?
Solved

Quest Migration Management

Posted on 2013-11-15
3
Medium Priority
?
270 Views
Last Modified: 2014-02-27
Hello

Does anyone know the best way to learn Quest tools.  There doesn't seem to be a qualification for it/book out there  

UK based question

Thanks
0
Comment
Question by:nico-
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 57

Accepted Solution

by:
Mike Kline earned 1400 total points
ID: 39652448
Nothing other than getting the tool and testing it out.  I'm not sure about the UK;  but in any project I've been on that used Quest they included hours for their engineers to come on site also.  You can pick a lot up that way

I'm not sure what official training they might offer but you can contact them about that   http://www.quest.com/training/

you are right though...not any books on it.

Thanks

Mike
0
 

Author Comment

by:nico-
ID: 39892941
will hand some points over !

I've found that Quest is only given to partners of Dell - i.e companies.  Nothing available outside of that for individuals
0
 

Author Closing Comment

by:nico-
ID: 39892946
cheers, thanks for your help
0

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Here's a look at newsworthy articles and community happenings during the last month.
In the absence of a fully-fledged GPO Management product like AGPM, the script in this article will provide you with a simple way to watch the domain (or a select OU) for GPOs changes and automatically take backups when policies are added, removed o…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Suggested Courses

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question