Your Windows Management and Migrations Community: Automate and simplify all of your Windows-related tasks.


  • Happy System Administrator Appreciation Day from @DellSoftware!

    A big thanks to those of you who keep things working!

    Learn more about System Administrator Appreciation Day.

  • Email Governance and Recovery: Finding email fast when something goes wrong

    Email is an essential business tool, obviously, and we all use it every day to get our jobs done. But what happens when a problem pops up in your email environment? Would you be able to easily pinpoint all requested information if a legal matter or other sensitive situation came up? Do you know if the all the data in your email system is compliant with industry regulations? Are you prepared to migrate your entire email system to the cloud, without suffering data loss?

    With the tremendous growth of electronic data — in email and otherwise — managing information is more and more challenging. Data breaches, corporate policy violations, and lost or corrupted emails are more common than ever. Hard disks crash, network cards fail, patches sometimes do not work as intended, upgrades go awry and employees sometimes violate your acceptable use policies.

    Consequently, good email governance and content management capabilities are critical:

    • Know the status of available email information assets
    • Implement good policies focused on proper information governance
    • Know whether or not email policies are being followed
    • Have the right technologies in place to help you search for, find and produce information quickly

    Here are four key areas to address when creating an email governance strategy that will address these concerns while best serving your business goals:

    1. E-discovery and regulatory compliance. “E-discovery” is a term used most commonly in relation to the ability to search for electronic information related to legal matters. Most organizations will at some time be involved in a legal or compliance action in one way or another and will need to be able to recover electronic information quickly for the case. If you cannot produce the required information in a timely manner, consequences can be expensive and damaging.
    2. Sensitive internal information. Your email governance strategy should include the ability to search for sensitive email content such as Social Security numbers, credit card information, data that is sent to specific domains (such as competitors), intellectual property, offensive content, personal health information and any other sensitive content that should not be sent without first being encrypted — or in some cases, not at all.
    3. Email migration. Even though you may not upgrade every time a new version of Microsoft Exchange comes out, eventually you will need to. And with the ever-increasing amount of data that is shared — and stored — within email, it’s critical to have a migration plan that will protect you from data loss and risk.  You'll need a toolset focused specifically on migrating user mailboxes, as well as tools for finding email that is lost or corrupted  as a result of the migration.
    4. Risk mitigation. To best avoid risk, you need to understand how your employees are using email. Is it solely used for communication? Or are employees also transferring files and storing content in email? To manage risk, you need tools that will enable you to track whether your email system is compliant with all of your corporate policies and industry regulations related to email retention and management. In addition, when upgrades or other systemwide activities go awry, you need a system in place that will allow you to recover email quickly and painlessly.

    Check out this white paper to learn more and find out how Recovery Manager for Exchange from Dell can help.

  • Missed our #HIPAA compliance webcast? Watch an independent auditor's point of view, now available on demand.

    But we can tell you some of the steps your organization can take to ensure HIPAA compliance!

    Watch this on-demand webcast where Independent Auditor Steven Marco of Modern Compliance Solutions joins Dell Software's Tim Sedlack as they discuss the latest on HIPAA compliance requirements. This is a unique opportunity to hear a point of view from an independent auditor.

  • New Security Explorer 9.5 Tech Demo: Complete Windows Permissions Management from a Single Console (No Registration Required)

    Security Explorer Is like Windows Explorer on Steroids!

    If you manage permissions for Windows Server, NAS/SAN devices, SQL Server, Exchange and SharePoint, check out the all-new Security Explorer 9.5!

    Security Explorer is like Windows Explorer on steroids It provides IT administrators with one platform to manage access controls and security across your entire Windows network environment. This powerful time-saving tool helps you achieve, maintain and prove compliance and reduce the risk of security breaches.

    Watch the new Security Explorer video!

     

     

     

     

     

     

     

  • Webcast for Managers: #ActiveDirectory Disasters - What You Don't Know Will Hurt You!

    Date:  Wednesday, July 23, 2014 at 9:00 a.m. PT / Noon ET (IT'S NOT TOO LATE TO REGISTER!)

    Register Now!

    Active Directory is one of the most critical components of the IT infrastructure. Surprisingly, management is often unaware of problems related to Active Directory. Register today – it’s not too late to learn what you might not know about the state of Active Directory within your own organization!

    Register Now!

  • Converting an Active Administrator database into an archive database can help improve the performance of the live database

     

    There are times when users want to create a new database, yet retain the ability to view and report on data in the old database. This helps keep the online database current and nimble with improved performance, while retaining historical information for various regulatory compliance rules or for regular business practices. The Active Administrator “Archive Databases” feature gives users a simple way of converting an Active Administrator database into an archive database.

    Here are the steps on how to archive a database.

    From within the Active Administrator console, expand "Configuration" and select "Archive Databases". Click the "New" option.

                            

     

       

    Enter the database server name or browse for it, and then enter the database name. Next, you will want to name the archive. Be sure to name it something relevant for easier identification purposes. For example, if you want to archive the database quarterly, you can name it AA_Archive_2014_Q2.

    Do not select the option to “Make this archive the active archive”.

    Click “OK” and then “Yes” to use this database.

    To search for the archive you have created, simply expand “Auditing & Alerting” and select "Archives". On the right hand side of the screen, use the drop down arrow to select the archive that you would like to search.


     

     

     

    When you are finished selecting the archive, you can select the reports you would like to view for the archived database.


     

     

    As you see, converting an Active Administrator database into an archive database is easy to do. It allows users to retain the reporting history they need. It also keeps the live database agile, which helps to improve database performance.

     

  • Still Time to Register! July 23 Webcast: Solving Your Top 5 #ActiveDirectory Challenges (Delegation, Security, Permissions Reporting, Recovery & Auditing)

    Join Active Directory experts Don Jones (Concentrated Tech) and Chris Ashley (Dell Software) for a real-life look at some of Active Directory’s most difficult tasks. You’ll see multiple approaches to solving each of 5 major challenges, including:

    1. Managing delegated permissions within AD
    2. Monitoring AD replication and health
    3. Reporting on “who has permission to what:
    4. Recovering from improper AD changes
    5. Auditing AD activity

    Don and Chris will debate the pros and cons of using conventional techniques, PowerShell scripts and native tools vs. specialized tools for tackling these common AD challenges. You’ll be invited to join in and share your own techniques, thoughts and challenges and get feedback directly from these experts. This event will be a lively discussion and all are encouraged to participate!

  • 8 steps for a successful GroupWise migration to #Office365

    If you’re using an older version of Novell® GroupWise® for messaging and collaboration, you’re probably wondering if you should upgrade to the latest version or just transition everything to Office 365.

    Office 365 certainly has a lot to offer, but the task of making that transition can be daunting. With careful planning, however, it’s a manageable process and your organization will be on its way to enjoying the benefits of Office 365 in no time. Here are eight steps to help plan for a cost-effective and low impact transition from GroupWise to Office 365.

    1. Gather all the information you can about your current environment. You’ll need details on GroupWise mailboxes, archives, shared folders and proxies. Some migration solutions offer assessment tools to automate this process.
    2. Run test migrations and analyze your GroupWise mailbox data to determine its impact on project timing. Plan ahead to accommodate organizational needs and minimize impact. The relative size of each mailbox is also important when defining and scheduling migration groups to ensure that migrations finish within the allotted windows.
    3. Locate and migrate valuable content stored in GroupWise archives. Because the archive location is controlled by the GroupWise client, the specific location often varies by user. Don’t let that intimidate you — you risk losing valuable information stored in your GroupWise archives and some migration solutions can automatically find the archives and provide a report with location and size information for each user.
    4. Gather information from shared folders and address books to help plan and audit your data. Keep track of data owners, file names, type of shared content and rights info. There are also solutions available to streamline this process.
    5. Gather your GroupWise proxy data. Preserving these rights and relationships will help ensure a seamless transition to the new platform. This data can help determine optimal migration groupings and ensure that users with delegate relationships have continual access throughout the migration process. Proper migration solutions assist in gathering this information in advance and automatically convert proxy rights to equivalent rights in Office 365.
    6. Consider coexistence. To keep the organization operating smoothly during the migration, you may want to consider coexistence options. Coexistence enables a seamless transition and gives you more flexibility in terms of scheduling and resource migration. If you do need a coexistence solution, you should document your coexistence plan as an addendum to the migration plan to ensure functional compatibility and technical coordination between both elements of the project.
    7. Consider all aspects of Office 365 that might affect your migration. Here are a couple of the more common details to look at:
      1. Architecture. Decisions should be made based on the ongoing needs of your organization rather than anything related to the transition. Note that decisions about the use of Active Directory®, Exchange, and Microsoft’s native synchronization and federation solutions will impact migration planning
      2. Throttling. Several types of throttling can impact migration, but specific elements of the MAPI and PowerShell throttling in Wave 15 are the biggest considerations when planning a migration from GroupWise to Office 365.

    8. Choose a migration solution package that fits with your project and automates the critical conversion details to provide a smooth transition. Make sure any third-party solutions you use to help with your migration and coexistence project are specifically designed for Office 365. You will also want to consider the advantages and disadvantages of on-premises versus hosted migration solutions. There are many options and considerations that go into planning a migration to Office 365. Always make choices that provide the most value while simplifying the transition and minimizing the impact on your organization. And be sure to build flexibility into the new system so that it can evolve as your business grows

    There are many options and considerations that go into planning a migration to Office 365. Always make choices that provide the most value while simplifying the transition and minimizing the impact on your organization. And be sure to build flexibility into the new system so that it can evolve as your business grows.

    Check out this white paper to find out how Dell GroupWise Migrator for Exchange can help ensure a successful migration.

  • How much do you like Recovery Manager for AD Forest Edition?

    Hopefully just as much as I do so I have several headliner announcements to make you aware of! Smile

    First, I am pleased to announce that Recovery Manager for Active Directory was a finalist in the 2014 American Business Awards (the “Stevies”), in the category of “New Product or Service of the Year - Software - Systems Management Solution.” Yes

    If you want to vote for Recovery Manager for Active Directory the American Business Awards People’s Choice Awards are open for voting:

    http://www.stevieawards.com/FavoriteNewProducts.peopleschoice/default.cfm and vote by

    - Entering the Short Code M942T (which is Recovery Manager for Active Directory Forest Edition) – and “Submit”

    - Registering your vote

    Vote by August 8, 11:59 pm ET and let your voice be heard!!! 

    WAIT!!! There is more!

    Did you know that in a recent Dell Software commissioned Dimensional Research survey showed that 66% of respondents said they are reluctant to make major changes to applications that use AD because they don’t have a valid environment in which to test the changes first? More disturbingly, 87% of respondents said they have had incidents or disasters with Active Directory yet less than half have a robust disaster recovery plan in place. Check out the full July 8th 2014 press release for more shocking survey results!

    One last headliner you need to check out!!!

    We briefed the well-respected Information Technology Author, Michael Vizard from IT BusinessEdge on our upcoming press release regarding the Dimensional research survey results and he wrote an article about it on Channelinsider.com called “Defining the Microsoft Active Directory Opportunity”.

    Thanks for reading my blog post and DON’T FORGET TO VOTE!!!

     

     

  • Learn what @DellSoftware customers have to say about Dell Lotus Notes migration solutions

    Have you ever wondered how Dell Software's Lotus Notes to SharePoint migration customers around the world are using the product? What are the key use cases? What are the key benefits customers are experiencing?

    Well, we recently asked our third party customer validation organization, TechValidate, to survey our Notes migration customers around the world. Here is the overwhelming response:

    • 220 customers responded
    • 20 case studies
    • 29 charts, graphs, quotes

    And you have access to all of this! Click on the link below to access a full library of customer testimonials. 

    Here is an example of what our customers are saying: