Ensuring Optimal Active Directory Health, Security, Performance, and Upgrades
Gangadhar Gaur
Date:27 January 2025
Active Directory Domain Service (AD DS) is widely used directory service and foundation of Windows domain network in organizations. It provides essential features such as centralized management, directory services, authentication, and authorization. Given its critical role within an organization, maintaining the health, security, and periodic upgrades of AD DS is paramount. Any disruption or compromise can result in significant business and financial losses.
In this blog, we will explore the industry-wide best practices for managing the various aspects of Active Directory, including maintaining its health, ensuring its security, optimizing its performance, and planning for periodic upgrades
1. Active Directory Health
Ensuring the well-being of your Active Directory environment requires consistent oversight and proactive administration. To achieve this, it's important to concentrate on several critical areas, including:
- Logs Monitoring: Regularly review security logs and alerts to detect any unusual activities or potential security breaches. Implementing tools like Security Information and Event Management (SIEM) can enhance your monitoring capabilities.
- Monitoring and Maintenance: Regularly monitor the health and performance of your AD sites and replication topology using tools like repadmin and dcdiag to identify and troubleshoot any replication problems promptly.
- Updates and Patching: Ensure that your Domain Controllers are always running the latest version of their Operating System. Additionally, implement a robust patch management strategy to guarantee that all Domain Controllers receive regular and timely updates to maintain security and performance across your network.
- AD Database: Regularly verify the integrity of the Active Directory database (NTDS.dit). Utilize tools such as ntdsutil to conduct essential maintenance tasks, including defragmentation and integrity checks, ensuring the database remains healthy and efficient.
- DNS Health: Active Directory is highly dependent on DNS, so it is essential to keep DNS healthy. Regularly check for DNS errors. Configure DNS Scavenging to automatically cleanup stale dynamically registered DNS records
- Active Directory Backup: Ensuring regular and reliable backups of your Active Directory (AD) is essential for maintaining the integrity and availability of your directory services. Here are some key recommendations:
- Daily Backups: Ensure that at least one domain controller in each domain is backed up daily, especially those holding FSMO (Flexible Single Master Operation) roles. Use the Windows Backup tool to take System State backups, even if you are performing full VM backups.
- Tombstone Lifetime Compliance: Back up AD frequently enough to ensure the backup age is never older than the tombstone lifetime (TSL), which is typically 180 days. Backups older than the tombstone lifetime are ineffective.
- Disaster Recovery Plan: Integrate your AD backup into your disaster recovery plan. Provide clear instructions on how to restore your domain controllers in the event of corruption, compromise, or disaster, including accessing Directory Services Restore Mode (DSRM) when needed.
2. Active Directory Performance
- System Performance Monitoring: Regularly track the performance metrics of Domain Controllers (DC) for CPU, Memory, Disk, and Network utilization. This helps in identifying and resolving potential bottlenecks before they impact the users.
- Hardware Sizing: While a Domain Controller (DC) can technically operate on the minimum hardware required by the Operating System, this setup may result in performance issues within a production environment of substantial size. To ensure a reliable and efficient Active Directory environment, it is advisable to exceed these minimum hardware requirements. Domain Controller sizing is complex and influenced by various factors; however, the following hardware specifications are recommended for an environment supporting up to 2,000 users/devices:
- Minimum of 2 Domain Controllers to ensure optimal performance and redundancy.
- 4 CPU Cores to manage the Operating System, Active Directory operations, and additional software such as antivirus and monitoring agents. Aim for a baseline target of 40% processor utilization during peak periods.
- 16 GB RAM to support the Operating System, Active Directory database, and other necessary software.
- SSD Storage with two partitions: 100 GB for the Operating System and 150 GB for the Active Directory database, allowing for defragmentation and future growth.
- 1 Gbps network connection to handle network traffic efficiently.
- AD Site Topology: Designing an effective Active Directory (AD) site topology is essential for optimizing performance and ensuring efficient replication and client query routing. Here are some key recommendations for AD sites:
- Understand Your Network and Create Sites: Thoroughly understand your physical network structure, including subnets and network links, and create sites that correspond to your physical locations or network segments.
- Domain Controller Placement and Redundancy: Place domain controllers in each site to ensure local authentication and reduce WAN traffic, ensuring redundancy by having at least two domain controllers per site.
- Define Subnets and Configure Site Links: Define subnets within each site to accurately reflect IP address ranges and use site links to define replication paths, configuring site link costs to prioritize faster, more reliable links.
- Replication Scheduling and Site Link Bridges: Schedule replication during offpeak hours for sites with slower links and use site link bridges to enable transitive replication between non-directly connected sites, reducing latency and improving efficiency.
- Client Affinity and Resource Location: Configure sites to ensure client computers locate the nearest domain controllers and resources, such as DFS servers, to reduce network traffic over slow WAN links and improve logon and resource access times.
- Site Link Cost: Adjust site link costs and replication schedules as needed to optimize performance and accommodate network changes.
- FRS to DFSR Migration: File Replication Service (FRS) is an older technology for replicating SYSVOL contents between domain controllers, but it has limitations in performance and scalability. Distributed File System Replication (DFSR) replaces FRS, offering improved performance, reliability, scalability, and bandwidth optimization. Migrating to DFSR also provides better management tools for easier monitoring and control of replication processes.
- AD Functional Level: Active Directory (AD) functional levels determine the features and capabilities available within your AD environment. They also dictate which Windows Server operating systems can be used on domain controllers within the domain or forest. It is advisable to maintain your AD environments at the latest forest and domain functional levels to leverage the most current features and security enhancements.
- Forest and Domain trust review: It is recommended to regularly review forest and domain trusts and remove those that are no longer needed. This helps ensure that only essential trust relationships are maintained, reducing potential security risks.
3. Active Directory Security
Security is paramount in any AD environment. Here are some best practices to enhance the security of your Active Directory:
- Platform and Network Security: Ensuring the security of the network and platform hosting your Domain Controllers (DCs) is paramount for maintaining a secure Active Directory (AD) environment. Here are comprehensive recommendations to enhance network and platform security:
- Physically secure domain controllers to prevent unauthorized access.
- Limit administrative access to domain controllers and use dedicated admin workstations for administrative tasks.
- Use firewalls and network segmentation to protect domain controllers and other critical infrastructure.
- Implement secure communication protocols, such as IPsec, to encrypt network traffic
- If domain controllers are hosted in the cloud, secure cloud access by implementing strong authentication and access controls.
- Ensure no public IP addresses are configured on domain controllers to prevent unauthorized access.
- Use virtual private networks (VPNs) and private endpoints to secure communication between on-premises and cloud environments.
- Controllers Security:
- Disable unwanted services:Disabling unnecessary services on your Domain Controllers (DCs) can significantly enhance security by reducing the attack surface. Here are some services that are generally recommended to disable on a domain controller:
- Bluetooth Support Service
- Fax Service
- Remote Registry
- Windows Error Reporting Service
- Windows Media Player Network Sharing Service
- Print Spooler
- Program Compatibility Assistant (PCA)
- Windows Push Notification Service (WNS)
- Downloaded Maps Manager
- Connected Devices Platform
- Retail Demo Service
- Windows Search
- Xbox Live Auth Manag
- Antivirus and Anti-malware: Install and maintain up-to-date antivirus and antimalware software on all domain controllers and regularly scan for and remove any detected threats.
- Least Privilege Principle: It is essential to follow the principle of least privilege by granting users only the minimum level of access necessary for their roles and regularly reviewing and adjusting permissions to ensure they remain appropriate. Adhering to this principle helps minimize security risks and potential vulnerabilities. The following groups should have limited membership:
- Enterprise Admins
- Schema Admins
- Domain Admins
- Account Operators (if present)
- Server Operators (if present)
- Print Operators (if present)
- DHCP Administrators
- DNSAdmins
- Secure Administrative Workstations (SAWs): Use dedicated, hardened workstations for administrative tasks to reduce the risk of credential theft.
- Group Policy Management: Regularly review and update Group Policies to ensure they align with your security policies. Use tools like Group Policy Management Console (GPMC) to manage and audit Group Policies.
- Regular Audits: Conduct regular security audits to identify and remediate vulnerabilities. Use tools like Microsoft Advanced Threat Analytics (ATA) to detect suspicious activities.
- Disable unwanted services:Disabling unnecessary services on your Domain Controllers (DCs) can significantly enhance security by reducing the attack surface. Here are some services that are generally recommended to disable on a domain controller:
- OU Accidental deletion: To prevent accidental deletion of Organizational Units (OUs) in Active Directory, you can enable the "Protect object from accidental deletion" feature. When creating a new OU, ensure the "Protect object from accidental deletion" option is checked. This setting helps prevent accidental deletions by requiring additional steps to remove the protection
- AD Recycle Bin: Active Directory Recycle Bin is a greate feature that allows you to recover accidentally deleted objects, such as users, groups, and OUs, without needing to restore from backup.
- Disable SMB v1: For Active Directory (AD) security, it is highly recommended to disable SMBv1. This legacy protocol is prone to numerous vulnerabilities, making it an easy target for attackers, as evidenced by the WannaCry ransomware incident. Disabling SMBv1 mitigates risks such as downgrade attacks and man-in-the-middle attacks. Upgrading to modern SMB versions, like SMB 3.0 and above, provides enhanced security features, including encryption and improved message signing, which are essential for a secure AD environment.
- Active Directory Management: Active Directory administrators should use separate accounts for performing privileged tasks and should not use these privileged accounts for their day-to-day activities. They should avoid browsing the internet with these accounts. Additionally, administrators should not log on to compromised workstations or member servers with privileged accounts. This approach helps minimize security risks and protects sensitive administrative credentials
- Stale objects: Regularly identify and clean up stale objects to maintain a secure and efficient environment. Define criteria for stale objects based on your organization's policies, typically considering inactivity thresholds of 30, 60, or 90 days.
- Disable internet on DCs: Block internet browsing on all Domain Controllers. This can be achieved by configuring an incorrect proxy setting on Domain Controllers via Group Policy. This measure helps enhance security by preventing unauthorized internet access from critical infrastructure
- krbtgt account password reset: It is highly recommended to reset the krbtgt account password regularly, ideally every 6 to 12 months. Since the krbtgt account maintains two passwords, it is advisable to reset the password twice, with an interval of 12-24 hours between resets.
Note: Resetting the krbtgt account password must be done carefully. Before proceeding, ensure that all Domain Controllers are powered on, Active Directory is healthy, and replication is functioning properly. - Service Account: Ensuring the security of service accounts is vital for protecting the integrity and confidentiality of your systems. Here are some best practices to keep your service accounts secure:
- Use Managed Service Accounts (MSAs) over traditional service accounts due to several advantages, such as automatic password management, simplified SPN management, enhanced security, and reduced administrative overhead.
- Assign only necessary permissions to service accounts to reduce the risk of misuse
- Do not place service accounts in built-in privileged groups like Domain Admins
- Ensure service accounts have strong, complex passwords and implement policies to ensure passwords expire and are changed regularly
- Use a clear and consistent naming convention for service accounts to easily identify them
- Regularly audit service accounts to ensure they are being used appropriately and have not been compromised
- Enable logging to track the activities of service accounts and detect any unusual behavior
- Use the "Log On To" feature to restrict service accounts to specific computers where they are needed
4. Active Directory Upgrades
Upgrading Active Directory is a critical task that requires careful planning and execution. Here are some steps to ensure a smooth upgrade process:
- Preparation and Planning: Clearly outline the goals of the upgrade or migration, such as consolidating domains, improving security, or upgrading to a newer version of Windows Server. Define a high-level project plan that includes timelines, milestones, and resource allocation.
- Current Environment Assessment: Document the existing AD infrastructure, including domain controllers, sites, Organizational Units (OUs), Group Policies, and trust relationships. Evaluate the health of your current AD environment to ensure there are no replication issues, DNS problems, or other errors.
- Compatibility and Requirements: Verify that the current hardware and software are compatible with the new AD version. Check if the current AD schema and functional levels meet the requirements for the upgrade.
- Risk Assessment and Mitigation: Conduct a risk assessment to identify potential issues that could arise during the upgrade.
- Dependency Analysis: Identify applications and services that depend on AD and ensure they are compatible with the new version. Map out interdependencies within your AD environment to understand the impact of the upgrade.
- Backup and Recovery: Review your AD backup solution and recovery procedures. Periodically test recovery plans to ensure they work as expected.
- Testing and Validation: Set up a test environment that mirrors your production environment to validate the upgrade process.
What Mismo Systems Offer:
At Mismo Systems, we offer comprehensive services to ensure your Active Directory (AD) environment is robust, secure, and up-to-date. Our offerings include:
- Active Directory Health and Performance Review: We thoroughly assess your AD infrastructure to identify performance bottlenecks and potential issues, ensuring optimal operation and reliability.
- Active Directory Security Review: Our experts evaluate your AD security posture, identifying vulnerabilities and providing actionable recommendations to enhance your security measures.
- Active Directory Upgrade and Migration Review: We assist in planning and executing upgrades or migrations, ensuring a seamless transition with minimal disruption. Our service includes a detailed assessment of your current environment, identification of gaps, and a comprehensive roadmap to address these gaps effectively.
By leveraging our expertise, you can ensure your AD environment is well-maintained, secure, and capable of supporting your organizational needs. Let us help you achieve a resilient and efficient AD infrastructure.
Comments On "Ensuring Optimal Active Directory Health, Security, Performance, and Upgrades"
Leave a Reply Cancel reply
Recent Blogs
Jan
27
2025
Ensuring Optimal Active Directory Health, Security, Performance, and Upgrades
Active Directory Domain Service (AD DS) is widely used directory service and foundation of Windows domain network in organizations. It
Jan
20
2025
Transform Your Business with Power Automate, Power Apps, and Copilot Studio
Microsoft’s Power Platform is a robust suite of tools designed to empower businesses to innovate and transform their operations. It
Jan
09
2025
How to Manually Migrate a WordPress Website from One Host to Another
Migrating a WordPress website from one host to another can seem daunting, but with a step-by-step guide, the process becomes
Dec
18
2024
A Stress-Free Guide to Setting Up Your Azure Environment
It’s like going on an adventure when you start your cloud journey. It may make you happy, but if you’re
Dec
18
2024
Microsoft Fabric Uncovered Capabilities Advantages
In this blog we will dive into Microsoft Fabric and go over the core services offered on the Fabric platform.
Nov
18
2024
MS Fabric and the Future of Predictive Analytics: What to Expect
Uncover how MS Fabric is transforming predictive analytics and what innovations lie ahead for businesses and technology.
Nov
12
2024
Unlock the Power of AI with Microsoft Copilot Studio
In this webinar, we dive deep into Microsoft’s transformative AI technology and show you how to create custom AI assistants
Nov
07
2024
Power BI for Business Success: Making Data-Driven Decisions Easy
Learn how to make the most of Power BI’s sharing functionalities to drive impactful data-driven decisions.
Nov
07
2024
Setting up High Availability and Disaster Recovery for Enterprise Applications
Learn how to ensure business continuity, minimize downtime, and protect your critical systems with best practices for HA and DR.
Nov
07
2024
Analytics Unplugged: From Raw Data to Actionable Insights
Dive into the world of Data Analytics and discover how to harness the power of data for smarter decisions and
Nov
07
2024
Overcoming Cloud Migration Challenges
Cloud migration offers numerous benefits, but it also comes with its own fair share of challenges Delve into the most
Oct
18
2024
Rescuing Important Emails from the Junk Folder with Microsoft Graph API
Introduction: Because, Of Course, It Had to Be the CEO Let me paint you a picture: we were managing the
Oct
07
2024
Cloud Adoption Challenges
Tune in for a deep dive into overcoming hurdles in cloud adoption using real-world solutions from our co-founder, Vineet Arora.
Sept
17
2024
Power BI Consulting Company
Power BI Consulting Company: Empowering Businesses with Data-Driven Insights In today’s competitive landscape, organizations need actionable insights to stay ahead.
Sept
17
2024
Power BI Partners
Power BI Partners: Driving Data-Driven Solutions As a trusted Power BI partner, Mismo Systems is dedicated to empowering organizations with
Sept
17
2024
Power BI Development Company
Empowering Data-Driven Insights in India (Delhi, Noida, Bangalore) and USA In today’s digital landscape, businesses are generating vast amounts of
Sept
17
2024
Power Bi Development Services
Power BI Development Services: Unlocking Data-Driven Success At Mismo Systems, we offer specialized Power BI development services to help organizations
Sept
10
2024
Power BI Service for Enterprise Analytics
In today’s data-driven business landscape, enterprise analytics plays a crucial role in informed decision-making and maintaining a competitive edge. Microsoft’s
Sept
10
2024
Planning Your Legacy Application Migration to Containers
This blog post is in continuation to “Why Migrate Legacy Applications to Containers and What are the Challenges this Brings?”
Aug
05
2024
Azure AI, ML Studio & OpenAI: Simplifying Microsoft’s AI Ecosystem
In today’s rapidly evolving technological landscape, integrating artificial intelligence (AI) and machine learning (ML) into business operations is no longer
Aug
05
2024
Why Migrate Legacy Applications to Containers and What are the Challenges this Brings?
Introduction to Containerization Containerization is the era to welcome: a time where complexity would confront simplicity in the field of
Apr
18
2024
Azure Log Analytics Workspace – Ensuring Compliance, Centralizing and Streamlining Monitoring
In the realm of cloud computing, the ability to monitor, analyze, and respond to IT environment anomalies is crucial for
Apr
17
2024
Azure Stack HCI 3-node Cluster Configuration – Switchless Storage Network
Mismo Systems implemented a 3-node Azure Stack HCI cluster for one of the clients. The cluster was configured with a
Oct
04
2023
Microsoft update: Chat with users with Teams personal accounts
Chat with Teams will extend collaboration support by enabling Teams users to chat with team members outside their work network
Dec
01
2022
AWS vs Azure
The cloud service providers AWS and Azure are truly miraculous helping millions across the globe creating a virtual space with
Apr
25
2022
The need for a hybrid solution – Azure Stack HCI
Microsoft’s Azure Stack HCI is a hyper-converged infrastructure with virtualization, software-defined networking, and more. What separates it from the rest
Jan
10
2022
Azure Virtual Desktop vs Windows 365
Azure Virtual Desktop (AVD) is a Desktop as a Service (DaaS) solution offered on Microsoft Azure, previously named Windows Virtual
Nov
16
2021
AWS Update:- Amazon EC2 now supports access to Red Hat Knowledgebase
Starting today, customers running subscriptions included Red Hat Enterprise Linux on Amazon EC2 can seamlessly access Red Hat Knowledgebase at
Nov
16
2021
AWS Update:- Amazon SNS now supports token-based authentication for APNs mobile push notifications
For sending mobile push notifications to Apple devices, Amazon Simple Notification Service (Amazon SNS) now enables token-based authentication. You may
Nov
16
2021
AWS Update:- Amazon ECS now adds container instance health information
Customers may now see the health of their compute infrastructure using Amazon Elastic Container Service (Amazon ECS). The customers running their
Nov
16
2021
Microsoft 365 Update:- Viva Connections is now generally available!
Viva Connections, part of Microsoft Viva, is your entry point to a modern employee experience. You get an all-in-one experience with the customized
Nov
16
2021
Microsoft 365 Update:- Meeting Activities in Teams Audit Log
Meeting Activities have been added to the Microsoft Teams audit log to help organizations respond more effectively to security events, forensic investigations,
Nov
15
2021
Azure Update:- Global Disaster Recovery via Azure Site Recovery
Azure Site Recovery is a Cloud-driven, highly innovative, and automated disaster recovery solution (DRaaS). Azure’s native platform capabilities for high
Nov
15
2021
Azure Update:- Screen Capture Protection for Azure Virtual Desktop
Azure Virtual Desktop is a service running in the cloud that enables your users to access the data, applications, and
Nov
15
2021
Azure Update:- Immutable Storage with versioning for Blob storage
Azure blob storage is massively scalable and secure object storage for cloud-native workloads, archives, data lakes, high-performance computing and machine
Nov
10
2021
How is Cloud transforming Industries?
Cloud technology has been impactful in transforming business. From cost savings to easy collaboration, the usage of the Cloud has
Sept
27
2021
4 Tips for Protection Against Unsafe Emails
Earlier, the spotting of malicious content in emails was quite an easy task. However, due to the rise in technology,
Sept
24
2021
How is hybrid cloud useful for midsize/large businesses?
A hybrid cloud can be defined as a cloud computing environment that utilizes a combination of on-premises private cloud and
Sept
22
2021
How to Protect Your Data from a Ransomware Attack
What is a Ransomware attack? It can be defined as a malware attack that is carried out deliberately to encrypt
Aug
24
2021
Build superpower apps, with no code-Power apps
PowerApps is a tool that allows you to create custom apps, leveraging many of the features of the Office 365
Aug
11
2021
Why do you need a Modern Workplace – M365?
Microsoft 365, a world of enhanced productivity and collaboration that drives a team to achieve more together, is a complete
July
02
2021
Microsoft Teams Updates (June 2021)
In this blog, we will be discussing the various Microsoft Teams updates in the month of June. Meeting Updates: During
June
22
2021
Microsoft rebrands Windows Virtual Desktop as Azure Virtual Desktop
Microsoft’s virtual desktop infrastructure platform has been rebranded under the Azure name and notified of new security and management capabilities
May
07
2021
How Startups can succeed with Cloud Computing?
Startups are an enjoyable but demanding professional experience. A host of entrepreneurially dedicated professionals pursue their passion and dive into
May
04
2021
Azure AD SSO & AWS – Connecting the Rivals
Being part of Mismo Systems, I am fortunate enough to get to work on a diverse set of projects. Few
May
04
2021
A quick look at the 4 Most Used Services on Microsoft Azure
1. Azure Compute Azure compute is an on-demand computing service for running cloud-based applications. Azure compute service can be divided broadly into three
May
01
2021
Cloud Security – A shared responsibility
We see all businesses small or big, consuming cloud technology in one or another way. The pandemic has increased the
Apr
18
2021
Breakout Rooms and Its Usage – Microsoft Teams
In this blog, we are going to discuss a feature provided by Microsoft teams known as Breakout rooms. Also, we
Apr
12
2021
Is Cloud cheaper than On-premises Data Centres?
Cloud has bloomed over the last decade, according to Goldman’s analysts almost 23% of IT workloads now live on Public
Apr
04
2021
Amazon CloudFront
Amazon CloudFront is a brisk Content Delivery Network (CDN) service that safely transfers data, videos, applications, and Application Programming Interface
Apr
04
2021
Hosting with Transparency, Compliance, and Security
We help customers host applications on the cloud, this includes accounting systems including Tally, ERP software including SAP, and Navision.
Apr
04
2021
Future of Cloud Computing
Cloud computing has established itself as the inevitable future when it comes to IT services. This picture becomes much clearer
Apr
04
2021
AWS Security Features
The Amazon Web Services (AWS) in terms of security follow a shared responsibility model. So, the security ‘of’ the cloud is on
Mar
14
2021
Azure vs AWS
It’s Azure vs AWS!! Read this blog to know the major differences between Azure & AWS. What is Azure? Microsoft
Mar
04
2021
Amazon FSx – How can it help you?
The Amazon FSx has a very efficient way of deploying and running traditional file servers in the cloud that is
Mar
04
2021
What is Budget in Azure and how can you set the Budget?
Budget in Azure to manage and monitor the spending or consumed cost for Azure services. We can apply budget on
Mar
23
2021
DevOps with AWS
What is CI CD? Continuous Integration Developers work on the code which is stored in a code repository. Code repository
Mar
09
2021
Azure Firewall
Azure Firewall is a managed, cloud-based network security service that protects your Azure virtual network resources. You can centrally create,
Mar
04
2021
AWS Directory Service: The Amazon Cloud Active Directory!
The AWS Directory Service provides several ways to use the Microsoft Active Directory (AD) with other AWS utilities. Information regarding
Mar
03
2021
Package Manager for Microsoft Intune Administrators – Part 1
Deploying applications to end-user Windows machines has never been easier if you are a Microsoft Intune administrator. Earlier what used
Mar
02
2021
Major Cloud Concerns – Do corporate agents, cyber hackers, and governments have access to my data if it is in the cloud?
This is one of the major cloud concerns for many companies, but it is irrational. Your IT team manages access,
Jan
04
2021
How Global admin can give someone’s OneDrive access to another user?
Please follow the below steps to use this feature. Go to Admin Center https://admin.microsoft.com/ > User>Active Users> Search Name>Click on User Profile.
Dec
04
2020
Microsoft Secure Score
Microsoft Secure Score is a security analytics tool that provides better security configuration and security features. It applies a numerical
Dec
04
2020
Top 10 Elements of The Cloud
In this blog I will be talking about the Top 10 elements of Cloud. Virtual Network: Create a logically isolated section
Nov
04
2020
AWS CodePipeline
AWS CodePipeline is an Amazon Web Services tool that automates the app deployment process, enabling the developer to easily create,
Nov
03
2020
How Cloud Computing Can Improve Your Business?
Cloud computing provides users with access to files, applications, data, and services from their Internet-connected devices, such as smartphones, laptops,
Sept
04
2020
Visio Tabs in Microsoft Teams
Visio Tabs in Microsoft Teams allows team members in a dedicated space to access resources and information in a channel
Aug
04
2020
Cloud or On-prem? – All you need to know about moving to Office 365
Protection and uptime are usual for Office 365 in the cloud. Companies are generating data at an utterly impressive pace
Mar
09
2019
Remove Azure AAD Connect
Let’s see the steps to disable AD Sync, remove AAD connect and move to cloud-only administration. 1. Download Azure Active
No Comments