Forum Discussion
Entra OU sync vs group filtering
- Jul 10, 2024
Hi, Eric.
There's no categorically right or wrong answer here, but since you've mentioned "testing", I'd recommend using the group filtering option.
You mentioned that AAD Connect is not destructive, and to some extent that is true. But it has to be noted that if through normal Active Directory administration, you scope someone out of synchronisation, they do get soft-deleted by AAD Connect, and under default conditions, that means they will be permanently deleted 30 days after the soft delete.
Once you're ready to exit your test phase, you can readily re-run the configuration wizard (or PowerShell, if you're comfortable with the command line) to no longer use group filtering.
Just make sure you're matching of the on-premise identities to the existing Azure AD identities is solid, or you might face some interesting outcomes if they end up mismatching. This is where group filtering can pay off, since it's harder to "accidentally" scope too many people in or out of synchronisation, and high importance identities - such as executives - can remain confidently immune from such accidents while you're testing.
There's nothing complicated about selecting the organisational units. Just select the ones (a tick will be displayed in their checkbox) you wish to make eligible for synchronisation in the tree. Any that you do not select - or later deselect - will not feature in the synchronisation (where deselection post synchronisation leads back to what I mentioned above about falling out of scope, soft- and permanent deletion).
Cheers,
Lain
I'm actually not sure what happens in that situation, as really, that's an error condition, not a scope change.
If the filtering group has been deleted, I'd actually expect synchronisation to completely fail. This means the Venn diagram is irrelevant, and only becomes relevant again once the error has been resolved (by either restoring the group or changing the configuration in the AAD Connect wizard to point to a new group, or through choosing the "synchronise all users and devices" option).
In this scenario, nothing would be deleted from Azure AD, as no changes of any kind would be effected until the error has been resolved.
To mitigate the group deletion scenario, three quick options come to mind:
- Enable the "protect object from accidental deletion in Active Directory Users and Computers -shown in Figure 1 below (under the hood, this results in a simple "deny" permission addition to the group);
- Explicitly add a "deny" permission to the group;
- Ensure the Active Directory Recycle Bin has been enabled (it's quite likely it's already enabled):
You can mix and match these options - you don't have to choose just one.
Figure 1: Protect object from accidental deletion.
Cheers,
Lain