In managing Active Directory, mistakes happen, corruption happens and today more than ever AD disasters happen. Complete Active Directory backup and recovery are essential for every organization. Unfortunately, a solid on-premises disaster recovery plan alone, while still necessary, is not sufficient because so many organizations are making greater use of cloud-only attributes, Office 365 groups, Azure AD groups, Azure B2B/B2C accounts and other features of the hybrid AD environment to support a growing remote workforce and improve the user experience. So what can you do when things go wrong?
Watch this 6 part series on-demand to discover how to implement a hybrid Active Directory recovery strategy and get peace of mind that you’re covered no matter the scenario.
The rise in remote workers increases the chances of inadvertent mistakes that can damage your Active Directory environment. Productivity can be impacted for hours, even days, costing your company money and reputation. You need a disaster recovery plan to pinpoint changes in your AD at the object and attribute level. Know what happened and who was impacted. With an effective disaster recovery plan and a strategy you can be back up and running quickly. Learn how by watching this on-demand webcast.
Face it - corruption happens more often now than ever before and your Active Directory environment can be severely damaged. When these incidents occur, they can bring your organization’s productivity to its knees. Minimize potential impact by reducing downtime and getting users back to work quickly. With the right tool, you can reduce recovery time from a forest-level AD corruption by up to 95 percent. Learn how in Episode Two.
It's a dangerous world out there –and getting worse by the day. By 2021 the costs associated with cybercrime is predicted to be $6 trillion annually. Global damage from ransomware is predicted to be $20 billion a year from now. So how do you protect yourself? You need to apply a complete backup and recovery strategy to recover from any AD disaster at the object and attribute level, the directory level and the OS level across the entire forest. Join Episode Three to learn how to ensure your on-prem and Azure AD remain safe and available.
Chances are at some point you will experience a scenario where all of your Office 365 Groups or security group data is deleted. Native tools cannot properly recover these groups, and the Recycle Bin only keeps Office 365 Groups for 30 days. With no Azure AD change log or comparison report to help you determine which users and Azure objects have been changed or deleted, recovery is impossible. Learn how to restore the points where the group was used, repair Synchronization Scope and restore and confirm the group is recovered. Join Episode Four.
Conditional Access Policies allow or block access to cloud applications and Azure management based on specific conditions. If hard deleted, your security and business continuity are compromised If the Applications themselves – more specifically – service principals, get hard deleted, your security is even more at risk. While native recovery tools might be able to restore soft-deleted Applications, they can’t recover Conditional Access Policies or service principals. So what can you do? With the right tool, you can recover hard-deleted Conditional Access Polices and restore their enforcement. Gain visibility into the ripple effect of the deleted Applications and service principals. Learn how in Episode Five.
Incorrectly deleting AD users is bad enough. Hard deleting them? Well, you don’t want to go there if you don’t have to. But what if it accidentally happens? Incorrect information from HR or a script or connector that automatically deletes users. Think you are covered by AD connect to sync your on-premise users to the cloud? It’s not as easy or reliable as you may think. Learn how in Episode Six.