Skip links

Innovation. Quality. Invention.

Zimbra mail

If you encounter any challenges while utilizing our mail servers, we encourage you to connect with our exceptional world-class support system for assistance.

Discover Zimbra mail

VM Datasheet Template

Use this sheet to provide details of all VMs associated with the hosted application for which DNS entry is being sought.

VM Datasheet Template

PMP Portal Access Guide

Please find instructions to log in and use the PMP portal.

Explore PMP

DDMS

A Digital Document Management System (DDMS) is a software platform designed to manage, store, and track electronic documents, audio, video and images of paper documents.

Login to DDMS

VM Request Form

Download the document for VM Hosting Request.

Request New VM

Ticketing System

Access top-notch support through our world-class online ticketing system, backed by a team of knowledgeable experts.

Raise a Ticket

General FAQs

LDAP stands for Lightweight Directory Access Protocol which is a directory service similar to the database that is used for storing computers, users, objects, etc. Moreover, it helps in adding, removing, and updating computer objects in the directory.

To configure and manage remote access in Windows Server, you can follow these steps:

  • Install the Remote Access role: Open Server Manager and select Add Roles and Features. Follow the wizard to select the Remote Access role, and choose the appropriate sub-roles such as DirectAccess, VPN, or Web Application Proxy.
  • Configure Remote Access policies: After installing the Remote Access role, you can configure policies for remote access, such as authentication methods, network access rules, and connection protocols. To configure policies, open the Remote Access Management Console and select the appropriate policy type such as VPN or DirectAccess.
  • Configure Remote Access clients: Once policies are configured, you can configure clients to connect to the remote access server. Clients can be configured using standard Windows VPN clients, DirectAccess clients, or web-based clients using Web Application Proxy.
  • Monitor and troubleshoot Remote Access: To monitor and troubleshoot Remote Access, you can use built-in tools such as the Remote Access Management Console, the Routing and Remote Access console, or event logs. These tools can help you track connection attempts, diagnose connection issues, and view performance statistics.
  • Secure Remote Access: It’s important to secure remote access by using appropriate authentication methods, such as multi-factor authentication or certificate-based authentication, and by using encryption for data in transit. You can also use features such as Network Access Protection (NAP) to enforce security policies on remote access clients.
  • Manage Remote Access infrastructure: To manage Remote Access infrastructure, you can use tools such as PowerShell, System Center Configuration Manager (SCCM), or third-party management tools. These tools can help you automate configuration, monitor performance, and ensure compliance with organizational policies.

Active Directory Federation Services (ADFS) is a Microsoft technology that enables secure single sign-on (SSO) between different organizations, allowing users to authenticate with their own organization’s identity provider (IDP) and access resources in another organization without having to provide separate login credentials. ADFS uses standards-based authentication protocols such as Security Assertion Markup Language (SAML) and OAuth to establish trust relationships between identity providers and service providers.

In Windows Server, ADFS can be set up using the following steps:

  • Install ADFS: Open Server Manager and select Add Roles and Features. Follow the wizard to select the ADFS role.
  • Configure ADFS: After installing the ADFS role, you can configure ADFS by running the ADFS Management snap-in from the Start menu. Configure the ADFS settings, such as the federation service name, certificate settings, and trust relationships.
  • Add identity providers and service providers: ADFS relies on trust relationships between identity providers and service providers to enable SSO. You can add identity providers and service providers to ADFS by using the ADFS Management snap-in and specifying the appropriate SAML or OAuth endpoints.
  • Test SSO: Once the identity providers and service providers are configured, you can test SSO by logging in to a service provider application and being redirected to the identity provider for authentication. After successful authentication, you should be redirected back to the service provider application and granted access.
  • Monitor and troubleshoot ADFS: To monitor and troubleshoot ADFS, you can use tools such as the ADFS Management snap-in, the Event Viewer, or the ADFS diagnostics cmdlets. These tools can help you diagnose authentication issues, view log files, and monitor performance statistics.

Group Policy refers to a feature of Microsoft Windows NT which also belongs to the family of OS. This helps in controlling the work setting of computer accounts and user accounts. Further, it also provides the central configuration management of the operating systems, user settings, and applications in an Active Directory setting.

This refers to a computer that acts as a gateway between a local network and a larger-scale system such as the Internet. Further, this also provides increased security and performance as well as helps in monitoring the employees using outside resources.

Group Policy Management Console (GPMC)  provides easy management of all GPOs diagonally the whole Active Directory Forest View of GPOs in one list. This allows to perform GPOs backup and restore, Immigration of GPOs over many forest and domains.

The WINS servers, which map IP addresses to NetBIOS names, are known as Windows Internet Name Service servers. Employers can now access resources using the computer’s name rather than the IP address. This machine can also be set up as a WINS server to keep track of the IP addresses and names of other computers on the network.

It is a set of files and folders that are stored on the local hard disk of each domain controller in a domain and are replicated by the FRS ( File Replication Service). These files contain group or user policy information.

INODE holds the metadata of files; INODE is a pointer to a block on the disk, and it is unique. In simple words, it is a unique number allocated to a file in UNIX-like OS.