Top 10 Active Directory Tune-up Tips - Slide 3

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Top 10 Active Directory Tune-up Tips-3 Next

Build an Active Directory test lab.  Safely test your changes and ideas in a sandbox.

Creating a sandbox test lab for your Active Directory environment can be invaluable for safely evaluating validations, potential changes, new applications and process discoveries. A basic AD test lab which replicates user accounts and objects from your production environment can be built quite easily. If the lab must be a closer approximation of the actual production environment, then additional resources can be added such as name resolution services, remote access, client server applications and beyond. This sandbox allows you to ferret out catastrophic errors, failure or similar complications such as bugs in new operating system versions, patches or applications – without impacting the production AD infrastructure.

In this slideshow, Azaleos identifies tips focusing on Active Directory improvements. They have collected the following best practices from their network operations centers for making Active Directory run more smoothly in 2012. These tips cover a lot of ground, from consolidation down to smaller items, such as using the new recycle bin feature. Start small and tackle each of these items gradually. This will enable you to stay current with required fixes, while monitoring the health, performance and functionality of your AD enterprise for smooth sailing into the new year.

More Slideshows:


Five Best Practices for Social Media Care Best practices for caring for customer through social media.

Emerging Cyber Threats for 2012 Georgia Tech forecasts cyber threats for 2012.

'Tis the Season to Be Grateful:
Top 5 Triggers for 'Thank You' Emails
Simple but powerful email campaign ideas to build loyalty with customers.

 

Related Topics : Single Sign-On, Windows Server Platforms

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

InfoBuildersIoTData0x Capitalizing on IoT Data: The Golden Rule for Data Success

The key to truly capitalizing on IoT data is a well-established, integrated information management strategy. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.