Operations | Monitoring | ITSM | DevOps | Cloud

Building a resilient IT asset management process for hybrid workplaces with ServiceDesk Plus Cloud

In the final episode of this season's ManageEngine's Masterclass 2022, we unveil the all new asset life cycle workflow builder and discuss how to streamline the asset management process in a hybrid work environment with ServiceDesk Plus Cloud.

A practical approach to Active Directory Domain Services, Part 6: FSMO roles in AD

Do new users created on one domain controller (DC) of an Active Directory (AD) environment, ever get erroneously deleted only after a few minutes by DCs of other sites within an AD forest? Do changes made in a particular AD site ever get rewritten by DCs in other sites? Can AD objects be erroneously identified? Can more than one AD user account, for example, with all its associated attributes, be a replica of another user account?

Featured Post

Network topology software for your enterprise networks

Every network has a topology. It is the task of the network admin to discover and build upon it. So it's vitally important you have an extremely detailed understanding of your network topology. A network topology diagram graphically depicts the devices, connections, and paths of a network so you can see how the different components interact and communicate with one another. A network topology diagram is essential for creating and managing a network. Without it, even basic troubleshooting can become unnecessarily difficult.

VLAN monitoring in OpManager

A local area network, what we know more commonly as a LAN, is a network that comprises devices based out of the same geographic location, enabling communication between them. The virtual counterpart of a LAN is a virtual LAN, or VLAN. A VLAN augments a LAN, offering flexibility in making changes, higher scalability, and better security.

Why a software self-service portal is a must

Imagine you’re in an airport and going through security. Why do you have to go through such rigorous checks? These security checks protect the passengers and the aircraft themselves from accidental harm and possible crime. Assume you’re in the office now. You enter the office after showing your ID card. Even if you forget your ID card, all you have to do is tell the receptionist your employee ID and they can let you in.

Co-creating business value with ITSM

IITL has been adopted by organizations to streamline their IT service management since its conception in the 1980s. ITIL talks about co-creating value from a service management perspective in its latest version. ITIL 4 can be considered a modernized framework that is more in line with changing technologies; unlike previous versions, it emphasizes the importance of stakeholder collaboration for co-creating value. The latest version aligns with new work models such as lean, agile, and DevOps and supports modern technologies like AI and the cloud.

A practical approach to Active Directory Domain Services, Part 5: Replication in Active Directory

This blog series on Active Directory Domain Services (AD DS) is designed to help you gain a good working knowledge of what Active Directory (AD) is. Each successive blog sheds light on some aspects of AD. All blogs are curated to include the right mix of AD theoretical basics along with some valuable hands-on exercises. Through the earlier parts of the blog series, it has become clear that AD DS installed in a Windows environment opens up a host of benefits to organizations.