Top 10 Active Directory Tune-up Tips - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Top 10 Active Directory Tune-up Tips-4 Next

Plan, document and test a strategy for Active Directory backups and disaster recovery. Prepare for the storms.

When disaster strikes, your chances of making a successful recovery will increase exponentially if you have planned ahead and created a solid disaster recovery (DR) strategy. A good DR methodology should include, but should not be limited to, a backup and restore process to recover granular attribute information or entire domain controllers. In addition, your plan should also test and include details to recover the entire AD forest, in the event that all DCs become collectively unavailable. A solid, tested and proven DR strategy plan can make all the difference in providing a clear path for recovery.

In this slideshow, Azaleos identifies tips focusing on Active Directory improvements. They have collected the following best practices from their network operations centers for making Active Directory run more smoothly in 2012. These tips cover a lot of ground, from consolidation down to smaller items, such as using the new recycle bin feature. Start small and tackle each of these items gradually. This will enable you to stay current with required fixes, while monitoring the health, performance and functionality of your AD enterprise for smooth sailing into the new year.

More Slideshows:


Five Best Practices for Social Media Care Best practices for caring for customer through social media.

Emerging Cyber Threats for 2012 Georgia Tech forecasts cyber threats for 2012.

'Tis the Season to Be Grateful:
Top 5 Triggers for 'Thank You' Emails
Simple but powerful email campaign ideas to build loyalty with customers.

 

Related Topics : Single Sign-On, Windows Server Platforms

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.