Top 10 Active Directory Tune-up Tips - Slide 7

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Top 10 Active Directory Tune-up Tips-7 Next

Use Distributed File System (DFS) and (-R)eplication with file servers. Raise the bar on file sharing.

Managing file resources across multiple file servers can be a fragmentation nightmare, since you may be addressing gaps with third-party products for backup, replication and centralized management. Take control of disparate and disjointed file server resources and create a simplified, logical, fault-tolerant file availability strategy with DFS (Distributed File System) and -R (Replication). The DFS-R technology uses the newer RDC or "diff over the wire" protocol to efficiently update only deltas and changes rather than the whole file as was done in the past with NTFRS technology and MD5 comparison. Using these feature sets you can join file shares from many locations and organize them logically into manageable structures. This will also allow you to use AD integration to create location aware services so that users can find the nearest server. In addition to logical structuring, DFS replication can be used to duplicate data across multiple servers and protect against single points of failure. This is definitely NOT the file sharing of yesterday.

In this slideshow, Azaleos identifies tips focusing on Active Directory improvements. They have collected the following best practices from their network operations centers for making Active Directory run more smoothly in 2012. These tips cover a lot of ground, from consolidation down to smaller items, such as using the new recycle bin feature. Start small and tackle each of these items gradually. This will enable you to stay current with required fixes, while monitoring the health, performance and functionality of your AD enterprise for smooth sailing into the new year.

More Slideshows:

Five Best Practices for Social Media Care Best practices for caring for customer through social media.

Emerging Cyber Threats for 2012 Georgia Tech forecasts cyber threats for 2012.

'Tis the Season to Be Grateful:
Top 5 Triggers for 'Thank You' Emails
Simple but powerful email campaign ideas to build loyalty with customers.


Related Topics : Single Sign-On, Windows Server Platforms

More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.