Solved

Win 2K Adv Server Services

Posted on 2002-03-14
3
186 Views
Last Modified: 2010-08-05
Hi,
   i have 2 services running on win2k adv srv.
1) bindview support service
2) bindview query service

can someone tell me what these services are for?

thanks

 
0
Comment
Question by:bimalprakashsharma
  • 3
3 Comments
 
LVL 44

Expert Comment

by:CrazyOne
ID: 6867349
Quoted from the following link
http://www.nwfusion.com/reviews/2001/direct0813a.jsp?_tablename=direct0813&a3='www.bindview.com'
Comprehensive security assessment - out of the box, bv-Control checks for more than 600 areas of risk and can generate automatically more than 600 reports Full-featured query-based interface that allows IT administrators to build custom queries for issues specific to their environment Baselining - BindView's exclusive technology that allows IT administrators to quickly document the content of their directory or the configuration of their file servers to uncover changes within their heterogeneous environments. Documentation against prior data can be performed daily,weekly or monthly to uncover discrepancies Find and Fix - BindView's exclusive technology that allows IT administrators to quickly identify and close security holes, enforce security standards and implement security policies across the enterprise Historical data storage Real time performance monitoring


The Crazy One
0
 
LVL 44

Expert Comment

by:CrazyOne
ID: 6867350
http://www.nwfusion.com/reviews/2001/direct0813result.jsp?_tablename=direct0813

Quoted from the following link. Also there is a lot of infor at this link
http://www.nwfusion.com/reviews/2000/0911rev.html
Bindview Development has released bv-Control for Microsoft Exchange, an analysis and reporting tool that helps you get a handle on what's buried deep inside your Exchange system. It can help answer questions such as: "Where did all of the disk space go?"; "Who's using the public folders?"; and "How fast is the system growing?" These questions, and many others, are very easily answered with a few clicks of the mouse.
0
 
LVL 44

Accepted Solution

by:
CrazyOne earned 200 total points
ID: 6867360
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Windows 2000 Kerberos problem 5 305
Cannot access port 443 4 573
VBScript not processed at Windows 8.1 logon 2 7,910
windows explorer 21 171
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Moving applications to the cloud or switching services to cloud-based ones, is a stressful job.  Here's how you can make it easier.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now