Share via

Why is Azure Entra no longer syncing with our servers?

Julien Carpenter 0 Reputation points
2025-09-16T22:16:30.5866667+00:00

After changing our SKU from Basic to Standard last week, our Entra Domain services have stopped syncing with our internal servers. When we add or modify a user in the Office 365 admin portal, the changes are not reflected on our servers. We are getting error AADDS500 and AADDS104. We have checked the Azure Firewall rules and everything seems to be alright. Everything was working smoothly until we made this change and we are unable to track down the source of the issue.

Microsoft Security | Microsoft Entra | Microsoft Entra ID
{count} votes

1 answer

Sort by: Most helpful
  1. Alex Burlachenko 19,615 Reputation points Volunteer Moderator
    2026-02-27T08:52:03.2666667+00:00

    Julien Carpenter hi (old one q, but still need to be answered)

    сhanging the SKU itself normally does not break synchronization, so the timing suggests something else changed during or after the upgrade. Azure Entra Domain Services (AAD DS) does not sync back to on-prem servers. It synchronizes from Microsoft Entra ID into the managed domain. If u expect changes made in Office 365 to appear on on-prem AD that only works if Azure AD Connect (or Cloud Sync) is correctly configured and running.

    Errors AADDS500 & AADDS104 indicate directory synchronization or domain services health issues not firewall blocking. I guess after SKU change common for one of these to happen

    • Azure AD Connect service stopped or lost credentials

    • Password hash sync disabled

    • Service account permissions changed

    • Domain Services resource went into degraded state

    • Network rules changed for required outbound endpoints

    But we can check )))))

    1. On the Azure AD Connect server, open Synchronization Service Manager and see – Sync service is running – No export errors – Last successful sync time
    2. In Azure portal Entra ID > Azure AD Connect > check sync status Entra ID > Domain Services > Health > look for alerts
    3. check is password hash sync is enabled. AAD DS requires password hash sync to work correctly.
    4. see if required ports are open from Domain Controllers / Connect server TCP 443 outbound to Microsoft endpoints LDAP/LDAPS if applicable
    5. If u are using Azure Firewall look if no outbound rule was tightened during SKU change.

    Most cases like this end up being Azure AD Connect not running or stuck after a service credential change. The SKU upgrade likely triggered a backend reconfiguration that exposed an existing sync issue.

    Focus first on Azure AD Connect health, if that service is not successfully syncing, nothing from O365 will reach ur servers.

    rgds,

    Alex

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.