What are some best practices for managing access rights during recovery situations. The question is particularly directed towards additional personnel or vendors that may need access to certain system functions, but only during a DR situation. How is that handled best?
April 22, 2011 4:25 AM
January 15, 2012 4:03 AM