Before You Click
“Install” — Read This
Missing a single prerequisite is the #1 cause of failed installations. This guide walks through every technical and administrative requirement — infrastructure, accounts, networking, and identity hygiene — before you touch the installer.
On-Premises Infrastructure
-
Forest Functional Level: Windows Server 2003 or laterVerify with PowerShell:
Get-ADForest | Select-Object ForestMode. Most modern environments will already exceed this minimum.
-
Supported OS — Windows Server 2016 / 2019 / 2022 / 2025Must be a domain-joined member server. Do not install on a Domain Controller — this causes GPO conflicts and security risks.
-
✕❌ Server Core is NOT supportedYou must use Windows Server with Desktop Experience (GUI). The installation wizard requires a graphical interface to run.
Account Permissions — The “Golden Trio”
Installation requires credentials for three distinct account types. Having the wrong permissions on any one of these is an immediate blocker. Prepare all three before you start.
dsacls. Always prefer least-privilege in production.
Network & Security
The sync server must reach Microsoft’s endpoints outbound. If you have a proxy or firewall, whitelist these — do not apply SSL inspection to Microsoft traffic.
*.microsoftonline.com
-
TLS 1.2 must be explicitly enabled on the serverTLS 1.0 and 1.1 are deprecated and will cause sync failures. On older OS versions, TLS 1.2 may exist but not be the default — it must be forced via registry or IIS settings.
-
PowerShell Execution Policy:
RemoteSignedRunSet-ExecutionPolicy RemoteSignedin an elevated PowerShell session. The installer and ADSync module use signed scripts that require this policy at minimum.
Identity “Cleanliness”
The sync engine is unforgiving about dirty data. Messy on-premises AD attributes create duplicate cloud objects, quarantine errors, and silent sync failures that are painful to diagnose after the fact.
contoso.com) in the Entra ID portal before installing. Users with unverified domains get a fallback @tenant.onmicrosoft.com UPN — breaking SSO.contoso.local, add a UPN suffix (contoso.com) in AD and migrate users so their UPN matches their email: user@contoso.com.proxyAddress or mail attribute. Azure AD rejects duplicates with an AttributeValueMustBeUnique error and silently quarantines one object.github.com/microsoft/idfix. Run it as Domain Admin, export the error report, and resolve every item marked ERROR before proceeding. Items marked WARN can be deferred.
Hardening Requirement
Microsoft has implemented a mandatory security hardening update affecting all existing Azure AD Connect / Entra Connect deployments. Any installation running a version older than 2.5.79.0 will have its synchronization blocked entirely by the Microsoft backend after the deadline — regardless of whether it was previously working.
Your Complete Checklist
- Forest Functional Level ≥ Windows Server 2003
- Dedicated domain-joined server with Desktop Experience (not Core)
- Database tier confirmed (LocalDB or full SQL based on object count)
- Local Administrator account on the sync server
- Hybrid Identity Administrator (or Global Admin) in Entra ID
- Enterprise Admin (or custom service account) in on-prem AD
- Outbound Port 443 open to Microsoft URLs — no SSL inspection
- TLS 1.2 enabled and enforced on the server
- PowerShell Execution Policy set to RemoteSigned
- Custom domain verified in the Entra ID portal
- UPN suffixes aligned — no @.local or non-routable suffixes
- IdFix run — zero errors, no duplicate proxyAddress or mail attributes