Filtered Index

Filtered by: Best Practices

coolguys's picture
article
Reads:

3491

Score:
0
0
 
Comments:

0


Steps to Security Success: A Best-Practice Approach to Security Management

Here's a new Novell Connection magazine article by Ken Baker. Learn best-practice steps to successful security management.

Submitted by: coolguys on Fri. 06.18.2010
Filed Under: Identity & Security Management Cool Solutions, Cool Solutions
Topic: Best Practices, Security
Product: Sentinel

mbluteau's picture
article
Reads:

3251

Score:
0
0
 
Comments:

0


Access Governance and COBIT: Getting Started

This sub-project is an effort to leverage frameworks and tools to position Access Governance within a global Information Security Program. We will simplify the process, with the goal to provide a simple example, and a potential skeleton for a more detailed process.
coolguys's picture
article
Reads:

2738

Score:
0
0
 
Comments:

0


Hidden Gems – Part 1: Best Practices for Asset Management with Novell ZENworks

Check out this new Connection Magazine article by Ken Baker for some tips on asset management best practices using Novell ZENworks Configuration Management.

zerfowski's picture
article
Reads:

6081

Score:
3
3
4
 
Comments:

2


Volume Inventory

One of the most important tasks of a network administrator is to document the used resources. The used disk space is one part of this job. NetWare as well as OES 2 on Linux offer a quick and easy way to execute this job. As a Novell Trainer I recently noticed that several Admins do not know this task. That's the reason for this tip.

nkamal's picture
blog
Reads:

4983

Score:
3.5
3.5
2
 
Comments:

1


eDirectory 8.8 SP5 Upgrade Best Practices

Need best practices to upgrade to eDirectory 8.8 SP5?

nkamal's picture
blog
Reads:

3403

Score:
3.333335
3.3
3
 
Comments:

0


Identity Manager 3.6.1 Upgrade Best Practices

Need best practices to upgrade to Identity Manager 3.6.1 ?

© 2013 Novell