Chatee ahora con Soporte
Chat con el soporte

Recovery Manager for AD Disaster Recovery Edition 10.3 - User Guide

Overview Getting started
Permissions required to use Recovery Manager for Active Directory Recovery Manager Console Getting and using help Configuring Windows Firewall Using Computer Collections Cloud Storage Secure Storage Server Hybrid Recovery with On Demand Recovery Managing Recovery Manager for Active Directory configuration Licensing
Backing up data
Permissions required for the Backup operation Managing Backup Agent Using a least-privileged user account to back up data Using Managed Service Accounts Active Directory backups vs Windows System State backups Creating BMR and Active Directory backups Using the Backup Wizard Retrying backup creation Enabling backup encryption Backing up AD LDS (ADAM) Backing up cross-domain group membership Backing up distributed file system (DFS) data Backup scheduling Setting performance options Setting advanced backup options Using Forest Recovery Agent Unpacking backups Using e-mail notification Viewing backup creation results
Restoring data
Getting started with Active Directory recovery Managing deleted or recycled objects Restoring backed up Active Directory components Integration with Change Auditor for Active Directory Using granular online restore Restoring AD LDS (ADAM) Selectively restoring Active Directory object attributes Restoring objects in an application directory partition Restoring object quotas Restoring cross-domain group membership Performing a restore without having administrator privileges Reports about objects and operations Using complete offline restore Offline restore implications Restoring SYSVOL authoritatively Performing a granular restore of SYSVOL Recovering Group Policy Restoring data from third-party backups Using the Extract Wizard Restoring passwords and SID history
Full Replication Consolidating backup registration data Monitoring Recovery Manager for Active Directory Recovering an Active Directory forest
Forest recovery overview Deploying Recovery Manager for Active Directory Forest Edition (Disaster Recovery Edition) Permissions required to use Forest Recovery Console Forest Recovery Console Managing a recovery project Recovery methods Phased recovery Managing Forest Recovery Agent Rebooting domain controllers manually Resetting DSRM Administrator Password Purging Kerberos Tickets Managing the Global Catalog servers Managing FSMO roles Manage DNS Client Settings Configuring Windows Firewall Developing a custom forest recovery plan Backing up domain controllers Assigning a preferred DNS server during recovery Handling DNS servers during recovery Forest recovery approaches Deciding which backups to use Running custom scripts while recovering a forest Overview of steps to recover a forest Viewing forest recovery progress Viewing recovery plan Viewing a report about forest recovery or verify settings operation Handling failed domain controllers Adding a domain controller to a running recovery operation Selectively recovering domains in a forest Recovering SYSVOL Deleting domains during recovery Resuming an interrupted forest recovery Recovering read-only domain controllers (RODCs) Checking forest health Collecting diagnostic data for technical support
Restore Active Directory on Clean OS method Bare metal forest recovery Using Management Shell Creating virtual test environments Appendices
Frequently asked questions Best practices for using Computer Collections Technical characteristics Best practices for creating backups Best practices for creating backups for forest recovery Best practices for recovering a forest Descriptions of recovery or verification steps Ports Used by Recovery Manager for Active Directory Forest Edition (Disaster Recovery Edition) Backup Wizard Online Restore Wizard Online Restore Wizard for AD LDS (ADAM) Group Policy Restore Wizard Repair Wizard Extract Wizard Events generated by Recovery Manager for Active Directory

Audit of objects and operations

To assist with troubleshooting lost or changed Active Directory® objects, AD LDS (ADAM) objects, or Group Policy objects, Recovery Manager for Active Directory provides the ability to compare the current state of individual objects in Active Directory® or AD LDS (ADAM) with that in an Active Directory® or AD LDS (ADAM) backup. This functionality is particularly useful for locating the source of and resolving problems resulting from the deletion or modification of critical objects.

During a restore operation, Recovery Manager for Active Directory allows for the creation of comparison reports, which present the changes that have occurred in Active Directory® or AD LDS (ADAM) since the last backup, without actually applying changes to Active Directory® or AD LDS (ADAM). Such reports show the objects that were deleted or modified since the backup was made. In addition, they show the properties of directory objects and settings of Group Policy objects that would change during the operation. An administrator can then review these changes and decide whether to apply them.

 

Integration with Change Auditor for Active Directory

To provide information on who modified particular Active Directory® objects, Recovery Manager for Active Directory integrates with Change Auditor and includes the Change Auditor data into the reports.

From version 10.0.1, Recovery Manager for Active Directory restores the deleted object(s) and restores the last change (if any) that was made to the object attributes after creating the backup, using the data from the Change Auditor database. This functionality is based on the auditing capability provided by Change Auditor for Active Directory, an award-winning product that helps to proactively track, audit, report, and alert on vital Active Directory® changes in real-time and without the overhead of auditing.
You can find out more about Change Auditor for Active Directory at http://quest.com/products/changeauditor-for-active-directory.

For details about this feature, see Integration with Change Auditor for Active Directory.

 

Management Shell

The Recovery Manager for Active Directory Management Shell, built on Microsoft Windows® PowerShell® technology, provides a command-line interface that enables automation of backup/recovery related administrative tasks. With this Management Shell, administrators can manage Computer Collections, backup/recovery sessions, compare, and start backup/recovery jobs.

The Recovery Manager for Active Directory Management Shell command-line tools (cmdlets), like all the Windows® PowerShell® cmdlets, are designed to deal with objects-structured information that is more than just a string of characters appearing on the screen. The cmdlets do not use text as the basis for interaction with the system, but use an object model that is based on the Microsoft .NET platform. In contrast to traditional, textbased commands, the cmdlets do not require the use of text-processing tools to extract specific information. Rather, you can access portions of the data directly by using standard Windows® PowerShell® object manipulation commands.

 

Scheduling and automation

Creation of Backups

Recovery Manager for Active Directory (RMAD) enables administrators to schedule the creation of backups. This functionality helps reduce the network workload and can save many hours of the administrators’ valuable time. When scheduling the creation of backups, RMAD relies on Task Scheduler - the Windows scheduler service. A unified graphical interface and wizard assistance provide easy access to the backup scheduling features of RMAD.

RMAD makes the creation of backups a straightforward task. Once the backup creation options and scheduling are set up, the backup creation process becomes an automatic, unattended operation.

Project Settings Verification

RMAD allows the administrators to schedule the forest recovery project verification. This functionality lets you automate the settings verification to ensure that the recovery project is in valid state and can be used for forest recovery.

Antimalware Checks

RMAD scans BMR and Active Directory backups for viruses as a part of the verification process. The best practice is to use the scheduled verification to have up-to-date backup scan results and to run anti-malware checks in the background because this process is time-consuming.

 

Documentos relacionados

The document was helpful.

Seleccionar calificación

I easily found the information I needed.

Seleccionar calificación