サポートと今すぐチャット
サポートとのチャット

Recovery Manager for AD Disaster Recovery Edition 10.3 - User Guide

Overview Getting started
Permissions required to use Recovery Manager for Active Directory Recovery Manager Console Getting and using help Configuring Windows Firewall Using Computer Collections Cloud Storage Secure Storage Server Hybrid Recovery with On Demand Recovery Managing Recovery Manager for Active Directory configuration Licensing
Backing up data
Permissions required for the Backup operation Managing Backup Agent Using a least-privileged user account to back up data Using Managed Service Accounts Active Directory backups vs Windows System State backups Creating BMR and Active Directory backups Using the Backup Wizard Retrying backup creation Enabling backup encryption Backing up AD LDS (ADAM) Backing up cross-domain group membership Backing up distributed file system (DFS) data Backup scheduling Setting performance options Setting advanced backup options Using Forest Recovery Agent Unpacking backups Using e-mail notification Viewing backup creation results
Restoring data
Getting started with Active Directory recovery Managing deleted or recycled objects Restoring backed up Active Directory components Integration with Change Auditor for Active Directory Using granular online restore Restoring AD LDS (ADAM) Selectively restoring Active Directory object attributes Restoring objects in an application directory partition Restoring object quotas Restoring cross-domain group membership Performing a restore without having administrator privileges Reports about objects and operations Using complete offline restore Offline restore implications Restoring SYSVOL authoritatively Performing a granular restore of SYSVOL Recovering Group Policy Restoring data from third-party backups Using the Extract Wizard Restoring passwords and SID history
Full Replication Consolidating backup registration data Monitoring Recovery Manager for Active Directory Recovering an Active Directory forest
Forest recovery overview Deploying Recovery Manager for Active Directory Forest Edition (Disaster Recovery Edition) Permissions required to use Forest Recovery Console Forest Recovery Console Managing a recovery project Recovery methods Phased recovery Managing Forest Recovery Agent Rebooting domain controllers manually Resetting DSRM Administrator Password Purging Kerberos Tickets Managing the Global Catalog servers Managing FSMO roles Manage DNS Client Settings Configuring Windows Firewall Developing a custom forest recovery plan Backing up domain controllers Assigning a preferred DNS server during recovery Handling DNS servers during recovery Forest recovery approaches Deciding which backups to use Running custom scripts while recovering a forest Overview of steps to recover a forest Viewing forest recovery progress Viewing recovery plan Viewing a report about forest recovery or verify settings operation Handling failed domain controllers Adding a domain controller to a running recovery operation Selectively recovering domains in a forest Recovering SYSVOL Deleting domains during recovery Resuming an interrupted forest recovery Recovering read-only domain controllers (RODCs) Checking forest health Collecting diagnostic data for technical support
Restore Active Directory on Clean OS method Bare metal forest recovery Using Management Shell Creating virtual test environments Appendices
Frequently asked questions Best practices for using Computer Collections Technical characteristics Best practices for creating backups Best practices for creating backups for forest recovery Best practices for recovering a forest Descriptions of recovery or verification steps Ports Used by Recovery Manager for Active Directory Forest Edition (Disaster Recovery Edition) Backup Wizard Online Restore Wizard Online Restore Wizard for AD LDS (ADAM) Group Policy Restore Wizard Repair Wizard Extract Wizard Events generated by Recovery Manager for Active Directory

Specifying recovery project settings

Each recovery project has a number of project-specific settings that allow you to control the various aspects of recovery. For example, you can use these settings to select how to handle the global catalog during recovery, configure balloon notifications displayed in the Forest Recovery Console and e-mail notification settings, select the Active Directory® domains you want to recover, and enable or disable the Recovery Persistence feature that provides protection from an inadvertent shutdown of the Forest Recovery Console.

To specify the recovery project settings
  1. Open or create a recovery project.

  2. On the menu bar, select Tools | Recovery Project Settings.

  3. Use the tabs described in the table below to view or modify the recovery project settings.

Recovery project settings

Recovery Mode

Displays a list of all domains in the current recovery project.

On this tab, you can use the following options:

  • Specify which type of restore operation you want to perform:

  • Specify the domains you want to selectively recover in the forest. For more information on how to selectively recover domains, see Selectively recovering domains in a forest.

  • For each domain, you can configure the domain controller where authoritative restore of SYSVOL will be performed.

  • You can specify default credentials to access domain controllers in the selected domain.

Global Catalog

Allows you to select how to handle the global catalog during recovery. This tab provides the following options:

  • Rebuild GC, advertise normally. Uses a standard Active Directory® mechanism to remove and add the global catalog. By removing and then adding the global catalog you ensure that it contains no lingering objects and thus can avoid replication inconsistencies.

    To advertise the rebuilt global catalog servers in DNS, this option uses the existing Global Catalog Partition Occupancy level specified in the system registry.

    By default, a global catalog server is considered as ready to be advertised in DNS when all read-only directory partitions have been fully replicated to the new global catalog server. However, your particular forest may use a different setting. For this reason, it is recommended that you check the Catalog Partition Occupancy level specified in the system registry. If the default setting is used, then the Rebuild GC, advertise normally option is the safest and most reliable way to rebuild and advertise the global catalog during the recovery.

    This option rebuilds the global catalog in the entire forest regardless of how many domains you are recovering.

  • Rebuild GC, advertise fast. Uses a standard Active Directory® mechanism to remove and then add the global catalog. This option offers a faster way to advertise the rebuilt global catalog servers in DNS. As a result, this option can help you make a number of forest-wide services (for example, user logon and Exchange Server messaging) available to the users more quickly after the recovery.

    When you select this option, the rebuilt global catalog servers will be advertised in DNS without waiting for the read-only directory partitions replication to fully complete. The trade-off of using this option is that the global catalog may include some inconsistencies until the global catalog servers have received the complete information from all the other domains in the forest.

    This option rebuilds the global catalog only in the domains that you recover by using RMADFE.

  • Keep GC intact. Does not rebuild or change the global catalog in any way during the recovery. With this option, the global catalog servers will remain either in the state in which they were before the recovery started (this is true for the servers that are located in the domains you selected not to recover) or in the state to which they were restored from backup during the recovery.

    In certain situations, this option might help you avoid global catalog downtime and make some forest-wide services available to the users more quickly. However, using this option greatly increases the risk of introducing lingering objects into the global catalog, which can lead to a corrupt forest. It might happen if you use a set of backups for the domain controllers with large age difference. That is, backups may contain inconsistencies that will lead to introducing lingering object.

    If you use this option, it is recommended that you manually reset the global catalog to ensure it does not include inconsistencies.

Notifications

You can use this tab to configure balloon notifications displayed in the Forest Recovery Console and e-mail notification settings.

Console notifications

Allows you to configure balloon notifications in the Forest Recovery Console to inform you if the backups selected for recovery were created at different points in time or if your recovery project is outdated.

  • Age difference of selected backups exceeds <Number> hours. When selected, notifies you if the age difference of backups selected for recovery exceeds the number of hours you specify in this option. This option helps you ensure that the backups you select are created at a similar point in time and therefore hold similar Active Directory states.

  • Recovery project was updated more than <Number> days ago. When selected, notifies you if the current recovery project was last updated more than the number of days you specify in this option.

  • Forest topology has changed (only checked at console startup). When selected, causes the Forest Recovery Console to check if the forest topology information in the current recovery project is outdated. This check is performed each time the Forest Recovery Console starts up.

E-mail notifications

Allows you to send e-mail notifications to specific recipients when the verification or recovery process is completed.

  • Verification process is completed When the option is selected, the specified recipients will be notified that the verification process has been completed.

  • Recovery process is completed When the option is selected, the specified recipients will be notified that the recovery process has been completed.

  • Email Service Type Select SMTP Authentication or Exchange OAuth2.

  • E-mail address to send notifications Use this text box to specify e-mail recipients. More that one address can be entered, separated by a semicolon or a comma.

  • Sender email address Specify the return address for your e-mail notification messages. It is recommended that you specify the e-mail address of the RMAD administrator.

SMTP Authentication

  • SMTP server Specify the SMTP server for outgoing messages.

  • SMTP port Specify the port number (default port for SMTP is 25) that will be used to connect to your SMTP server.

  • SMTP server requires authentication When the option is selected, you will be prompted to provide credentials to log on to the SMTP server.

  • User name Specify the account name used to log on to the SMTP server.

  • Password Specify the user password.

  • Use Secure Socket Layer (SSL) to encrypt the connection Enables the SSL data encryption for email notifications.

Exchange OAuth2 Authentication

To set up email notifications for Microsoft 365 Exchange Online, you need to register Recovery Manager for Active Directory with Azure Active Directory. For steps to create and manage your Azure Active Directory application see Registering Recovery Manager for Microsoft 365 Exchange Online Email Notifications.

  • From address Provides a space for you to specify the return address for your email notification messages. It is recommended that you specify the e-mail address of the RMAD administrator.

  • Application (client) ID Provide the application (client) ID for the Azure Active Directory application created for Recovery Manager for Active Directory email notifications.

  • Directory (tenant) ID Provide the directory (tenant) ID for the Azure Active Directory application created for Recovery Manager for Active Directory email notifications.

  • Certificate Thumprint Provide the certificate thumbprint for the Azure Active Directory application created for Recovery Manager for Active Directory email notifications.

  • Test settings Sends a test notification message to the address specified in the Sender email address text box. Use this button to verify that the specified e-mail notification settings are valid.

Agents

On this tab, you can specify TCP ports that will be used by Forest Recovery Console to communicate with Forest Recovery Agent and Management Agent.

  • Connect to Management Agent using a specific TCP port. This agent is used to deploy other agents to the target server. Allows you to specify the TCP port number that will be used to connect to Management Agent installed on a target domain controller. If the option is not selected, RPC dynamic port range is used by default.

  • Management Agent will configure Windows Firewall exceptions. If this option is selected, Windows Firewall settings will be configured automatically for Management Agent.

  • Connect to Forest Recovery Agent using a specific TCP port. Allows you to specify the TCP port number that will be used to connect to Forest Recovery Agent installed on a target domain controller. If the option is not selected, RPC dynamic port range is used by default.

  • Forest Recovery Agent will configure Windows Firewall exceptions. If this option is selected, Windows Firewall settings will be configured automatically for Forest Recovery Agent.

Infrastructure

On this tab, you can configure the automatic VM boot and automatic VM creation configuration options. For more information on the settings, see VMware ESXi, Microsoft Hyper-V, or Create virtual machines in Microsoft Azure.

 

Cloning an infrastructure platform template

You can clone existing infrastructure platform templates, which are Azure®, Hyper-V®, and VMWare™. This allows you to create additional templates specific to each machine being restored in the Forest Recovery Project to meet the requirements of the environment.

  1. In the Forest Recovery Console, click Tools | Recovery Project Settings.

  2. On the Infrastructure tab, from the Infrastructure platform drop-down list, select the type of infrastructure platform that you want to clone.

  3. Click Clone to make a copy of the currently selected infrastructure platform.

  4. Type a name for the cloned infrastructure template.

  5. Configure the infrastructure settings and virtual machine settings. For more information on the settings, see VMware™ ESXi™, Microsoft Hyper-V®, or Create virtual machines in Microsoft Azure®.

  6. Click OK to generate the service principal.

Assigning an infrastructure platform template to a domain controller

After creating infrastructure platform templates, you can assign the templates to the appropriate domain controllers.

  1. In the Forest Recovery Console, select the domain controller.

  2. Click the General tab.

  3. From the Infrastructure drop-down list, select the appropriate template.

 

Verifying recovery project settings

To ensure you can recover your Active Directory® forest with minimum downtime, it is recommended that you regularly run the verify settings operation on your recovery project. When you run this operation, Recovery Manager for Active Directory (RMAD) connects to the domain controllers in the project, collects their configuration parameters, and then saves these parameters in the recovery project (.frproj) file. The verify settings operation does not modify any data in your Active Directory® forest.

After the configuration parameters have been collected, RMAD checks the recovery project settings against these parameters for any incompatibilities that may affect the forest recovery process. When the verify settings operation completes, you can view a report providing details about any problems found in your recovery project.

Running the verify settings operation on a regular basis allows you to promptly reveal any potential recovery problems and proactively prevent them by making appropriate adjustments to the recovery project settings.

When you run the verify settings operation, RMAD collects and saves the following information from each domain controller in the project:

  • IP addresses of all network adapters

  • IP addresses of all DNS servers on all network adapters

  • DNS names of all FSMO role holders in the Active Directory® forest

  • Forest Recovery Agent version installed on the domain controller (if any)

  • Whether the domain controller is read-only (RODC)

  • Operating system version installed on the domain controller

NOTE:

  • Check that the Administrative Share Admin$ exists and is accessible on the target domain controllers to perform the remote Forest Recovery Agent installation.

  • If the backup is located on the Recovery Manager Console machine: Check that the Administrative Share 'DriveLetter$' exists and is accessible for the disk where the backup is stored .

Otherwise, the Forest Recovery will fail. For more information, see Installing Backup Agent automatically.

To verify the settings of your recovery project
  1. Create or open a recovery project.

  2. Specify recovery settings in the project.

  3. On the toolbar, click the drop-down toggle next to Verify Settings, select Verify Settings and wait for the operation to complete.

  4. To perform the verify settings operation for the particular domain controller(s), use the Verify Selected DCs option from the drop-down list.

After the verify settings operation completes, you can view a report on the operation results: from the menu bar, select View | Report.

 

Scanning backups for viruses

Recovery Manager for Active Directory scans BMR and Active Directory® backups for malware as a part of the verification process (not recovery). The anti-virus checks are performed on the Forest Recovery Console machine running Windows Server® 2016 or higher by means of antivirus software installed on the machine. The best practice is to use the scheduled verification to have up-to-date backup scan results and to run anti-malware checks in the background because this process is time-consuming. To configure the verification schedule, refer Scheduling project verification.

Supported antivirus software

  • Microsoft Defender

  • FEATURE PREVIEW Symantec™ Endpoint Protection 14.x; Broadcom Endpoint Security (former name: Symantec™ Endpoint Protection 15)

Note

Recovery Manager for Active Directory Disaster Recovery Edition only supports scanning of BMR backups.

Virus scanning general recommendations

  • The scan performance highly depends on the network speed to the remote backup storage.

  • It is not recommended to scan more than 5-10 BMR backups in parallel - this means that only 5-10 DCs should be configured to restore from the BMR backup. It is a risk to restore some DC from scanned BMR backup, and others from not scanned backups that can potentially contain malware.

  • If you have remote sites with slow network connection, consider installing other instances of RMAD there, and configure backup metadata replication. For details, see Consolidating backup registration data.

  • In some cases, depending on a host environment and the size of the backed-up data, the host machine can experience a high CPU load while scanning a backup. To avoid this, a user can limit CPU utilization in the antivirus software settings. For example, a user can change the ScanAvgCPULoadFactor setting if Windows Defender Antivirus is used. For details, see Configure Microsoft Defender Antivirus scanning options. You can use this formula to estimate a possible setting value: (number of parallel backups) * ScanAvgCPULoadFactor < (desired overall CPU usage by RMAD scan process).

  • For all antivirus vendors, real-time protection mode can affect Active Directory® backup scans.

Symantec™ Endpoint Protection limitations

  • A parallel backup scan is not yet supported for Symantec™ Endpoint Protection. Therefore, the scan operation with Symantec™ may take longer than a scan using Windows Defender.

  • Make sure that AD backup checks are not run together with any other file system scans on the Forest Recovery Console machine.

  • For Symantec™ Endpoint Protection: If you cancel the project verification, the virus scan will continue running due to the Tamper Protection feature of Symantec Endpoint Protection (SEP). To resolve this problem, there are two workarounds:

    • Stop the current antivirus scan from Symantec™ Endpoint Protection Manager.

    • Then, end the ccSvcHst.exe process. This process is a common scanning process for the SEP client, so this action will drop all scanning tasks on the machine. See Symantec™ Endpoint Protection for details.

Features supported by different anti-virus scanners

Supported features Backup type Windows Defender Symantec™ Endpoint Protection, Broadcom Endpoint Security
Parallel scan BMR backup, AD backup
Scan with enabled Real-Time Protection mode BMR backup, AD backup Supported for BMR backup only* Supported for BMR backup only*
Completely cancel the verification process BMR backup, AD backup
Warn if the anti-virus database is outdated BMR backup, AD backup

* If Real-Time Protection is disabled, Active Directory backups can also be scanned.

Note

Only Windows Defender supports parallel scanning of backups. Other anti-virus solutions scan backups in sequential mode. This must be taken into account when planning the verification schedule.

How to enable virus scanning in Recovery Manager for Active Directory

Recovery Manager for Active Directory automatically detects antivirus software and you do not need to explicitly specify it in the configuration file (%ProgramFiles%\Quest\Recovery Manager for Active Directory\Management\AntivirusConfiguration.json). The AntivirusToUse parameter value is empty by default. If this parameter contains any value, the autodetect feature will not work. Recovery Manager for Active Directory detects only antivirus software specified in the "Antiviruses" section of the configuration file, using Prechecks. Make sure that all the PrecheckTarget parameter values are correct. If you have more than one antivirus software supported by RMAD in your environment, the autodetect feature will use the first found antivirus software for backup scans.

IMPORTANT

If you upgrade or reinstall Recovery Manager for Active Directory, the settings from AntivirusConfiguration.json will be reset to the default settings.

To enable scan for viruses

In Forest Recovery Console, select the Advanced Actions tab and then check the Scan the selected backup with Microsoft Defender Antivirus during the project verification option.

Resources/Images/virus_scan.png

The backup scan status is shown next to the backup in Recovery Manager for Active Directory Console and Forest Recovery Console. Also, Recovery Manager for Active Directory Console gives a better representation of scan results. Anti-virus check statuses:

  • Resources/Images/MalwareGreen.png Passed - All antimalware checks have passed successfully.

  • Resources/Images/MalwareYellow.png Passed with warnings - This status appears if antimalware checks have passed successfully but with minor issues.

  • Resources/Images/MalwareRed.png Infected - The backup is infected.

  • Resources/Images/MalwareRedShield.png Corrupted - This status appears when malware checks are not performed because the selected backup cannot be mounted or unpacked by RMAD.

  • Resources/Images/MalwareRedShield.png Check failed - This status is returned by the antimalware script and appears when malware checks cannot be performed, for example, if antimalware software is not installed, etc.

  • Resources/Images/MalwareGray.png Unknown - The backup has not been checked yet but the check operation is enabled on the General tab for this DC.

Note

You can get the Passed with warnings status if your antivirus database is older than the specified time limit. According to security best practices, this limit is set to 3 days by default. Depending on the policies of your organization, you can configure this parameter in the AntivirusConfiguration.json file that is mentioned above. Change the AntivirusSignatureAgeThresholdInDays property to the desired value. In case of any security incident or data breach, it is recommended that you run an antivirus scan using the latest database for your antivirus software.

Resources/Images/virus_check_status.png

If you use the backup criteria to automatically select a backup

If you set the project to automatically select backups using the backup selection criteria, the following logic is applied:

Backups, #3 is
the latest backup
Backup selected
and scanned for Verify
Backup selected
for Recovery
Comments
#3 Not scanned X X The latest backup will be used for the settings verification or recovery. You will get a warning before the recovery process.
#2 Not scanned    
#1 Not scanned    
 
#3 Passed X X The latest backup with the "Passed" status will be rescanned and will be used for the settings verification or recovery if there are no newer backups.
#2 Not scanned    
#3 Not scanned    
 
#3 Infected     If only the latest backup is scanned and has the "Infected" status, the latest not scanned backup will be selected for settings verification or recovery.
#2 Not scanned X X
#1 Not scanned    
 
#3 Infected     If the latest backup is scanned and is infected, and there are several scanned backups that have passed the virus checks - the latest backup with the "Passed" status will be selected for settings verification or recovery.
#2 Passed X X
#1 Not scanned    
 
#3 Not scanned X X If there are a scanned backup with the "Passed" status and the newer non-scanned backup, the latest not scanned backup is selected for settings verification or recovery. You will get a warning before the recovery process. To avoid this scenario, configure the regular anti-virus scan in accordance with the BMR backup schedule.
#2 Passed    
#1 Not scanned    
 
#3 Infected   X If all the existing backups are infected, an anti-virus scan can be skipped, and the latest backup is selected for recovery. You will get a warning before the recovery process.
#2 Infected    
#1 Infected    
 
#3 Not scanned X X The latest backup will be used for the settings verification or recovery. You will get a warning before the recovery process.
#2 Infected    
#1 Not scanned    

 

関連ドキュメント

The document was helpful.

評価を選択

I easily found the information I needed.

評価を選択