Chat now with support
Chat with Support

Technical Documents

Filter Your Results

Product Line

Product

See All

All Products

Book

Filter Search Results

Search Technical Document by keyword

(Choose different product)



DateRelevance Displaying 1-25 of 269510
Security Guide > Azure Datacenter Security

Microsoft Azure datacenters have the highest possible physical security and are considered among the most secure and well protected datacenters in the world. ... Relevant references with additional...

Last Updated On: 5/9/2024
Product(s): Security Guardian
Technical Documentation
Security Guide > Introduction

Managing information system security is a priority for every organization. ... In fact, the level of security provided by software vendors has become a differentiating factor for IT purchase decisi...

Last Updated On: 5/9/2024
Product(s): Security Guardian
Technical Documentation
Security Guide > Network Communications

Internal network communication within Azure includes inter-service communication between Security Guardian components and the On Demand Platform. ... Inter-service communication uses OAuth authenti...

Last Updated On: 5/9/2024
Product(s): Security Guardian
Technical Documentation
Security Guide > Overview of Data Handled by Security Guardian

Security Guardian manages the following type of customer data: ... Active Directory objects such as users, groups, computers and domains are provided by the On Demand Hybrid Agent via Event Hubs an...

Last Updated On: 5/9/2024
Product(s): Security Guardian
Technical Documentation
Security Guide > Permissions Required to Configure and Operate Security Guardian

Quest Operations team members have access to the Quest’s production Azure Subscription and monitor this as part of normal day to day operations. ... Security Guardian developers have no access to Q...

Last Updated On: 5/9/2024
Product(s): Security Guardian
Technical Documentation
Security Guide > Certification

On Demand is included in the scope of the Platform Management ISO/IEC 27001, 27017 and 27018 certifications: ... ISO/IEC 27017 Information technology – Security techniques – Code of practice for in...

Last Updated On: 5/9/2024
Product(s): Security Guardian
Technical Documentation
Security Guide > SDLC and SDL

Access to source control and build systems is protected by domain security, meaning that only employees on Quest’s corporate network have access to these systems. ... Therefore, should an On Demand...

Last Updated On: 5/9/2024
Product(s): Security Guardian
Technical Documentation
Security Guide > FIPS 140-2 Compliance

Security Guardian cryptographic usage is based on Azure FIPS 140-2 compliant cryptographic functions.

Last Updated On: 5/9/2024
Product(s): Security Guardian
Technical Documentation
Security Guide > Customer Measures

Security Guardian security features are only one part of a secure environment. ... Customers must implement their own security practices when proceeding with data handling. ... Special care needs t...

Last Updated On: 5/9/2024
Product(s): Security Guardian
Technical Documentation
Security Guide > SDLC and SDL

Access to source control and build systems is protected by domain security, meaning that only employees on the Quest corporate network have access to these systems. ... Therefore, should an On Dema...

Last Updated On: 5/7/2024
Product(s): On Demand Recovery, On Demand Migration, On Demand Audit, On Demand...
Technical Documentation
Security Guide > Overview of Data Handled by On Demand Core

This section describes how On Demand core services handle data.

Last Updated On: 5/7/2024
Product(s): On Demand Recovery, On Demand Migration, On Demand Audit, On Demand...
Technical Documentation
Security Guide > Privacy and Protection of Customer Data

Customer data is differentiated using a unique organization identifier. ... This organization identifier is generated securely during customer sign-up. ... This organization identifier is passed to...

Last Updated On: 5/7/2024
Product(s): On Demand Recovery, On Demand Migration, On Demand Audit, On Demand...
Technical Documentation
Security Guide > Separation of Customer Data

For Azure Data Explorer, each organization is contained within a separate database ensuring no mixture of data. ... For Azure Storage, a combination of techniques is employed. ... In Azure Blob Sto...

Last Updated On: 5/7/2024
Product(s): On Demand Recovery, On Demand Migration, On Demand Audit, On Demand...
Technical Documentation
Security Guide > About On Demand Shared Services

Managing information system security is a priority for every organization. ... In fact, the level of security provided by software vendors has become a differentiating factor for IT purchase decisi...

Last Updated On: 5/7/2024
Product(s): On Demand Recovery, On Demand Migration, On Demand Audit, On Demand...
Technical Documentation
Security Guide > Role Based Access Control

Quest On Demand is configured with default roles that cannot be edited or deleted, and also allows you to add custom roles to make permissions more granular. ... Each access control role has a spec...

Last Updated On: 5/7/2024
Product(s): On Demand Recovery, On Demand Migration, On Demand Audit, On Demand...
Technical Documentation
Security Guide > User Authentication

Authenticating through Microsoft Entra ID provides native granular control and allows you to manage your configuration from a central location. ... It allows configuring advanced security layers th...

Last Updated On: 5/7/2024
Product(s): On Demand Recovery, On Demand Migration, On Demand Audit, On Demand...
Technical Documentation
Security Guide > Third party Assessments and Certifications

On Demand has undergone a third party security assessment and penetration testing yearly since 2017. ... The assessment includes but is not limited to: ... A summary of the results is available upo...

Last Updated On: 5/7/2024
Product(s): On Demand Recovery, On Demand Migration, On Demand Audit, On Demand...
Technical Documentation
Security Guide > FIPS 140-2 Compliance

On Demand Core cryptographic usage is based on Azure and AWS FIPS 140-2 compliant cryptographic functions.

Last Updated On: 5/7/2024
Product(s): On Demand Recovery, On Demand Migration, On Demand Audit, On Demand...
Technical Documentation
Security Guide > Data Handled by the Notification Service

Every email sent by the Notification Service is scanned for viruses and malware. ... All request data sent to On Demand Notification Service is persisted by default. ... This includes the notificat...

Last Updated On: 5/7/2024
Product(s): On Demand Recovery, On Demand Migration, On Demand Audit, On Demand...
Technical Documentation
Security Guide > Auditing

On Demand Core provides an activity trail log for the following actions: ... Adding and removing hybrid agents, domains and relevant capabilities ... Authorizing and de-authorizing users as an On D...

Last Updated On: 5/7/2024
Product(s): On Demand Recovery, On Demand Migration, On Demand Audit, On Demand...
Technical Documentation
Reference Guide > About this guide

This guide is a reference for the following: ... SharePlex commands — an overview of the commands that control replication through sp_ctrl, an explanation of command authorization levels, and detai...

Last Updated On: 5/6/2024
Product(s): SharePlex
Technical Documentation
Reference Guide > stop

Use the stop command to stop a SharePlex replication process gracefully, allowing it to finish reading from, or writing to, its associated queues. ... When you stop a replication process, data accu...

Last Updated On: 5/6/2024
Product(s): SharePlex
Technical Documentation
Reference Guide > Database Setup for Oracle Cloud-ExaCS and DBCS

Use the Database Setup utility for Oracle (ora_setup) to establish SharePlex as an Oracle user and create the required SharePlex database objects. ... This setup utility creates the following: ... ...

Last Updated On: 5/6/2024
Product(s): SharePlex
Technical Documentation
User Guide > Select Type of Target Storage

On the Select Type of Target Storage page, the wizard prompts you to select the type of target storage. ... You can restore public folders to a registered target storage (this includes target stora...

Last Updated On: 5/6/2024
Product(s): Recovery Manager for Exchange
Technical Documentation
Reference Guide > create config

Use the create config command to create a new configuration file. ... This command runs the SharePlex default text editor and opens a new file. ... To create a configuration, follow the instruction...

Last Updated On: 5/6/2024
Product(s): SharePlex
Technical Documentation
Self Service Tools
Knowledge Base
Notifications & Alerts
Product Support
Software Downloads
Technical Documentation
User Forums
Video Tutorials