Group writeback enables Microsoft Entra ID security groups synchronization with your on-premises AD. However, Microsoft deprecated security group writeback in Microsoft Entra Connect in June 2024. But they made it available in Microsoft Entra Cloud Sync. In this article, you will learn how to configure group writeback in Microsoft Entra Cloud Sync.
Prerequisites for Microsoft Entra Cloud Sync
Before proceeding, make sure you have:
- A Microsoft Entra ID tenant.
- An Entra ID Global Administrator account for initial setup.
- At least one Windows Server 2016 or later machine (domain-joined) to host the provisioning agent.
- Necessary firewall ports open: HTTPS (443) and HTTP (80) to Microsoft cloud endpoints.
- Proper DNS resolution from the server to your domain controllers and to external internet.
If you already followed the article Enable Group Writeback in Microsoft Entra Connect Sync, you already have the OUs set up and it’s writing back the groups from Entra ID to AD. However, these are not the security groups.
Note: The security groups writeback is only possible to set up in Microsoft Entra Cloud Sync, which we will cover in this article.
How to enable group writeback in Microsoft Entra Cloud Sync
To enable and configure group writeback in Microsoft Entra Cloud Sync, follow the steps below:
Step 1. Create OUs in AD
Start Active Directory Users and Computers and create two separate OUs:
- Entra ID: Microsoft Entra ID
- AD: Active Directory
If you already have different OUs for the groups, you don’t have to create an AD OU and move all the groups into it. Only create a new OU named Entra ID. This is what you will use later in the guide.
- Right-click the Entra ID OU
- Click Properties


- Double-click on the distinguishedName attribute


- Copy the value and save it. You will need it later in the guide.


Step 2. Get group writeback status
If you have Microsoft Entra Connect installed, run the Get-ADSyncAADCompanyFeature PowerShell cmdlet to check the group writeback status.
Get-ADSyncAADCompanyFeature
The PowerShell output shows that UnifiedGroupWriteback is disabled because the value is False.
PasswordHashSync : True
ForcePasswordChangeOnLogOn : False
UserWriteback : False
DeviceWriteback : False
UnifiedGroupWriteback : False
GroupWritebackV2 : False
You can have the UnifiedGroupWriteback enabled and keep it like that. It’s important that you have GroupWritebackV2 disabled because that’s discontinued. Read more in the article Disable Group Writeback v2 in Microsoft Entra Connect.
Note: UnifiedGroupWriteback refers to the original version, which will continue to function. GroupWritebackV2 refers to the new version and is discontinued in June 2024. It’s now integrated in Microsoft Entra Cloud Sync, and that’s what this article is about.
Step 3. Download the Cloud Sync Agent
- Sign in to the Microsoft Entra admin center
- Navigate to Identity > Show more


- Select Hybrid management > Microsoft Entra Connect
- Click on Cloud Sync


- Select Agents
- Click on Download on-premises agent


- Click on Accept terms & download
- Save the executable file to your Windows Server machine


Step 4. Install Provisioning Agent on Windows Server
- Start File Explorer
- Go to the downloaded Provisioning Agent setup executable file
- Run the downloaded Microsoft Entra Connect Provisioning Agent installer as Administrator


- Accept the license terms and conditions
- Click Install


- The setup starts installing the Microsoft Entra Provisioning Agent


- Click Next in the Welcome to the Microsoft Entra provisioning agent configuration wizard screen


- Select HR-driven provisioning (Workday and SuccessFactors) / Microsoft Entra Cloud Sync
- Click Next


- Click Authenticate
- Sign in with your Microsoft Entra ID administrator credentials


- Select Create gSMA
- Enter your On-Premises domain admin credentials
- Click Next


- Click Next


- Click Confirm


- Click Exit


Step 5. Verify Provisioning Agent status
- Sign in to the Microsoft Entra admin center
- Click Agents and verify that the machine name appears and the status is Active


- Start Windows Services
- Verify that the Microsoft Azure AD Connect Provisioning Agent service is running


- Start Active Directory Users and Computers
- Navigate to Domain (exoip.local) > Managed Service Accounts
- Verify that the provAgentgMSA service account appears


Step 6. Set up Microsoft Entra ID to AD sync configuration
- Sign in to Microsoft Entra admin center
- Click on Configurations
- Select + New configuration > Microsoft Entra ID to AD sync


- Select the Active Directory domain
- Click Create


- Click Overview
- Select Properties
- Click on the pencil icon to edit the Basics


- Configure the basics:
- Add email address for notifications
- Enable prevent accidental deletion
- Set accidental deletion treshold to 500
- Select Apply


- Click Scoping filters
- Select All security groups
- Select Edit attribute mapping


- Select Constant from the dropdown menu
- Paste in the Constant value field the OU distinguished name value that you noted in the first step
- Click Apply


- Click Save


- Click Overview
- Click Review and enable


- Click Enable configuration


Step 7. Check Microsoft Entra ID to AD sync configuration status
- Verify that the configuration sync from Microsoft Entra ID to AD shows the status Healthy


- Return to Overview
- Select Overview and verify that everything looks good


Step 8. Verify group writeback sync
- Select Monitoring
- Group provision shows initial sync not run


- Refresh until it shows the initial sync completed


- Verify that the security groups are written back to the Entra ID OU


- Suppose you want to double-check that these are the security groups, you can always sign in to the Microsoft Entra admin center and go the Groups blade and filter them in Microsoft Entra ID on:
- Group type: Security
- Source: Cloud


These are the correct groups that are written back from Microsoft Entra ID to on-premises AD.
That’s it!
Read more: Configure Microsoft Entra Password Protection for on-premises »
Conclusion
You learned how to configure group writeback in Microsoft Entra Cloud Sync. This applies only to cloud security groups. If you want the distribution groups and Microsoft 365 groups writeback, Enable group writeback in Microsoft Entra Connect Sync. This way you have all the groups written back from Entra ID to on-premises AD.
Did you enjoy this article? You may also like How to Restrict access to Microsoft Entra admin center. Don’t forget to follow us and share this article.