Top 10 Active Directory Tune-up Tips - Slide 7

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Top 10 Active Directory Tune-up Tips-7 Next

Use Distributed File System (DFS) and (-R)eplication with file servers. Raise the bar on file sharing.

Managing file resources across multiple file servers can be a fragmentation nightmare, since you may be addressing gaps with third-party products for backup, replication and centralized management. Take control of disparate and disjointed file server resources and create a simplified, logical, fault-tolerant file availability strategy with DFS (Distributed File System) and -R (Replication). The DFS-R technology uses the newer RDC or "diff over the wire" protocol to efficiently update only deltas and changes rather than the whole file as was done in the past with NTFRS technology and MD5 comparison. Using these feature sets you can join file shares from many locations and organize them logically into manageable structures. This will also allow you to use AD integration to create location aware services so that users can find the nearest server. In addition to logical structuring, DFS replication can be used to duplicate data across multiple servers and protect against single points of failure. This is definitely NOT the file sharing of yesterday.

In this slideshow, Azaleos identifies tips focusing on Active Directory improvements. They have collected the following best practices from their network operations centers for making Active Directory run more smoothly in 2012. These tips cover a lot of ground, from consolidation down to smaller items, such as using the new recycle bin feature. Start small and tackle each of these items gradually. This will enable you to stay current with required fixes, while monitoring the health, performance and functionality of your AD enterprise for smooth sailing into the new year.

More Slideshows:

Five Best Practices for Social Media Care Best practices for caring for customer through social media.

Emerging Cyber Threats for 2012 Georgia Tech forecasts cyber threats for 2012.

'Tis the Season to Be Grateful:
Top 5 Triggers for 'Thank You' Emails
Simple but powerful email campaign ideas to build loyalty with customers.


Related Topics : Single Sign-On, Windows Server Platforms

More Slideshows

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

IoT challenges IoT: Top 7 Challenges

The IoT represents a unique set of challenges that pose a real threat to its utility as an engine of economic growth. Fortunately, the problems encountered so far are solvable, although it will probably take some time to determine exactly how to handle them and what level of optimization is needed for the multiple IoT services that are certain to arise. ...  More >>

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.