Legal Considerations for Archiving Why implementing an effective archiving solution can help reduce legal risk
|
|
- Evelyn Oliver
- 8 years ago
- Views:
Transcription
1 Legal Considerations for Archiving Why implementing an effective archiving solution can help reduce legal risk Written by: Quest Software, Inc. Executive Summary
2 Copyright Quest Software, Inc All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser's personal use without the written permission of Quest Software, Inc. WARRANTY The information contained in this document is subject to change without notice. Quest Software makes no warranty of any kind with respect to this information. QUEST SOFTWARE SPECIFICALLY DISCLAIMS THE IMPLIED WARRANTY OF THE MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Quest Software shall not be liable for any direct, indirect, incidental, consequential, or other damage alleged in connection with the furnishing or use of this information. TRADEMARKS All trademarks and registered trademarks used in this guide are property of their respective owners. World Headquarters 5 Polaris Way Aliso Viejo, CA info@quest.com U.S. and Canada: Please refer to our Web site for regional and international office information. Updated May,
3 ABSTRACT This document helps explain why implementing an effective archiving solution can help reduce legal risk even if an organization has yet to decide what sort of retention and disposal policies are appropriate for them. 2
4 DISCLAIMER This document is not intended to provide legal advice. Quest recommends professional legal advice is sought before considering or implementing any of the information in this document. Quest is not responsible for any loss or damage which may be caused as a result of using information provided in this document. 3
5 CONTENTS ABSTRACT... 2 DISCLAIMER... 3 CONTENTS... 4 INTRODUCTION... 5 LEGAL CONSIDERATIONS FOR MANAGING WHAT SHOULD BE KEPT?... 6 ARE DELETED MESSAGES REALLY DELETED?... 6 HOW BAD CAN IT BE?... 7 YOU RE PROBABLY KEEPING ALL YOUR ANYWAY... 7 PSTS ARE LANDMINES... 8 UNDERSTANDING HOW ARCHIVING CAN HELP... 9 TAKE CONTROL OF MANAGING RETENTION...10 SUMMARY ABOUT QUEST SOFTWARE, INC CONTACTING QUEST SOFTWARE...13 CONTACTING QUEST SUPPORT
6 INTRODUCTION Recent litigation and legislation have combined to raise the profile of the importance of , and impose burdens on organizations of most sizes, in most industries. Illustrated in Table 1 below, high profile cases involving institutions such as Morgan Stanley, Bank of America, Phillip Morris and JP Morgan have resulted in multi-million dollar fines, setting the stage for enforced management. Offending Company Case Penalty Judgment Morgan Stanley Coleman Holdings v. Morgan Stanley (2005) Bank of America SEC Settlement (2004) Philip Morris United States v. Philip Morris USA Inc. (2004) $1.45B Failure to produce e- mail evidence $10M Failure to produce e- mail evidence $2.75M Spoliation (deletion of 60-day old for 2 years) J.P. Morgan SEC, NASD, NYSE Settlement (2005) $2.1M Spoliation of Table 1. Examples of violations in retention. But despite the potential penalties, organizations affected by the myriad of legislation are struggling to determine how to address their compliance requirements everything from not doing anything with to not dealing with it properly. Implementing an archiving system helps organizations address compliance requirements by ensuring there are mechanisms in place to capture and locate information. Often, in addition to helping with compliance requirements, these systems have operational benefits, such as reducing overall storage requirements and centralizing the control of the system to improve performance and realize better use of limited resources. But once implemented, organizations also need to ensure that the policies controlling the archiving solution meet the requirements of the business. In many cases, though, organizations have been so daunted by the many options available to them that they have either done nothing and delayed deployment of a solution, or not purchased a solution at all. This technical brief helps explain why implementing an effective archiving solution can help reduce legal risk even if an organization has yet to decide what sort of retention and disposal policies are appropriate for them. 5
7 LEGAL CONSIDERATIONS FOR MANAGING E- MAIL From a legal perspective is fraught with risk and many legal departments would prefer was not used at all. However, the reality is that is now the predominant form of business communication and while is simple to use, its ramifications for business are significant. Additionally, the hesitancy of the legal department to agree to, or implement, an archiving system can have a detrimental effect on other parts of the business that want to take advantage of the operational benefits these systems provide. A number of companies have delayed deploying an archiving solution because they believe that until they have formulated appropriate policies, keeping in an archive will expose them to increased risk. In an ideal situation, a business would retain all s that are beneficial and dispose of those that are harmful within the bounds of the law. There are a number of reasons while this seemingly simple requirement is virtually impossible to achieve. What should be kept? s are context poor, in that it is often very difficult to decide the importance of an based purely on its content. Furthermore, many e- mails contain office banter and important information. Events often determine the importance of an and so an that may have been deemed to have no value can take on a whole new meaning in the context of an event such as a sexual harassment case. Individuals can t be expected to classify as to their importance not just because of the above but also because the typical volume of makes this impractical. No one would keep an that was damaging to them even if it was important to their organization. Are deleted messages really deleted? Like a fax machine transaction there is always more than one the sender s copy, and anyone who receives the message. exists in peoples sent items folders and in multiple inboxes both internally and externally. Completely deleting an is often impossible. Even if you manage to delete it within your organization it could exist outside of your corporate boundaries. This is further complicated by the use of offline stores or personal stores where an is no longer contained in the corporate mail 6
8 system but exits on a local computer drive that is effectively beyond the control of an organization s IT department. All of these repositories could be searched as part of a legal discovery exercise even though it is a complex and expensive process. How bad can it be? In the event of litigation where is involved (which is most litigation) it is vital to know what the potential exposure is to the organization. If you can t search and discover across your own repository how can you formulate a strategy to deal with the situation? Modern platforms are optimized to send and receive . However they lack the ability to effectively search and manage the data they contain and, as previously mentioned, data is often stored outside of the system. The defense of not having the systems in place to search is no longer an acceptable reason to not produce in a timely manner. For example, in early 2007 Intel said it may have lost correspondence relevant to an antitrust lawsuit brought by rival Advanced Micro Devices (AMD). The company's document-retention program, which was used around the time of the AMD suit, possibly did not preserve potentially relevant messages. AMD accused Intel of apparently allowing the destruction of evidence. You re probably keeping all your anyway Most organizations will find that regardless of any formal retention and disposal policies, end users retain almost all of their messages. Usually these messages are kept in the personal stores mentioned earlier. End users retain most of their s because they believe they have to in order to perform their jobs, or in some cases they do so for personal protection. Remember: is now the most widely used form of business communication. As a result, organizations will unwittingly be keeping significantly more than it knows about or controls, increasing the likelihood of non-compliance. Most organizations force people to keep their outside of the corporate mail system systems are not designed to store long-term and so most organizations have quotas whereby users are limited to a certain size of store in the system. When a quota is reached or exceeded a user is forced to delete s to reduce storage before they can send or receive new messages. To avoid being interrupted by these messages, users either move to a personal store and/or randomly delete (usually starting with the largest ones) to get below their quota limit. 7
9 This has two serious implications: Once is outside of the corporate system they are no longer in corporate control and this presents a serious risk as they exist but cannot easily be searched and accessed by the organization. If users are randomly deleting to stay under their quota the risk to the organization increases. Not only are the deleted of potential business value, they may also be important from a compliance perspective. Organizations need a way of ensuring the right information is retained, and that the organization not end users manage this. PSTs Are Landmines Some organizations work to limit -based liability by aggressively deleting out of the mail server, believing that if does not exist it cannot be discovered. These same organizations often do not have an effective means of controlling, deleting, or retaining messages that reside in personal stores. Because that exists in personal stores is certainly discoverable and open to subpoena, yet is mostly invisible to the organization as it is not centrally stored nor managed, PSTs are essentially legal landmines that undermine an organization s effort to decrease liability. Only through the collection and proactive management of all these personal stores and all other data can an organization be prepared to deal with the -related legal issues that are bound to arise. 8
10 UNDERSTANDING HOW ARCHIVING CAN HELP In this situation, the risk is not keeping all of your messages; it s not knowing what you have, nor being able to manage it. archiving solutions have been designed to help organizations control and manage their , not only helping them to address their compliance requirements, but also reducing overall storage utilization, assisting with mailbox management and increasing the performance of the mission critical server. Often, the needs of the wider organization are considered less significant than those of the legal team, who understandably need to understand the pros and cons of implementing such systems, and make recommendations accordingly. Regardless of the size of the company, or the industry in which it operates, understanding these issues can be a challenge. As a result, the implementation of such a system often stalls. The question the lawyers want answered is: Why should we implement an archiving solution if we haven t formulated retention and disposal policies? There are several rational reasons why implementation is important, and the factors identified in the previous section can be addressed. Take Control of One of the primary objectives of any archiving project must be to gain some level of control over the in your organization. In this case, control doesn t only mean being able to manage the new messages being sent and received, but also includes all of the other which is stored across the organization in file shares, on local hard disks, in Microsoft Outlook personal store (PST) files, etc. Retention and disposal policies are worthless if they cannot be effectively applied and managed and if is stored in disparate locations it is impossible to apply such policies. An effective archiving solution can import all the from personal stores and the corporate system, regardless of where this data is located. also needs to be managed on an ongoing basis. Even once it s been collected, it is important that users are either no longer able to, or no longer need to, keep in personal stores. Given that users need access to old e- mails in order to perform their jobs, their quota needs to be effectively removed. Quest Archive Manager provides two powerful features to address this issue: the ability for end users to search their , and the ability to manage the size of the originating message store. 9
11 End users can have direct and secure access to their archived , and can use the powerful search tools to quickly locate the information they need. Below, Figure 1 depicts the standard web-based search screen that Archive Manager provides, including the results of a sample search. Messages can be opened directly from this results grid. Figure 1: Archive Manager Search Screen Archive Manager can also help manage the corporate store so users can effectively have an unlimited quota without putting the corporate system at risk, and in doing so maintains access to the for end users including those who access using Microsoft Outlook. Reducing the size of the store also improves the performance of the store, and reduces the amount of data that needs to be backed up. Once all s are centrally captured and managed retention and disposal policies (once formulated) can be applied retrospectively. It is expected that an organization will evolve their policies over time to keep pace with changing business and legislative requirements. Managing Retention Retention will allow organizations to determine how long to keep messages for, both at a global and a partial level once the retention period has passed, then the messages are removed from the archive. Laws and regulations specify that, for some industries, messages must be kept for a specific period of time, in some cases ranging from one year to 10+ years. The retention policies and the rules which are implemented supporting those policies must be sufficiently precise in order to increase the likelihood of compliance. 10
12 As this is an emerging area, there are few examples of organizations being fined for mismanaging their retention rules the -related cases that have occurred have been related to not keeping in the first place. By ensuring the messages are kept, and that appropriate classifications are used, organizations can use Archive Manager s flexible retention policies to control the retention and disposal of . Figure 2 below shows how organizations can create flexible retention policies to suit their specific needs. Figure 2: Archive Manager Retention Policy Editor 11
13 SUMMARY Most organizations now have to comply with laws and regulations relating to e- mail and how it is managed. The penalties for non-compliance are significant, and for that reason archiving solutions are being adopted to help organizations address their compliance requirements. By relying on the status quo and not implementing a solution, organizations are exposing themselves to unnecessary risk and effort as their data will not be controlled, managed or able to be located in a timely way. Implementing an archiving system ensures organizations gain control of their data, and in conjunction with appropriate people, processes and technologies, can significantly increase the likelihood of compliance being achieved. Organizations will also benefit from the operational benefits such systems also deliver. Quest Archive Manager enables to become a true asset for the organization by capturing, indexing, and storing messaging data for mailbox management, compliance, and knowledge sharing. 12
14 ABOUT QUEST SOFTWARE, INC. Quest Software, Inc. delivers innovative products that help organizations get more performance and productivity from their applications, databases and Windows infrastructure. Through a deep expertise in IT operations and a continued focus on what works best, Quest helps more than 50,000 customers worldwide meet higher expectations for enterprise IT. Quest s Windows Management solutions simplify, automate and secure Active Directory, Exchange and Windows, as well as integrate Unix and Linux into the managed environment. Quest Software can be found in offices around the globe and at Contacting Quest Software Phone: (United States and Canada) info@quest.com Mail: Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA USA Web site Please refer to our Web site for regional and international office information. Contacting Quest Support Quest Support is available to customers who have a trial version of a Quest product or who have purchased a commercial version and have a valid maintenance contract. Quest Support provides around the clock coverage with SupportLink, our web self-service. Visit SupportLink at From SupportLink, you can do the following: Quickly find thousands of solutions (Knowledgebase articles/documents). Download patches and upgrades. Seek help from a Support engineer. Log and update your case, and check its status. View the Global Support Guide for a detailed explanation of support programs, online services, contact information, and policy and procedures. The guide is available at: Support Guide.pdf 13
4.0. Offline Folder Wizard. User Guide
4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this
More informationQuest InTrust for Active Directory. Product Overview Version 2.5
Quest InTrust for Active Directory Product Overview Version 2.5 Copyright Quest Software, Inc. 2006. All rights reserved. This guide contains proprietary information, which is protected by copyright. The
More informationGain Control of Space with Quest Capacity Manager for SQL Server. written by Thomas LaRock
Gain Control of Space with Quest Capacity Manager for SQL Server written by Thomas LaRock Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains proprietary information, which is
More information8.3. Competitive Comparison vs. Microsoft ADMT 3.1
8.3 Competitive Comparison vs. Microsoft ADMT 3.1 Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described
More informationImplementing Database Development Best Practices for Oracle
Implementing Database Development Best Practices for Oracle Written by, John Pocknell Product Manager, Toad for Oracle & Toad Data Modeler Quest Software, Inc. Technical Brief Copyright Quest Software,
More informationPragmatic Business Service Management
Pragmatic Business Service Management Written by Quest Software, Inc. White Paper Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected
More informationAchieving Successful Coexistence Between Notes and Microsoft Platforms
Achieving Successful Coexistence Between Notes and Microsoft Platforms Written by Technology Strategy Research LLC White Paper Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains
More informationFile Shares to SharePoint: 8 Keys to a Successful Migration
File Shares to SharePoint: 8 Keys to a Successful Migration Written by Doug Davis Director, SharePoint Product Management Quest Software, Inc. White Paper Copyright Quest Software, Inc. 2008. All rights
More information2.0. Quick Start Guide
2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished
More informationQuest ChangeAuditor 4.8
Quest ChangeAuditor 4.8 Migration Guide Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information protected by copyright. The software described in this guide
More informationTen Things to Look for in a SharePoint Recovery Tool
Ten Things to Look for in a SharePoint Recovery Tool Written by Ilia Sotnikov Product Manager, SharePoint Management Solutions Quest Software, Inc. White Paper Copyright Quest Software, Inc. 2009. All
More informationformerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual
formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo,
More information2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer
What s New 6.7 2007 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More informationQuest SQL Optimizer 6.5. for SQL Server. Installation Guide
Quest SQL Optimizer for SQL Server 6.5 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationHow To Send E Mail From An Exchange 2007 To A Domain Name Address Book On A Domain Address Book (For A Domain) On A Pc Or Mac Xp (For An Ipod) On An Ipo (For Windows 2007) On Your Ip
Lotus Domino Server and Exchange 2007 Server SMTP Routing using Smart Hosts Supplemental - Version 1.1, Dated June 2, 2009 Contents Purpose... 4 Current Lotus Domino Environment... 5 Sample Outbound Message
More informationStorage Capacity Management for Oracle Databases Technical Brief
Storage Capacity Management for Oracle Databases Technical Brief Written by Name Title Quest Software, Inc. Technical Brief Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains
More informationBig Brother Professional Edition Windows Client Getting Started Guide. Version 4.60
Big Brother Professional Edition Windows Client Getting Started Guide Version 4.60 Copyright Quest Software, Inc. 2002 2011. All rights reserved. This guide contains proprietary information, which is protected
More informationQuest Management Pack for AS400. Written by Quest Software, Inc.
Quest Management Pack for AS400 Written by Quest Software, Inc. 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information, protected by copyright. No part of this document
More informationTechnical Brief. Unify Your Backup and Recovery Strategy with LiteSpeed for SQL Server and LiteSpeed Engine for Oracle
Unify Your Backup and Recovery Strategy with LiteSpeed for SQL Server and LiteSpeed Engine for Oracle Written by Tom Sager, DBA team leader E. ON U.S. Technical Brief 2009 Quest Software, Inc. ALL RIGHTS
More informationOvercoming Active Directory Audit Log Limitations. Written by Randy Franklin Smith President Monterey Technology Group, Inc.
Overcoming Active Directory Audit Log Limitations Written by Randy Franklin Smith President Monterey Technology Group, Inc. White Paper 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains
More information10 Simple Steps for Boosting Database Performance in a Virtualized Environment
10 Simple Steps for Boosting Database Performance in a Virtualized Environment Written by Dr. Bert Scalzo Quest Software, Inc. White Paper 10 Simple Steps for Boosting Database Performance in a Virtualized
More informationQuest Collaboration Services 3.6.1. How it Works Guide
Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationDefender Delegated Administration. User Guide
Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More information8.7. Resource Kit User Guide
8.7 Resource Kit User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under
More information4.0. Attribute Mapping Rules
4.0 Attribute Mapping Rules Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide
More informationWeb Portal Installation Guide 5.0
Web Portal Installation Guide 5.0 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationQuest Collaboration Services 3.5. How it Works Guide
Quest Collaboration Services 3.5 How it Works Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationDell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide
Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationLowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007
Lowering E-Discovery Costs Through Enterprise Records and Retention Management An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management Exponential
More information7.5 7.5. Spotlight on Messaging. Evaluator s Guide
7.5 Spotlight on Messaging 7.5 Evaluator s Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationFOR WINDOWS FILE SERVERS
Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
More informationManage, Extend, and Simplify Group Policy using Quest Group Policy Solutions
Manage, Extend, and Simplify Group Policy using Quest Group Policy Solutions Technical Brief written by Darren Mar-Elia Chief Technology Officer Windows Management Quest Software, Inc. Copyright Quest
More informationQuest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide
Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
More informationQuest vworkspace Virtual Desktop Extensions for Linux
Quest vworkspace Virtual Desktop Extensions for Linux What s New Version 7.6 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright.
More informationDATA GOVERNANCE EDITION
Quest One Identity Manager DATA GOVERNANCE EDITION 6.1 What s New 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationWhite Paper. Getting Your Macs Under Control with System Center Configuration Manager 2007. Really?
Getting Your Macs Under Control with System Center Configuration Manager 2007. Really? Written by Don Jones Co-Founder, Concentrated Technology Microsoft MVP White Paper 2009 Quest Software, Inc. ALL RIGHTS
More informationFoglight. Managing Java EE Systems Supported Platforms and Servers Guide
Foglight Managing Java EE Systems Supported Platforms and Servers Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationEnterprise Reporter Report Library
Enterprise Reporter Overview v2.5.0 This document contains a list of the reports in the Enterprise Reporter. Active Directory Reports Change History Reports Computer Reports File Storage Analysis Reports
More informationAdaptive Management to Achieve Java Application Service Levels
Adaptive Management to Achieve Java Application Service Levels Written by: Steve Stover Quest Software, Inc. Technical Brief Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains
More information10.2. Auditing Cisco PIX Firewall with Quest InTrust
10.2 Auditing Cisco PIX Firewall with Quest InTrust 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationQuest Privilege Manager Console 1.1.1. Installation and Configuration Guide
Quest Privilege Manager Console 1.1.1 Installation and Configuration Guide 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationformerly Help Desk Authority 9.1.3 Upgrade Guide
formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com
More informationDell Statistica. Statistica Document Management System (SDMS) Requirements
Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationMicrosoft Active Directory Backup and Recovery in Windows Server 2008. written by Shawn Barker Product Manager, Quest Software, Inc.
Microsoft Active Directory Backup and Recovery in Windows Server 2008 written by Shawn Barker Product Manager, Quest Software, Inc. Copyright Quest Software, Inc. 2008. All rights reserved. This guide
More informationQuest Management Agent for Forefront Identity Manager
Quest Management Agent for Forefront Identity Manager Version 1.0 Administrator Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationEmail Archiving, Retrieval and Analysis The Key Issues
Email Archiving, Retrieval and Analysis The "If you are going to find a smoking gun, you will find it in email." Abstract Organisations are increasingly dependent on email for conducting business, internally
More informationSpotlight Management Pack for SCOM
Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System
More informationIntroduction to Version Control in
Introduction to Version Control in In you can use Version Control to work with different versions of database objects and to keep the database updated. You can review, manage, compare, and revert to any
More informationDesktop Authority vs. Group Policy Preferences
Desktop Authority vs. Group Policy Preferences A Comparison of Desktop Lifecycle Management Features Introduction Group Policy Preferences In Windows Server 2008 and Windows Vista Service Pack 1, Microsoft
More informationDell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More informationArchive Legislation: Email archiving in the United States. The key laws that affect your business
Archive Legislation: Email archiving in the United States The key laws that affect your business Contents Laws regulating archiving and the penalties 3 I. The Securities Exchange Act of 1934 (the 1934
More informationEnsuring a Successful Migration, Consolidation or Restructuring
Ensuring a Successful Migration, Consolidation or Restructuring The Right Tools Can Reduce Risk and Help Ensure Success. Abstract More and more companies are facing infrastructure consolidations, restructuring,
More informationQuick Connect Express for Active Directory
Quick Connect Express for Active Directory Version 5.2 Quick Start Guide 2012 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationSystem Requirements and Platform Support Guide
Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationformerly Help Desk Authority 9.1.3 HDAccess Administrator Guide
formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656
More informationFoglight Experience Monitor and Foglight Experience Viewer
Foglight Experience Monitor and Foglight Experience Viewer Quest Software, Inc. April 2008 Using the Dell Remote Access Controller Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains
More informationFoglight 5.6.5.2. Managing SQL Server Database Systems Getting Started Guide. for SQL Server
Foglight for SQL Server 5.6.5.2 Managing SQL Server Database Systems Getting Started Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationDefender 5.7. Remote Access User Guide
Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationFoglight for Oracle. Managing Oracle Database Systems Getting Started Guide
Foglight for Oracle Managing Oracle Database Systems Getting Started Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationChangeAuditor 5.6. For Windows File Servers Event Reference Guide
ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationChangeAuditor 6.0 For Windows File Servers. Event Reference Guide
ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationEnterprise Single Sign-On 8.0.3
For Internal Use Only Enterprise Single Sign-On 8.0.3 Additional Dedicated Server Instance Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains proprietary
More information5.5. Change Management for PeopleSoft
5.5 Change Management for PeopleSoft 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationSpambrella Email Archiving Service Guide Service Guide
April 4, 2013 Spambrella Email Archiving Service Guide Service Guide Spambrella and/or other noted Spambrella related products contained herein are registered trademarks or trademarks of Spambrella and/or
More informationFoglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server
Foglight for SQL Server 5.6.4 Managing SQL Server Database Systems Getting Started Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More information10 Point Plan to Eliminate PST Files
10 Point Plan to Eliminate PST Files Executive Summary When it comes to assuring a comprehensive corporate data retention and litigation readiness plan, no single data set seems to present more challenges
More informationDell One Identity Manager 7.0. Help Desk Module Administration Guide
Dell 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure
More informationDell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide
Dell Unified Communications Command Suite - Diagnostics 8.0 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationDeath to PST Files. The Hidden Costs of Email
WHITE PAPER: EMAIL MANAGEMENT........................................ Death to PST Files Who should read this paper IT professionals looking for an easy storage, search and retrieval system for email that
More informationUsing Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group
Using Self Certified SSL Certificates Paul Fisher Systems Consultant paul.fisher@quest.com Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott
More informationWhite Paper. Better Together: Auditing with Microsoft Audit Collection Services (ACS) and Quest Software
Better Together: Auditing with Microsoft Audit Collection Services (ACS) and Quest Software Written by Tom Crane, Product Manager, Quest Software, Inc. Edited by James Galvin, Microsoft Sr. Product Manager,
More informationQuest Site Administrator 4.4
Quest Site Administrator 4.4 for SharePoint Product Overview 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information, which is protected by copyright. The software described
More information10 Steps to Establishing an Effective Email Retention Policy
WHITE PAPER: 10 STEPS TO EFFECTIVE EMAIL RETENTION 10 Steps to Establishing an Effective Email Retention Policy JANUARY 2009 Eric Lundgren INFORMATION GOVERNANCE Table of Contents Executive Summary SECTION
More informationNew Features and Enhancements
Dell Migration Manager for SharePoint 4.7 Build number: 4.7.20141207 December 9, 2014 These release notes provide information about the Dell Migration Manager for SharePoint release. New Features and Enhancements
More information6.7. Quick Start Guide
6.7 Quick Start Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software
More informationThe Disconnect Between Legal and IT Teams
WHEPAPER The Disconnect Between and Teams Examples of what each side doesn t know #2 in a series of 4 whitepapers. Circulate this document to,, and company management. It can be used to start a dialog,
More informationEight Ways Better Software Deployment and Management Can Save You Money
Eight Ways Better Software Deployment and Management Can Save You Money Introduction Software management and deployment are perhaps among the most difficult and time-consuming activities undertaken by
More informationDell Migration Manager for Enterprise Social What Can and Cannot Be Migrated
Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated MMES - What Can and Cannot Be Migrated First Release - April 2015 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary
More informationGetting the Most From. Your Help Desk
. Turbo-IT Corporation 103 West Second Street Irving, Texas 75060 http://www.turbo-it.com turbo-it Corporation Getting the Most From.......... Your Help Desk Cost Reduction Strategies for Service Desk
More informationFoglight 1.0.0.0. Cartridge for Active Directory Installation Guide
Foglight 1.0.0.0 Cartridge for Active Directory Installation Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationNavigating the NIST Cybersecurity Framework
Navigating the NIST Cybersecurity Framework Explore the NIST Cybersecurity Framework and tools and processes needed for successful implementation. Abstract For federal agencies, addressing cybersecurity
More informationBest Practices in Instant Messaging Management
Best Practices in Instant Messaging Management Enabling Productive, Secure and Compliant Instant Messaging Policies and Usage in the Business Environment Written by Quest Software, Inc. White Paper Copyright
More informationGo beyond basic up/down monitoring
Go beyond basic up/down monitoring Extending the value of SCOM with Foglight for SQL Server Introduction Microsoft Systems Center Operations Manager (SCOM) allows IT professionals to manage and monitor
More informationTop 10 Most Popular Reports in Enterprise Reporter
Top 10 Most Popular Reports in Enterprise Reporter Users Rely Most on Reports for Active Directory Security and Operations and File Server Migration Assessment Written by Alexey Korotich, Dell Software
More informationFoglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide
Foglight Foglight for Virtualization, Enterprise Edition 7.2 Virtual Appliance Installation and Setup Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected
More informationAdd the compliance and discovery benefits of records management to your business solutions. IBM Information Management software
Records-enable your applications, content, documents and e-mail IBM Information Management software Add the compliance and discovery benefits of records management to your business solutions. Records management
More information10 Point Plan to Eliminate PST Files
10 Point Plan to Eliminate PST Files Executive Summary When it comes to assuring a comprehensive corporate data retention and litigation readiness plan, no single data set seems to present more challenges
More informationAn Introduction to Toad Extension for Visual Studio. Written By Thomas Klughardt Systems Consultant Quest Software, Inc.
An Introduction to Toad Extension for Visual Studio Written By Thomas Klughardt Systems Consultant Quest Software, Inc. Contents Introduction... 2 Installation... 3 Creating Projects... 4 Working with
More informationNetVault LiteSpeed for SQL Server version 7.5.0. Integration with TSM
NetVault LiteSpeed for SQL Server version 7.5.0 Integration with TSM 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationFoglight. Dashboard Support Guide
Foglight Dashboard Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationEnterprise Vault.cloud. Microsoft Exchange Managed Folder Archiving Guide
Enterprise Vault.cloud Microsoft Exchange Managed Folder Archiving Guide Enterprise Vault.cloud: Microsoft Exchange Managed Folder Archiving Guide The software described in this book is furnished under
More informationDell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS
Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationBest Practices for an Active Directory Migration
Best Practices for an Active Directory Migration Written by Derek Melber, MCSE, MVP, president, BrainCore.Net AZ, Inc. Abstract This white paper details the major challenges of Microsoft Active Directory
More informationDell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More informationEradicating PST Files from Your Network
The Essentials Series: Operations Benefits of Email Archiving Eradicating PST Files from Your Network sponsored by by Jim McBee Eradicating PST Files from Your Network...1 Understanding the Disadvantages
More informationCA Message Manager. Benefits. Overview. CA Advantage
PRODUCT BRIEF: CA MESSAGE MANAGER CA Message Manager THE PROACTIVE MANAGEMENT OF EMAIL AND INSTANT MESSAGES IS INTEGRAL TO THE OVERALL STRATEGY OF INFORMATION GOVERNANCE. THERE ARE MANY COMPLEX CHALLENGES
More informationSpotlight Management Pack for SCOM
Spotlight Management Pack for SCOM User Guide March 2015 The Spotlight Management Pack for SCOM is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations
More informationformerly Help Desk Authority 9.1.3 HDAccess User Manual
formerly Help Desk Authority 9.1.3 HDAccess User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA
More informationThe Legal Advantages of Retaining Information
WHITE PAPER: CUSTOMIZE WHITE PAPER: BEST PRACTICES FOR ARCHIVING Confidence in a connected world. Best Practices for Defining and Establishing Effective Archive Retention Policies Sponsored by Symantec
More informationSolving the Security Puzzle
Solving the Security Puzzle How Government Agencies Can Mitigate Today s Threats Abstract The federal government is in the midst of a massive IT revolution. The rapid adoption of mobile, cloud and Big
More information