Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Preparing for Attacks that Seek Total Annihilation

    Defending your IT infrastructure against attack has never been a simple task. But things have taken a decidedly ugly turn of late: More and more attacks are simply seeking the total annihilation of your infrastructure. Any organization can be a target - or simply collateral damage from an attack targeting someone else.

  • The No-Nonsense Guide to Microsoft 365 Delegated Administration

    Organizations using Microsoft 365 with a single tenant that contains multiple departments, remote locations, sister companies, and different agencies have complex environments to support and manage. Most of them want to delegate administration rights so IT groups can manage their business units independently — but stop short of giving out full Global Admin Rights to regional, local, or specialized IT admins.

  • The Ultimate 10 Step Guide to Boosting Your Microsoft Secure Score

    Microsoft Secure Score is one of the best ways to measure your tenant’s security posture. Using the Secure Score, you’ll earn points for good security practices, such as adopting multi-factor authentication (MFA), using third-party solutions to improve security, regularly producing and viewing security-related reports, and using and configuring recommended Microsoft 365 security features.

  • 12 Smart Ways to Manage and Secure External Users in Your M365 Tenant

    Download this paper to learn the 12 steps to securely managing external users—leaving your M365 tenant under control.

  • The complete Guide to Eradicating PST Files

    PSTs are no longer necessary today. They are outdated, hard to control or centralize, and vulnerable to corruption.

  • Solve the Problems Caused by B2B Guest

    Download this tech brief to understand how Quest Power365 solutions help you solve the problems that B2B guest user accounts create for your corporate partnerships, mergers, and acquisitions.

  • A Guide for Consolidating Active Directory, Exchange, and Office 365 After a Merger

    Day One of your merger or acquisition is in the books. You pushed hard to integrate the identity and messaging environments so that your users could start collaborating right out of the gate. Now, you’ve got a bit more breathing room to consolidate everyone onto the same platform. And you need to do it without disrupting your users. In this white paper, we walk you through what that process looks like.

  • Managing Remote Workstations with Active Directory Domain Joins

    Recently, with the rapid advance of employees working from home intensifying this issue, the net result is that remote machines pose a unique and growing problem for offline domain joins that are necessary to maintain business operations. We have prepared this white paper as a collation of our best practice recommendations for Active Directory management for domain consolidations.

  • Maintaining the Health of Active Directory

    Maintaining the health of your production AD environment is key to its performance, availability and security. The health of your AD infrastructure is also crucial for preventing roadblocks to significant IT changes like adding new applications, network upgrades, cloud migrations, or supporting a merger, acquisition or divestiture. This white paper is intended to provide insights on how to identify and remediate the potential issues with an Active Directory environment.

  • Veeam on AWS: 5 Secure Backup Best Practices

    Ransomware is everywhere, but that doesn’t mean you should ever consider paying the ransom. Make sure you have secure backup as your last line of defense! Get this exclusive FREE eBook to learn secure backup and recovery best practices to fight ransomware and other cyberthreats when using AWS.

  • AWS Certified Solutions Architect Exam Guide

    The AWS Certified Solutions Architect certification is an industry‑recognized professional certification that validates one’s knowledge in the design and deployment of distributed applications in AWS Cloud. Having the certification can be a unique opportunity to grow your career, boost your resume, highlight in‑demand skills and generally become more competitive.

  • The Complete Cyberattack Survival Guide for Microsoft 365 Using the CISA's Recommendations

    In this e-book, you'll learn about the mitigation techniques recommended by the Cybersecurity and Infrastructure Security Agency (CISA) to prevent new-age cloud attacks. It also covers how these settings can be implemented in Microsoft 365.

  • Data Governance Trends

    Remote work isn’t going away anytime soon, nor is the long list of apps and tools employees rely on to store data and collaborate on projects. These shifts have been a lifesaver for employees navigating the pandemic, but there’s also been a ripple effect for businesses trying to get a handle on their disparate collections of content.

  • Managing Sprawl in Microsoft 365

    The goal of this whitepaper is to help you better identify where content sprawl may be happening inside of your organization, and provide some community-hardened best practices for building your governance strategy.

  • Microsoft 365 Security Control Checklist

    Microsoft 365, as a service, contains many features that focus on security. Each service uses Azure Active Directory for authentication and authorization to access either the app itself or the content that resides within it. Organization-specific security controls and procedures should augment all out-of-the-box configurations. Remember that security within Microsoft 365 is not just about enabling features and controls; it also involves teaching and guiding end-users to understand the restrictions and knowing how to use them.

  • Microsoft 365 & Data Management

    This report explores the hazards of not having an Microsoft 365 backup in your arsenal, and why backup solutions for Microsoft 365 fill the gap of long-term retention and data protection.

  • #1 Microsoft 365 Backup Guide by Veeam

    Read this #1 Microsoft 365 Backup Guide by Veeam and learn about the infrastructure components, and how simple it is to use Veeam Backup for Microsoft 365 — from the early planning stage all the way to performing restores.

  • 100 Pipeline Plays: The Modern Sales Playbook

    Modern business moves at an incredible pace. New technologies and competitors, an increasingly global economy, and constant social disruptions are forcing fundamental change so quickly that it's nearly impossible to keep up. But the right tools can help.

  • Understanding Conversational Marketing

    Conversations have always been at the heart of our most authentic relationships. Whether it’s a business deal or a personal connection, conversations are a driving force that solidify a foundation of trust. Enter conversational marketing — the new paradigm for tackling business deals and converting prospects in minutes.

  • Buyer's Guide: 5 Essential Features of a Prospecting Solution

    Using ZoomInfo’s field surveys and exclusive research, third-party industry studies, and analyst briefs, this report aims to help B2B sales leaders understand: How prospecting solutions help maximize sales productivity...