Auditing DNS with Change Auditor
Since starting my tenure at Quest, I have had multiple customers ask me “how can I use Change Auditor to audit DNS changes in my environment?” At first thought, this seems like an easy task to comple...
Since starting my tenure at Quest, I have had multiple customers ask me “how can I use Change Auditor to audit DNS changes in my environment?” At first thought, this seems like an easy task to comple...
The first step in migrating Notes archives with Migrator for Notes to Exchange (MNE) is to determine where the archive files are located. The location of Notes archives can vary between Notes deployme...
Organizations exist either to generate revenue or to perform a service. The mere thought of securing an environment doesn’t exist until there is something of value to secure. Once you have gotten to...
Encrypting Ransomware is a family of malicious software (also known as malware) designed to take files on a PC or network storage device, encrypt them, and then extort money in the form of a ransom to...
Moving data between servers can be a painful process because of the security involved over the data. Moving the same data between servers, which are in different domains, is even more troublesome. Try...
Migration from Lotus Notes to Exchange is not a task to take on lightly. One should adequately pack up their existing Lotus Notes Environment to get ready for the migration to Exchange. What have you...
As summer comes to an end and the days get shorter, another major thing happens at this time every year… kids go back to school. It’s not just the kids that dread it, but it’s the parents and teacher...
This second blog in a series on the impact of GDPR on IT operations examines the IT requirements specified in or implied by the new regulation. There are three main areas that IT operations must focus...
Quest is a Platinum sponsor of Microsoft Ignite 2016, September 26-30 in Atlanta, Georgia. It’s only the second year of the event, but the conference is sold out – which makes it even more exciting t...
Change Auditor now supports Client Certificate Authentication. This is a welcome feature for administrator who prefer a more secure method of Authenticating users connecting with the web client. Intro...
To understand why Change Auditor for Exchange requires the Exchange Scripting Agent, it is important to understand the function of the Exchange Scripting Agent. The Scripting Agent is called (if enabl...
One of the more common areas of inquiry from organizations planning their Office 365 migration strategy relates to large mailboxes and how they should be converted. These concerns typically arise in t...