Top 10 Active Directory Tune-up Tips - Slide 10

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Top 10 Active Directory Tune-up Tips-10 Next

Simplify and optimize Active Directory replication topology. Direct the data flow.

Active Directory topology can be confusing at times and even more so when you co-mingle automatic and manual configurations. The AD topology is critical to the flow of AD metadata replication as well as SYSVOL GPO information. If you are working with a mix of automatic and manual configurations, then your overall topology may be a bit of a mystery. Take control of your AD topology by defining AD sites, site links, and manual connections into a specific topology which works best given your physical network environment. Once simplified, you can consider options such as enabling change-based notification across links, rather than interval-based notifications. This will provide much faster convergence that resembles intra-site, but will be truly inter-site.

In this slideshow, Azaleos identifies tips focusing on Active Directory improvements. They have collected the following best practices from their network operations centers for making Active Directory run more smoothly in 2012. These tips cover a lot of ground, from consolidation down to smaller items, such as using the new recycle bin feature. Start small and tackle each of these items gradually. This will enable you to stay current with required fixes, while monitoring the health, performance and functionality of your AD enterprise for smooth sailing into the new year.

More Slideshows:


Five Best Practices for Social Media Care Best practices for caring for customer through social media.

Emerging Cyber Threats for 2012 Georgia Tech forecasts cyber threats for 2012.

'Tis the Season to Be Grateful:
Top 5 Triggers for 'Thank You' Emails
Simple but powerful email campaign ideas to build loyalty with customers.

 

Related Topics : Single Sign-On, Windows Server Platforms

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

InfoBuildersIoTData0x Capitalizing on IoT Data: The Golden Rule for Data Success

The key to truly capitalizing on IoT data is a well-established, integrated information management strategy. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.