Blogs

Ensuring Optimal Active Directory Health, Security, Performance, and Upgrades

Active Directory Domain Service (AD DS) is widely used directory service and foundation of Windows domain network in organizations. It provides essential features such as centralized management, directory services, authentication, and authorization. Given its critical role within an organization, maintaining the health, security, and periodic upgrades of AD DS is paramount. Any disruption or compromise can result in significant business and financial losses.

In this blog, we will explore the industry-wide best practices for managing the various aspects of Active Directory, including maintaining its health, ensuring its security, optimizing its performance, and planning for periodic upgrades

1. Active Directory Health

Ensuring the well-being of your Active Directory environment requires consistent oversight and proactive administration. To achieve this, it's important to concentrate on several critical areas, including:

  • Logs Monitoring: Regularly review security logs and alerts to detect any unusual activities or potential security breaches. Implementing tools like Security Information and Event Management (SIEM) can enhance your monitoring capabilities.
  • Monitoring and Maintenance: Regularly monitor the health and performance of your AD sites and replication topology using tools like repadmin and dcdiag to identify and troubleshoot any replication problems promptly.
  • Updates and Patching: Ensure that your Domain Controllers are always running the latest version of their Operating System. Additionally, implement a robust patch management strategy to guarantee that all Domain Controllers receive regular and timely updates to maintain security and performance across your network.
  • AD Database: Regularly verify the integrity of the Active Directory database (NTDS.dit). Utilize tools such as ntdsutil to conduct essential maintenance tasks, including defragmentation and integrity checks, ensuring the database remains healthy and efficient.
  • DNS Health: Active Directory is highly dependent on DNS, so it is essential to keep DNS healthy. Regularly check for DNS errors. Configure DNS Scavenging to automatically cleanup stale dynamically registered DNS records
  • Active Directory Backup: Ensuring regular and reliable backups of your Active Directory (AD) is essential for maintaining the integrity and availability of your directory services. Here are some key recommendations:
    • Daily Backups: Ensure that at least one domain controller in each domain is backed up daily, especially those holding FSMO (Flexible Single Master Operation) roles. Use the Windows Backup tool to take System State backups, even if you are performing full VM backups.
    • Tombstone Lifetime Compliance: Back up AD frequently enough to ensure the backup age is never older than the tombstone lifetime (TSL), which is typically 180 days. Backups older than the tombstone lifetime are ineffective.
    • Disaster Recovery Plan: Integrate your AD backup into your disaster recovery plan. Provide clear instructions on how to restore your domain controllers in the event of corruption, compromise, or disaster, including accessing Directory Services Restore Mode (DSRM) when needed.

2. Active Directory Performance

  • System Performance Monitoring: Regularly track the performance metrics of Domain Controllers (DC) for CPU, Memory, Disk, and Network utilization. This helps in identifying and resolving potential bottlenecks before they impact the users.
  • Hardware Sizing: While a Domain Controller (DC) can technically operate on the minimum hardware required by the Operating System, this setup may result in performance issues within a production environment of substantial size. To ensure a reliable and efficient Active Directory environment, it is advisable to exceed these minimum hardware requirements. Domain Controller sizing is complex and influenced by various factors; however, the following hardware specifications are recommended for an environment supporting up to 2,000 users/devices:
    • Minimum of 2 Domain Controllers to ensure optimal performance and redundancy.
    • 4 CPU Cores to manage the Operating System, Active Directory operations, and additional software such as antivirus and monitoring agents. Aim for a baseline target of 40% processor utilization during peak periods.
    • 16 GB RAM to support the Operating System, Active Directory database, and other necessary software.
    • SSD Storage with two partitions: 100 GB for the Operating System and 150 GB for the Active Directory database, allowing for defragmentation and future growth.
    • 1 Gbps network connection to handle network traffic efficiently.
  • AD Site Topology: Designing an effective Active Directory (AD) site topology is essential for optimizing performance and ensuring efficient replication and client query routing. Here are some key recommendations for AD sites:
    • Understand Your Network and Create Sites: Thoroughly understand your physical network structure, including subnets and network links, and create sites that correspond to your physical locations or network segments.
    • Domain Controller Placement and Redundancy: Place domain controllers in each site to ensure local authentication and reduce WAN traffic, ensuring redundancy by having at least two domain controllers per site.
    • Define Subnets and Configure Site Links: Define subnets within each site to accurately reflect IP address ranges and use site links to define replication paths, configuring site link costs to prioritize faster, more reliable links.
    • Replication Scheduling and Site Link Bridges: Schedule replication during offpeak hours for sites with slower links and use site link bridges to enable transitive replication between non-directly connected sites, reducing latency and improving efficiency.
    • Client Affinity and Resource Location: Configure sites to ensure client computers locate the nearest domain controllers and resources, such as DFS servers, to reduce network traffic over slow WAN links and improve logon and resource access times.
    • Site Link Cost: Adjust site link costs and replication schedules as needed to optimize performance and accommodate network changes.
  • FRS to DFSR Migration: File Replication Service (FRS) is an older technology for replicating SYSVOL contents between domain controllers, but it has limitations in performance and scalability. Distributed File System Replication (DFSR) replaces FRS, offering improved performance, reliability, scalability, and bandwidth optimization. Migrating to DFSR also provides better management tools for easier monitoring and control of replication processes.
  • AD Functional Level: Active Directory (AD) functional levels determine the features and capabilities available within your AD environment. They also dictate which Windows Server operating systems can be used on domain controllers within the domain or forest. It is advisable to maintain your AD environments at the latest forest and domain functional levels to leverage the most current features and security enhancements.
  • Forest and Domain trust review: It is recommended to regularly review forest and domain trusts and remove those that are no longer needed. This helps ensure that only essential trust relationships are maintained, reducing potential security risks.

3. Active Directory Security

Security is paramount in any AD environment. Here are some best practices to enhance the security of your Active Directory:

  • Platform and Network Security: Ensuring the security of the network and platform hosting your Domain Controllers (DCs) is paramount for maintaining a secure Active Directory (AD) environment. Here are comprehensive recommendations to enhance network and platform security:
    • Physically secure domain controllers to prevent unauthorized access.
    • Limit administrative access to domain controllers and use dedicated admin workstations for administrative tasks.
    • Use firewalls and network segmentation to protect domain controllers and other critical infrastructure.
    • Implement secure communication protocols, such as IPsec, to encrypt network traffic
    • If domain controllers are hosted in the cloud, secure cloud access by implementing strong authentication and access controls.
    • Ensure no public IP addresses are configured on domain controllers to prevent unauthorized access.
    • Use virtual private networks (VPNs) and private endpoints to secure communication between on-premises and cloud environments.
  • Controllers Security:
    • Disable unwanted services:Disabling unnecessary services on your Domain Controllers (DCs) can significantly enhance security by reducing the attack surface. Here are some services that are generally recommended to disable on a domain controller:
      • Bluetooth Support Service
      • Fax Service
      • Remote Registry
      • Windows Error Reporting Service
      • Windows Media Player Network Sharing Service
      • Print Spooler
      • Program Compatibility Assistant (PCA)
      • Windows Push Notification Service (WNS)
      • Downloaded Maps Manager
      • Connected Devices Platform
      • Retail Demo Service
      • Windows Search
      • Xbox Live Auth Manag
    • Antivirus and Anti-malware: Install and maintain up-to-date antivirus and antimalware software on all domain controllers and regularly scan for and remove any detected threats.
    • Least Privilege Principle: It is essential to follow the principle of least privilege by granting users only the minimum level of access necessary for their roles and regularly reviewing and adjusting permissions to ensure they remain appropriate. Adhering to this principle helps minimize security risks and potential vulnerabilities. The following groups should have limited membership:
      • Enterprise Admins
      • Schema Admins
      • Domain Admins
      • Account Operators (if present)
      • Server Operators (if present)
      • Print Operators (if present)
      • DHCP Administrators
      • DNSAdmins
    • Secure Administrative Workstations (SAWs): Use dedicated, hardened workstations for administrative tasks to reduce the risk of credential theft.
    • Group Policy Management: Regularly review and update Group Policies to ensure they align with your security policies. Use tools like Group Policy Management Console (GPMC) to manage and audit Group Policies.
    • Regular Audits: Conduct regular security audits to identify and remediate vulnerabilities. Use tools like Microsoft Advanced Threat Analytics (ATA) to detect suspicious activities.
  • OU Accidental deletion: To prevent accidental deletion of Organizational Units (OUs) in Active Directory, you can enable the "Protect object from accidental deletion" feature. When creating a new OU, ensure the "Protect object from accidental deletion" option is checked. This setting helps prevent accidental deletions by requiring additional steps to remove the protection
  • AD Recycle Bin: Active Directory Recycle Bin is a greate feature that allows you to recover accidentally deleted objects, such as users, groups, and OUs, without needing to restore from backup.
  • Disable SMB v1: For Active Directory (AD) security, it is highly recommended to disable SMBv1. This legacy protocol is prone to numerous vulnerabilities, making it an easy target for attackers, as evidenced by the WannaCry ransomware incident. Disabling SMBv1 mitigates risks such as downgrade attacks and man-in-the-middle attacks. Upgrading to modern SMB versions, like SMB 3.0 and above, provides enhanced security features, including encryption and improved message signing, which are essential for a secure AD environment.
  • Active Directory Management: Active Directory administrators should use separate accounts for performing privileged tasks and should not use these privileged accounts for their day-to-day activities. They should avoid browsing the internet with these accounts. Additionally, administrators should not log on to compromised workstations or member servers with privileged accounts. This approach helps minimize security risks and protects sensitive administrative credentials
  • Stale objects: Regularly identify and clean up stale objects to maintain a secure and efficient environment. Define criteria for stale objects based on your organization's policies, typically considering inactivity thresholds of 30, 60, or 90 days.
  • Disable internet on DCs: Block internet browsing on all Domain Controllers. This can be achieved by configuring an incorrect proxy setting on Domain Controllers via Group Policy. This measure helps enhance security by preventing unauthorized internet access from critical infrastructure
  • krbtgt account password reset: It is highly recommended to reset the krbtgt account password regularly, ideally every 6 to 12 months. Since the krbtgt account maintains two passwords, it is advisable to reset the password twice, with an interval of 12-24 hours between resets.
    Note: Resetting the krbtgt account password must be done carefully. Before proceeding, ensure that all Domain Controllers are powered on, Active Directory is healthy, and replication is functioning properly.
  • Service Account: Ensuring the security of service accounts is vital for protecting the integrity and confidentiality of your systems. Here are some best practices to keep your service accounts secure:
    • Use Managed Service Accounts (MSAs) over traditional service accounts due to several advantages, such as automatic password management, simplified SPN management, enhanced security, and reduced administrative overhead.
    • Assign only necessary permissions to service accounts to reduce the risk of misuse
    • Do not place service accounts in built-in privileged groups like Domain Admins
    • Ensure service accounts have strong, complex passwords and implement policies to ensure passwords expire and are changed regularly
    • Use a clear and consistent naming convention for service accounts to easily identify them
    • Regularly audit service accounts to ensure they are being used appropriately and have not been compromised
    • Enable logging to track the activities of service accounts and detect any unusual behavior
    • Use the "Log On To" feature to restrict service accounts to specific computers where they are needed

4. Active Directory Upgrades

Upgrading Active Directory is a critical task that requires careful planning and execution. Here are some steps to ensure a smooth upgrade process:

  • Preparation and Planning: Clearly outline the goals of the upgrade or migration, such as consolidating domains, improving security, or upgrading to a newer version of Windows Server. Define a high-level project plan that includes timelines, milestones, and resource allocation.
  • Current Environment Assessment: Document the existing AD infrastructure, including domain controllers, sites, Organizational Units (OUs), Group Policies, and trust relationships. Evaluate the health of your current AD environment to ensure there are no replication issues, DNS problems, or other errors.
  • Compatibility and Requirements: Verify that the current hardware and software are compatible with the new AD version. Check if the current AD schema and functional levels meet the requirements for the upgrade.
  • Risk Assessment and Mitigation: Conduct a risk assessment to identify potential issues that could arise during the upgrade.
  • Dependency Analysis: Identify applications and services that depend on AD and ensure they are compatible with the new version. Map out interdependencies within your AD environment to understand the impact of the upgrade.
  • Backup and Recovery: Review your AD backup solution and recovery procedures. Periodically test recovery plans to ensure they work as expected.
  • Testing and Validation: Set up a test environment that mirrors your production environment to validate the upgrade process.

What Mismo Systems Offer:

At Mismo Systems, we offer comprehensive services to ensure your Active Directory (AD) environment is robust, secure, and up-to-date. Our offerings include:

  • Active Directory Health and Performance Review: We thoroughly assess your AD infrastructure to identify performance bottlenecks and potential issues, ensuring optimal operation and reliability.
  • Active Directory Security Review: Our experts evaluate your AD security posture, identifying vulnerabilities and providing actionable recommendations to enhance your security measures.
  • Active Directory Upgrade and Migration Review: We assist in planning and executing upgrades or migrations, ensuring a seamless transition with minimal disruption. Our service includes a detailed assessment of your current environment, identification of gaps, and a comprehensive roadmap to address these gaps effectively.

By leveraging our expertise, you can ensure your AD environment is well-maintained, secure, and capable of supporting your organizational needs. Let us help you achieve a resilient and efficient AD infrastructure.

No Comments

Comments On "Ensuring Optimal Active Directory Health, Security, Performance, and Upgrades"

Leave a Reply

Your email address will not be published. Required fields are marked *

Recent Blogs

Jan

27

2025

Ensuring Optimal Active Directory Health, Security, Performance, and Upgrades

Active Directory Domain Service (AD DS) is widely used directory service and foundation of Windows domain network in organizations. It

Jan

20

2025

Transform Your Business with Power Automate, Power Apps, and Copilot Studio

Microsoft’s Power Platform is a robust suite of tools designed to empower businesses to innovate and transform their operations. It

Jan

09

2025

How to Manually Migrate a WordPress Website from One Host to Another

Migrating a WordPress website from one host to another can seem daunting, but with a step-by-step guide, the process becomes

Dec

18

2024

A Stress-Free Guide to Setting Up Your Azure Environment

It’s like going on an adventure when you start your cloud journey. It may make you happy, but if you’re

Dec

18

2024

Microsoft Fabric Uncovered Capabilities Advantages

In this blog we will dive into Microsoft Fabric and go over the core services offered on the Fabric platform.

Nov

18

2024

MS Fabric and the Future of Predictive Analytics: What to Expect

Uncover how MS Fabric is transforming predictive analytics and what innovations lie ahead for businesses and technology.

Nov

12

2024

Unlock the Power of AI with Microsoft Copilot Studio

In this webinar, we dive deep into Microsoft’s transformative AI technology and show you how to create custom AI assistants

Nov

07

2024

Power BI for Business Success: Making Data-Driven Decisions Easy

Learn how to make the most of Power BI’s sharing functionalities to drive impactful data-driven decisions.

Nov

07

2024

Setting up High Availability and Disaster Recovery for Enterprise Applications

Learn how to ensure business continuity, minimize downtime, and protect your critical systems with best practices for HA and DR.

Nov

07

2024

Analytics Unplugged: From Raw Data to Actionable Insights

Dive into the world of Data Analytics and discover how to harness the power of data for smarter decisions and

Nov

07

2024

Overcoming Cloud Migration Challenges

Cloud migration offers numerous benefits, but it also comes with its own fair share of challenges Delve into the most

Oct

18

2024

Rescuing Important Emails from the Junk Folder with Microsoft Graph API

Introduction: Because, Of Course, It Had to Be the CEO Let me paint you a picture: we were managing the

Oct

07

2024

Cloud Adoption Challenges

Tune in for a deep dive into overcoming hurdles in cloud adoption using real-world solutions from our co-founder, Vineet Arora.

Sept

17

2024

Power BI Consulting Company

Power BI Consulting Company: Empowering Businesses with Data-Driven Insights In today’s competitive landscape, organizations need actionable insights to stay ahead.

Sept

17

2024

Power BI Partners

Power BI Partners: Driving Data-Driven Solutions As a trusted Power BI partner, Mismo Systems is dedicated to empowering organizations with

Sept

17

2024

Power BI Development Company

Empowering Data-Driven Insights in India (Delhi, Noida, Bangalore) and USA In today’s digital landscape, businesses are generating vast amounts of

Sept

17

2024

Power Bi Development Services

Power BI Development Services: Unlocking Data-Driven Success At Mismo Systems, we offer specialized Power BI development services to help organizations

Sept

10

2024

Power BI Service for Enterprise Analytics

In today’s data-driven business landscape, enterprise analytics plays a crucial role in informed decision-making and maintaining a competitive edge. Microsoft’s

Sept

10

2024

Planning Your Legacy Application Migration to Containers

This blog post is in continuation to “Why Migrate Legacy Applications to Containers and What are the Challenges this Brings?”

Aug

05

2024

Azure AI, ML Studio & OpenAI: Simplifying Microsoft’s AI Ecosystem

In today’s rapidly evolving technological landscape, integrating artificial intelligence (AI) and machine learning (ML) into business operations is no longer

Aug

05

2024

Why Migrate Legacy Applications to Containers and What are the Challenges this Brings?

Introduction to Containerization Containerization is the era to welcome: a time where complexity would confront simplicity in the field of

Apr

18

2024

Azure Log Analytics Workspace – Ensuring Compliance, Centralizing and Streamlining Monitoring

In the realm of cloud computing, the ability to monitor, analyze, and respond to IT environment anomalies is crucial for

Apr

17

2024

Azure Stack HCI 3-node Cluster Configuration – Switchless Storage Network

Mismo Systems implemented a 3-node Azure Stack HCI cluster for one of the clients. The cluster was configured with a

Oct

04

2023

Microsoft update: Chat with users with Teams personal accounts

Chat with Teams will extend collaboration support by enabling Teams users to chat with team members outside their work network

Dec

01

2022

AWS vs Azure

The cloud service providers AWS and Azure are truly miraculous helping millions across the globe creating a virtual space with

Apr

25

2022

The need for a hybrid solution – Azure Stack HCI

Microsoft’s Azure Stack HCI is a hyper-converged infrastructure with virtualization, software-defined networking, and more. What separates it from the rest

Jan

10

2022

Azure Virtual Desktop vs Windows 365

Azure Virtual Desktop (AVD) is a Desktop as a Service (DaaS) solution offered on Microsoft Azure, previously named Windows Virtual

Nov

16

2021

AWS Update:- Amazon EC2 now supports access to Red Hat Knowledgebase

Starting today, customers running subscriptions included Red Hat Enterprise Linux on Amazon EC2 can seamlessly access Red Hat Knowledgebase at

Nov

16

2021

AWS Update:- Amazon SNS now supports token-based authentication for APNs mobile push notifications

For sending mobile push notifications to Apple devices, Amazon Simple Notification Service (Amazon SNS) now enables token-based authentication. You may

Nov

16

2021

AWS Update:- Amazon ECS now adds container instance health information

Customers may now see the health of their compute infrastructure using Amazon Elastic Container Service (Amazon ECS). The customers running their

Nov

16

2021

Microsoft 365 Update:- Viva Connections is now generally available!

Viva Connections, part of Microsoft Viva, is your entry point to a modern employee experience. You get an all-in-one experience with the customized

Nov

16

2021

Microsoft 365 Update:- Meeting Activities in Teams Audit Log

Meeting Activities have been added to the Microsoft Teams audit log to help organizations respond more effectively to security events, forensic investigations,

Nov

15

2021

Azure Update:- Global Disaster Recovery via Azure Site Recovery

Azure Site Recovery is a Cloud-driven, highly innovative, and automated disaster recovery solution (DRaaS). Azure’s native platform capabilities for high

Nov

15

2021

Azure Update:- Screen Capture Protection for Azure Virtual Desktop

Azure Virtual Desktop is a service running in the cloud that enables your users to access the data, applications, and

Nov

15

2021

Azure Update:- Immutable Storage with versioning for Blob storage

Azure blob storage is massively scalable and secure object storage for cloud-native workloads, archives, data lakes, high-performance computing and machine

Nov

10

2021

How is Cloud transforming Industries?

Cloud technology has been impactful in transforming business. From cost savings to easy collaboration, the usage of the Cloud has

Sept

27

2021

4 Tips for Protection Against Unsafe Emails

Earlier, the spotting of malicious content in emails was quite an easy task. However, due to the rise in technology,

Sept

24

2021

How is hybrid cloud useful for midsize/large businesses?

A hybrid cloud can be defined as a cloud computing environment that utilizes a combination of on-premises private cloud and

Sept

22

2021

How to Protect Your Data from a Ransomware Attack

What is a Ransomware attack? It can be defined as a malware attack that is carried out deliberately to encrypt

Aug

24

2021

Build superpower apps, with no code-Power apps

PowerApps is a tool that allows you to create custom apps, leveraging many of the features of the Office 365

Aug

11

2021

Why do you need a Modern Workplace – M365?

Microsoft 365, a world of enhanced productivity and collaboration that drives a team to achieve more together, is a complete

July

02

2021

Microsoft Teams Updates (June 2021)

In this blog, we will be discussing the various Microsoft Teams updates in the month of June. Meeting Updates: During

June

22

2021

Microsoft rebrands Windows Virtual Desktop as Azure Virtual Desktop

Microsoft’s virtual desktop infrastructure platform has been rebranded under the Azure name and notified of new security and management capabilities

May

07

2021

How Startups can succeed with Cloud Computing?

Startups are an enjoyable but demanding professional experience. A host of entrepreneurially dedicated professionals pursue their passion and dive into

May

04

2021

Azure AD SSO & AWS – Connecting the Rivals

Being part of Mismo Systems, I am fortunate enough to get to work on a diverse set of projects. Few

May

04

2021

A quick look at the 4 Most Used Services on Microsoft Azure

1. Azure Compute Azure compute is an on-demand computing service for running cloud-based applications. Azure compute service can be divided broadly into three

May

01

2021

Cloud Security – A shared responsibility

We see all businesses small or big, consuming cloud technology in one or another way. The pandemic has increased the

Apr

18

2021

Breakout Rooms and Its Usage – Microsoft Teams

In this blog, we are going to discuss a feature provided by Microsoft teams known as Breakout rooms. Also, we

Apr

12

2021

Is Cloud cheaper than On-premises Data Centres?

Cloud has bloomed over the last decade, according to Goldman’s analysts almost 23% of IT workloads now live on Public

Apr

04

2021

Amazon CloudFront

Amazon CloudFront is a brisk Content Delivery Network (CDN) service that safely transfers data, videos, applications, and Application Programming Interface

Apr

04

2021

Hosting with Transparency, Compliance, and Security

We help customers host applications on the cloud, this includes accounting systems including Tally, ERP software including SAP, and Navision.

Apr

04

2021

Future of Cloud Computing

Cloud computing has established itself as the inevitable future when it comes to IT services. This picture becomes much clearer

Apr

04

2021

AWS Security Features

The Amazon Web Services (AWS) in terms of security follow a shared responsibility model. So, the security ‘of’ the cloud is on

Mar

14

2021

Azure vs AWS

It’s Azure vs AWS!! Read this blog to know the major differences between Azure & AWS. What is Azure? Microsoft

Mar

04

2021

Amazon FSx – How can it help you?

The Amazon FSx has a very efficient way of deploying and running traditional file servers in the cloud that is

Mar

04

2021

What is Budget in Azure and how can you set the Budget?

Budget in Azure to manage and monitor the spending or consumed cost for Azure services. We can apply budget on

Mar

23

2021

DevOps with AWS

What is CI CD? Continuous Integration Developers work on the code which is stored in a code repository.  Code repository

Mar

09

2021

Azure Firewall

Azure Firewall is a managed, cloud-based network security service that protects your Azure virtual network resources. You can centrally create,

Mar

04

2021

AWS Directory Service: The Amazon Cloud Active Directory!

The AWS Directory Service provides several ways to use the Microsoft Active Directory (AD) with other AWS utilities. Information regarding

Mar

03

2021

Package Manager for Microsoft Intune Administrators – Part 1

Deploying applications to end-user Windows machines has never been easier if you are a Microsoft Intune administrator. Earlier what used

Mar

02

2021

Major Cloud Concerns – Do corporate agents, cyber hackers, and governments have access to my data if it is in the cloud?

This is one of the major cloud concerns for many companies, but it is irrational. Your IT team manages access,

Jan

04

2021

How Global admin can give someone’s OneDrive access to another user?

Please follow the below steps to use this feature. Go to Admin Center https://admin.microsoft.com/ > User>Active Users> Search Name>Click on User Profile.

Dec

04

2020

Microsoft Secure Score

Microsoft Secure Score is a security analytics tool that provides better security configuration and security features. It applies a numerical

Dec

04

2020

Top 10 Elements of The Cloud

In this blog I will be talking about the Top 10 elements of Cloud. Virtual Network: Create a logically isolated section

Nov

04

2020

AWS CodePipeline

AWS CodePipeline is an Amazon Web Services tool that automates the app deployment process, enabling the developer to easily create,

Nov

03

2020

How Cloud Computing Can Improve Your Business?

Cloud computing provides users with access to files, applications, data, and services from their Internet-connected devices, such as smartphones, laptops,

Sept

04

2020

Visio Tabs in Microsoft Teams

Visio Tabs in Microsoft Teams allows team members in a dedicated space to access resources and information in a channel

Aug

04

2020

Cloud or On-prem? – All you need to know about moving to Office 365

Protection and uptime are usual for Office 365 in the cloud. Companies are generating data at an utterly impressive pace

Mar

09

2019

Remove Azure AAD Connect

Let’s see the steps to disable AD Sync, remove AAD connect and move to cloud-only administration. 1. Download Azure Active