Access Manager Quest Access Manager Controls User and Group

Total Page:16

File Type:pdf, Size:1020Kb

Access Manager Quest Access Manager Controls User and Group Quest Access Manager controls user and group access to resources throughout the Windows enterprise and NAS devices in order to meet security and compliance requirements, control operational costs and optimize infrastructure performance. It intelligently Access Manager suggests who should “own” which data resources, bringing accountability and visibility from a single console into resources that are actively used. Provisioning, Admin and Security for Active Directory. ActiveRoles Server helps you manage, automatically provision, reprovision and, most importantly, deprovision users quickly, efficiently and securely in Active Directory, AD LDS (formerly ADAM) and beyond. ActiveRoles ActiveRoles Server provides strictly enforced role-based security, automated group management, workflow and easy-to-use web Server interfaces for self-service to achieve practical user and group lifecycle management for the Windows enterprise. ActiveRoles Server is part of the Quest One Identity Solution The Next Generation of Active Directory Bridge Technology Quest Authentication Services is patented technology that addresses the authentication needs of more than 1,000 enterprise Authentication customers with more than 5 million installed seats by extending the security and compliance of Active Directory to Unix, Linux and Services Mac, as well as to many enterprise applications. Some of the largest and most complex global environments rely on Authentication Services to achieve compliance with cross-platform access control, improve operational efficiency with centralized authentication and single sign-on, as well as unify identities and consolidate directories for simplified identity and access management. Active Directory Change Auditing ChangeAuditor for Active Quest ChangeAuditor for Active Directory proactively tracks, audits, reports and alerts on vital configuration changes—in real time Directory and without the overhead of native auditing. You will instantly know who made what change when, where, which workstation and why. Plus, you can compare the original and current values for fast troubleshooting. ChangeAuditor for AD generates intelligent, in- depth forensics for auditors and management—and reduces the risks associated with day-to-day modifications. Secure, Affordable, Achievable Two-Factor Authentication Quest Defender enhances security by enabling two-factor authentication to network, Web, and applications-based resources. Defender was designed to base all administration and identity management on an organization's existing investment in Active Defender Directory and eliminates the costs and time involved in setting up and maintaining proprietary databases. In addition, Defender works with any OATH-compliant hardware token enabling organizations to select the most appropriate token for their users. By leveraging an organization's existing investment in Active Directory and supporting multiple token vendors, Defender enables organizations to increase security and achieve and sustain compliance in a cost-effective manner. Single Sign-on Made Simple Enterprise Single Enterprise Single Sign-on from Quest Software, the industry’s leading enterprise single sign-on solution that bases all logins on the a Sign-on user’s existing Active Directory identity, requires no cumbersome infrastructure and streamlines both end-user management and enterprise-wide administration of single sign-on. Security Information Management & Security Event Management for Compliance InTrust securely collects, stores, reports and alerts on event data from Windows, Unix and Linux systems, helping you comply with external regulations, internal policies and security best practices. InTrust helps you achieve regulatory compliance by auditing access to critical systems and detecting inappropriate or suspicious InTrust access-related events. With this tool, you can collect, analyze, report and generate automated real-time alerts for all relevant access- related events across your heterogeneous network. Using this single solution to monitor access to critical systems on multiple platforms reduces the complexity of event log management, saves expensive storage administration costs, improves information assurance, mitigates risk and helps to reduce cost and improve efficiency of security, operational and compliance reporting. Complete Control Over Password Management Quest Password Manager enables the end user to reset forgotten passwords securely, allowing administrators to implement stronger password policies while reducing the help desk workload. The pain of password management - the single most common support issue - is becoming more pervasive. An administrator's Password preference for more complex passwords that must be changed more frequently increases the likelihood that users will forget them. Manager As a result, many organizations face the challenge of increasing security while reducing support costs. Password Manager provides a simple, secure set of password management utilities that allows end users to reset forgotten passwords and unlock their user accounts themselves. Password Manager accommodates the widest possible range of organization requirements and data security standards. Password Manager supports Windows 2000/2003/2008 Active Directory environments and connected systems. Organizations no longer have to sacrifice security to reduce costs. Securely Manage and Control Unix Root Access Quest Privilege Manager for Unix enhances security by protecting the full power of root access from potential misuse or abuse through fine-grained, policy-based control. Privilege Manager helps you to define a security policy that stipulates who has access to which root function, as well as when and where individuals can perform those functions. It controls access to existing programs as Privilege well as any purpose-built utilities used for common system administration tasks. With Privilege Manager, you don’t need to worry Manager for Unix about someone—whether inadvertently or maliciously—deleting critical files, modifying file permissions or databases, reformatting disks or damaging Unix systems in more subtle ways. By enabling administrators to define fine-grained security policies, delegate common management tasks and log all Unix root activities down to the keystroke level, Privilege Manager for Unix reduces security risks, increases IT productivity and enables organizations to achieve and sustain compliance in a cost-effective manner. Quest One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities. Identity Manager offers advanced role-based access control (RBAC) management, while automating complex IAM tasks—all at a fraction of the time and expense of “traditional” solutions. Identity Manager can help you: Quest One Identity Manager Achieve identity and access management objectives for less money and less effort than you previously thought Ensure access to all applications, platforms, systems and data and the employee lifecycle Deliver identity and access management without excessive customization and expensive consulting services Provide “codeless” provisioning of any and all resources Ensure user and resource provisioning meets your business objectives and is not limited by technology resources or capabilities Enable business employees to manage identity lifecycle processes through self-service without involving IT resources Incorporate workflow, attestation and separation of duty into IAM to achieve compliance, security, and efficiency *Quest One Identity Manager was previously known as Voelcker Informatik's ActiveEntry. Command Control for Security & Compliance Quest One Privileged Quest One Privileged Command Manager provides the command control you need for administrative tasks that require elevated Command credentials. You can granularly control user access to specific programs, tasks and commands. Privileged Command Manager is ideal Manager for those systems (Windows- or Unix-based) that require advanced security beyond native capabilities through a network-based proxy model of command control. Privileged Command Manager is deployed on a secure, hardened appliance. Comprehensive Password Vault Functionality for Your Most Important Administrative Access Credentials Quest One Privileged Quest One Privileged Password Manager automates, controls and secures the entire process of granting administrators the Password credentials necessary to perform their duties. Privileged Password Manager ensures that when administrators require elevated Manager access, that access is granted according to established policy, with appropriate approvals, that all actions are fully audited and tracked and that the password is changed immediately upon its return. It’s a secure, compliant and efficient solution to the age-old “keys to the kingdom” problem. Privileged Password Manager is deployed on a secure, hardened appliance. The Power to Know That Your Administrators Are Doing the Right Thing Quest One Privileged Quest One Privileged Session Manager provides session control, proxy, audit, recording and replay of high-risk users, including Session Manager administrators, remote vendors and others. It provides a single point of control from which you can authorize connections, limit access to specific resources, view active connections, record all activity, alert if connections exceed pre-set time limits and terminate
Recommended publications
  • Netvault Backup Plug-In for Domino User’S Guide Updated - February 2020 Software Version - 12.4 Contents
    Quest® NetVault® Backup Plug-in for Domino 12.4 User’s Guide © 2020 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the written permission of Quest Software Inc. The information in this document is provided in connection with Quest Software products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest Software products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST SOFTWARE ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST SOFTWARE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest Software makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice.
    [Show full text]
  • Netvault Backup for Network-Attached Storage
    NetVault for Network-Attached Storage Get flexible, scalable protection for data Optimize backups — Optimize your BENEFITS: stored on network-attached storage (NAS) backups with selectable index options. • Fast indexing of backup data devices with Quest NetVault. Using a Enhanced options include writing the specialized plug-in that supports Network index to media or the NetVault database • Disk-to-disk backup Data Management Protocol (NDMP), after a backup completes. • Support for all five NDMP NetVault maximizes data transfer over the transfer models network while maintaining centralized Operate seamlessly between multiple backup administration. It not only provides platforms — NetVault supports mixed • Directory-level relocation fast, online data backup and recovery, server environments with integrated data protection for UNIX, Windows, • Simple point-and-click it also provides efficient backup and installation and configuration recovery options regardless of the NDMP Linux and NAS devices. network configuration model in use. • Local backup and restore Choose from multiple backup The solution also offers advanced configuration options — Increase NAS • Filer-to-filer backup and restore and network availability by defining features, including browsable volume • NetVault Backup client-to- selection and direct access restore (DAR) NDMP-based backup functions to meet filer backup and restore support, which lets you quickly find your existing storage environment. exactly what must be restored to provide NetVault supports all five NDMP data • Dynamic drive sharing on a rapid time to recovery. Altogether, with transfer models. It also supports storage area network (SAN) between filers and NetVault NetVault, you’ll be able to optimize dynamic sharing of tape devices in Backup servers and clients operating efficiency, minimize impact to a NAS/ SAN storage environment, users and reduce your storage window.
    [Show full text]
  • Netvault Backup
    NetVault ® Backup Enterprise-class data protection for diverse IT environments The success of your business depends FEATURES on your ability to protect, access and Physical and virtual support — Protect NetVault Backup provides leverage your mission-critical data on a both physical and virtual servers comprehensive data daily basis — and to restore it quickly in (VMware and Hyper-V) with a single protection for hybrid IT the event of an unexpected outage. Yet solution and gain consistent, reliable, many enterprises use data protection environments from one point-and-click backup and restore. By intuitive console. software that sacrifices functionality for running the VMware plug-in on any avail- simplicity, or scalability for versatility. able proxy, you can back up all virtual machines with a single unified view that With Quest® NetVault® Backup, high- BENEFITS: growth organizations can benefit from scales to thousands of VMs. enterprise-class, cross-platform data • Lower total cost of ownership Enterprisewide control — Configure, protection that's easy to use right out of and simplified administration manage and monitor your backup and using a single solution to manage the box and that scales easily to accom- recovery operations from a web-based complex, hybrid data centers modate data growth. user interface. Convenient wizards guide • Significant storage cost savings with you through common tasks, such as With this software, you can protect a client-side deduplication and the creating backup jobs, assigning policies, massive number of servers contain- ability to use lower cost storage ing petabytes of data — from one configuring storage devices and gener- • More granular recovery points web-based console.
    [Show full text]
  • Network and Workload
    Dell Enterprise Backup & Recovery NetVault Backup At a Glance Pain Points Why NetVault Backup Rising Capital & Operating Expenses Easy to Deployment, Management, & Upgrade What is NetVault Backup? • Many organizations are struggling to keep up with • Get up and running in a matter of hours Dell NetVault Backup is a cross-platform data growth • Modular architecture makes it easy to upgrade to backup and recovery solution that delivers the • Many backup solutions require constant attention, meet your growing environment and changing breadth of coverage organizations need for all raising operating costs recovery objectives. of their platforms and applications. It provides • Upgrades are costly, requiring professional • Requires minimal training to become an expert unsurpassed ease of use, advanced functionality services and a lot of hardware and built-in scalability to manage resources Comprehensive Protection across a diverse range of physical and virtual Unreliable Recovery • Protect many different platforms, applications, platforms. • Today more data is considered mission critical, yet databases, processors, and storage devices many organizations aren’t confident they can • Support for Linux & Mac OS, plus many other NetVault Backup supports most major operating recover lost data platforms systems (physical and virtual) and processor • Organizations demand more aggressive recovery • “Best in Class’ protection for MySQL and Oracle architectures. It also supports many different objectives (recovery points, recovery times, and • Excellent
    [Show full text]
  • Dell Netvault Backup Plug-In for NDMP 10.0.5 User's Guide
    Dell™ NetVault™ Backup Plug-in for NDMP 10.0.5 User’s Guide © 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the written permission of Dell Inc. The information in this document is provided in connection with Dell products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Dell products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, DELL ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL DELL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF DELL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Dell makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice.
    [Show full text]
  • Best Practices for Setting up Netvault Smartdisk on a DR Disk Backup Appliance
    Best Practices for Setting up NetVault SmartDisk on a DR Disk Backup Appliance A Dell Technical White Paper © 2013 Dell Inc. All Rights Reserved. Dell and the Dell logo, and other Dell names and marks are trademarks of Dell Inc. in the US and worldwide. NetVault is a trademark of Dell-Quest. 2 Setting up NetVault SmartDisk on the Dell™ DR4X00 Disk Backup Appliance Table of contents Introduction ....................................................................................................................................................................................... 4 Executive Summary .......................................................................................................................................................................... 5 1 Technical Setup/configuration Best Practices ..................................................................................................................... 6 1.1 General Setup /configuration Best Practices ............................................................................................................. 6 1.2 DR4X00 Setup/configuration Best Practices ............................................................................................................. 6 1.3 NetVault Setup /configuration Best Practices ........................................................................................................... 6 2 Install and Configure the DR4X00 .........................................................................................................................................
    [Show full text]
  • Dell Netvault Backup DR Series Backup Appliance Application Note
    Dell™ DR Series Appliance Virtual Tape Library Best Practices Topics covered: - Dell DR VTL Container - NetVault nVTL A Dell Technical White Paper © 2014 Dell Inc. All Rights Reserved. Dell, the Dell logo, and NetVault are trademarks of Dell Inc. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. VMware and vSphere are registered trademarks of VMware, Inc. in the United States and/or other jurisdictions. Hyper-V and Windows are registered trademarks of Microsoft Corporation in the United States and/or other countries. Table of contents Introduction .................................................................................................................................................................3 Executive Summary ....................................................................................................................................................5 Pros and Cons of each VTL Technique .................................................................................................................6 Technical setup and configuration – DR VTL Container .................................................................................... 7 General setup and configuration – DR VTL Container ......................................................................... 7 DR Series appliance setup and configuration – DR VTL Container .................................................. 7 NetVault
    [Show full text]
  • Netvault Backup
    Quest® NetVault® Backup 12.1 Release Notes September 2018 These release notes provide information about the Quest® NetVault® Backup release. Topics: • About this release • New Features • Enhancements • Resolved issues • Known issues • System requirements • Product licensing • Upgrade and installation instructions • More resources • Globalization • About us About this release Quest NetVault Backup (NetVault Backup) offers the most advanced, cross-platform data protection capabilities on the market and unsurpassed ease of use, out-of-the-box deployment, and pain-free scalability. NetVault Backup allows you to safeguard your data and applications in both physical and virtual environments from one intuitive user interface and to protect a massive number of servers that contain many petabytes of data. NetVault Backup also features heterogeneous support, so you can safeguard data on a wide range of operating systems, applications, databases, processor architectures, and networked storage devices. Such cross-platform versatility makes it easy for you to tailor NetVault Backup to match the ever-changing and growing landscape of your IT infrastructure. NetVault Backup 12.1 is a minor release, with enhanced features and functionality. For complete product documentation, visit https://support.quest.com/technical-documents. Quest NetVault Backup 12.1 1 Release Notes New Features New feature in NetVault Backup 12.1: • Added support for Quest® Foglight® for Virtualization, Enterprise Edition 8.8 or later. • Added support for push installation on Linux-based machines. (DNAD-703) • Added support for using as a managed service provider (MSP). (NVBU-17607) • Added support for Active Directory (AD) integration with Linux using Lightweight Directory Access Protocol (LDAP). (DNAD-707, DNAD-315) • Added a Secure Mode feature for AD user management.
    [Show full text]
  • Netvault Backup for Network-Attached Storage
    NetVault Backup for Network-Attached Storage Get flexible, scalable protection for data sequentially through the entire backup BENEFITS: stored on network-attached storage set to locate and restore individual files. • Fast indexing of backup data (NAS) devices with Quest NetVault Backup. Using a specialized plug-in that Optimize backups — Optimize your • Disk-to-disk backup supports Network Data Management backups with selectable index options. Enhanced options include writing the • Support for all five NDMP Protocol (NDMP), NetVault Backup transfer models maximizes data transfer over the network index to media or the NetVault Backup while maintaining centralized backup database after a backup completes. • Directory-level relocation administration. It not only provides fast, Operate seamlessly between multiple • Simple point-and-click installation online data backup and recovery, it also and configuration provides efficient backup and recovery platforms — NetVault Backup supports options regardless of the NDMP network mixed server environments with • Local backup and restore configuration model in use. integrated data protection for UNIX, Windows, Linux and NAS devices. • Filer-to-filer backup and restore The solution also offers advanced Choose from multiple backup • NetVault Backup client-to-filer features, including browsable volume backup and restore selection and direct access restore configuration options — Increase NAS (DAR) support, which lets you quickly and network availability by defining • Dynamic drive sharing on a storage find exactly what must be restored NDMP-based backup functions to meet area network (SAN) between filers and NetVault Backup to provide rapid time to recovery. your existing storage environment. servers and clients Altogether, with NetVault Backup, you’ll NetVault Backup supports all five NDMP data transfer models.
    [Show full text]
  • Netvault Backup Administrator’S Guide Updated - June 2019 Software Version - 12.3 NVG-106-12.2-EN-01 Contents
    Quest® NetVault® Backup 12.3 Administrator’s Guide for Managed Service Provider © 2019 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the written permission of Quest Software Inc. The information in this document is provided in connection with Quest Software products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest Software products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST SOFTWARE ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST SOFTWARE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest Software makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice.
    [Show full text]
  • Netvault Administrator's Guide
    NetVault Administrator’s Guide Version 6.03 Release Date 01/15/2001 Copyrights Software Copyright © 2001 BakBone Software NetVault Administrator’s Guide Copyright © 2001 BakBone Software Printed and online versions. This software product is copyrighted and all rights are reserved. The distribution and sale of this product are intended for the use of the original purchaser only per the terms of the License Agreement. All other product trademarks are the property of their respective owners. The NetVault Administrator’s Guide documentation is copyrighted and all rights are reserved. This document may not, in whole or part, be copied, photocopied, reproduced, translated, reduced or transferred to any electronic medium or machine-readable form without prior consent in writing from BakBone Software. THIS PUBLICATION IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. THIS PUBLICATION COULD INCLUDE TECHNICAL INACCURACIES OR TYPOGRAPHICAL ERRORS. CHANGES ARE PERIODICALLY ADDED TO THE INFORMATION HEREIN; THESE CHANGES WILL BE INCORPORATED INTO NEW EDITIONS OF THE PUBLICATION. BAKBONE SOFTWARE MAY MAKE IMPORVEMENTS AND/OR CHANGES IN THE PRODUCT(S) AND/OR THE PROGRAM(S) DESCRIBED IN THIS PUBLICATION AT ANY TIME. BakBone Software 10145 Pacific Heights Blvd. Suite 900 San Diego, California 92121 858.450.9009 CONTENTS CHAPTER 1 INTRODUCTION .........................................................................................................
    [Show full text]
  • Netvault Backup Plug-In for Hyper-V User’S Guide Updated - December 2017 Software Version - 11.4.5 HYV-101-11.4.5-EN-01 Contents
    Quest® NetVault® Backup Plug-in for Hyper-V 11.4.5 User’s Guide © 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the written permission of Quest Software Inc. The information in this document is provided in connection with Quest Software products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest Software products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST SOFTWARE ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST SOFTWARE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest Software makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice.
    [Show full text]