White Paper. Managing Group Policies for Non Windows Computers through Microsoft Active Directory

Size: px
Start display at page:

Download "White Paper. Managing Group Policies for Non Windows Computers through Microsoft Active Directory"

Transcription

1 89 Fifth Avenue, 7th Floor New York, NY White Paper Managing Group Policies for Non Windows Computers through Microsoft Active Directory

2 Printed in the United States of America. Copyright 2009 Edison Group, Inc. New York. Edison Group offers no warranty either expressed or implied on the information contained herein and shall be held harmless for errors resulting from its use. All products are trademarks of their respective owners. First Publication: April 2009 Produced by: Andrew Podosenin, Senior Analyst; Barry Cohen, Editor in Chief

3 Table of Contents Table of Contents...1 Executive Summary...1 Introduction...2 Managing Group Policies...3 Predominance of Windows Platform...3 Group Policy Management...3 Schema Extension...3 Ease of Use...4 Uniformity of Management...4 Policy Management Features Available through Active Directory...4 Management Complexities in the Unix Environment...5 Cross platform Challenges...6 Limitations of SUDO...6 Limitations of NIS/NIS+...6 Limitations of RBAC...6 Kerberos Authentication...7 Limitations of File Permissions in Unix...7 Managing Policies Across Different Flavors of Unix/Linux...7 Advantages of Managing Unix Policies with Likewise...7 Complexities of Managing Policies in Mac OS X Environment...8 Conclusion and Recommendations...11

4 Executive Summary Currently, midsize and large enterprises have to manage identities and policies uniformly across a heterogeneous platform base. This need arises from increasing node management costs, the desire to improve security posture, and industry regulatory requirements. The most efficient way to manage policies and identities on non Windows platforms in these environments is to choose Windows as a common ground for the storage, management, and enforcement of such policies. Windows is chosen as a common ground, because it is a scalable and reliable platform with excellent, intuitive management tools. Administrators can use Open Source tools or professional, scalable, and supported solutions like Likewise Enterprise when standardizing identity management on Windows. The present paper discusses the advantages and disadvantages of both approaches. Managing Group Policies for Non Windows Computers through Microsoft Active Directory Page 1

5 Introduction This white paper discusses how Likewise Enterprise enables organizations to integrate and manage their Unix, Linux, and Mac computers using Microsoft Active Directory tools. The paper briefly describes the proliferation of Windows and then moves on to describe how Active Directory features, such as Group Policy and extensions to Active Directory schemas, enable the management of Unix like systems. The paper then discusses why Windowsʹ well known ease of use advantages make management of non Windows systems through Active Directory an attractive alternative. The remainder of the white paper provides a more technical discussion of Unix management complexity and why incorporating a Windows Policy based management alternative provides organizations with a uniform use and management model for their computing environments. Finally, the paper describes how Likewise Enterprise works to bring together Active Directory and Unix management under Windows Group Policies. Managing Group Policies for Non Windows Computers through Microsoft Active Directory Page 2

6 Managing Group Policies Predominance of Windows Platform Microsoft Windows Server and Active Directory have come to dominate business computing. This has resulted in the need for non Windows devices and applications to interoperate with and even be managed within a Microsoft Windows Active Directory environment. Besides being one of (if not the) most widely deployed scalable directory solutions, Active Directory is also the widest deployed and most robust commercial implementation of Kerberos. Over the years, Microsoft has been successfully able to deliver a scalable computing solution from the server to the client, particularly because of the ease of use of its graphical user interface. Besides addressing the operating system, directory, and storage markets, Microsoftʹs enterprise class applications such as Exchange and SQL Server depend upon directory based authentication. In addition, many third party applications such as PeopleSoft and SAP incorporate AD authentication. Given the roadmap offered by Microsoft, this interconnection of the directory side and the application side will only increase. The following sections describe the advantages of Microsoft Windows marketplace success from a heterogeneous environment perspective. Group Policy Management Unlike the other directory vendors, Microsoft has delivered profile and desktop management on a large scale. Unlike vendors such as Novell or Sun Microsystems who only have partial solutions, Microsoft is able to automatically push policies through the domain from the server to the client. The enhanced group policy implementation in Windows Vista and Windows Server 2008 has allowed administrators to centrally manage a greater number of features and component behaviors than were possible in the previous versions. With the continuing consolidation of IT vendors, the enterprise computing landscape will be undoubtedly be geared more and more toward Windows platforms. Schema Extension Over the years Microsoft has lessened its aggressive stance toward Unix, starting with adding some interoperability in Microsoft Services for Unix 3.0 (SFU 3.0), and extending that in SFU 3.5. Most recently, in Windows 2003 Server R2, Microsoft has incorporated most of the features of SFU 3.5, adding the ability to extend AD schema with Unix Managing Group Policies for Non Windows Computers through Microsoft Active Directory Page 3

7 compliant attributes in accordance with RFC This simplified the integration of cross platform identity management by eliminating the need to choose between the storing of Unix object credentials in the existing classes (so called non schema mode) and the non supported extension of the AD schema. Now administrators can take advantage of RFC 2307 by using Unix and Linux specific attributes that are built into the AD schema. Ease of Use It is generally accepted that Windowsʹ management tools are easier to use that their Unix and Linux counterparts. This is one of the major reasons that Microsoft has won the desktop client and server enterprise management battle. Administrators today very infrequently must be involved with the error prone manual editing of configuration files or rely on writing scripts and executing them from the command line. In fact, creating and pushing the enterprise policy across thousands of clients can be performed with fairly few mouse clicks from one of the policy management plug ins for the Microsoft Management Console. Uniformity of Management The various vendorʹs Unix and Linux platforms are notoriously different from one another: they have different management tools and different desktop interfaces. Looking at a number of popular Linux distributions from Red Hat, SUSE, and Ubuntu, it becomes clear that Linux did not deliver the uniformity hoped for. Since it is clear that Unix and Linux must inevitably interoperate with Windows, there is a heightened need for standardized authentication and management tools. Fortunately, Microsoft now offers such common ground: the combination of an Active Directory framework and Group Policy management. This is where Unix administrators can take a lazy approach, since both the framework and the management tools have been already written, scaled, tested, and delivered to the enterprise. All it takes is to tap into this offered technology and use AD for uniform policy management. Policy Management Features Available through Active Directory Windows policy management allows administrators to automatically and intuitively enforce a large number of end node parameters across the domain in a hierarchical fashion. These parameters include security settings, wired and wireless settings, startup and shutdown scripts, software restrictions, QoS, IPSec, remote software installation settings, access restrictions to local hardware, and many more. Increased group policy settings appearing in Microsoft Vista and the upcoming Windows 7clearly indicates that this is the desktop management approach that Microsoft has chosen. 1 RFC 2307 can be found at: archive.org/getrfc.php?rfc=2307 Managing Group Policies for Non Windows Computers through Microsoft Active Directory Page 4

8 All these policies are edited and enforced from the Microsoft Group Policy Management Console (GPMC), a comprehensive and intuitive suite of policy management tools available as a Microsoft Management Console (MMC) snap in. GPMC allows administrators to launch the Active Directory Users and Computers (ADUC) console to apply policy objects to the desired OU (Organizational Unit) level and launch Group Policy Object Editor (GPOE) to modify group policy settings within group policy objects. Overall, the above described suite of tools allows administrators to easily create multiple group policies and enforce them at different OU levels. Management Complexities in the Unix Environment Interoperability between Windows and Unix has always been a problem repeatedly addressed with limited success from both OSes. While porting applications across platforms is often impractical, cross platform authentication allows administrators to deliver Unix applications (particularly Web based applications) to the Windows realm, providing a faster and more convenient solution. By the same token, allowing Windows users to authenticate and manage Unix systems simplifies tracking identities, making the overall Unix user experience more pleasant. Some attempts to have Windows and Unix interoperate have met with moderate success. Microsoft Services for Unix (most features of SFU have been incorporated into Windows Server 2003 R2 and Windows Server 2008) offers limited interoperability between AD and NIS, plus a password synchronization utility. Specifically, SFU offered a service that would synchronize Unix UIDs/GIDs and Windows user and group identities (SID) bidirectionally in one to one and many to one mode. Additionally, SFU offered bidirectional Windows to Unix and Unix to Windows password synchronization that supports both local and domain account Windows password synchronization. However, these features did not support very many Unix flavors while requiring a fair amount of manual configuration work to be implemented. Documents for Unix and Linux platforms also offer limited interoperability at the cost of extensive manual labor associated with editing configuration files, sometimes on each participating host. This is a tedious and error prone procedure. Several how to documents of this kind have been maintained since the year 2000, particularly addressing authentication through pluggable authentication modules. Unfortunately, not all the Unix and Linux flavors are supported and the implementation requires laborious manual configuration and extensive testing. An incorrect configuration can not only result in failed user authentication but also make the Unix host less secure. There are similar documents for Samba, Apache, and SSH authentication. Additionally, the recommendations and implementations change from application to application, particularly in the versions of supported tools and the location and format of the Managing Group Policies for Non Windows Computers through Microsoft Active Directory Page 5

9 configuration files. Frequently, the recommended modifications are not supported by either the Unix or Linux vendors or Microsoft, which makes it difficult to implement these changes in a production environment. Therefore, should the particular platforms need to be supported, administrators need to have extensive knowledge of both platforms and rely on often untimely free technical advice from Internet forums. Supporting cross platform authentication in such a manner is stressful and counterproductive. Cross platform Challenges The following sections describe the cross platform challenges administrators must face. Limitations of SUDO SUDO is used as an alternative to the extensive use of the root account for management purposes. SUDO allows non privileged accounts to execute privileged commands. While a great idea, as typically implemented SUDO has a number of drawbacks. Among these are the need to manually apply and maintain the sudoers file across all the managed systems, test each configuration change, and make modifications to each node when a new administrator joins or leaves the company. Limitations of NIS/NIS+ While NIS is still widely used for domain authentication, the technology has known security limitations (a client can retrieve the entire NIS password database for offline inspection), is not very scalable, and has inefficient replication processes. While NIS+ has fixed a number of NIS drawbacks, by being hierarchical, requiring server authentication, and allowing permissions on operations, NIS+ is difficult to administer, requires special backup procedures, and has limited scalability particularly with multiple domains and over 1,000 clients. In this regard, the scalability and robustness of Active Directory offers a far better alternative. Limitations of RBAC Role based access control (RBAC) is another approach at restricting system access to authorized users. RBAC is based on roles that are created for various job functions. The operations permissions are assigned to roles rather than users. Rights management is simplified by assigning a user to a particular role, simplifying operations. However, in large heterogeneous environments management of RBAC memberships becomes extremely complex as it lacks hierarchical creation of roles and privilege assignments. Additionally, not all the users have the same role on different systems, which further complicates the administration process. Managing Group Policies for Non Windows Computers through Microsoft Active Directory Page 6

10 Kerberos Authentication Kerberos configuration requires running a daemon, synchronizing time between the server and the client via NTP, installation of the pam_krb5 module, and making applicable changes to the sample configuration files provided with the distribution. Administrators, therefore, have to rely on an extensive knowledge of both platforms and on the not always timely third party help from the Internet forums to get Kerberos implemented within a Unix or Linux environment. Obviously, handling domain authentication in such a manner is time consuming and prone to error. Limitations of File Permissions in Unix In Unix a file has three classes of permissions: the owner, the group, and everyone. Each class has three levels of access rights: read, write, and execute. This offers far less flexibility than a Windows environment, where multiple local and domain based file permissions can be granted for users and groups. Linux Security Modules (LSM), which are included with the SELinux 2 security framework, offer more granular file access but at the cost of CPU overhead. Managing Policies Across Different Flavors of Unix/Linux In heterogeneous environments, administrators have to enforce standard policy settings across multiple flavors of Unix, each often using different desktop environments (GNOME, KDE, Sun Java Desktop System, etc). These desktop environments differ in the parameters that can be modified and in the format and location of the configuration files. Thus, when pushing policies, administrators have to manually filter the enforced settings on a per target platform basis requiring either polling the system OS or maintaining lists containing the systems and corresponding OSes. This is another timeconsuming and error prone process. Advantages of Managing Unix Policies with Likewise Likewise Enterprise is capable of solving all the above problems in a simple and intuitive fashion. The technology offers seamless integration of over a hundred different Unix/Linux operating systems with Active Directory for both authentication and policy management needs. Likewise Enterprise offers centralized management of identities, desktop environments (including 2500 plus Gnome policy parameters), credential caching for off line connection, OS based client policy filtering, NIS and user migration tools, as well as auditing and reporting functionality. With Likewise Enterprise technology, administrators can easily deliver Kerberos based single sign on for such applications as telnet, FTP, SSH, rlogin, rsh, LDAP queries against AD, and Apache HTTP server. 2 SELinux, or Secure Linux is further explained at: Managing Group Policies for Non Windows Computers through Microsoft Active Directory Page 7

11 Likewise simplifies account management by assigning each user a unique ID, which is provisioned and centrally managed through Active Directory. Likewise s unique cell technology can map users to different UIDs and GIDs for different computers, eliminating the need for multiple local user accounts. The Likewise extension to the Microsoft Active Directory User and Computers MMC snap in allows administrators to create an associated cell for an OU and then use the cell to manage UID GID numbers. This allows AD user to access non Windows node in selected Likewise cells: The above features let administrators integrate non Widows nodes into a Windows AD authentication and management framework with adequate policy management, user provisioning, and reporting tools. Complexities of Managing Policies in Mac OS X Environment Over the years the Apple Macintosh computer has maintained a small but stable share of the computing environment. While being used primarily for audio, video, and Managing Group Policies for Non Windows Computers through Microsoft Active Directory Page 8

12 graphics editing, the Macintosh offers extreme ease of use compared to Windows (not to mention Unix) coupled with a plethora of high end graphics applications designed and compiled for the Macintosh platform. Apple s marketing effort is maintaining and somewhat expanding the OS X market share, which has now surpassed 8 percent. Part of this success can be attributed to the use of a stable Unix kernel in OS X and more standard PC components, such as Intel microprocessors, PCI E slots, and DDR memory. This introduced Apple to a pool of hardware that is more reliable, less expensive, and comes in wider variety than the components in older RISC processor based Macintoshes. Unfortunately, from an enterprise computing perspective, Apple does not have robust enterprise management tools. There are a number of reasons for this. First, the Macintosh has never been a widespread enterprise class platform, so Apple never needed to address the issues of scalable directory service, terabytes of storage, or centralized computational facilities. Thus enterprise messaging and data management applications such as Microsoft Exchange, Lotus Notes, SQL Server, and so forth have never been ported to Appleʹs Macintosh servers. Even now few enterprise class products are available for the OS X platform. Secondly, the primary use of Macintoshes is in the graphics departments, a technologically and organizationally secluded group that requires sharing among Macintosh users only and interoperating with the rest of the IT infrastructure via sharing printers, storage, and Internet access. This situation certainly did not call for provisioning and identity solutions to the depth and scalability of its Windows counterparts. On the bright side, since Apple did not excel in enterprise management tools, others such as Microsoft, Novel, and Sun have created the infrastructure allowing Macintosh users to tap into a reliable framework of user and desktop provisioning. The Macintosh platform uses a recently added Workgroup Manager (WGM) to manage users, groups, shares (with access permissions), and client preferences. The application allows administrators to modify accounts (including users, groups, and computer lists), assign privileges, manage share points, and modify desktop preferences that define the user experience for clients bound to Apple s Open Directory domain. WGM requires an OS X Server as a centralized repository of user information. While being a big step for Macintosh management, the product pales in comparison with widely recognized enterprise user provisioning solutions. Likewise Solution for Mac Desktop Policy Management The Likewise solution for managing Macintosh desktops allows administrators to store settings in Active Directory rather than on a Macintosh OS X Server. Besides decreasing the cost of the solution and offloading AD maintenance to Window administrators, Macintosh user settings are now stored in a more robust and scalable directory. Since storing third party data in Active Directory requires either irreversible schema changes Managing Group Policies for Non Windows Computers through Microsoft Active Directory Page 9

13 (which may not be agreeable with Windows administrators) or using non standard fields (which is cumbersome), initially non Windows vendors were reluctant to store user credentials in AD. This is where Likewise comes to the rescue. By taking advantage of RFC 2307, Likewise Enterprise integrates user authentication with Active Directory (in the same way as Macintosh Active Directory Plug In allows Macs to authenticate to Macintosh OS X Open Directory) offering a mechanism that allows Workgroup Manager settings to be stored in Active Directory Group Policy Objects. Likewise Enterprise contains a utility to join Macs to Active Directory, letting them participate in AD based user authentication and in group policy processing. From that point on, administrators can connect to Active Directory from the Workgroup Manager interface and store settings in the GPO. From the Windows side, administrators can use GPMC to store and manage Mac policy settings. As a result, Likewise Enterprise brings together the advantages of the Macintosh Workgroup Manager with the robustness and uniform policy management tools of Active Directory in a seamless and intuitive fashion. Managing Group Policies for Non Windows Computers through Microsoft Active Directory Page 10

14 Conclusion and Recommendations Likewise Enterprise allows for seamless enforcement of group policies from Windows Active Directory Group Policy Manager across Unix, Linux, and Macintosh platforms. It does this with Windows GUI based policy management interfaces for authentication of non Windows users and applications against Microsoft Active Directory. Additionally, Likewise Enterprise offers adequate reporting and troubleshooting tools. All the above, along with a very affordable per seat cost, make Likewise Enterprise indispensible for heterogeneous enterprises that require tight user and policy management. Managing Group Policies for Non Windows Computers through Microsoft Active Directory Page 11

Managing Group Policies for Non-Windows Computers through Microsoft Active Directory

Managing Group Policies for Non-Windows Computers through Microsoft Active Directory White Paper Managing Group Policies for Non-Windows Computers through Microsoft Active Directory Abstract Administrators currently have the option either to use Open Source tools or implement professional,

More information

89 Fifth Avenue, 7th Floor New York, NY 10003 www.theedison.com 212.367.7400. White Paper. How to Avoid the High Cost of Security Audits

89 Fifth Avenue, 7th Floor New York, NY 10003 www.theedison.com 212.367.7400. White Paper. How to Avoid the High Cost of Security Audits 89 Fifth Avenue, 7th Floor New York, NY 10003 www.theedison.com 212.367.7400 White Paper How to Avoid the High Cost of Security Audits Printed in the United States of America. Copyright 2009 Edison Group,

More information

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Open Directory. Apple s standards-based directory and network authentication services architecture. Features Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data

More information

Likewise Security Benefits

Likewise Security Benefits Likewise Enterprise Likewise Security Benefits AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise improves the security of Linux and UNIX computers

More information

Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley

Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley Likewise Enterprise Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley IMPROVE SOX COMPLIANCE WITH CENTRALIZED ACCESS CONTROL AND AUTHENTICATION With Likewise Enterprise, you get one user,

More information

identity management in Linux and UNIX environments

identity management in Linux and UNIX environments Whitepaper identity management in Linux and UNIX environments EXECUTIVE SUMMARY In today s IT environments everything is growing, especially the number of users, systems, services, applications, and virtual

More information

Virtualization Case Study

Virtualization Case Study INDUSTRY Finance COMPANY PROFILE Major Financial Institution. BUSINESS SITUATION Internal security audits found that VMware ESX, Red Hat Linux, and Solaris systems lacked an efficient way to control access

More information

Active Directory and DirectControl

Active Directory and DirectControl WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now

More information

Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard

Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard White Paper Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard Abstract This document describes how PowerBroker Identity Services Enterprise and Microsoft Active Directory

More information

Authentication in a Heterogeneous Environment

Authentication in a Heterogeneous Environment Authentication in a Heterogeneous Environment Integrating Linux (and UNIX and Mac) Identity Management in Microsoft Active Directory Mike Patnode VP of Technology Centrify Corporation mike.patnode@centrify.com

More information

What s New in Centrify Server Suite 2014

What s New in Centrify Server Suite 2014 CENTRIFY SERVER SUITE 2014 WHAT S NEW What s New in Centrify Server Suite 2014 The new Centrify Server Suite 2014 introduces major new features that simplify risk management and make regulatory compliance

More information

Whitepaper: Centeris Likewise Identity 3.0 Security Benefits

Whitepaper: Centeris Likewise Identity 3.0 Security Benefits Whitepaper: Centeris Likewise Identity 3.0 Security Benefits Author: Manny Vellon VP, Product Development Centeris Corporation Abstract This document describes how Centeris Likewise Identity improves the

More information

Active Directory and Linux Identity Management

Active Directory and Linux Identity Management Active Directory and Linux Identity Management Published by the Open Source Software Lab at Microsoft. December 2007. Special thanks to Chris Travers, Contributing Author to the Open Source Software Lab.

More information

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust

More information

Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure

Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure Technical White Paper DESKTOP www.novell.com Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure * Using SUSE Linux Enterprise Desktop with Microsoft Active Directory Infrastructure

More information

Centrify Suite 2012 Express

Centrify Suite 2012 Express Centrify Suite 2012 Express Administrator s Guide November 2011 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject to the terms

More information

Windows Security and Directory Services for UNIX using Centrify DirectControl

Windows Security and Directory Services for UNIX using Centrify DirectControl SOLUTION GUIDE CENTRIFY CORP. SEPTEMBER 2005 Windows Security and Directory Services for UNIX using Centrify DirectControl With Centrify, you can now fully leverage your investment in Active Directory

More information

Red Hat Enterprise ipa

Red Hat Enterprise ipa Red Hat Enterprise ipa Introduction Red Hat Enterprise IPA enables your organization to comply with regulations, reduce risk, and become more efficient. Simply and centrally manage your Linux/Unix users

More information

Chapter 1 - Web Server Management and Cluster Topology

Chapter 1 - Web Server Management and Cluster Topology Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management

More information

CONFIGURING ACTIVE DIRECTORY IN LIFELINE

CONFIGURING ACTIVE DIRECTORY IN LIFELINE White Paper CONFIGURING ACTIVE DIRECTORY IN LIFELINE CONTENTS Introduction 1 Audience 1 Terminology 1 Test Environment 2 Joining a Lenovo network storage device to an AD domain 3 Importing Domain Users

More information

Microsoft Windows Server 2003 and Tecplot Software

Microsoft Windows Server 2003 and Tecplot Software Microsoft Windows Server 2003 Customer Solution Case Study Visualization Software Company Extends Windows-based Security Model and Management Tools to Linux Systems Overview Country or Region: United States

More information

Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite

Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite WHITE PAPER CENTRIFY CORP. MARCH 2009 Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite Securing and auditing administrative access to the Virtual Infrastructure

More information

Lowering Storage TCO with Iomega NAS

Lowering Storage TCO with Iomega NAS Brief ing March 2002 Version 3 s Lowering Storage TCO with Iomega NAS Summary Today s organizations no longer think of storage as a device. Instead, it is an architecture constructed with storage technologies

More information

Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server

Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server Hardware Windows Windows NT 4.0 Linux Server Software and

More information

Integration with Active Directory. Jeremy Allison Samba Team

Integration with Active Directory. Jeremy Allison Samba Team Integration with Active Directory Jeremy Allison Samba Team Benefits of using Active Directory Unlike the earlier Microsoft Windows NT 4.x Domain directory service which used proprietary DCE/RPC calls,

More information

IBM Tivoli Endpoint Manager for Lifecycle Management

IBM Tivoli Endpoint Manager for Lifecycle Management IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,

More information

NetWrix USB Blocker. Version 3.6 Administrator Guide

NetWrix USB Blocker. Version 3.6 Administrator Guide NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.

More information

Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation.

Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation. NETWORK OPERATING SYSTEM Introduction Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation. Network operating

More information

Oracle Desktop Virtualization

Oracle Desktop Virtualization Oracle Desktop Virtualization Oracle Desktop Virtualization Portfolio Oracle Desktop Virtualization Portfolio Software. Hardware. Complete. Oracle Virtual Desktop Infrastructure VDI desktops to users on

More information

visionapp Remote Desktop 2010 (vrd 2010)

visionapp Remote Desktop 2010 (vrd 2010) visionapp Remote Desktop 2010 (vrd 2010) Convenient System Management P roduct Information www.vrd2010.com Inhalt 1 Introduction... 1 2 Overview of Administration Tools... 1 2.1 RDP Administration Tools...

More information

WHY EXTENDING GROUP POLICY MAKES SENSE FOR YOUR WINDOWS ENTERPRISE

WHY EXTENDING GROUP POLICY MAKES SENSE FOR YOUR WINDOWS ENTERPRISE Specops Software presents: WHY EXTENDING GROUP POLICY MAKES SENSE FOR YOUR WINDOWS ENTERPRISE By Derek Melber, MCSE, MVP Why Extending Group Policy Makes Sense for Your Windows Enterprise... 3 Every Active

More information

Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments. Dragos Manac 01.10.2008

Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments. Dragos Manac 01.10.2008 Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments Dragos Manac 01.10.2008 Agenda The Need for Identity & Access Management Enterprise IPA Overview Pricing Questions to

More information

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system Integrated and reliable the heart of your iseries system i5/os the next generation iseries operating system Highlights Enables the legendary levels of reliability and simplicity for which iseries systems

More information

Mac OS X and Directory Services Integration

Mac OS X and Directory Services Integration Mac OS X and Directory Services Integration Neha Setia 1 and Tarun Dalal 2 1 M.Tech Scholor, CBS Group of Institutions, CSE Department, MDU Rohtak, India setia_neha@yahoo.co.in 2 Assistant Professor, CBS

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

An Analysis of Propalms TSE and Microsoft Remote Desktop Services

An Analysis of Propalms TSE and Microsoft Remote Desktop Services An Analysis of TSE and Remote Desktop Services JULY 2010 This document illustrates how TSE can extend your Remote Desktop Services environment providing you with the simplified and consolidated management

More information

This unit contains the following two lessons:

This unit contains the following two lessons: Unit 5 Networking Operating Systems Overview Description This unit contains two lessons. The first lesson describes the characteristics of the four major Internetworking Systems, including Windows NT Server,

More information

NetWrix USB Blocker Version 3.6 Quick Start Guide

NetWrix USB Blocker Version 3.6 Quick Start Guide NetWrix USB Blocker Version 3.6 Quick Start Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Getting Started...5 3.1.

More information

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE

More information

Integrated Approach to User Account Management

Integrated Approach to User Account Management Mission Critical Enterprise Systems Symposium 2006 Integrated Approach to User Account Management Kesselman, Glenn and Smith, William Lockheed Martin Mission Services Quest Software Public Sector October

More information

Directory-enabled Lights-Out Management

Directory-enabled Lights-Out Management Directory-enabled Lights-Out Management white paper Abstract... 2 Remote management products... 2 Business needs... 3 Customer environment... 3 Benefits... 3 Directory architecture... 4 Overview... 4 Objects...

More information

Product Life Cycle Management

Product Life Cycle Management Engineering Change Control Systems (atecc) Product Life Cycle Management Enterprise information boundaries are disappearing as corporations open their networks to allow external access by manufacturing

More information

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p. Preface p. ix Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p. 6 Common Linux Features p. 8 Primary Advantages

More information

DriveLock Quick Start Guide

DriveLock Quick Start Guide Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Samba in the Enterprise : Samba 3.0 and beyond

Samba in the Enterprise : Samba 3.0 and beyond Samba in the Enterprise : Samba 3.0 and beyond By Jeremy Allison jra@samba.org jeremy.allison@hp.com Where we are now : Samba 2.2 The current Samba is a credible replacement for a Windows server providing

More information

HP ProCurve Identity Driven Manager 3.0

HP ProCurve Identity Driven Manager 3.0 Product overview HP ProCurve Identity Driven Manager (IDM), a plug-in to HP ProCurve Manager Plus, dynamically provisions network security and performance settings based on user, device, location, time,

More information

The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones

The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones The Definitive Guide tm To Active Directory Troubleshooting, Auditing, and Best Practices 2011 Edition Don Jones Ch apter 5: Active Directory Auditing... 63 Goals of Native Auditing... 63 Native Auditing

More information

How To Configure Vnx 7.1.1 (Vnx) On A Windows-Only Computer (Windows) With A Windows 2.5 (Windows 2.2) (Windows 3.5) (Vnet) (Win

How To Configure Vnx 7.1.1 (Vnx) On A Windows-Only Computer (Windows) With A Windows 2.5 (Windows 2.2) (Windows 3.5) (Vnet) (Win EMC é VNX dm Series Release 7.1 Configuring VNX dm User Mapping P/N 300-013-811 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright â 2009-2012

More information

Group Policy 21/05/2013

Group Policy 21/05/2013 Group Policy Group Policy is not a new technology for Active Directory, but it has grown and improved with every iteration of the operating system and service pack since it was first introduced in Windows

More information

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta

More information

Stellar Active Directory Manager

Stellar Active Directory Manager Stellar Active Directory Manager What is the need of Active Directory Manager? Every organization uses Active Directory Services (ADMS) to manage the users working in the organization. This task is mostly

More information

Small Systems Solutions is the. Premier Red Hat and Professional. VMware Certified Partner and Reseller. in Saudi Arabia, as well a competent

Small Systems Solutions is the. Premier Red Hat and Professional. VMware Certified Partner and Reseller. in Saudi Arabia, as well a competent T R A I N I N G C O U R S E S T H E # 1 L I N U X A N D O P E N S O U R C E P R O V I D E R I N S A U D I A R A B I A Introd uction to Linux Administra tion Adva nce Linux Ad ministrati on Linux Identity

More information

The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway

The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged

More information

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to

More information

Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE

Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE A P P L I C A T I O N V E R S I O N : 8. 0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your

More information

Using Centrify s DirectControl with Mac OS X

Using Centrify s DirectControl with Mac OS X WHITE PAPER CENTRIFY CORP. OCTOBER 2008 Using Centrify s DirectControl with Mac OS X Centralized, Active Directory-based authentication, access control and policy enforcement for Mac OS X systems in Windows

More information

Directory Integration in LANDesk Management Suite

Directory Integration in LANDesk Management Suite Directory Integration in LANDesk Management Suite A white-paper detailing the use of an LDAP Directory in an LANDesk Management Suite environment LANDesk Software Inc. Sam Merrill Technical Marketing Engineer

More information

automates system administration for homogeneous and heterogeneous networks

automates system administration for homogeneous and heterogeneous networks IT SERVICES SOLUTIONS SOFTWARE IT Services CONSULTING Operational Concepts Security Solutions Linux Cluster Computing automates system administration for homogeneous and heterogeneous networks System Management

More information

Deploying Ubuntu Server Edition. Training Course Overview. (Ubuntu 10.04 LTS)

Deploying Ubuntu Server Edition. Training Course Overview. (Ubuntu 10.04 LTS) Deploying Ubuntu Server Edition Training Course Overview (Ubuntu 10.04 LTS) 1. Deploying Ubuntu Server Edition Course Overview About the Course and Objectives This advanced 40-hour course will provide

More information

Advancements in Linux Authentication and Authorisation using SSSD

Advancements in Linux Authentication and Authorisation using SSSD Managing an Enterprise Series and Authorisation using SSSD Lawrence Kearney Enterprise Workgroup and Service Analyst e. lawrence.kearney@earthlink.net w. www.lawrencekearney.com How SSSD came to our infrastructure

More information

Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment

Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Network (RHN) Satellite server is an easy-to-use, advanced systems management platform

More information

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications

More information

Unit 10 : An Introduction to Linux OS

Unit 10 : An Introduction to Linux OS Unit 10 : An Introduction to Linux OS Linux is a true 32/64-bit operating system that run on different platforms. It is a multi-user, multi-tasking and time sharing operating system. Linux is a very stable

More information

Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment

Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Satellite server is an easy-to-use, advanced systems management platform for your Linux infrastructure.

More information

Centrify Server Suite 2014

Centrify Server Suite 2014 Centrify Server Suite 2014 Administrator s Guide for Linux and UNIX June 2014 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject

More information

PROPALMS TSE 6.0 March 2008

PROPALMS TSE 6.0 March 2008 PROPALMS March 2008 An Analysis of and Terminal Services: Contents System Administration... 2 Server Management... 3 Application Management... 5 Security... 7 End User Experience... 8 Monitoring and Reporting...

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)... CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...

More information

Major Retailer Achieves Compliance With the PCI Data Security Standard

Major Retailer Achieves Compliance With the PCI Data Security Standard Leading Online Retailer INDUSTRY Online retail clothing sales COMPANY PROFILE This world-class apparel business operates multiple enterprises under multiple brands. BUSINESS SITUATION Had difficulty meeting

More information

White Paper. Advantages of IBM Notes and Domino 9 Social Edition for Midsize Businesses. 89 Fifth Avenue, 7th Floor. New York, NY 10003

White Paper. Advantages of IBM Notes and Domino 9 Social Edition for Midsize Businesses. 89 Fifth Avenue, 7th Floor. New York, NY 10003 89 Fifth Avenue, 7th Floor New York, NY 10003 www.theedison.com 212.367.7400 White Paper Advantages of IBM Notes and Domino 9 Social Edition for Midsize Businesses Printed in the United States of America

More information

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative

More information

Introduction... 3. Need... 3. Solution... 3. Benefits...4. Product Overview...5. System Requirements, Scalability, and Licensing...6. Background...

Introduction... 3. Need... 3. Solution... 3. Benefits...4. Product Overview...5. System Requirements, Scalability, and Licensing...6. Background... Terminal Server TM Provides a centralized OS X environment that enables you to easily and inexpensively deploy OS X applications in your organization. Aqua Connect, Inc. Version 3 Contents Introduction...

More information

IBM Tivoli Endpoint Manager for Lifecycle Management

IBM Tivoli Endpoint Manager for Lifecycle Management IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,

More information

IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE

IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE White Paper IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE Abstract The OneFS user mapping service combines a user s identities from different directory services into a single access

More information

Novell Identity Manager

Novell Identity Manager Password Management Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 3.6.1 June 05, 2009 www.novell.com Identity Manager 3.6.1 Password Management Guide Legal Notices Novell, Inc. makes no representations

More information

File Services. File Services at a Glance

File Services. File Services at a Glance File Services High-performance workgroup and Internet file sharing for Mac, Windows, and Linux clients. Features Native file services for Mac, Windows, and Linux clients Comprehensive file services using

More information

4.1 Introduction 4.2 Explain the purpose of an operating system 4.2.1 Describe characteristics of modern operating systems Control Hardware Access

4.1 Introduction 4.2 Explain the purpose of an operating system 4.2.1 Describe characteristics of modern operating systems Control Hardware Access 4.1 Introduction The operating system (OS) controls almost all functions on a computer. In this lecture, you will learn about the components, functions, and terminology related to the Windows 2000, Windows

More information

Connecting to Windows

Connecting to Windows Connecting to Windows The easiest way to get a non-windows operating system like Macintosh or UNIX/Linux to connect to a Windows computer is to make that non-windows system look like another Windows computer

More information

INTRODUCTION ADVANTAGES OF RUNNING ORACLE 11G ON WINDOWS. Edward Whalen, Performance Tuning Corporation

INTRODUCTION ADVANTAGES OF RUNNING ORACLE 11G ON WINDOWS. Edward Whalen, Performance Tuning Corporation ADVANTAGES OF RUNNING ORACLE11G ON MICROSOFT WINDOWS SERVER X64 Edward Whalen, Performance Tuning Corporation INTRODUCTION Microsoft Windows has long been an ideal platform for the Oracle database server.

More information

24x7 Scheduler Multi-platform Edition 5.2

24x7 Scheduler Multi-platform Edition 5.2 24x7 Scheduler Multi-platform Edition 5.2 Installing and Using 24x7 Web-Based Management Console with Apache Tomcat web server Copyright SoftTree Technologies, Inc. 2004-2014 All rights reserved Table

More information

Utilizing Solaris 10 Security Features. Presented by: Nate Rotschafer Peter Kiewit Institute Revised: August 8, 2005

Utilizing Solaris 10 Security Features. Presented by: Nate Rotschafer Peter Kiewit Institute Revised: August 8, 2005 Utilizing Solaris 10 Security Features Presented by: Nate Rotschafer Peter Kiewit Institute Revised: August 8, 2005 Solaris 10 Security Features Outline Solaris Development Least Privilege RBAC Service

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

Best Practices: Integrating Mac OS X with Active Directory. Technical White Paper April 2009

Best Practices: Integrating Mac OS X with Active Directory. Technical White Paper April 2009 Best Practices: Integrating Mac OS X Technical White Paper April 2009 2 Contents Page 3 Page 5 Page 9 Page 10 Page 11 Page 12 Apple s Built-In Solution How to Integrate Mac OS X Getting Started dsconfigad

More information

Centralized Identity and Access Management of Cross-Platform Systems and Applications with Active Directory and the Centrify Suite

Centralized Identity and Access Management of Cross-Platform Systems and Applications with Active Directory and the Centrify Suite WHITE PAPER CENTRIFY CORP. OCTOBER 2008 Centralized Identity and Access Management of Cross-Platform Systems and Applications with Active Directory and the Centrify Suite The Centrify Suite is an integrated

More information

Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU

Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU JG659AAE Key features Identity-based access, advanced device profiling, and real-time traffic quarantining Converged network support

More information

7 Tips for Achieving Active Directory Compliance. By Darren Mar-Elia

7 Tips for Achieving Active Directory Compliance. By Darren Mar-Elia 7 Tips for Achieving Active Directory Compliance By Darren Mar-Elia Contents 7 Tips for Achieving Active Directory Compliance...2 Introduction...2 The Ups and Downs of Native AD Auditing...2 The Ups!...3

More information

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

DIGIPASS Authentication for Citrix Access Gateway VPN Connections DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer

More information

Installing Management Applications on VNX for File

Installing Management Applications on VNX for File EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

Privileged Account Access Management: Why Sudo Is No Longer Enough

Privileged Account Access Management: Why Sudo Is No Longer Enough Access Control Excellence Privileged Account Access Management: Why Sudo Is No Longer Enough The new privileged access management solutions available on the market today provide highly efficient and effective

More information

Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide

Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide Advanced Functionality Basic Functionality Feature MANAGEMENT Microsoft Management Console Enhanced Connection

More information

Goverlan Remote Control

Goverlan Remote Control Goverlan Remote Control Feature Overview Goverlan Remote Control Powerful IT remote control, made easy Support, control and manage multiple users anywhere securely and seamlessly. With its powerful broadscope

More information

Patch Management SoftwareTechnical Specs

Patch Management SoftwareTechnical Specs Patch Management SoftwareTechnical Specs 1. Scalable: a. The PMS (Patch Management Software)must be scalable(can grow as network grows). b. The PMSmust be able to support more than 10k nodes from a single

More information

Windows Services. Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features

Windows Services. Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features Windows Services Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features File and print services Integrated Samba 3 for native SMB/CIFS protocol support

More information

Windows Server 2008 R2 Hyper V. Public FAQ

Windows Server 2008 R2 Hyper V. Public FAQ Windows Server 2008 R2 Hyper V Public FAQ Contents New Functionality in Windows Server 2008 R2 Hyper V...3 Windows Server 2008 R2 Hyper V Questions...4 Clustering and Live Migration...5 Supported Guests...6

More information

Introduction to Active Directory. December 10th, 2008 1-3pm Daniels 407

Introduction to Active Directory. December 10th, 2008 1-3pm Daniels 407 Introduction to Active Directory December 10th, 2008 1-3pm Daniels 407 What we are going to cover... The basics of Active Directory What AD is What AD isn't Tools Management Concepts Additional Services

More information

Manage, Extend, and Simplify Group Policy using Quest Group Policy Solutions

Manage, Extend, and Simplify Group Policy using Quest Group Policy Solutions Manage, Extend, and Simplify Group Policy using Quest Group Policy Solutions Technical Brief written by Darren Mar-Elia Chief Technology Officer Windows Management Quest Software, Inc. Copyright Quest

More information

EventTracker: Support to Non English Systems

EventTracker: Support to Non English Systems EventTracker: Support to Non English Systems Publication Date: April 25, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Introduction This document has been prepared to

More information

Single Sign-On for Kerberized Linux and UNIX Applications

Single Sign-On for Kerberized Linux and UNIX Applications Likewise Enterprise Single Sign-On for Kerberized Linux and UNIX Applications AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise facilitates the

More information

Kaspersky Anti-Virus 8.0 for Linux File Server Installation Guide

Kaspersky Anti-Virus 8.0 for Linux File Server Installation Guide Kaspersky Anti-Virus 8.0 for Linux File Server Installation Guide A P P L I C A T I O N V E R S I O N : 8. 0 M P 2 C F 2 Dear User! Thank you for choosing our product. We hope that this documentation will

More information