Following our recent webinar, “A Practical Playbook to Migrate Users & Devices from Local AD to Entra ID” we received a strong set of practical, real-world questions from IT teams and MSPs.

This follow-up blog addresses those questions directly, with a focus on how MigrationWiz + Directory Sync, and Migration Agent (both powered by PowerSyncPro) work together in real environments.

1. Can this help after a security breach of on-prem AD?

Yes, with the right approach.

If your on-prem AD is compromised, Directory Sync can help you:

  • Rebuild and re-establish trusted identities in Entra ID
  • Avoid blindly replicating potentially compromised attributes
  • Apply controlled matching and filtering during synchronization

However, this is not a “lift-and-shift” scenario. You should:

  • Audit identities before syncing
  • Use selective attribute flows
  • Treat Entra ID as a clean target state, not a mirror of a compromised directory

2. Can I migrate standalone (non-domain) PCs into Entra ID?

Yes.

Migration Agent can:

  • Join unmanaged or workgroup devices to Entra ID
  • Create and map user profiles
  • Standardize endpoints into a managed state

This is a common use case for organizations modernizing unmanaged environments.

3. Can I migrate devices only in a hybrid environment?

Yes.

If identities already exist in Entra ID:

  • You can use Migration Agent to move devices independently
  • This is often done before decommissioning Azure AD Connect

It’s a practical way to transition from hybrid to cloud-only in phases.

4. Why not just use PowerShell for user creation?

PowerShell works for simple scenarios.

But at scale, it breaks down:

  • No built-in coexistence
  • No synchronization or drift control
  • No attribute mapping logic
  • No automation across lifecycle changes

Directory Sync adds:

  • Matching and deduplication logic
  • Attribute transformation and governance
  • Continuous synchronization—not one-time scripts

This is about operational consistency, not just initial provisioning.

5. When does automation make sense vs manual work?

There is absolutely a threshold.

  • Small environments (1–5 users) → manual may be faster
  • Anything beyond that → automation quickly wins

Once you factor:

  • Devices
  • Profiles
  • Identity alignment
  • Ongoing sync

Manual approaches become inefficient and risky.

6. What about apps, ERP/CRM systems, shares, and printers?

This is one of the most important considerations.

After moving to Entra ID:

  • Legacy apps may still rely on on-prem authentication
  • File shares and printers tied to GPOs will not automatically remap

Options include:

  • Maintaining hybrid access temporarily
  • Using solutions like SSO bridges or identity federation
  • Re-mapping resources via modern management tools (e.g., Intune scripts)

Key point: Device migration is one step application dependency planning is critical.

7. ERP/CRM concerns delaying migration?

This is common and valid.

Before migrating:

  • Validate authentication method (AD vs modern auth)
  • Test access from Entra-joined devices
  • Identify dependencies on domain join or Kerberos

In many cases, a phased or hybrid approach is required until apps are modernized.

8. How is Folder Redirection handled?

Folder Redirection should be addressed before device migration:

  • Migrate data to OneDrive or SharePoint
  • Remove or transition GPO-based redirection policies
  • Ensure data is accessible in the cloud-first model

Do not carry legacy redirection into Entra-native environments.

9. Is there a rollback option?

Rollback is not a single-click operation, but you can:

  • Revert device join state
  • Restore user access to the original profile (if preserved)
  • Re-run migration workflows

Best practice:

  • Test with pilot groups
  • Validate before broad rollout

10. Can I use Migration Agent without Directory Sync?

Yes.

Migration Agent can:

  • Migrate devices independently
  • Be used in environments where identity is already aligned

However, Directory Sync is recommended when:

  • You need coexistence
  • You’re migrating identities alongside devices

11. What happens to the old user profile?

Migration Agent:

  • Converts and maps the existing profile to the new Entra ID user

This avoids:

  • Profile loss
  • Reconfiguration
  • User disruption

Old profiles can be removed later if needed for disk space optimization.

12. Does it handle Outlook reconfiguration?

Yes.

Migration Agent includes:

  • Outlook profile handling
  • Reconnection to the new tenant

This provides similar outcomes to tools like DeploymentPro.

13. Does the user need to be logged in?

Typically, yes, for the cleanest experience.

  • Profile migration and context-aware changes benefit from user session presence
  • Some automation can be staged, but execution is best aligned with user login

Final Takeaway

What these questions highlight is a broader shift:

Migrations are no longer just about moving data. They require coordination across:

  • Data (MigrationWiz)
  • Identity (Directory Sync, powered by PowerSyncPro)
  • Devices (Migration Agent, powered by PowerSyncPro)

That’s the value of the New Migration Stack—bringing these layers together into a repeatable, scalable process.

What’s Next

If you’re planning a migration:

  • Start with a pilot group
  • Map application dependencies early
  • Align identity, data, and devices not just one layer

And most importantly, design for automation and scale from the beginning.