Tchater maintenant avec le support
Tchattez avec un ingénieur du support

Recovery Manager for AD 10.3.1 - User Guide

Overview Getting started
Permissions required to use Recovery Manager for Active Directory Recovery Manager Console Getting and using help Configuring Windows Firewall Using Computer Collections Hybrid Recovery with On Demand Recovery Managing Recovery Manager for Active Directory configuration Licensing
Backing up data
Permissions required for the Backup operation Managing Backup Agent Using a least-privileged user account to back up data Using Managed Service Accounts Active Directory backups vs Windows System State backups Creating BMR and Active Directory backups Using the Backup Wizard Retrying backup creation Enabling backup encryption Backing up AD LDS (ADAM) Backing up cross-domain group membership Backing up distributed file system (DFS) data Backup scheduling Setting performance options Setting advanced backup options Unpacking backups Using e-mail notification Viewing backup creation results
Restoring data
Getting started with Active Directory recovery Managing deleted or recycled objects Restoring backed up Active Directory components Integration with Change Auditor for Active Directory Using granular online restore Restoring AD LDS (ADAM) Selectively restoring Active Directory object attributes Restoring objects in an application directory partition Restoring object quotas Restoring cross-domain group membership Performing a restore without having administrator privileges Reports about objects and operations Using complete offline restore Offline restore implications Restoring SYSVOL authoritatively Performing a granular restore of SYSVOL Recovering Group Policy Restoring data from third-party backups Using the Extract Wizard Restoring passwords and SID history
Full Replication Consolidating backup registration data Using Management Shell Collecting diagnostic data for technical support Appendices
Frequently asked questions Best practices for using Computer Collections Technical characteristics Best practices for creating backups Ports Used by Recovery Manager for Active Directory Backup Wizard Online Restore Wizard Online Restore Wizard for AD LDS (ADAM) Group Policy Restore Wizard Repair Wizard Extract Wizard Events generated by Recovery Manager for Active Directory

General tab

On this tab, you can specify the default location for storing Active Directory backups or select a default method for compare and restore operations.

This tab provides the following options:

  • Default backup location. Allows you to specify the path to the folder where to store backups. You can either type the path or click Browse to locate and select the folder.

  • Maximum number of items displayed per folder under the Active Directory node. Use this box to type the maximum number of objects (default 2000) that you want to be displayed for any single folder in the console tree under the Active Directory® node.

  • Default method for compare and restore operations. Allows you to select the default method to perform compare and restore operations in the Online Restore Wizard. For more information about the methods that you can select, see Using the agentless or agent-based method.

  • Change Auditor (CA)

    • Include Change Auditor "Who" data in reports. Includes information on users who modified certain Active Directory objects into the reports you can generate in the Online Restore Wizard. To use this option, you must have Change Auditor for Active Directory installed in the home Active Directory forest of RMAD.

    • Include subsequent changes from CA on deleted objects. When this option is selected, Recovery Manager for Active Directory restores the deleted object(s) and continuously restores the last change (if any) that was made to the object attributes after creating the backup, using data from the Change Auditor database.

    • Database. Allows you to specify the name of Change Auditor database.

      To specify the CA database server, instance, port, and name, use the following format: <Server Name>\<Instance Name>,<Port>\<Database Name>. Example: testserver.domain.com\testinstance,1432\ChangeAuditorDB

      For details about the Change Auditor-related options, see Integration with Change Auditor for Active Directory.

  • Default Active Directory connection

    • Use Secure Sockets Layer (SSL) to encrypt the connection. Allows you to use LDAP over SSL when accessing the AD forests. This selection affects all the LDAP connections in RMAD and sets the default value for this check box in the other dialogs where it is displayed.
Note

You must reopen the Forest Recovery console after updating the Use Secure Socket Layer (SSL) to encrypt the connection setting for the changes to take effect.

 

Unpacked Backups tab (global settings)

On this tab, you can specify some global (or default) settings to automatically unpack backups. By default, these settings will apply to all new Computer Collections.

This tab provides the following options:

  • Unpack each backup upon its creation - Specifies to unpack each backup upon its creation. This option will only apply to those Computer Collections whose properties are configured to use the global settings. In this option, you can specify the number of recent backup creation sessions (default 3) from which you want to keep unpacked backups for each domain in the Computer Collections.

  • Prompt me to keep backups unpacked by wizards - Specifies that the Online Restore Wizard and the Group Policy Restore Wizard will prompt you to keep unpacked backups. Use the Keep unpacked backups list to specify for how long you want RMAD to keep (default 7 days) the backups unpacked by the wizards.

  • Unpacked backups folder - Provides a space for you to specify the path to the folder (default C:\ProgramData\Quest\Recovery Manager for Active Directory\Unpacked) where you want RMAD to keep unpacked backups. Each unpacked backup will be saved in a separate subfolder. Type the folder path or click Browse to locate and select the folder.

DC selection algorithm that is used to select a DC for unpacking
  1. Only one DC backup per domain is chosen for unpacking for each backup session.

  2. Not Read-Only DCs are selected first.

    -OR-

    If there are no Not Read-Only DCs in the domain, all the DCs are supposed to be selected.

  3. If several DCs are selected on the Step 2, DC with the Global Catalog role will be selected among them. If there are several DCs with the GC role, it is unpredictable which backup will be selected then.

  4. The chosen backup (one per domain) is unpacked.

If there is limit for unpacked backups and it is exceeded, the specified number of the oldest backups are deleted. If individual settings are specified for a collection, backups for that particular collection are taken into account, otherwise backups of all collections that use the global settings are taken into account when comparing against the specified limit.

For more information on managing unpacked backups, see Unpacking backups.

 

E-mail tab

On this tab, you can configure e-mail notification settings. Recovery Manager for Active Directory (RMAD) will use these settings to send notification e-mails about backup creation sessions.

This tab provides the following options:

  • Service Type Select SMTP Authentication or Exchange OAuth2 for Microsoft 365 Exchange Online.

  • SMTP Authentication

  • To set up email notifications for Exchange, specify the following for SMTP Authentication:

    • SMTP server. Provides a space for you to specify the SMTP server for outgoing messages.

    • SMTP port. Provides a space for you to specify the port number (default port for SMTP is 25) to connect to on your outgoing mail (SMTP) server.

    • From address. Provides a space for you to specify the return address for your e-mail notification messages. It is recommended that you specify the e-mail address of the RMAD administrator.

    • SMTP server requires authentication. When selected, specifies that you must log on to your outgoing mail server.

    • User. Provides a space for you to specify the account name used to log on to the SMTP server.

    • Password. Provides a space for you to specify the user password.

    • Use Secure Sockets Layer (SSL) to encrypt the connection. Allows you to use SSL when accessing the e-mail server.

  • Exchange OAuth2 Authentication

  • To set up email notifications for Microsoft 365 Exchange Online, you need to register Recovery Manager for Active Directory with Microsoft Entra ID. For steps to create and manage your Microsoft Entra ID application see Registering Recovery Manager for Microsoft 365 Exchange Online Email Notifications.

    • From address. Provides a space for you to specify the return address for your email notification messages. It is recommended that you specify the e-mail address of the RMAD administrator.

    • Application (client) ID. Provide the application (client) ID for the Microsoft Entra ID application created for Recovery Manager for Active Directory email notifications.

    • Directory (tenant) ID. Provide the directory (tenant) ID for the Microsoft Entra ID application created for Recovery Manager for Active Directory email notifications.

    • Certificate Thumbprint. Provide the certificate thumbprint for the Microsoft Entra ID application created for Recovery Manager for Active Directory email notifications.

    • U.S Government GCC High. Check this box if you are using an US Government GCC High account for Exchange Online OAuth2 notification.

  • Test Settings. Sends a test notification message to the address set in the “From” address text box. Use this button to verify that the specified e-mail notification settings are valid.

For more information, see Using e-mail notification.

 

Registering Application for Exchange Online Email Notifications

To use email notifications using Microsoft 365 Exchange Online, you need to register Recovery Manager for Active Directory with Microsoft Entra ID. During the registration process, the required variables are generated. These variables are used when you configure OAuth2 authentication.

To register an application for Microsoft 365 Exchange Online through Microsoft Entra ID

  • Log into the Microsoft Entra ID portal (https://portal.azure.com) with your global administrator user account.

  • In the Microsoft Azure dashboard, go to Microsoft Entra ID | App Registrations, and click New Registration.

  • Enter a name for the application.

  • Under Supported account types, select Accounts in this organizational directory only (Single tenant) for the accounts that can access the application API.

    IMPORTANT: It is highly recommended that the application does not have access to all mailboxes. For more information about how to limit the application access to all mailboxes see the article Limiting application permissions to specific Exchange Online mailboxes.

  • Leave the Redirect URI (optional) field empty.

  • Click Register.

  • On the Overview tab, go to View API Permissions. Click Add a permission, click Microsoft Graph | Application Permissions and add the Mail.ReadWrite and Mail.Send permissions. See Microsoft documentation for details on limiting permissions to specific Exchange Online mailboxes. (Note: The Enforce approver account validation option found when configuring email notifications will not function if you select to follow the Microsoft article to restrict access to a single mailbox.)

  • Click Add Permission.

  • On the API Permission tab, under Grant consent, click Grant admin consent for tenant name.

  • Click Yes to confirm.

  • On the preview screen, click Overview, and note the application ID and the directory ID. (You will need these values when setting up OAuth2 authentication.)

  • Go to Microsoft Entra ID - Roles and administrators and assign the Exchange Administrator role for the application you created in previous steps.

  • The Microsoft Entra ID application requires a certificate for authentication. Go to Certificates & secrets, select Upload Certificate and upload the required file.

Recovery Manager for Active Directory requires the certificate to be copied to the machine where the Recovery Manager console is installed. The certificate should be stored in the local certificate store.

To import the certificate on the console machine:

  • Open the Certificate Import Wizard
  • Select Local machine for Store location. Click Next.
  • Select Place all certificates in the following store, click Browse and select the Personal store. Click Next
  • After the certificate is imported to the store, obtain and save the certificate thumbprint. The certificate thumbprint will be needed when setting up OAuth2 authentication.
NOTE

Once OAuth2 authentication is set up, Recovery Manager for Active Directory saves the Application (client) ID, Directory (tenant) ID, and Certificate thumbprint in the registry. It is located in the registry path: "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Quest\Recovery Manager for Active Directory\Options\Email".

 

Documents connexes

The document was helpful.

Sélectionner une évaluation

I easily found the information I needed.

Sélectionner une évaluation