Best Practices for Designing a Secure Active Directory: Multi-Org Exchange Edition. written by Dmitry Sotnikov, Aelita Software.

Size: px
Start display at page:

Download "Best Practices for Designing a Secure Active Directory: Multi-Org Exchange Edition. written by Dmitry Sotnikov, Aelita Software."

Transcription

1 Best Practices for Designing a Secure Active Directory: Multi-Org Exchange Edition written by Dmitry Sotnikov, Aelita Software White Paper

2 Abstract This paper discusses how to select the optimal design for Active Directory that meets your company's requirements and maintains a balance between administrative and support costs, ease of collaboration, and the desired level of security and isolation. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. However, because of the possibility of human or mechanical errors, Aelita Software does not guarantee the accuracy, adequacy, or completeness of any information in this publication, and is not responsible for any errors or omissions or the results obtained from use of such information. Unless otherwise noted, the example companies, organizations, products, people, and events depicted herein are fictitious. No association with any real company, organization, product, person, or event is intended or should be inferred. Aelita Software does not endorse or accept any responsibility for the content or usage of links and references to non-aelita Web sites or technical documentation. No part of this document may be reproduced, stored or transmitted in any form, by any means, or for any purpose, without the express written permission of Aelita Software Corporation. Aelita, Aelita Software, the Aelita Software Corporation logo, and all Aelita product names and slogans are either registered trademarks or trademarks of Aelita Software Corporation. Other product or company names mentioned herein may be trademarks of their respective owners. Copyright , Aelita Software Corporation. All rights reserved. Last revised February 19, 2004 AELITA SOFTWARE CORPORATION 6500 Emerald Parkway Suite 400 Columbus, Ohio 43016, Phone: Fax: URL: info@aelita.com

3 CONTENTS INTRODUCTION... 5 DEFINING ACTIVE DIRECTORY SECURITY BOUNDARIES... 6 SINGLE FOREST/SINGLE ORGANIZATION... 8 Security Considerations... 9 Messaging and Collaboration... 9 Data Replication and Synchronization... 9 Administration MULTIPLE FORESTS/SINGLE ORGANIZATION Security Considerations Messaging and Collaboration Data Replication and Synchronization Administration MULTIPLE FOREST/MULTIPLE ORGANIZATION Security Considerations Messaging and Collaboration Data Replication and Synchronization Administration SUMMARY Aelita Solutions GLOSSARY ADDITIONAL INFORMATION ABOUT AELITA SOFTWARE CORPORATION Best Practices For Designing A Secure Active Directory: Multi-Org Exchange Edition 3

4

5 INTRODUCTION This paper discusses best practices for Active Directory and Exchange 2000/2003 design. A single Active Directory forest design is compared to multi-forest designs with a focus on security and operational efficiency. Changing the Active Directory design after it is deployed might become a big administrative challenge. Thus, security and efficiency should be considered when planning Active Directory. A single Active Directory forest design is the simplest design, where there is only one forest for the whole corporate network: it is the simplest to administer, provides lower support costs, and offers the best messaging and collaboration environment for a whole company using Exchange 2000/2003. However, a single forest might not provide the level of security and isolation required by some companies. In a multi-forest Active Directory design, the corporate network is separated into several forests. This design carries higher administrative and support costs, and complicates collaboration and messaging. However, it offers the highest level of security isolation. In addition, a multi-forest design is considered by some companies because of organizational structure issues (e.g., autonomous business units and decentralized IT departments), business policy, or legal and regulatory requirements. Optimal design depends on specific company requirements and should represent a balance between administrative and support costs, ease of collaboration, and the desired level of security and isolation. Best Practices For Designing A Secure Active Directory: Multi-Org Exchange Edition 5

6 DEFINING ACTIVE DIRECTORY SECURITY BOUNDARIES Active Directory allows administrators to organize the elements of a network, such as users, computers, and devices, into a hierarchical, tree-like structure based on the concept of containership. The top level Active Directory container is called a forest. Within forests, there are domains. Within domains there are organizational units (OUs). Although Active Directory provides for granular delegation of administrative rights at the domain and the OU levels, neither domains nor OUs can provide proper security isolation. A domain in Windows 2000/2003 Active Directory cannot be considered a security boundary. Every domain controller (DC) in a forest holds a writable copy of the schema and configuration. A domain administrator or somebody with physical access to a DC can potentially disrupt the forest by attempting to circumvent Windows security or by editing the Active Directory database, with the changes being propagated to all domains in the forest. In addition, a domain cannot prevent Domain Trust attacks by service administrators who can potentially elevate their privileges beyond a domain boundary. In fact, anyone who has administrative or backup/restore rights on any domain controller or physical access to any domain controller can potentially gain full control over the whole forest to which the domain belongs. This particular vulnerability was announced in January 2002 by Microsoft. For more information on this Active Directory forest security vulnerability, please see the Protecting Active Directory from Domain Trust Vulnerability white paper at Microsoft recommends that the forest must be considered the security boundary in Active Directory design. All network elements that require security isolation need to have their separate Active Directory forests. This design is referred to as a multi-forest Active Directory design. 6 Best Practices For Designing A Secure Active Directory: Multi-Org Exchange Edition

7 A multi-forest Active Directory design provides the security and isolation required by some enterprises, but it also introduces the need for inter-forest collaboration solutions. The most important among them is the Exchange 2000/2003 messaging system. The main decision in the multi-forest Active Directory deployment is whether to have separate Exchange organizations for each Active Directory forest or for the forests to share a single common Exchange organization. The following configurations are the main ones to be considered: Single Active Directory Forest/Single Exchange Organization (SF/SO) Multiple Active Directory Forest/Single Exchange Organization (MF/SO) Multiple Active Directory Forest/Multiple Exchange Organization (MF/MO) This document describes these configurations in detail. Best Practices For Designing A Secure Active Directory: Multi-Org Exchange Edition 7

8 SINGLE FOREST/SINGLE ORGANIZATION The simplest Active Directory configuration is a single forest with a single Exchange organization. This is the configuration most companies selected during early Active Directory deployments. AD Forest Exchange Organization The main advantages of the SF/SO model are: Administration is the least complicated of the three designs. Replication is handled by native Active Directory/Exchange mechanisms. There is no need for synchronization between forests and Exchange orgs. Messaging and collaboration with all network users is intrinsic. This configuration has the following drawbacks: There is no means of separating network elements that are required, either legally (regulations) or because of business policies (autonomous business units), to be completely isolated and secure. The absence of security boundaries within the forest leaves domains vulnerable to rogue administrators. This design can be used in smaller companies that do not need to isolate any parts of their networks and that have a limited number of people with domain administrative rights. However, due to security, business policy, or regulatory reasons, this configuration might not suit medium- and large-size enterprises. 8 Best Practices For Designing A Secure Active Directory: Multi-Org Exchange Edition

9 Security Considerations This model is the weakest from a security perspective. As stated earlier, in Active Directory a forest is the only security boundary that can offer full security isolation and protection from possible security breaches. A single-forest Active Directory configuration, therefore, has no such secure boundaries. Anyone who has either administrative or backup/restore rights on any domain controller or physical access to any domain controller can potentially gain full control over the whole forest. This means that a company must completely trust all administrators in all domains of the forest and ensure that all domain controllers are located in safe and secure places. Other means of risk mitigation might include deploying administrative software for Active Directory auditing and security, as well as for secure rules & roles Active Directory and Exchange management. However, if security isolation is a legally mandatory requirement, a single forest solution cannot be used. Messaging and Collaboration In a single forest, all users have mailboxes in the same Exchange 2000/2003 organization, which gives them full collaboration capabilities with no additional administrative costs. They see all of their colleagues in the Global Address List (GAL); they can exchange mail, schedule meetings, and view each other s free/busy information; and they can access documents in the same public folders. Data Replication and Synchronization In this model, the entire company is using a single Active Directory forest and Exchange organization. This means that all data can be replicated by native Active Directory and Exchange mechanisms. In addition, this design uses one company-wide global catalog infrastructure, which speeds searches and enables Exchange 2000/2003 to generate one GAL for all users. Best Practices For Designing A Secure Active Directory: Multi-Org Exchange Edition 9

10 Administration The main advantage of this Active Directory design is its administrative simplicity. This configuration represents the least possible administrative overhead. Trusts. Active Directory automatically manages inter-domain trusts within a forest. Unified administrative model. A single service administration group can manage Active Directory service issues, while data administrators from particular domains and OUs can set security in their containers. Products exist from both Microsoft and third parties to permit the movement of certain types of objects, such as user or computer accounts, from one domain to another in the same forest. Having Exchange set up in the same forest where the user accounts are located is another important administrative advantage of the model. Active Directory and Exchange share the same directory. Each user account has a mailbox associated with it, so little additional Exchange administration is required. For example, user properties, such as name, phone numbers, and addresses, are set only once. 10 Best Practices For Designing A Secure Active Directory: Multi-Org Exchange Edition

11 MULTIPLE FORESTS/SINGLE ORGANIZATION A multiple forest design is the only option whenever security isolation is required. If a company chooses a multiple forest model, the main question that arises is the messaging system setup. Under the MF/SO model, while user accounts are split into multiple Active Directory forests, all mailboxes are located within a single Exchange 2000/2003 organization. This configuration is similar to the traditional Windows NT/Exchange 5.5 model, when separate directories were used for accounts and the messaging system. Account Forest Account Forest Exchange Forest Account Forest The model s advantages are: Multiple forests provide directory-level security boundaries. A single Exchange organization provides for a single GAL and full Exchange collaboration capabilities. Native Exchange data replication is used, lowering administrative overhead. All Exchange administration is done within a single organization. This model s drawbacks are: Each forest needs separate service administration, raising administrative overhead. Trusts between the forests have to be set up and managed manually. This issue is mitigated by the inter-forest trusts available in Windows Server 2003 forest functional mode. Best Practices For Designing A Secure Active Directory: Multi-Org Exchange Edition 11

12 Security Considerations The separate directories maintained for user accounts and the messaging system need to be continually synchronized. A single messaging system might not fulfill security, business policy, or legal requirements, just as is the case with a single forest design. This model provides directory isolation, so it can be used in medium- and large-size companies. However, its use involves more administrative effort and requires directory synchronization/ provisioning between the forests. Security is the main reason for using the multiple forest design. An Active Directory forest can be used as a security boundary in the corporate directory. However, security does not come automatically; to be effective, the boundaries need to be properly set up. Trust relationships are required between the account forests and the Exchange forest. The Exchange forest needs to trust the account forests; otherwise users will not be able to get access to their mailboxes. You might also have to set up trusts between the account forests if users need to access to any shared resources in other forests. Account Forest Account Forest Trust with SID Filtering Exchange Forest Trusts are a potential security exposure through which a malicious user might circumvent the security boundary. To prevent this, you must make sure that security ID (SID) filtering is set up on each trust relationship between forests. With this feature enabled, malicious users can not insert forged administrative SIDs into other Active Directory forests. 12 Best Practices For Designing A Secure Active Directory: Multi-Org Exchange Edition

13 When setting up group membership, you should make sure that the administrative groups from one forest do not include accounts from the other forests. Users from other forests should not be included in any of the following groups: Groups responsible for service management, or groups that can manage the membership of service administrator groups Groups with administrative control over computers that store protected data Groups that have access to protected data, or groups responsible for the management of users or group objects that have access to protected data If users from another forest are included in any of these groups, then a breach of the other forest might lead to a breach of the isolated forest and to a security risk for protected data. Within the forests it is still recommended that security precautions including the ones listed for SF/SO design are implemented. If provisioning/synchronization/metadirectory solutions are used to automate the multi-forest administration and account management, it is important that these solutions are evaluated from security standpoint. If security or legal requirements demand that certain parts of an organization have totally isolated messaging systems, this model cannot be used; the organization must have multiple, separate Exchange organizations. Messaging and Collaboration A single Exchange organization shared by the whole directory is ideal for the messaging system setup. All users have their mailboxes within the same organization. They have all their colleagues in their GAL; they can schedule meetings and use other Exchange intra-org collaboration capabilities. Also a single Exchange directory simplifies Exchange administration: All mailboxes are within the same Exchange organization so no additional third-party tools are required for their intra-org collaboration. Exchange data is replicated by the native Exchange mechanisms. The Exchange administration team has its own separate Exchange directory much like they had in Exchange 5.5, which reduces the required learning curve. Best Practices For Designing A Secure Active Directory: Multi-Org Exchange Edition 13

14 Data Replication and Synchronization Administration Having a separate forest dedicated to the Exchange directory raises a new directory synchronization challenge. Basically, each user account in an account forest has a corresponding disabled account and mailbox in the Exchange forest. This means that two accounts exist for each user. The account properties should also be synchronized between the account forests and the Exchange forest. Provisioning and deprovisioning should be accomplished when new user accounts are created or removed. This directory synchronization and provisioning is a difficult task that needs to be continually executed. Performing synchronization manually is complicated and requires much administrative time and effort. Moreover, it cannot be performed just by native Active Directory mechanisms. As with any multiple forest configuration, the main disadvantage of this model is the increased directory structure complexity. This leads to an increased administration burden: Each forest needs separate service administration. Trusts between the forests have to be set up and managed manually. This issue is mitigated by the inter-forest trusts available in Windows Server 2003 forest functional mode. The Exchange organization is located in a separate forest, so its directory also needs to be administered Another issue is that each user is represented by two objects: a user account in the account forest and a disabled mailbox account in the Exchange forest. This means that additional administration and directory synchronization software should be used to manage these duplicate directories. 14 Best Practices For Designing A Secure Active Directory: Multi-Org Exchange Edition

15 MULTIPLE FOREST/MULTIPLE ORGANIZATION In the MF/MO model, the directory is split into separate Active Directory forests, with each of the forests having its own Exchange organization. Forest with Exchange Organization Forest with Exchange Organization Forest with Exchange Organization This model provides several advantages: Multiple forests provide security boundaries between the directories. Each Exchange organization/active Directory forest pair shares the same directory. This design provides for full security isolation of both directory and messaging systems. The model s drawbacks include the following: Each forest needs separate service administration. Trusts between the forests have to be set up and managed manually. This issue is mitigated by the inter-forest trusts available in Windows Server 2003 forest functional mode. Each forest has its own administration teams (including service administration, such as schema management). The messaging system is split, so additional software is required to enable collaboration between users in different Exchange organizations. Best Practices For Designing A Secure Active Directory: Multi-Org Exchange Edition 15

16 Security Considerations This model provides the best possible options for security isolation of directory and messaging system segments. It can be used in medium- and large-size companies wherever security boundaries are required. However, the model s implementation requires directory and data replication between the Active Directory forests and Exchange organizations for inter-forest user collaboration. As a multi-forest model, this approach is safe because it maintains security boundaries between directories. Each forest is administrated separately and can be protected from possible attacks from other forests. Some of the same security considerations that were listed in the MF/SO apply to this model as well: Each forest needs separate service administration, raising administrative overhead. The separate directories need to be continually synchronized. However, MF/MO model is safer, because it lets the administrators isolate messaging system segments as well as the directory forests. Each forest has its own Exchange organization for the accounts in the forest. Trusts between the forests are: Required for shared resource usage Possibly required for data synchronization software that provides for inter-forest user collaboration The trusts and data replication between the forests should be set up with the proper security consideration in mind. (Refer to Multiple Forests/Single Organization - Security Considerations on page 5.) If any inter-forest synchronization/identity management/metadirectory solutions are put in place, special considerations should be given to the security aspects. Many of these solutions have requirements that violate forest security isolations, including the following: Might require using service accounts from other forests Might have a single installation that manages account and other information in several forests 16 Best Practices For Designing A Secure Active Directory: Multi-Org Exchange Edition

17 In the worst case, administrators of the synchronization software installed in just one of the forests could effectively get control over data and accounts in all the forests being synchronized. Thus the software ruins the security isolation and administrative autonomy that were the drivers for multi-forest deployment. Messaging and Collaboration Inside each forest, user collaboration is provided by the Exchange organization installed in the forest. However, the messaging system and, therefore, collaboration are fractured since each forest has its own Exchange organization. This means that additional work is required to minimize the impact on users. This requires additional software and administrative effort to establish data replication and synchronization of both Exchange and Active Directory data between the forests. Data Replication and Synchronization The main replication and synchronization challenges for this model arise from the Exchange organization being split between two or more forests and the subsequent interruption in collaboration. Employees of any company would surely like to have a unified messaging system. At a minimum, they would like to see their colleagues in their global address lists. This makes directory synchronization necessary. Companies that choose the MF/MO model have to decide what data needs to be synchronized and how tightly the collaboration capabilities should be synchronized between the forests. For example, GAL synchronization lets users exchange . However, if they need to be able to use calendaring (e.g., schedule meetings and phone calls), then at least their calendar free/busy information should be made available across the forests. Unfortunately, no native Active Directory or Exchange tools can perform this synchronization. Third-party tools or a collection of tools from Microsoft including Microsoft Identity Integration Server (MIIS) are required to implement Exchange data and directory synchronization when deploying the MF/MO model. Best Practices For Designing A Secure Active Directory: Multi-Org Exchange Edition 17

18 Administration Within each of the forests, the MF/MO model offers the Exchange administration simplicity of the SF/SO model. Exchange and Active Directory share the same directory. No separate Active Directory accounts should be set up for Exchange mailboxes. On the other hand, as with any multiple forest model, this configuration increases directory administration complexity: Each forest needs a separate service administration. Synchronization of Exchange data and Active Directory between the forests would also require additional administrative effort. 18 Best Practices For Designing A Secure Active Directory: Multi-Org Exchange Edition

19 SUMMARY Many medium- and large-size companies are considering a multi-forest Active Directory deployment for security, business policy, or legal reasons, or because of autonomous business units. Depending on the messaging system deployment, two multi-forest models are available. In a MF/SO model, a single Exchange forest is established with information being shared by users from the other forests. The separate Exchange forest and the various account forests require directory synchronization between them. In a MF/MO model, each forest has its own Exchange organization. Multiple Exchange organizations hinder user collaboration and require Exchange data to be replicated between the organizations. The table below summarizes the advantages and drawbacks of each model: SF/SO MF/SO MF/MO Security boundaries No Between forests Between forests and Exchange organizations Messaging and collaboration The same Exchange 2000/2003 organization for all users The same Exchange 2000/2003 organization for all users The messaging system is split between multiple Exchange organizations Required synchronization All synchronization and replication handled by native Exchange/Active Directory mechanisms Directory synchronization required between the account forests and the Exchange forest Directory and data synchronization is required between the separate forests Administration Simplest to administer Increased administration burden Increased administration burden Companies should spend considerable time researching and evaluating these three design alternatives; transitioning from one model to another after implementing an Active Directory/Exchange solution can be complex. Furthermore, multi-forest designs cannot be fully implemented with the native Active Directory and Exchange mechanisms and require third party tools for ongoing management and synchronization. Best Practices For Designing A Secure Active Directory: Multi-Org Exchange Edition 19

20 Aelita Solutions Aelita's exclusive focus is to provide the most innovative, customerfocused solutions for migration, administration, security, and recovery of Windows systems, Active Directory, and Exchange. Our products include: Aelita Enterprise Migration Manager Whether your changing world dictates simple "pruning & grafting" or more extensive Active Directory redesign, Aelita Enterprise Migration Manager offers a complete, ZeroIMPACT solution to your restructuring needs. Enterprise Migration Manager's flexibility makes it ideally suited to meet the technical requirements associated with Active Directory restructuring projects. Your organization will save both time and money as the project is shortened through automated migrations and parallel processing. Organizations will save time with scalability designed to meet the demands of the largest organizations. Aelita Enterprise Directory Manager Aelita Enterprise Directory Manager provides a secure rules & roles management platform that facilitates secure administration of Active Directory and Exchange. It can integrate with HR applications and other enterprise directories to streamline account and resource provisioning and overall identity management. Enterprise Directory Manager provides a secure rules & roles management platform that facilitates secure administration of Active Directory and Exchange. The software can be used both within one forest and in multi-forest environments. Aelita Collaboration Services for Exchange Secure by design, Aelita Collaboration Services for Exchange provides global address list and free/busy synchronization while maintaining security isolation between organizations. Administrators of multi-forest Active Directory deployments can optimize the power of synchronization yet maintain regulatory compliance and administrative autonomy. Administrators can eliminate the manual tasks of duplicating contacts in several address books. Users can stop maintaining complex personal address lists and sending multiple s to find available meeting times. 20 Best Practices For Designing A Secure Active Directory: Multi-Org Exchange Edition

21 GLOSSARY Account Forest In MF/SO design, an Active Directory forest that hosts user accounts. Users from an account forest use mailboxes located in the Exchange forest. Active Directory The directory service that stores information about objects on a network and makes this information available to users and network administrators. Data Administration Managing the objects in the directory and setting permissions on them. This includes managing computers, users, groups, organizational units, and Group Policy settings. Domain In Active Directory, the container within a forest that represents an administrative and replication boundary. Domains are normally created for geographical or organizational reasons, mainly to separate administration and/or reduce replication. Domain Controller In a Windows domain environment, a computer running Active Directory that manages user access to a network, which includes logging on, authentication, and access to the directory and shared resources. Domain Trust Vulnerability The security issue in Windows NT/2000/2003 trust relationships that allows for elevation of privilege attacks. Exchange Forest In MF/SO design, the Active Directory forest that hosts the Exchange organization that contains mailboxes for all user accounts in all the account forests. Exchange Organization (Org) A set of computers running Microsoft Exchange Server that provide messaging and collaboration services within a business, association, or group. In Active Directory, only one Exchange organization can exist per Active Directory forest. Forest In Active Directory, the highest level container. A forest is a collection of one or more Windows domains that share a common schema, configuration, and global catalog and that are linked with two-way transitive trusts. Best Practices For Designing A Secure Active Directory: Multi-Org Exchange Edition 21

22 Global Address List (GAL) A list of all Exchange users, contacts, groups, conferencing resources, and public folders in an organization. This list is retrieved from the global catalog servers in Active Directory and is used by Outlook clients to address messages or find information about recipients within the organization. Global Catalog The server that holds a complete replica of the configuration and schema naming contexts for the forest, a complete replica of the domain naming context in which the server is installed, and a partial replica of all other domains in the forest. The global catalog is the central repository for information about objects in the forest. Multi-Forest Design An Active Directory configuration in which the corporate directory is split into multiple separate forests. Multiple Forests/Multiple Organizations (MF/MO) An Active Directory configuration in which each forest has its own Exchange organization. Multiple Forests/Single Organization (MF/SO) An Active Directory configuration in which a single dedicated Exchange forest is set up as the common messaging and collaboration system for the corporate directory, which is split among several forests. Organizational Unit (OU) An Active Directory container object used within domains. An organizational unit is a logical container into which users, groups, computers, and other organizational units are placed. Replication The process of updating the directories of all servers within and between sites. Schema A description of the object classes and attributes stored in Active Directory. For each object class, the schema defines the attributes that the object class must have, the additional attributes it may have, and the object class that can be its parent. 22 Best Practices For Designing A Secure Active Directory: Multi-Org Exchange Edition

23 Security ID (SID) A data structure of variable length that identifies user, group, and computer accounts. Every account on a network is issued a unique SID when the account is created. Internal processes in Windows refer to an account s SID rather than the account's user, group, or computer name. Service Administration Tasks completed by the administrator to deliver the directory service, administer domains, own the domain controllers, and manage the configuration of the directory. SID Filtering A mechanism set on trust relationships to prevent inter-forest attacks. SIDHistory An account attribute that can optionally hold SIDs from the account s previous domains in case it took part in account migration. Single Forest Design An Active Directory model in which the corporate directory consists of a single Active Directory forest. Single Forest/Single Organization (SF/SO) An Active Directory model which has a single forest with a single Exchange organization. Synchronization The process required to update data in multiple directories/exchange organizations so that users can share common resources. Transitive Trust The standard trust relationship between Windows domains in a domain tree or forest. When a domain joins an existing forest or domain tree, a transitive trust is automatically established. Transitive trusts are always two-way relationships. This series of trusts between parent and child domains in a domain tree and between root domains of domain trees in a forest allows all domains in a forest to trust each other for the purposes of authentication. For example, if domain A trusts domain B and domain B trusts domain C, then domain A trusts domain C. Best Practices For Designing A Secure Active Directory: Multi-Org Exchange Edition 23

24 ADDITIONAL INFORMATION Active Directory and the Domain Trust Vulnerability : Microsoft: Using Security Identifier (SID) Filtering to Prevent Elevation of Privilege Attacks Microsoft White Paper: Design Considerations for Delegation of Administration in Active Directory Microsoft: Best Practice Active Directory Design for Managing Windows Networks 24 Best Practices For Designing A Secure Active Directory: Multi-Org Exchange Edition

25 ABOUT AELITA SOFTWARE CORPORATION Aelita Software provides systems management solutions to organizations that rely on Microsoft Windows technologies. Aelita s proven expertise with Active Directory and Exchange helps customers improve productivity, system availability and security. IT professionals choose Aelita solutions to administer, migrate, recover and audit these critical systems. The company s customers and partners include Bristol-Myers Squibb, HMS Host (formerly known as Host Marriott Services), Kmart Corporation, Pitney Bowes, Textron, Inc., Hewlett-Packard and Microsoft. Aelita is a global organization with headquarters in Columbus, Ohio. Contact Aelita at or visit Contacting Aelita Software Corporation: Web: Technical Support: Sales: General Inquiries: support@aelita.com sales@aelita.com services@aelita.com Phone: Fax: Aelita Software Corporation 6500 Emerald Parkway Suite 400 Columbus, Ohio USA Best Practices For Designing A Secure Active Directory: Multi-Org Exchange Edition 25

Quest Collaboration Services 3.6.1. How it Works Guide

Quest Collaboration Services 3.6.1. How it Works Guide Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Best Practice Active Directory Design for Managing Windows Networks

Best Practice Active Directory Design for Managing Windows Networks Best Practice Active Directory Design for Managing Windows Networks A structured approach to Active Directory design makes enterprise-scale directory service deployment straightforward and easy to understand.

More information

Quest Collaboration Services 3.5. How it Works Guide

Quest Collaboration Services 3.5. How it Works Guide Quest Collaboration Services 3.5 How it Works Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Dell Migration Manager for Active Directory 8.11. Product Overview

Dell Migration Manager for Active Directory 8.11. Product Overview Dell Migration Manager for Active Directory 8.11 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Windows Server 2003 Active Directory: Perspective

Windows Server 2003 Active Directory: Perspective Mary I. Hubley, MaryAnn Richardson Technology Overview 25 September 2003 Windows Server 2003 Active Directory: Perspective Summary The Windows Server 2003 Active Directory lies at the core of the Windows

More information

Migrate from Exchange Public Folders to Business Productivity Online Standard Suite

Migrate from Exchange Public Folders to Business Productivity Online Standard Suite Migrate from Exchange Public Folders to Business Productivity Online Standard Suite White Paper Microsoft Corporation Published: July 2009 Information in this document, including URL and other Internet

More information

ADMT v3 Migration Guide

ADMT v3 Migration Guide ADMT v3 Migration Guide Microsoft Corporation Published: November 2006 Abstract This guide explains how to use the Active Directory Migration Tool version 3 (ADMT v3) to restructure your operating environment.

More information

ADMT v3.1 Guide: Migrating and Restructuring Active Directory Domains

ADMT v3.1 Guide: Migrating and Restructuring Active Directory Domains ADMT v3.1 Guide: Migrating and Restructuring Active Directory Domains Microsoft Corporation Published: July 2008 Authors: Moon Majumdar, Brad Mahugh Editors: Jim Becker, Fran Tooke Abstract This guide

More information

identity management in Linux and UNIX environments

identity management in Linux and UNIX environments Whitepaper identity management in Linux and UNIX environments EXECUTIVE SUMMARY In today s IT environments everything is growing, especially the number of users, systems, services, applications, and virtual

More information

Introduction to Active Directory Services

Introduction to Active Directory Services Introduction to Active Directory Services Tom Brett A DIRECTORY SERVICE A directory service allow businesses to define manage, access and secure network resources including files, printers, people and

More information

Quest Collaboration Services 3.7. Deployment Guide

Quest Collaboration Services 3.7. Deployment Guide Quest Collaboration Services 3.7 Deployment Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

SMART Considerations for Active Directory Migration. A Strategic View and Best Practices for Migrating the Corporate Directory

SMART Considerations for Active Directory Migration. A Strategic View and Best Practices for Migrating the Corporate Directory SMART Considerations for Active Directory Migration A Strategic View and Best Practices for Migrating the Corporate Directory Table of Contents Introduction: The Strategic View of Active Directory Migrations...

More information

Designing the Active Directory Structure

Designing the Active Directory Structure 253 CHAPTER 9 Designing the Active Directory Structure Microsoft Windows 2000 Server includes a directory service called Active Directory. The Active Directory concepts, architectural elements, and features

More information

Redeploying Microsoft CRM 3.0

Redeploying Microsoft CRM 3.0 Redeploying Microsoft CRM 3.0 2005 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies,

More information

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks

More information

Prüfungsnummer. fungsnummer: 70-238. Prüfungsname. fungsname: Version : Demo. Pro:Deploying Messaging Solutions w/ms Exchange Server 2007

Prüfungsnummer. fungsnummer: 70-238. Prüfungsname. fungsname: Version : Demo. Pro:Deploying Messaging Solutions w/ms Exchange Server 2007 Prüfungsnummer fungsnummer: 70-238 Prüfungsname fungsname: Pro:Deploying Messaging Solutions w/ms Exchange Server 2007 Version : Demo http://www.it-pruefungen.de/ QUESTION NO: 1 You work as the exchange

More information

8.7. Target Exchange 2010 Environment Preparation

8.7. Target Exchange 2010 Environment Preparation 8.7 Target Exchange 2010 Environment Preparation 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document

More information

Websense Support Webinar: Questions and Answers

Websense Support Webinar: Questions and Answers Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user

More information

Forests, trees, and domains

Forests, trees, and domains Active Directory is a directory service used to store information about the network resources across a. An Active Directory (AD) structure is a hierarchical framework of objects. The objects fall into

More information

WINDOWS 2000 Training Division, NIC

WINDOWS 2000 Training Division, NIC WINDOWS 2000 Active TE Directory Services WINDOWS 2000 Training Division, NIC Active Directory Stores information about objects on the network and makes this information easy for administrators and users

More information

Best Practices for an Active Directory Migration

Best Practices for an Active Directory Migration Best Practices for an Active Directory Migration Written by Derek Melber, MCSE, MVP, president, BrainCore.Net AZ, Inc. Abstract This white paper details the major challenges of Microsoft Active Directory

More information

Active Directory and DirectControl

Active Directory and DirectControl WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now

More information

CGIAR Active Directory Design Assessment DRAFT. 18 September 2007

CGIAR Active Directory Design Assessment DRAFT. 18 September 2007 CGIAR Active Directory Design Assessment DRAFT 18 September 2007 1170 Hamilton Court Menlo Park, California 94025 www.cgnet.com Table of Contents 1. Executive Summary...3 2. Introduction...4 3. Alternative

More information

Overview of Active Directory Rights Management Services with Windows Server 2008 R2

Overview of Active Directory Rights Management Services with Windows Server 2008 R2 Overview of Active Directory Rights Management Services with Windows Server 2008 R2 Student Manual Module 5: Information Rights Management on Server Applications Information in this document, including

More information

Ultimus and Microsoft Active Directory

Ultimus and Microsoft Active Directory Ultimus and Microsoft Active Directory May 2004 Ultimus, Incorporated 15200 Weston Parkway, Suite 106 Cary, North Carolina 27513 Phone: (919) 678-0900 Fax: (919) 678-0901 E-mail: documents@ultimus.com

More information

Lesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure

Lesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure Lesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure (Exam 70-294) Table of Contents Course Overview... 2 Section 1.1: Introduction to Active Directory... 3 Section

More information

Module 1: Introduction to Active Directory Infrastructure

Module 1: Introduction to Active Directory Infrastructure Module 1: Introduction to Active Directory Infrastructure Contents Overview 1 Lesson: The Architecture of Active Directory 2 Lesson: How Active Directory Works 10 Lesson: Examining Active Directory 19

More information

Real-Time Security for Active Directory

Real-Time Security for Active Directory Real-Time Security for Active Directory Contents The Need to Monitor and Control Change... 3 Reducing Risk and Standardizing Controls... 3 Integrating Change Monitoring... 4 Policy Compliance... 4 The

More information

MOC 6436A: Designing Active Directory Infrastructure and Services in Windows Server 2008

MOC 6436A: Designing Active Directory Infrastructure and Services in Windows Server 2008 MOC 6436A: Designing Active Directory Infrastructure and Services in Windows Server 2008 Course Number: 6436A Course Length: 5 Days Course Overview At the end of this five-day course, students will learn

More information

Manage all your Office365 users and licenses

Manage all your Office365 users and licenses Manage all your Office365 users and licenses Delegate 365 White Paper Authors: Toni Pohl, Martina Grom Version: 1.2 of December 2014 atwork information technology gmbh. All rights reserved. For information

More information

IBM Rational ClearCase 4.x and Active Directory

IBM Rational ClearCase 4.x and Active Directory IBM Rational ClearCase 4.x and Active Directory ABSTRACT: Like any enterprise-scale application in a Windows network, Rational ClearCase will be affected when the network is converted from using Windows

More information

Department of Information Technology Active Directory Audit Final Report. August 2008. promoting efficient & effective local government

Department of Information Technology Active Directory Audit Final Report. August 2008. promoting efficient & effective local government Department of Information Technology Active Directory Audit Final Report August 2008 promoting efficient & effective local government Executive Summary Active Directory (AD) is a directory service by Microsoft

More information

How Cisco IT Migrated to Microsoft Active Directory

How Cisco IT Migrated to Microsoft Active Directory How Cisco IT Migrated to Microsoft Active Directory Automated migration and provisioning tools reduce cost of migrating to Active Directory and simplify training and troubleshooting. Cisco IT Case Study

More information

Windows Least Privilege Management and Beyond

Windows Least Privilege Management and Beyond CENTRIFY WHITE PAPER Windows Least Privilege Management and Beyond Abstract Devising an enterprise-wide privilege access scheme for Windows systems is complex (for example, each Window system object has

More information

Documentation. CloudAnywhere. http://www.cloudiway.com. Page 1

Documentation. CloudAnywhere. http://www.cloudiway.com. Page 1 Documentation CloudAnywhere http://www.cloudiway.com Page 1 Table of Contents 1 INTRODUCTION 3 2 OVERVIEW 4 2.1 KEY FUNCTIONALITY 4 2.2 PREREQUISITES 5 3 FEATURES 6 3.1 A UNIVERSAL PROVISIONING SOLUTION.

More information

Administering Group Policy with Group Policy Management Console

Administering Group Policy with Group Policy Management Console Administering Group Policy with Group Policy Management Console By Jim Lundy Microsoft Corporation Published: April 2003 Abstract In conjunction with Windows Server 2003, Microsoft has released a new Group

More information

Multi-Tenant Scalability Guidance for Exchange Server 2010 Service Pack 2

Multi-Tenant Scalability Guidance for Exchange Server 2010 Service Pack 2 Multi-Tenant Scalability Guidance for Exchange Server 2010 Service Pack 2 Customer Advisory Team Exchange Product Group Microsoft Corporation December 2011 Contents Introduction... 3 Scalability Guidance...

More information

An Oracle White Paper September 2013. Directory Services Integration with Database Enterprise User Security

An Oracle White Paper September 2013. Directory Services Integration with Database Enterprise User Security An Oracle White Paper September 2013 Directory Services Integration with Database Enterprise User Security Disclaimer The following is intended to outline our general product direction. It is intended

More information

Planning and Implementing an OU Structure

Planning and Implementing an OU Structure 3 CHAPTER THREE Planning and Implementing an OU Structure Terms you ll need to understand: Organizational unit (OU) Delegation of control Group Policy Security group Linked policies Techniques/concepts

More information

Installing Microsoft Exchange Integration for LifeSize Control

Installing Microsoft Exchange Integration for LifeSize Control Installing Microsoft Exchange Integration for LifeSize Control September 2005 Part Number 132-00002-001, Version 1.1 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize

More information

The Challenges of Administering Active Directory

The Challenges of Administering Active Directory The Challenges of Administering Active Directory As Active Directory s role in the enterprise has drastically increased, so has the need to secure the data it stores and to which it enables access. The

More information

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions. Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory

More information

Installation and Configuration Guide

Installation and Configuration Guide www.novell.com/documentation Installation and Configuration Guide GroupWise Coexistence Solution for Exchange November 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect

More information

Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer

Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan

More information

What s New Guide. Active Administrator 6.0

What s New Guide. Active Administrator 6.0 What s New Guide Active Administrator 6.0 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5

Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5 Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5 Disclaimer The following is intended to outline our general product

More information

DriveLock and Windows 7

DriveLock and Windows 7 Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Module 3: Implementing an Organizational Unit Structure

Module 3: Implementing an Organizational Unit Structure Module 3: Implementing an Organizational Unit Structure Contents Overview 1 Lesson: Creating and Managing Organizational Units 2 Lesson: Delegating Administrative Control of Organizational Units 13 Lesson

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture Introduction... 3 Identity management... 3 What is Identity

More information

The Challenges of Administering Active Directory

The Challenges of Administering Active Directory The Challenges of Administering Active Directory As Active Directory s role in the enterprise has drastically increased, so has the need to secure the data it stores and to which it enables access. The

More information

Dell Migration Manager for Exchange 8.11. Product Overview

Dell Migration Manager for Exchange 8.11. Product Overview Dell Migration Manager for Exchange 8.11 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Pipeliner CRM Phaenomena Guide Administration & Setup. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Administration & Setup. 2015 Pipelinersales Inc. www.pipelinersales.com Administration & Setup 05 Pipelinersales Inc. www.pipelinersales.com Administration & Setup Learn how to manage your sales team with Pipeliner Sales CRM Application. CONTENT. Managing Pipeliner s Users

More information

BEST PRACTICES FOR PROTECTING MICROSOFT EXCHANGE DATA

BEST PRACTICES FOR PROTECTING MICROSOFT EXCHANGE DATA BEST PRACTICES FOR PROTECTING MICROSOFT EXCHANGE DATA Bill Webster September 25, 2003 VERITAS ARCHITECT NETWORK TABLE OF CONTENTS Introduction... 3 Exchange Data Protection Best Practices... 3 Application

More information

Best Practices for Auditing Changes in Active Directory WHITE PAPER

Best Practices for Auditing Changes in Active Directory WHITE PAPER Best Practices for Auditing Changes in Active Directory WHITE PAPER Table of Contents Executive Summary... 3 Needs for Auditing and Recovery in Active Directory... 4 Tracking of Changes... 4 Entitlement

More information

Collaboration Technology Support Center Microsoft Collaboration Brief

Collaboration Technology Support Center Microsoft Collaboration Brief Collaboration Technology Support Center Microsoft Collaboration Brief September 2005 HOW TO INTEGRATE MICROSOFT EXCHANGE SERVER INTO SAP ENTERPRISE PORTAL Authors Robert Draken, Solution Architect, Comma

More information

CA Spectrum Active Directory and Exchange Server Manager

CA Spectrum Active Directory and Exchange Server Manager CA Spectrum Active Directory and Exchange Server Manager Solution Guide Release 9.2.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred

More information

SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR DOCUMENTUM @ EROOM

SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR DOCUMENTUM @ EROOM SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR DOCUMENTUM @ EROOM Abstract This paper explains how to setup Active directory service on windows server 2008.This guide also explains about how to install

More information

Managing an Active Directory Infrastructure

Managing an Active Directory Infrastructure 3 CHAPTER 3 Managing an Active Directory Infrastructure Objectives This chapter covers the following Microsoft-specified objectives for the Planning and Implementing an Active Directory Infrastructure

More information

2.0. Quick Start Guide

2.0. Quick Start Guide 2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished

More information

End-to-End Identity Management With Oblix and Microsoft WHITEPAPER

End-to-End Identity Management With Oblix and Microsoft WHITEPAPER End-to-End Identity Management With Oblix and Microsoft WHITEPAPER Copyright 2004 Oblix, Inc. All rights reserved This white paper is for informational purposes only. Oblix makes no warranties, expressed

More information

The 2007 R2 Version of Microsoft Office Communicator Mobile for Windows Mobile: Frequently Asked Questions

The 2007 R2 Version of Microsoft Office Communicator Mobile for Windows Mobile: Frequently Asked Questions The 2007 R2 Version of Microsoft Office Communicator Mobile for Windows Mobile: Frequently Asked Questions Published: December 2008 Information in this document, including URL and other Internet Web site

More information

Google Apps Deployment Guide

Google Apps Deployment Guide CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate

More information

Implementing HIPAA Compliance with ScriptLogic

Implementing HIPAA Compliance with ScriptLogic Implementing HIPAA Compliance with ScriptLogic A ScriptLogic Product Positioning Paper By Nick Cavalancia 1.800.424.9411 www.scriptlogic.com Table of Contents INTRODUCTION... 3 HIPAA BACKGROUND... 3 ADMINISTRATIVE

More information

Managing UNIX Generic and Service Accounts with Active Directory

Managing UNIX Generic and Service Accounts with Active Directory APPLICATION NOTE Managing UNIX Generic and Service Accounts with Active Directory Published: June 2007 Abstract Generic accounts are commonly used to enable UNIX administrative staff to log on to a computer

More information

The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones

The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones The Definitive Guide tm To Active Directory Troubleshooting, Auditing, and Best Practices 2011 Edition Don Jones Ch apter 5: Active Directory Auditing... 63 Goals of Native Auditing... 63 Native Auditing

More information

Connecting Software Connect Bridge - Exchange Server Sync User manual

Connecting Software Connect Bridge - Exchange Server Sync User manual Connect Bridge - Exchange Server Sync User manual Document History Version Date Author Changes 1.0 02 Mar 2015 KK Creation 1.1 17 Apr 2015 KK Update 1.2 27 July 2015 KK Update 1.3 3 March 2016 DMI Update

More information

Restructuring Active Directory Domains Within a Forest

Restructuring Active Directory Domains Within a Forest C H A P T E R 1 2 Restructuring Active Directory Domains Within a Forest Restructuring Active Directory directory service domains within a forest with the goal of reducing the number of domains allows

More information

Windows Server 2003 Active Directory MST 887. Course Outline

Windows Server 2003 Active Directory MST 887. Course Outline Content and/or textbook subject to change without notice. Pennsylvania College of Technology Workforce Development & Continuing Education Windows Server 2003 Active Directory MST 887 Course Outline Course

More information

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows Quest InTrust Version 8.0 What's New Active Directory Exchange Windows Abstract This document describes the new features and capabilities of Quest InTrust 8.0. Copyright 2004 Quest Software, Inc. and Quest

More information

Why cloud backup? Top 10 reasons

Why cloud backup? Top 10 reasons Why cloud backup? Top 10 reasons HP Autonomy solutions Table of contents 3 Achieve disaster recovery with secure offsite cloud backup 4 Free yourself from manual and complex tape backup tasks 4 Get predictable

More information

content-aware identity & access management in a virtual environment

content-aware identity & access management in a virtual environment WHITE PAPER Content-Aware Identity & Access Management in a Virtual Environment June 2010 content-aware identity & access management in a virtual environment Chris Wraight CA Security Management we can

More information

SUPPORTED ACTIVE DIRECTORY TOPOLOGIES BY LYNC 2013

SUPPORTED ACTIVE DIRECTORY TOPOLOGIES BY LYNC 2013 SUPPORTED ACTIVE DIRECTORY TOPOLOGIES BY LYNC 2013 LYNC SERVER 2013 Lync Server 2013 supports the same Active Directory Domain Services topologies as Microsoft Lync Server 2010 and Microsoft Office Communications

More information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information Store, Manage, and Discover Critical Business Information Trusted and Proven Email Archiving Symantec Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage,

More information

Active Directory. By: Kishor Datar 10/25/2007

Active Directory. By: Kishor Datar 10/25/2007 Active Directory By: Kishor Datar 10/25/2007 What is a directory service? Directory Collection of related objects Files, Printers, Fax servers etc. Directory Service Information needed to use and manage

More information

ONE Mail Direct for Desktop Software

ONE Mail Direct for Desktop Software ONE Mail Direct for Desktop Software Version: 1 Document ID: 3931 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2015, ehealth Ontario All rights reserved No part of this document may

More information

Microsoft Office 365 from Vodafone. Administrator s Guide for Midsize Businesses and Enterprises

Microsoft Office 365 from Vodafone. Administrator s Guide for Midsize Businesses and Enterprises Microsoft Office 365 from Vodafone Administrator s Guide for Midsize Businesses and Enterprises Contents Footer bar Return to contents page Go to next of section Return to start of section Previous page

More information

Archive Attender. Version 3.2. White Paper. Archive Attender is a member of the Attender Utilities family. www.re-soft.

Archive Attender. Version 3.2. White Paper. Archive Attender is a member of the Attender Utilities family. www.re-soft. Archive Attender Version 3.2 White Paper Archive Attender is a member of the Attender Utilities family Under the copyright laws, neither the documentation nor the software can be copied, photocopied, reproduced,

More information

Lepide Exchange Recovery Manager

Lepide Exchange Recovery Manager Configuration Guide Lepide Exchange Recovery Manager Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights

More information

6.7. Quick Start Guide

6.7. Quick Start Guide 6.7 Quick Start Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not

More information

MCTS Guide to Microsoft Windows 7. Chapter 13 Enterprise Computing

MCTS Guide to Microsoft Windows 7. Chapter 13 Enterprise Computing MCTS Guide to Microsoft Windows 7 Chapter 13 Enterprise Computing Objectives Understand Active Directory Use Group Policy to control Windows 7 Control device installation with Group Policy settings Plan

More information

Extend your Exchange On Premises Organization to the Cloud

Extend your Exchange On Premises Organization to the Cloud Phoenix Cloud Intelligence 2012 Extend your Exchange On Premises Organization to the Cloud Mike Pfeiffer Technical Director Interface Technical Training What is Office 365? Bringing together cloud versions

More information

Administration Challenges

Administration Challenges The Essentials Series: Enterprise Identity and Access Management Administration Challenges sponsored by by Richard Siddaway Administration Challenges...1 Heterogeneous Environments...1 Multiple Directories...1

More information

Mastering Mergers and Acquisitions: Controlling Impacts on Active Directory and Exchange Infrastructures

Mastering Mergers and Acquisitions: Controlling Impacts on Active Directory and Exchange Infrastructures Mastering Mergers and Acquisitions: Controlling Impacts on Active Directory and Exchange Infrastructures Use the right combination of tools and processes to protect your core network services during these

More information

CA Spectrum Active Directory and Exchange Server Manager

CA Spectrum Active Directory and Exchange Server Manager CA Spectrum Active Directory and Exchange Server Manager Solution Guide Release 9.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred

More information

Netwrix Auditor. Administrator's Guide. Version: 7.1 10/30/2015

Netwrix Auditor. Administrator's Guide. Version: 7.1 10/30/2015 Netwrix Auditor Administrator's Guide Version: 7.1 10/30/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix Corporation

More information

The Encryption Anywhere Data Protection Platform

The Encryption Anywhere Data Protection Platform The Encryption Anywhere Data Protection Platform A Technical White Paper 5 December 2005 475 Brannan Street, Suite 400, San Francisco CA 94107-5421 800-440-0419 415-683-2200 Fax 415-683-2349 For more information,

More information

6.7. Administrator Guide

6.7. Administrator Guide 6.7 Administrator Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Open Directory. Apple s standards-based directory and network authentication services architecture. Features Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data

More information

Module 1: Introduction to Designing Security

Module 1: Introduction to Designing Security Module 1: Introduction to Designing Security Table of Contents Module Overview 1-1 Lesson 1: Overview of Designing Security for Microsoft Networks 1-2 Lesson 2: Introducing Contoso Pharmaceuticals: A Case

More information

Citrix Systems, Inc.

Citrix Systems, Inc. Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change

More information

Mailbox Recovery for Microsoft Exchange 2000 Server. Published: August 2000 Updated: July 2002 Applies To: Microsoft Exchange 2000 Server SP3

Mailbox Recovery for Microsoft Exchange 2000 Server. Published: August 2000 Updated: July 2002 Applies To: Microsoft Exchange 2000 Server SP3 Mailbox Recovery for Microsoft Exchange 2000 Server Published: August 2000 Updated: July 2002 Applies To: Microsoft Exchange 2000 Server SP3 Copyright The information contained in this document represents

More information

With Windows Server 2003 Active Directory

With Windows Server 2003 Active Directory Understanding Active Directory Domains and Trusts With Windows Server 2003 Active Directory Domains and Trusts structure, you can control the information flow, access to resources, security, and the type

More information

Pipeliner CRM Phaenomena Guide Add-In for MS Outlook. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Add-In for MS Outlook. 2015 Pipelinersales Inc. www.pipelinersales.com Add-In for MS Outlook 205 Pipelinersales Inc. www.pipelinersales.com Add-In for MS Outlook Learn how to use sales lead management with Pipeliner MS Outlook Add-In. CONTENT. Setting up Pipeliner Add-In

More information

DriveLock and Windows 8

DriveLock and Windows 8 Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Netwrix Auditor for Windows Server

Netwrix Auditor for Windows Server Netwrix Auditor for Windows Server Quick-Start Guide Version: 7.0 7/7/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

8.3. Competitive Comparison vs. Microsoft ADMT 3.1

8.3. Competitive Comparison vs. Microsoft ADMT 3.1 8.3 Competitive Comparison vs. Microsoft ADMT 3.1 Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described

More information

Windows BitLocker Drive Encryption Step-by-Step Guide

Windows BitLocker Drive Encryption Step-by-Step Guide Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft

More information

8.7. Installation Guide

8.7. Installation Guide 8.7 Installation Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under a

More information