Recovery Manager for Active Directory provides comparison reports to assist with isolating deletion or changes to Active Directory or AD LDS (ADAM), and troubleshooting the resulting problems. These reports are based on per-attribute comparisons of Active Directory, AD LDS (ADAM), or Group Policy objects selected from a backup, with their counterparts in Active Directory, AD LDS (ADAM), or another backup.
By comparing the state of the directory objects or Group Policy objects in Active Directory with those in a backup, comparison reports improve the efficiency of recovering objects, by allowing you to specify precisely which objects should be restored.
By showing the changes that would be made to Active Directory or AD LDS (ADAM) during a restore operation, comparison reports help to highlight possible side effects that could result from restoring data. If such side effects are indicated in the report, you may then reconsider whether to apply the changes to the “live” directory data.
Comparison reports may also be used to monitor changes that occurred in Active Directory or AD LDS (ADAM) since the backup was created, or within the period between two backups. Comparison reports assist with troubleshooting Active Directory, and resolving problems that may result from the deletion of critical objects in Active Directory. The reports also help you monitor changes made to Active Directory or AD LDS (ADAM) by third party applications.
The ability to compare the current state of objects in Active Directory or AD LDS (ADAM) with their state in a backup helps when troubleshooting problems that may result from the deletion or modification of a user account or an Organizational Unit, or modification of more critical objects. Comparison reports show whether critical objects were deleted or modified since a backup was made.
The deletion of critical objects such as a domain controller’s computer account or the "NTDS Settings" object is one of the most common causes of Active Directory problems.
Other critical, equally sensitive objects include all objects in the System container, such as FRS subscription objects, trusted domain objects (TDO), and DNS objects. By comparing the current state of objects in the System container with the state of the objects in a backup, it is possible to isolate problems that result from the absence or incorrect modification of critical objects.
Recovery Manager for Active Directory serves as a valuable tool when implementing a change management process. The importance of testing changes to Active Directory is paramount, whether you are changing configurations, installing new software, or implementing service packs and patches. The product has the ability to report changes, and if necessary, roll back changes made to Active Directory. This improves the effectiveness of testing application deployment scenarios in a laboratory environment, and monitoring changes made to Active Directory by third-party applications.
Permissions required to use Recovery Manager for Active Directory
Managing Recovery Manager for Active Directory configuration
Note |
From version 8.8, Recovery Manager for Active Directory supports environments with disabled NTLM authentication and the Protected Users security group. |
The following user account permissions are required to perform some common tasks with Recovery Manager for Active Directory.
The account must be a member of the local Administrators group on the computer where you want to install Recovery Manager for Active Directory. If during the installation you specify an existing SQL Server instance, the account with which Recovery Manager for Active Directory connects to that instance must have the following permissions on the instance:
Create Database
Create Table
Create Procedure
Create Function
The account must be a member of the local Administrators group on the computer where the Recovery Manager Console is installed. The account must also have the following permissions on the SQL Server instance used by Recovery Manager for Active Directory:
Insert
Delete
Update
Select
Execute
The account you use to access the target computer must be a member of the local Administrators group on that computer.
The account you use to access the target computer must be a member of the local Administrators group on that computer.
The account used to access the target domain controllers must:
Have the Write permission on the folder %AllUsersProfile%\Application Data\Quest\Recovery Manager for Active Directory that is located on the Recovery Manager for Active Directory computer.
Be a member of the Backup Operators group on each target domain controller.
The account used to access the target domain controllers must:
Have the Write permission on the folder %AllUsersProfile%\Application Data\Quest\Recovery Manager for Active Directory that is located on the Recovery Manager for Active Directory computer.
Be a member of the Backup Operators group on each target domain controller.
The account used to access the target domain controllers must:
Have the Write permission on the folder %AllUsersProfile%\Application Data\Quest\Recovery Manager for Active Directory that is located on the Recovery Manager for Active Directory computer.
Be a member of the Backup Operators group on each target domain controller.
To automatically install Backup Agent, the account must have:
Write permission on the folder %AllUsersProfile%\Application Data\Quest\Recovery Manager for Active Directory located on the Recovery Manager for Active Directory computer.
Local Administrator permissions on the target domain controller.
To back up data, the account must be a member of the Backup Operators group on the target domain controller.
The account used to access the target domain controllers must:
Have the Write permission on the folder %AllUsersProfile%\Application Data\Quest\Recovery Manager for Active Directory that is located on the Recovery Manager for Active Directory computer.
Be a member of the Backup Operators group on each domain controller to be backed up.
If you restore data to a domain controller where User Account Control (UAC) is not installed or disabled:
If you restore data to a domain controller where User Account Control (UAC) is enabled:
In both these cases, the account you use to access the domain controller must have the Write permission on the folder %AllUsersProfile%\Application Data\Quest\Recovery Manager for Active Directory located on the Recovery Manager for Active Directory computer.
Agentless restore (used by default in Online Restore Wizard)
The account used to access target domain controllers must have:
Write permission on the folder %AllUsersProfile%\Application Data\Quest\Recovery Manager for Active Directory that is located on the Recovery Manager for Active Directory computer.
Reanimate Tombstones extended right in the domain where objects are to be restored.
Write permission on each object attribute to be updated during the restore.
Create All Child Objects permission on the destination container.
List Contents permission on the Deleted Objects container in the domain where objects are to be restored.
For more details, see Agentless method.
Agent-based restore
For more details, see Agent-based method.
The account used to access the target domain controller must:
Be a member of the Group Policy Creator Owners group.
Have Full Control privilege on the Group Policy object.
Be a member of the Backup Operators group.
Have sufficient permissions to read/write Active Directory objects linked to the Group Policy object.
The account used to access the computer hosting the instance must:
Have the Write permission on the folder %AllUsersProfile%\Application Data\Quest\Recovery Manager for Active Directory that is located on the Recovery Manager for Active Directory computer.
Be a member of the local Administrators group on the computer hosting the AD LDS (ADAM) instance
The account used to access the computer hosting the instance must:
Have the Write permission on the folder %AllUsersProfile%\Application Data\Quest\Recovery Manager for Active Directory located on the Recovery Manager for Active Directory computer.
Be a member of the local Administrators group on the computer hosting the AD LDS (ADAM) instance.
The account used to access the computer hosting the instance must:
Have the Write permission on the folder %AllUsersProfile%\Application Data\Quest\Recovery Manager for Active Directory located on the Recovery Manager for Active Directory computer.
Be a member of the local Administrators group on the computer hosting the AD LDS (ADAM) instance.
To install the Recovery Manager Portal, you can use a domain user account, MSA, or gMSA account that is a member of the local Administrators group on the target computer. All account requirements and limitations are described in the table below, where
Step 1. Access web site - user account that is specified on the "Specify Web Site Settings" step of the Recovery Manager Portal setup wizard.
Step 2. Create a database on the SQL server instance - user account that is specified on the "Specify Preinstalled SQL Server Instance" step of the Recovery Manager Portal setup wizard.
Step 3. Access a database on the SQL server instance - user account that is specified on the "Specify SQL Server Access Account" step of the Recovery Manager Portal setup wizard.
Step 1. Access web site | Step 2. Create a database on the SQL server instance | Step 3. Access the database on the SQL server instance | Supported or not |
---|---|---|---|
AD user | Windows authentication (dbcreator) | Windows authentication any type of user | NOT Supported |
Windows authentication (dbcreator) | SQL authentication any type of user | Supported | |
SQL authentication (dbcreator) | Windows authentication any type of user | NOT Supported | |
SQL authentication (dbcreator) | SQL authentication any type of user | Supported | |
Windows authentication (sysadmin) | Windows authentication any type of user | Supported | |
Windows authentication (sysadmin) | SQL authentication any type of user | Supported | |
SQL authentication (dbcreator) | Windows authentication any type of user | Supported | |
SQL authentication (dbcreator) | SQL authentication any type of user | Supported | |
MSA/gMSA | Windows authentication (dbcreator) | Windows authentication MSA/gMSA | NOT Supported |
SQL authentication (dbcreator) | Windows authentication MSA/gMSA | NOT Supported | |
Windows authentication (sysadmin) | Windows authentication MSA/gMSA | Supported | |
SQL authentication (sysadmin) | Windows authentication MSA/gMSA | Supported |
To access a Recovery Manager for Active Directory instance, the Recovery Manager Portal requires the Recovery Manager Remote API Access service to be installed and running on the Recovery Manager for Active Directory computer. This service enables the following Recovery Manager for Active Directory features: integration with Recovery Manager Portal, full replication of RMAD console, consolidation of backup information and support for hybrid environment.
For information about minimum permission requirements for the service, refer Step 1: Install Recovery Manager Remote API Access Service.
Recovery Manager Portal can be run under Managed Service Account (in Windows Server 2008 or higher) or Group Managed Service Account (in Windows Server 2012 or higher). If you specify the MSA or gMSA account, add the '$' character at the end of the account name (e.g. domain\computername$) and leave the Password field blank (on the Specify Web Site Settings step of the wizard).
For more details about required permissions, see the Install or uninstall Recovery Manager Portal section above.
For more information about MSA/gMSA, see Using Managed Service Accounts.
User must be a member of the "Recovery Manager Portal - Recovery Operators" security group on the computer where the Recovery Manager Portal is installed.
If you want to use the agentless recovery method, select the Configure a list of delegates that can perform the restore and undelete operations option on the Portal Settings tab. For more information about delegation, see Delegating restore or undelete permissions.
User must be a member of the "Recovery Manager Portal - Undelete Operators" local security group on the computer where the Recovery Manager Portal is installed.
If you want to use the agentless recovery method, select the Configure a list of delegates that can perform the restore and undelete operations option on the Portal Settings tab. For more information about delegation, see Delegating restore or undelete permissions.
User must be a member of the "Recovery Manager Portal - Configuration Admins" local security group on the computer where the Recovery Manager Portal is installed.
User must be a member of the "Recovery Manager Portal - Monitoring Operators" local security group on the computer where the Recovery Manager Portal is installed.
To access the SQL reporting database (%ProgramData%\Quest\Recovery Manager for Active Directory\DBReporting\RecoveryManager-Reporting-<host name>), the account must be assigned to db_datareader, db_datawriter roles and have rights to run all the usp_* procedures, as follows:
usp_GetSummaryReportBody
usp_GetSessionErrors
usp_GetReportsList
usp_GetReportsHeader
usp_GetReportBody
usp_GetReplicationHistory
usp_GetOptionalObjects
usp_GetOptionalAttributes
usp_GetObjectChildren
usp_GetObjectAttributes
usp_GetAllObjects
usp_GetAllChildObjects
usp_GetAllAttributes
Verify that the user account under which you run Recovery Manager for Active Directory Management Shell console has the Write permission to the %ProgramData%\Quest\Recovery Manager for Active Directory folder. Otherwise, you will get warning messages when you run the snap-in cmdlets.
Recovery Manager for Active Directory includes an MMC snap-in (also known as the Recovery Manager Console) to ensure intuitive operation and close integration with the Windows operating system.
Note |
Machine that hosts the Recovery Manager Console must have same or higher version of Windows operating system than the processed domain controllers. Otherwise, the online compare and object search in a backup during the online restore operation may fail. |
On the Start screen, click the Recovery Manager for Active Directory tile.
When started for the first time, the Recovery Manager Console looks similar to the following:
The main viewing area of the window is divided into two panes. The left pane contains the console tree, showing the items that are available in the snap-in. The right pane, known as the details pane, is used to display information about those items. The window also contains command menus and toolbars that are provided by both the MMC and the snap-in.
The information in the details pane changes accordingly when you select items in the console tree. To perform management tasks, you can click or right-click entries in the details pane and then use commands on the Action menu or shortcut menu.
You can move objects by selecting them in a source folder and then dragging the selection to a destination folder. If the drop operation is not allowed, the mouse pointer changes accordingly.
For more information about how to navigate an MMC snap-in, refer to Microsoft Management Console Help.
The console tree includes the following items:
Replication Using this node you can add multiple console instances to the replication console list and perform the data replication from source consoles to the local one. For more information, see Full replication and Consolidating backup registration data.
Backup Agent Management. Provides a central location for managing Backup Agent on computers added to Computer Collections. You can use this node to discover all preinstalled instances of Backup Agent and to manually install, uninstall, or update the agent on computers in Computer Collections (such as domain controllers and AD LDS (ADAM) hosts). For more information, see Managing Backup Agent.
Computer Collections. Contains a list of user-defined collections of computers. When you select a collection in the console tree, the details pane displays a list of all members of that collection. For more information, see Using Computer Collections.
Active Directory. Contains nodes representing the forests and AD LDS (ADAM) configuration sets to which the Recovery Manager Console is currently connected. You can browse forests and AD LDS (ADAM) configuration sets for computers and AD LDS (ADAM) instances, respectively.
To add a forest to the list, select Active Directory, and then, on the Action menu, click Connect to Forest.
To add an AD LDS (ADAM) configuration set to the list, select Active Directory, and then, on the Action menu, click Connect to AD LDS (ADAM).
Sessions. Contains a list of all backup-creation sessions performed by Recovery Manager for Active Directory. When you select a session in the console tree, the details pane reports information about that session, such as whether backups were successfully created during the session.
Backups. Contains a list of the Active Directory backups, AD LDS (ADAM) backups registered in the backup registration database of Recovery Manager for Active Directory. When you select Active Directory or AD LDS (ADAM) under the Backups node, the details pane displays a list of all registered AD backups or AD LDS (ADAM) backups respectively.
You can use the Properties dialog box provided for the Active Directory or AD LDS (ADAM) node, to filter the list of backups displayed in the details pane.
© ALL RIGHTS RESERVED. Términos de uso Privacidad Cookie Preference Center