Recovering Active Directory in a Hybrid World
In managing Active Directory, mistakes happen, corruption happens and today more than ever AD disasters happen. Complete Active Directory backup and recovery are essential for every organization. Unfortunately, a solid on-premises disaster recovery plan alone, while still necessary, is not sufficient because so many organizations are making greater use of cloud-only attributes, Office 365 groups, Azure AD groups, Azure B2B/B2C accounts and other features of the hybrid AD environment to support a growing remote workforce and improve the user experience. So what can you do when things go wrong?
Join this 6 part series to discover how to implement a hybrid Active Directory recovery strategy and get peace of mind that you’re covered no matter the scenario.
Episode 1 On Demand: AD mistakes happen – How do you quickly recover without missing a beat?
The rise in remote workers increases the chances of inadvertent mistakes that can damage your Active Directory environment. Productivity can be impacted for hours, even days, costing your company money and reputation. You need a disaster recovery plan to pinpoint changes in your AD at the object and attribute level. Know what happened and who was impacted. With an effective disaster recovery plan and a strategy you can be back up and running quickly. Learn how in Episode One.
Episode 2 On Demand: AD corruption happens – And recovering from it isn't easy...
Face it - corruption happens more often now than ever before and your Active Directory environment can be severely damaged. When these incidents occur, they can bring your organization’s productivity to its knees. Minimize potential impact by reducing downtime and getting users back to work quickly. With the right tool, you can reduce recovery time from a forest-level AD corruption by up to 95 percent. Learn how in Episode Two.
Participer à l’événement
Episode 3 On Demand: AD disasters are real – Do you have the insurance coverage you need?
It's a dangerous world out there –and getting worse by the day. By 2021 the costs associated with cybercrime is predicted to be $6 trillion annually. Global damage from ransomware is predicted to be $20 billion a year from now. So how do you protect yourself? You need to apply a complete backup and recovery strategy to recover from any AD disaster at the object and attribute level, the directory level and the OS level across the entire forest. Join Episode Three to learn how to ensure your on-prem and Azure AD remain safe and available.
Episode 4 On Demand: Recovering the unrecoverable – restoring all types of Office 365 groups.
Chances are at some point you will experience a scenario where all of your Office 365 Groups or security group data is deleted. Native tools cannot properly recover these groups, and the Recycle Bin only keeps Office 365 Groups for 30 days. With no Azure AD change log or comparison report to help you determine which users and Azure objects have been changed or deleted, recovery is impossible. Learn how to restore the points where the group was used, repair Synchronization Scope and restore and confirm the group is recovered. Join Episode Four.
Episode 5 On Demand: Restoring Conditional Access policies, Applications, and service principals to ensure security and availability.
Conditional Access Policies allow or block access to cloud applications and Azure management based on specific conditions. If hard deleted, your security and business continuity are compromised If the Applications themselves – more specifically – service principals, get hard deleted, your security is even more at risk. While native recovery tools might be able to restore soft-deleted Applications, they can’t recover Conditional Access Policies or service principals. So what can you do? With the right tool, you can recover hard-deleted Conditional Access Polices and restore their enforcement. Gain visibility into the ripple effect of the deleted Applications and service principals. Learn how in Episode Five.
Episode 6: Wait… You hard deleted AD users? No worries… you can recover!
Incorrectly deleting AD users is bad. Hard deleting them? Well, you don’t want to go there. But what if it happens? AD Connect doesn’t sync your on-prem users to the cloud as easily or reliably as you may think. Native tools have gaps. You want a tool that provides difference reporting to elp you determine what changes were made to Azure AD and then help you roll back unwanted changes into Azure AD, including those not captured by the Recycle Bin. Fully restore your users. Learn how in Episode Six.