Azure AD connect - a few questions

%3CLINGO-SUB%20id%3D%22lingo-sub-1322565%22%20slang%3D%22en-US%22%3EAzure%20AD%20connect%20-%20a%20few%20questions%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1322565%22%20slang%3D%22en-US%22%3E%3CP%3EI've%20used%20Azure%20AD%20connect%20for%20two%20clients%20of%20mine%20on%20a%20very%20limited%20test%20basis%20and%20it%20now%20has%20me%20asking%20myself%20several%20questions%20I'm%20hoping%20someone%20can%20answer%20for%20me.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20understand%20the%20concept%20of%20Azure%20AD%20connect%20and%20I've%20read%20in%20KB%20articles%20about%20the%20benefits.%26nbsp%3B%20One%20is%20the%20sync%20options%20(keeping%20local%20AD%20and%20Azure%20AD%20users%20and%20their%20passwords%20in%20sync).%26nbsp%3B%20Easier%20to%20manage%20overall%20(as%20opposed%20to%20having%20to%20manage%20local%20AD%20users%2Fpasswords%2C%20and%20Azure%20users%20%26amp%3B%20passwords).%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWhat%20I%20was%20and%20wasn't%20aware%20of%3A%26nbsp%3B%20On%20the%20local%20AD%2C%20all%20the%20users%20have%20cheap%20not-strong%20passwords.%26nbsp%3B%20Passwords%20they%20have%20been%20using%20for%20years.%26nbsp%3B%20No%20password%20policy%20for%20the%20local%20AD.%26nbsp%3B%20I%20wasn't%20aware%2C%20until%20after%20I%20did%20my%201st%20sync%20-%20that%20all%20those%20local%20AD%20passwords%20would%20replace%20the%20Azure%20user%20passwords%20(which%20stemmed%20from%20their%20Office%20365%20subscription).%26nbsp%3B%20That%20would%20explain%20why%20the%20test%20users%20contacted%20me%20saying%20%22my%20outlook%20is%20nagging%20me%20for%20a%20password%2C%20and%20I'm%20using%20my%20office%20365%20password%2C%20but%20it%20doesn't%20work%22%20-%20and%20I'd%20tell%20them%20to%20use%20their%20computer%20password%20because%20their%20computer%20is%20in%20a%20domain%20environment%2C%20thus%20the%20local%20AD%20password%2C%20which%20is%20now%20synced%20with%20their%20Azure%20account.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EOK%20-%20lesson%20learned.%26nbsp%3B%20Now%20I%20shall%20implement%20a%20password%20policy%20so%20the%20user%20will%20be%20forced%20to%20make%20a%20strong%20password.%26nbsp%3B%20I%20wish%20I%20knew%20this%20ahead%20of%20time%20as%20I%20would%20have%20set%20up%20a%20policy%20on%20my%20local%20AD%20and%20forced%20everyone%20to%20redo%20their%20passwords.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EMoving%20on%20-%20I've%20noticed%20that%20Azure%20AD%20joined%20devices%20don't%20show%20up%20my%20local%20AD%20devices%2Fcomputers.%26nbsp%3B%20Aww%2C%20I'm%20not%20using%20Device%20Writeback.%26nbsp%3B%20And%20since%20I'm%20not%20and%20this%20new%20Windows%2010%20machine%20which%20is%20Azure%20AD%20joined%2C%20but%20not%20showing%20up%20in%20my%20local%20AD%20devices%2Fcomputers%20-%20well%2C%20my%20local%20AD%20doesn't%20even%20know%20it%20exists%2C%20thus%2C%20it's%20running%20in%20batch%20files%20during%20login%20to%20map%20network%20drives.%26nbsp%3B%20OK%2C%20I%20understand.%26nbsp%3B%20I%20can%20run%20the%20batch%20file%20manually%20for%20a%20few%20computers%20as%20I%20set%20them%20up%20-%20but%20I%20don't%20want%20to%20do%20it%20for%20100%20users!%26nbsp%3B%20So%20I%20should%20be%20using%20Device%20Writeback%20in%20my%20Azure%20AD%20Connect%20tool.%26nbsp%3B%20That%20should%20solve%20that%20problem.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ESorry%2C%20I%20don't%20really%20have%20any%20technical%20questions.%26nbsp%3B%20More%20ranting%20a%20conversation%20here.%26nbsp%3B%20Any%20other%20hidden%20tips%20I%20should%20be%20aware%20of%20before%20rolling%20this%20out%20for%20an%20entire%20company%3F%26nbsp%3B%20I've%20read%20just%20about%20everything%20possible%20on%20the%20Azure%20AD%20Connect%2C%20but%20as%20I%20do%20more%20stuff%2C%20I%20find%20more%20stuff%20I've%20never%20read%20about.%26nbsp%3B%20I'm%20sure%20there%20are%20some%20hidden%20tricks%2C%20secrets%2C%20and%20other%20stuff%20hiding%20(if%20you%20do%20this%2C%20that%20will%20happen%2C%20which%20in%20turn%20will%20cause%20this%2Fthat%20to%20happen%20too%20-%20so%20be%20aware).%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks%20for%20listening.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1322565%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAccess%20Management%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20AD%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1323145%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20AD%20connect%20-%20a%20few%20questions%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1323145%22%20slang%3D%22en-US%22%3ETips%3A%3CBR%20%2F%3EUse%20Seamless%20SSO%20when%20configuring%20ADConnect.%3CBR%20%2F%3E%3CBR%20%2F%3ESync%20AD%20Devices%20to%20Cloud%20so%20you%20can%20use%20Intune%20policies%20for%20hybrid%20config.%3CBR%20%2F%3E%3CBR%20%2F%3EMake%20sure%20you%20check%20proxyaddress%20and%20mail%20attributes%20(on%20prem)%20before%20syncing%20existing%20user%20in%20cloud%20and%20learn%20more%20about%20soft%2Fhard%20match%20if%20you%20have%20existing%20users%20in%20cloud.%3CBR%20%2F%3E%3CBR%20%2F%3EHope%20it%20helps!%3CBR%20%2F%3EMoe%3C%2FLINGO-BODY%3E
Highlighted
New Contributor

I've used Azure AD connect for two clients of mine on a very limited test basis and it now has me asking myself several questions I'm hoping someone can answer for me.

 

I understand the concept of Azure AD connect and I've read in KB articles about the benefits.  One is the sync options (keeping local AD and Azure AD users and their passwords in sync).  Easier to manage overall (as opposed to having to manage local AD users/passwords, and Azure users & passwords).

 

What I was and wasn't aware of:  On the local AD, all the users have cheap not-strong passwords.  Passwords they have been using for years.  No password policy for the local AD.  I wasn't aware, until after I did my 1st sync - that all those local AD passwords would replace the Azure user passwords (which stemmed from their Office 365 subscription).  That would explain why the test users contacted me saying "my outlook is nagging me for a password, and I'm using my office 365 password, but it doesn't work" - and I'd tell them to use their computer password because their computer is in a domain environment, thus the local AD password, which is now synced with their Azure account.

 

OK - lesson learned.  Now I shall implement a password policy so the user will be forced to make a strong password.  I wish I knew this ahead of time as I would have set up a policy on my local AD and forced everyone to redo their passwords.  

 

Moving on - I've noticed that Azure AD joined devices don't show up my local AD devices/computers.  Aww, I'm not using Device Writeback.  And since I'm not and this new Windows 10 machine which is Azure AD joined, but not showing up in my local AD devices/computers - well, my local AD doesn't even know it exists, thus, it's running in batch files during login to map network drives.  OK, I understand.  I can run the batch file manually for a few computers as I set them up - but I don't want to do it for 100 users!  So I should be using Device Writeback in my Azure AD Connect tool.  That should solve that problem.

 

Sorry, I don't really have any technical questions.  More ranting a conversation here.  Any other hidden tips I should be aware of before rolling this out for an entire company?  I've read just about everything possible on the Azure AD Connect, but as I do more stuff, I find more stuff I've never read about.  I'm sure there are some hidden tricks, secrets, and other stuff hiding (if you do this, that will happen, which in turn will cause this/that to happen too - so be aware).

 

Thanks for listening.

1 Reply
Highlighted
Tips:
Use Seamless SSO when configuring ADConnect.

Sync AD Devices to Cloud so you can use Intune policies for hybrid config.

Make sure you check proxyaddress and mail attributes (on prem) before syncing existing user in cloud and learn more about soft/hard match if you have existing users in cloud.

Hope it helps!
Moe