Chat now with support
Chat with Support

Technical Documents

Filter Your Results

Product Line

Product

See All

All Products

Book

Filter Search Results

Search Technical Document by keyword

(Choose different product)



DateRelevance Displaying 1-25 of 225967
Security Guide > Admin consent and service principals

On Demand Recovery requires access to the customer’s Microsoft Entra ID and Microsoft 365 tenants. ... The customer grants that access using the Microsoft Admin Consent process, which will create...

Last Updated On: 10/23/2025
Product(s): On Demand Recovery
Technical Documentation
Security Guide > Network communications

All communications to and from the On Demand Recovery web application go over HTTPS, and the SSL certificates are issued by trusted certificate authorities. ... As for the On Demand Recovery web ap...

Last Updated On: 10/23/2025
Product(s): On Demand Recovery
Technical Documentation
Security Guide > SDLC and SDL

All product code is reviewed by another developer before check in. ... In addition, the On Demand Recovery Development team follows a managed Security Development Lifecycle (SDL) which includes: .....

Last Updated On: 10/23/2025
Product(s): On Demand Recovery
Technical Documentation
Security Guide > Third party assessments and certifications

On Demand Recovery has undergone a third party security assessment and penetration testing yearly since 2018. ... A summary of the results is available upon request. ... Certification ... On Demand...

Last Updated On: 10/23/2025
Product(s): On Demand Recovery
Technical Documentation
Security Guide > Architecture overview

The following scheme shows the key components of the On Demand Recovery configuration. ... Hybrid configuration with Recovery Manager for Active Directory requires only outbound TCP/UDP port 443 to...

Last Updated On: 10/23/2025
Product(s): On Demand Recovery
Technical Documentation
Security Guide > FIPS 140-2 compliance

On Demand Recovery cryptographic usage is based on Azure FIPS 140-2 compliant cryptographic functions.

Last Updated On: 10/23/2025
Product(s): On Demand Recovery
Technical Documentation
Security Guide > Operational security

Access to source control and build systems is protected by domain security, meaning that only employees that are on Quest’s corporate network have access to these systems. ... Therefore, if an On...

Last Updated On: 10/23/2025
Product(s): On Demand Recovery
Technical Documentation
Security Guide > Azure datacenter security

Microsoft Azure datacenters have the highest possible physical security and are considered among the most secure and well protected datacenters in the world. ... Relevant references with additional...

Last Updated On: 10/23/2025
Product(s): On Demand Recovery
Technical Documentation
Security Guide > Role based access control

Quest On Demand provides permission-based roles to determine what permission level a user has and what tasks the user can perform. ... List of permissions that can be assigned to Recovery module users

Last Updated On: 10/23/2025
Product(s): On Demand Recovery
Technical Documentation
Security Guide > Overview of data handled by On Demand Recovery

Microsoft Entra ID and Microsoft 365 users, groups, conditional access policies, service principals with their properties, and device information returned by Microsoft Graph API, including account ...

Last Updated On: 10/23/2025
Product(s): On Demand Recovery
Technical Documentation
Security Guide > Location of customer data

The following datacenters are used to store customer data: ... Service account credentials that are used to backup MFA settings, inactive mailboxes, conditional access policies, Gallery application...

Last Updated On: 10/23/2025
Product(s): On Demand Recovery
Technical Documentation
Security Guide >

Last Updated On: 10/23/2025
Product(s): On Demand Recovery
Technical Documentation
Security Guide > Privacy and protection of customer data

The most sensitive customer data collected and stored by On Demand Recovery is the Microsoft Entra ID and Microsoft 365 data including users, groups, service principals, conditional access policies...

Last Updated On: 10/23/2025
Product(s): On Demand Recovery
Technical Documentation
Security Guide > About On Demand Recovery

On Demand Recovery cloud application automatically backs up Microsoft Entra ID and Microsoft 365 users, groups, service principals, device information, conditional access policies and navigation pr...

Last Updated On: 10/23/2025
Product(s): On Demand Recovery
Technical Documentation
Security Guide > Separation of customer data

A common concern related to cloud based services is the prevention of commingling of data that belongs to different customers.On Demand Recovery has architected its solution to specifically prevent...

Last Updated On: 10/23/2025
Product(s): On Demand Recovery
Technical Documentation
Security Guide > Customer measures

On Demand Recovery security features are only one part of a secure environment. ... Customers need to operate by their own best security practices when proceeding with data recovery. ... Special ca...

Last Updated On: 10/23/2025
Product(s): On Demand Recovery
Technical Documentation
Security Guide > Authentication of users

The customer logs in to the application by providing On Demand user account credentials. ... The process of registering an Microsoft Entra tenant into On Demand Recovery is handled through the well...

Last Updated On: 10/23/2025
Product(s): On Demand Recovery
Technical Documentation
Security Guide > Introduction

Managing information system security is a priority for every organization. ... In fact, the level of security provided by software vendors has become a differentiating factor for IT purchase decisi...

Last Updated On: 10/23/2025
Product(s): On Demand Recovery
Technical Documentation
Security Guide > Network Communications

Internal network communication within Azure includes inter-service communication between Security Guardian components and the On Demand Platform. ... Inter-service communication uses OAuth authenti...

Last Updated On: 10/23/2025
Product(s): Security Guardian
Technical Documentation
User Guide > Introducing Quest Security Guardian

About On Demand ... About Security Guardian ... Security Guardian Intelligence ... Access Control ... Functional Overview ... Configuring Additional Components

Last Updated On: 10/23/2025
Product(s): Security Guardian
Technical Documentation
Security Guide >

Last Updated On: 10/23/2025
Product(s): Security Guardian
Technical Documentation
User Guide > Discovery for Entra ID Initial Access Vulnerabilities

The following table describes the vulnerabilities identified in the pre-defined Entra Discovery for Initial Access. ... NOTE: Initial Access techniques are used by adversaries to obtain a foothold ...

Last Updated On: 10/23/2025
Product(s): Security Guardian
Technical Documentation
User Guide > Indicators by Source

Security Guardian Indicators originate from the following sources: ... On Demand Audit ... Security Guardian Assessments ... Security Guardian Tier Zero detection or protection

Last Updated On: 10/23/2025
Product(s): Security Guardian
Technical Documentation
Security Guide > Third Party Assessments and Certifications

<IFRAME id=mctoolbar_2406675348_0 title=Toolbar class=MCTopicToolbar_0 style="HEIGHT: 28px; WIDTH: 100%; VISIBILITY: hidden" src="../Skin/Toolbar.htm" frameBorder=0 allowTransparency name=mctoolbar...

Last Updated On: 10/23/2025
Product(s): Security Guardian
Technical Documentation
User Guide > Discovery for Entra ID Privilege Escalation Vulnerabilities

The following table describes the vulnerabilities identified in the pre-defined Entra ID Discovery for Privilege Escalation. ... NOTE: Privilege Escalation techniques are used by adversaries to gai...

Last Updated On: 10/23/2025
Product(s): Security Guardian
Technical Documentation
Self Service Tools
Knowledge Base
Notifications & Alerts
Product Support
Software Downloads
Technical Documentation
User Forums
Video Tutorials