GPMC Reports

Identity and Access Management: You Have to Be Compliant, You Want Security and Efficiency. Why Not Get it All?
sponsored by Dell Software
WHITE PAPER: Learn how to not only meet your compliance challenges, but improve security and operational efficiency. In this business brief by Quest Software, discover how to extend the power of Active Directory and Windows Group policy, and make it easy to achieve and prove compliance.
Posted: 26 Jul 2010 | Published: 26 Jul 2010

Dell Software

Windows Server 2008 R2: Top 10 Changes You'll Actually Care About
sponsored by DellEMC and Intel®
WEBCAST: Watch this webcast to learn about the top ten most useful advantages of Windows Server 2008 R2. Gain insight into improvements made to Terminal Services and Hyper-V that can provide your organization with increased flexibility.
Posted: 05 Feb 2010 | Premiered: Feb 5, 2010

DellEMC and Intel®

Automating Group Policy Management
sponsored by SDM Software
WHITE PAPER: Group policy objects (GPOs) are used to secure and lockdown your Windows environment. Learn how you can ensure that GPOs are available, manageable and automated.
Posted: 03 Mar 2008 | Published: 27 Feb 2008

All resources sponsored by SDM Software

Presentation Transcript: Windows Server 2008 R2 - Top 10 Changes You'll Actually Care About
sponsored by Dell EMC and Microsoft
PRESENTATION TRANSCRIPT: This presentation transcript will discuss the top ten most useful advantages of Windows Server 2008 R2. Gain insight into improvements made to Terminal Services and Hyper-V that can provide your organization with increased flexibility.
Posted: 21 Jun 2011 | Published: 21 Jun 2011

Dell EMC and Microsoft

Make Group Policies Do More and Reach Further
sponsored by Dell Software
WHITE PAPER: This white paper introduces the latest desktop management platform that can help expand the benefits of Group Policy and overcome its various deficiencies. Explore the advantages it can provide and review the advanced features it offers.
Posted: 25 Jun 2012 | Published: 20 Jun 2012

Dell Software

Developers and Identity Services - Tackling Identity Data with Identity Hub
sponsored by Oracle Corporation
WHITE PAPER: This paper takes a closer look at the issues surrounding the patterns for accessing identity data and what an ideal Identity Hub should provide for developers.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

Oracle Corporation

Network Access Control: User and Device Authentication
sponsored by Intel Corporation
WHITE PAPER: Networking has evolved to support both wired and wireless access, securing corporate networks from attack is even more essential. This white paper discusses how your organization can authenticate users and devices before they connect to the network.
Posted: 31 Aug 2007 | Published: 01 Aug 2005

Intel Corporation

Active Directory Maintenance & Cleanup
sponsored by STEALTHbits Technologies
WHITE PAPER: Active Directory (AD) plays a central role for many organizations’ Windows Domain architecture and access control, so it’s essential to maintain a clean and correct AD to avoid any potential security and operational risks. View now to explore the risks and challenges of AD that organizations face today and uncover best practices to address them.
Posted: 23 Apr 2012 | Published: 20 Apr 2012

STEALTHbits Technologies

Overview of Windows Search Technologies
sponsored by Global Knowledge
WHITE PAPER: This paper helps us to understand the importance of desktop search tools fit in the universe of Microsoft search tools.
Posted: 10 Feb 2009 | Published: 10 Feb 2009

Global Knowledge

Azure Active Directory vs. Classic AD
sponsored by One Identity
ESSENTIAL GUIDE: Jump into this E-Guide to find out how to pinpoint the differences between the Microsoft Azure edition of Active Directory and the classic Windows Active Directory – and how to use those differences to your enterprise's advantage.
Posted: 13 Mar 2019 | Published: 11 Mar 2019

One Identity