Hybrid identity is the bridge. On-premises Active Directory holds your users, groups, and computers. Microsoft Entra ID (formerly Azure AD) powers Microsoft 365, Azure, and third-party SaaS apps. Without synchronization, you manage two directories — and they inevitably drift apart.
Microsoft Entra Connect is the tool that synchronizes on-premises AD objects to Entra ID. It replaces the older DirSync and Azure AD Sync tools. As of 2026, only Entra Connect v2 is supported, and Microsoft has announced that all sync services will stop on September 30, 2026 if you are not on at least version 2.5.79.0.
This guide walks through installing Entra Connect v2 on Windows Server 2025, configuring password hash sync, OU-based filtering, optional writeback features (password, device, group), staging mode, and verification.
Screenshots and images to add later:
- Entra Connect download page in Entra admin center
- Express settings welcome screen
- Connect to Microsoft Entra ID credentials dialog
- Domain/OU filtering page
- Optional features page (password/device/group writeback)
- Ready to configure summary
- Synchronization Service Manager UI
- Synchronization statistics showing imported/exported objects
- Entra admin center showing synced users
- Staging mode configuration
Prerequisites
Microsoft Entra (Cloud)
- A Microsoft Entra tenant (get one with an Azure free trial)
- A verified custom domain (e.g.,
gntech.me— not justtenant.onmicrosoft.com) - A Hybrid Identity Administrator account in the Entra tenant (or Global Administrator)
- At least a Microsoft Entra ID Free license (P1/P2 unlocks features like writeback, password protection, and Self-Service Password Reset)
Verify Your Domain
If your domain is not yet verified in Entra ID:
- Sign in to the Microsoft Entra admin center
- Go to Identity → Settings → Domain names
- Click Add custom domain, enter
gntech.me - Add the TXT verification record to your public DNS zone
- Wait for propagation and click Verify
On-Premises Active Directory
- AD schema + forest functional level: Windows Server 2003 or later (Server 2025 is fine)
- Domain controller must be writable (no RODC)
- At least one DC in the same site as the Entra Connect server (or accessible via low-latency link)
Entra Connect Server Hardware
Entra Connect v2 must run on a Windows Server 2016 or later. Windows Server 2025 is fully supported.
| Component | Minimum | Recommended |
|---|---|---|
| CPU | 1.6 GHz, 2 cores | 2.0 GHz, 4 cores |
| RAM | 8 GB | 16 GB |
| Disk | 70 GB | 100 GB (SSD) |
The server should be:
- Domain-joined to
gntech.me - Not a domain controller (install on a member server)
- Running Windows Server 2025 Standard or Datacenter
Software Prerequisites
Entra Connect v2 installs these automatically, but confirm:
- .NET Framework 4.7.2 or later (Server 2025 ships with newer versions)
- PowerShell 5.0 or later
- TLS 1.2 enabled
|
|
Network Requirements
The Entra Connect server needs outbound HTTPS (TCP 443) to:
*.msappproxy.net*.servicebus.windows.netlogin.microsoftonline.com*.microsoftonline.com
In a homelab with restricted outbound internet, ensure your firewall allows these destinations. A proxy can be configured during installation.
Clean Up Your AD Data
Run the IdFix tool before installing Entra Connect. It identifies duplicate UPNs, invalid characters, and formatting issues that cause sync errors:
|
|
IdFix scans your AD and presents errors. Click Accept on each action to fix them, then click Apply.
Downloading Entra Connect
Entra Connect v2 is available only from the Microsoft Entra admin center (not from the download center’s public page):
- Sign in to the Microsoft Entra admin center
- Navigate to Identity → Hybrid management → Microsoft Entra Connect → Connect Sync
- Click Download Microsoft Entra Connect → the installer is named
AzureADConnect.msi(version 2.x.x.x)
Express Installation (Single Forest)
The Express option is for single-forest AD with password hash sync. It configures everything with defaults — perfect for a homelab.
Step 1 — Run the Installer
|
|
Step 2 — Express Settings
-
On the Welcome screen, accept the license terms and click Continue
-
Click Express Settings (or Customize for advanced options)
-
Connect to Microsoft Entra ID
- Enter your Hybrid Identity Administrator credentials (e.g.,
[email protected]) - Click Next
- Enter your Hybrid Identity Administrator credentials (e.g.,
-
Connect to Active Directory
- Enter your on-premises AD Enterprise Admin credentials
(
GNTECH\Administrator) - Entra Connect discovers your local AD forest automatically
- Click Next
- Enter your on-premises AD Enterprise Admin credentials
(
-
Ready to Configure
- Review the summary: password hash sync enabled, auto upgrade on, no writeback
- Check the box Start the synchronization process as soon as the configuration completes
- Click Install
Installation takes 5–15 minutes. When complete, the wizard shows the Configuration complete screen.
Step 3 — Verify Initial Sync
On the Entra Connect server, open Synchronization Service Manager:
|
|
Look for:
- Management Agents tab →
gntech.me(on-prem AD) andMicrosoft Entra ID(cloud) agents present - Operations tab → a completed Initial Sync run with imported and exported objects
In the Entra admin center:
- Go to Identity → Users → All users
- Confirm users from
gntech.meappear with Synced from on-premises in the Source column - Check Identity → Groups → All groups for synced security groups
Custom Installation
Use Custom when you need:
- Multi-forest topologies
- OU filtering (sync only specific OUs)
- Optional features (password writeback, device writeback, group writeback)
- Federated sign-in (AD FS or 3rd party)
- Staging mode
Step 1 — Run Custom Install
|
|
On Welcome, click Customize (not Express).
Step 2 — Options
| Option | Recommendation for Homelab |
|---|---|
| Password Hash Synchronization | ✅ Enabled — simplest and most secure for lab |
| Pass-through Authentication | ❌ Skip — requires more infrastructure (connector agents) |
| Federation with AD FS | ❌ Skip — overkill for single-domain homelab |
| Do not configure | ❌ Avoid — you need at least one sign-in method |
| Enable device writeback | ✅ Enable if you plan to deploy Hybrid Entra Join |
| Enable directory extension attribute sync | ✅ Enable (adds AD attributes to cloud) |
| Enable password writeback | ⏹ Enable after sync is verified (see Post #3) |
Step 3 — OU Filtering (Important)
By default, Entra Connect syncs all OUs in the domain. In a homelab with test users, guest accounts, or service accounts that should not sync to the cloud, restrict it:
- On the Domain/OU filtering page, select Sync selected domains and OUs
- Check only the OUs you want to sync:
✓ DC=gntech,DC=me ├─ ✓ OU=Users ├─ ✓ OU=Workstations ├─ ✓ OU=Servers ├─ ✓ OU=Groups └─ ✗ OU=ServiceAccounts └─ ✗ OU=Test - Click Next
OU filtering can be changed later, but a full sync cycle runs after each change.
Step 4 — Attribute Sync Configuration
On the Optional Features page:
- Check Directory extension attribute sync if you need custom AD attributes in Entra ID (useful for custom claims or apps)
- Check Password writeback and Device writeback (covered in Post #3)
Leave Exchange hybrid deployment unchecked unless you run Exchange on-premises.
Step 5 — Install
Review the summary, verify settings, check Start the synchronization process and click Install.
Post-Installation Verification
1. Synchronization Service Manager
|
|
Check the Operations tab. A successful initial sync shows:
- Import (staging) → objects pulled from AD and from Entra ID
- Synchronization (delta) → differences computed
- Export → changes written to target
Expected exports after initial sync:
- Connector = gntech.me (on-prem): near-zero exports (cloud objects written back, e.g., device writeback)
- Connector = Entra ID: users, groups, contacts exported to cloud
2. PowerShell Verification
|
|
3. Entra Admin Center
- Identity → Users → All users — verify synced users
- Identity → Groups → All groups — verify groups
- Identity → Devices → All devices — verify if device writeback is enabled
4. UPN Mismatch Check
If a user’s on-prem UPN suffix is not verified in Entra ID, the
default domain (tenant.onmicrosoft.com) is used as fallback. Verify
your custom domain is added and the UPN suffixes match:
|
|
All UPN suffixes should be verified in Entra ID.
Managing Sync Scope (OU Filtering)
After installation, you can change which OUs are synced:
Via GUI
- Start Microsoft Entra Connect from the Start menu
- Click Configure → Customize synchronization options
- Enter credentials when prompted
- On Domain/OU filtering, adjust selections
- Complete the wizard — a full sync cycle runs automatically
Via PowerShell
|
|
Attribute-Based Filtering (Advanced)
Beyond OU filtering, you can filter objects by attribute:
|
|
Attribute filtering is managed through the Synchronization Rules Editor (found in the Start menu under Microsoft Entra Connect). Each sync rule can filter by attribute value. This is advanced — for a homelab, OU filtering is sufficient.
The Sep 30, 2026 Upgrade Deadline
Microsoft announced that all Entra Connect Sync services will stop working on September 30, 2026 if you are not on at least version 2.5.79.0.
Check Your Version
|
|
Upgrade
- Download the latest
AzureADConnect.msifrom the Entra admin center - Run the installer — it detects the existing installation and upgrades in place
- Click Upgrade (not reinstall)
No configuration changes are needed. The wizard preserves all settings.
What Happens If You Miss the Deadline
- All sync cycles stop
- New users, groups, and password changes in AD are not replicated to Entra ID
- Password change/SSPR writeback fails
- Existing users and groups remain in the cloud (no data deletion)
- To restore sync, upgrade Entra Connect — a full sync cycle runs after
Scheduling and Performance
Entra Connect syncs on a schedule. The default is every 30 minutes.
|
|
For a homelab, 30 minutes is fine. For testing, you can trigger delta syncs on demand.
Staging Mode
Staging mode installs Entra Connect without exporting changes to the cloud. The server imports and syncs locally but does not write to Entra ID. This lets you verify the configuration before going live.
Enable During Installation
On the Ready to configure page, check Enable staging mode.
Enable After Installation
|
|
To exit staging mode, set StagingModeEnabled $false and run a full
sync cycle. The next export writes all pending changes to Entra ID.
When to Use Staging Mode
- Before going live with a first-time sync
- After configuration changes (new OU, changed attribute mapping)
- As disaster recovery standby — install a second Entra Connect server in staging mode. If the primary fails, promote staging to production by disabling staging mode.
Disaster Recovery
Entra Connect stores its configuration in the ADSync database (local SQL Express by default, or a full SQL Server instance). To recover:
- Install a new member server
- Run the Entra Connect installer
- Choose Customize → Restore from a previously created backup
(requires the
%ProgramData%\AADConnect\backup, exported earlier)
Export the configuration periodically:
|
|
The real disaster recovery best practice is a staging mode server, not a config-only backup.
Common Issues
“Object is not synced” — UPN Not Verified
Cause: The user’s UPN suffix (e.g., @gntech.me) is not verified
in Entra ID.
Fix: Verify the custom domain in Entra admin center → Domain names.
Sync Export Errors
Check the Synchronization Service Manager → Operations tab for errors. Common export errors:
| Error | Cause | Fix |
|---|---|---|
| “Duplicate attribute” | Two objects with the same proxyAddresses |
Run IdFix |
| “Invalid UPN” | Special characters in UPN | Clean AD data |
| “Missing source anchor” | ms-ds-consistencyGUID missing (immutableId) |
Attribute sync round-trip |
Users Not Appearing
- Is the OU being synced? Check OU filtering.
- Is the user enabled? Disabled users are synced by default unless filtered via attribute.
- Check if the user passes the connector space filter → run a preview in the Sync Rules Editor.
What We Built
| Component | Detail |
|---|---|
| Entra Connect v2 installation | Express or Custom on Windows Server 2025 |
| Password hash sync | On-prem password hash replicated to cloud |
| OU filtering | Selective sync of Users, Workstations, Servers, Groups |
| Writeback ready | Password writeback enabled (config in Post #3) |
| Staging mode | Verification before production writes |
| Backup config | Export JSON for disaster recovery |
| Upgrade awareness | Version check, Sep 2026 deadline noted |
Next in the Series
With identity sync flowing, the next post covers the reverse direction — writeback. Password changes in the cloud are written back to on-premises AD, device registrations are written back for conditional access, and Microsoft 365 groups are synchronized to Exchange Online:
Post 3: Writeback — Cloud to On-Premises (Password, Device, and Group)
After that:
- Post 4: Entra ID Hybrid Join + Device Registration
- Post 5: Windows Hello for Business — Hybrid Key Trust
- Post 6: Self-Service Password Reset (SSPR)