Sherlock Holmes has the power of deduction that helps him solve rather difficult cases. If only IT technicians develop this as a habit, they can churn out advanced analytics from simple data
Autoarchiving Security Logs in Event Viewer
A small, nearly hidden feature of the Event Viewer by Microsoft is the ability to autoarchive the logs. Of course, one of the most important Event Viewer logs is the security log. For years, we have had to develop solutions or acquire software to help archive the security log when it fills up; but now, that is no longer necessary.
Webinar – The Science Behind Effective Service Catalogues
Join us for the free webinar, The Science Behind Effective Service Catalogues on Thursday, March 19 at 2 PM AEDT (Sydney, Australia time). James Gander, IT service management and operations consultant, will be our speaker for this webinar. The date : Thursday, March 19 , 2015 The time : 2 PM – 3 PM AEDT (Sydney, Australia time) Awesome : D efinitely [ Register Now ] In this webinar, you’ll learn: The value of service catalogues to organis ations The three different types of service catalogues How to build a service catalogue from the ground up Click here to view our earlier webinars.
Active Directory Recovery Management and Change Control
You Can Learn More About the ManageEngine Product Line By Going to manageengine.optrics.com The original article/video can be found at Active Directory Recovery Management and Change Control
Protective, GPG13-Compliant Monitoring Using EventLog Analyzer
The journey to a thousand IT problems begins with a single compliance lapse. Yes, this is the first time you are hearing it! So, tell us how often you’ve walked straight into trouble because you underestimated the importance of compliance
Desktop Central Supports Kiosk Mode for Samsung Devices
Today , we increasingly depend on technology, especially mobile technology, to accomplish even the simplest of tasks. Mobile devices are transforming the way we do business; we use them extensively for financial transactions, health care, and consumer shopping. Understanding this trend, Samsung continues to introduce enterprise-friendly features for its mobile devices, transforming the legacy workplace into a highly sophisticated technological ecosystem. The Kiosk mode is one such feature that is sure to transform the workplace.
[Live Webinar] How Application Discovery and Dependency Mapping can stop you from losing customers
With ever shortening technology life cycles, change is not only constant but also quite frequent in today’s IT enterprise. So can your business keep up with such rapidly evolving IT ?
Securing Active Directory: A Glimpse into the Future
As an MVP in Directory Services, I feel it is my job, duty, and responsibility to share, explain, and provide feedback into past, current, and future technologies that Microsoft provides with regards to Windows and Active Directory.
Overcoming Active Directory Group Bloat!
Most Active Directory environments are riddled with a common problem. That problem is group bloat! Group bloat is the concept that too many people have had the opportunity to create groups and they have exercised that opportunity without any control. As a result , the Active Directory environment has too many groups
For a Change, What Happens in Vegas Isn’t Staying in Vegas: Pink15 Annual International IT Service Management Conference and Exhibition
What happens when people from the most happening IT teams convene at the most happening place on the planet? Pink Elephant’s 19th annual international IT service management conference and exhibition provided us the answer .