMS Guide MEDIABURST: SMS GUIDE 2 Contents Introduction 3 This guide will cover 3 Why use SMS in business? 4 Our products 5 How do I add existing contacts? 6 Who are you sending

More information

DisplayLink Corporate Install Guide

DisplayLink Corporate Install Guide This document s classification is: Public This means: It can be freely distributed to Customers without an NDA needing to be in place Document Analysis Title Document number DisplayLink Corporate Install

More information

The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones

The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones The Definitive Guide tm To Active Directory Troubleshooting, Auditing, and Best Practices 2011 Edition Don Jones Ch apter 3: Active Directory Troubleshooting: Tools and Practices... 32 Na rrowing Down

More information

Orchestrating your Disaster Recovery with Quorum onq

Orchestrating your Disaster Recovery with Quorum onq WHITEPAPER Orchestrating your Disaster Recovery with Quorum onq http://www.quorum.net/ 2013 QuorumLabs, Inc. All Rights Reserved. Orchestrating your Disaster Recovery with Quorum onq Chances are that you

More information

9 Principles of Killer Dashboards SELL. SERVICE. MARKET. SUCCEED.

9 Principles of Killer Dashboards SELL. SERVICE. MARKET. SUCCEED. 9 Principles of Killer Dashboards SELL. SERVICE. MARKET. SUCCEED. The information provided in this e-book is strictly for the convenience of our customers and is for general informational purposes only.

More information

SchoolBooking SSO Integration Guide

SchoolBooking SSO Integration Guide SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,

More information

Windows Application and Server Backup 2.0

Windows Application and Server Backup 2.0 The Definitive Guide tm To Windows Application and Server Backup 2.0 HOME OF BACKUP 2.0 Ch apter 6: SharePoint Server Backups... 95 Na tive Solutions... 95 Versioning... 96 Recycle Bin... 96 SharePoint

More information

Nightmare on Delegation Street with Native Active Directory Tools

Nightmare on Delegation Street with Native Active Directory Tools Nightmare on Delegation Street with Native Active Directory Tools Abstract Delegating Active Directory permissions and managing and reporting on those delegations is a nightmare. If you re using native

More information

WHITE PAPER The Future of Backup Appliances in a Complex IT World

WHITE PAPER The Future of Backup Appliances in a Complex IT World The Future of Backup Appliances in a Complex IT World By Nick Cavalancia TABLE OF CONTENTS THE GROWING BACKUP DATA PROBLEM... 2 THE GROWING COMPLEXITY PROBLEM...3 ENTER: THE BACKUP APPLIANCE...6 SIMPLIFYING

More information

Copyright 2010 You have giveaway rights to this report. Feel free to share.

Copyright 2010 You have giveaway rights to this report. Feel free to share. Article Marketing Magic Copyright 2010 You have giveaway rights to this report. Feel free to share. Table of Contents What Is Article Marketing?...3 The History of Article Marketing...7 Article Marketing

More information

WINDOWS AZURE EXECUTION MODELS

WINDOWS AZURE EXECUTION MODELS WINDOWS AZURE EXECUTION MODELS Windows Azure provides three different execution models for running applications: Virtual Machines, Web Sites, and Cloud Services. Each one provides a different set of services,

More information

Chapter 1 Scenario 1: Acme Corporation

Chapter 1 Scenario 1: Acme Corporation Chapter 1 Scenario 1: Acme Corporation In This Chapter Description of the Customer Environment page 18 Introduction to Deploying Pointsec PC page 20 Prepare for Deployment page 21 Install Pointsec PC page

More information