?
Solved

Quest Migration Management

Posted on 2013-11-15
3
Medium Priority
?
272 Views
Last Modified: 2014-02-27
Hello

Does anyone know the best way to learn Quest tools.  There doesn't seem to be a qualification for it/book out there  

UK based question

Thanks
0
Comment
Question by:nico-
  • 2
3 Comments
 
LVL 57

Accepted Solution

by:
Mike Kline earned 1400 total points
ID: 39652448
Nothing other than getting the tool and testing it out.  I'm not sure about the UK;  but in any project I've been on that used Quest they included hours for their engineers to come on site also.  You can pick a lot up that way

I'm not sure what official training they might offer but you can contact them about that   http://www.quest.com/training/

you are right though...not any books on it.

Thanks

Mike
0
 

Author Comment

by:nico-
ID: 39892941
will hand some points over !

I've found that Quest is only given to partners of Dell - i.e companies.  Nothing available outside of that for individuals
0
 

Author Closing Comment

by:nico-
ID: 39892946
cheers, thanks for your help
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Transferring FSMO roles is done when an admin wants to split roles between certain Domain Controllers or the Domain Controller holding the Roles has been forcefully demoted using dcpromo / forceremoval
I’m willing to make a bet that your organization stores sensitive data in your Windows File Servers; files and folders that you really don’t want making it into the wrong hands.
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month5 days, 11 hours left to enroll

588 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question