지금 지원 담당자와 채팅
지원 담당자와 채팅

Recovery Manager for AD Forest Edition 10.2.2 - User Guide

Overview Getting started
Permissions required to use Recovery Manager for Active Directory Recovery Manager Console Getting and using help Configuring Windows Firewall Using Computer Collections Hybrid Recovery with On Demand Recovery Managing Recovery Manager for Active Directory configuration Licensing
Backing up data
Permissions required for the Backup operation Managing Backup Agent Using a least-privileged user account to back up data Using Managed Service Accounts Active Directory backups vs Windows System State backups Creating BMR and Active Directory backups Using the Backup Wizard Retrying backup creation Enabling backup encryption Backing up AD LDS (ADAM) Backing up cross-domain group membership Backing up distributed file system (DFS) data Backup scheduling Setting performance options Setting advanced backup options Using Forest Recovery Agent Unpacking backups Using e-mail notification Viewing backup creation results
Restoring data
Getting started with Active Directory recovery Managing deleted or recycled objects Restoring backed up Active Directory components Integration with Change Auditor for Active Directory Using granular online restore Restoring AD LDS (ADAM) Selectively restoring Active Directory object attributes Restoring objects in an application directory partition Restoring object quotas Restoring cross-domain group membership Performing a restore without having administrator privileges Reports about objects and operations Using complete offline restore Offline restore implications Restoring SYSVOL authoritatively Performing a granular restore of SYSVOL Recovering Group Policy Restoring data from third-party backups Using the Extract Wizard Restoring passwords and SID history
Full Replication Consolidating backup registration data Monitoring Recovery Manager for Active Directory Recovering an Active Directory forest
Forest recovery overview Deploying Recovery Manager for Active Directory Forest Edition (Disaster Recovery Edition) Permissions required to use Forest Recovery Console Forest Recovery Console Managing a recovery project Recovery methods Phased recovery Managing Forest Recovery Agent Rebooting domain controllers manually Resetting DSRM Administrator Password Purging Kerberos Tickets Managing the Global Catalog servers Managing FSMO roles Manage DNS Client Settings Configuring Windows Firewall Developing a custom forest recovery plan Backing up domain controllers Assigning a preferred DNS server during recovery Handling DNS servers during recovery Forest recovery approaches Deciding which backups to use Running custom scripts while recovering a forest Overview of steps to recover a forest Viewing forest recovery progress Viewing recovery plan Viewing a report about forest recovery or verify settings operation Handling failed domain controllers Adding a domain controller to a running recovery operation Selectively recovering domains in a forest Recovering SYSVOL Deleting domains during recovery Resuming an interrupted forest recovery Recovering read-only domain controllers (RODCs) Checking forest health Collecting diagnostic data for technical support
Using Management Shell Creating virtual test environments Appendices
Frequently asked questions Best practices for using Computer Collections Technical characteristics Best practices for creating backups Best practices for creating backups for forest recovery Best practices for recovering a forest Descriptions of recovery or verification steps Ports Used by Recovery Manager for Active Directory Forest Edition (Disaster Recovery Edition) Backup Wizard Online Restore Wizard Online Restore Wizard for AD LDS (ADAM) Group Policy Restore Wizard Repair Wizard Extract Wizard Events generated by Recovery Manager for Active Directory

Secondary Storage tab

NOTE

All Secondary Storage functionality require a Recovery Manager for Active Directory Disaster Recovery Edition license. The tab will be disabled if license is not available.

This tab includes the following elements:

  • Enable a Secure Storage server. Select this check box to enable a Secure Storage server for a backup. After creation and saving of backup to primary storage locations, a copy of the backup will be saved to the Secure Storage server.

  • Select the radio button below Enable a Secure Storage server to choose the primary storage location for the backup file to be copied from. Select Copy backup from remote storage location to the selected Secure Storage server to pull the backup file from the remote storage location. Select Copy backup from local storage location to the selected Secure Storage server to pull backup file from the local storage location. If using both local and remote storage options for primary storage, the recommendation is to configure your Secure Storage server to communicate with the primary storage location closest for optimal network performance.

  • Copy backup from remote storage location to the selected Secure Storage server. Select the DNS name or IP address of a Secure Storage host.

  • Copy backup from local storage location to the selected Secure Storage server. Select the DNS name or IP address of a Secure Storage host.

  • Enable Cloud Storage and select Cloud Storage locations. Select this checkbox to enable Cloud Storage. After creation and saving of backup to primary storage locations, a copy of the backup will be made to the configured Cloud storage locations.

  • Select the checkbox for each registered Cloud Storage location to be used for this backup.

NOTE

Computer collections can also be selected on the Cloud Storage node.

Access Credentials For Reading Data

IMPORTANT

Access credentials are required for reading backups on primary storage to copy to Secure Storage and Cloud Storage. There may be some cases where credentials have to be specified for both remote and local storage based on the types of primary and secondary storage configured for the computer collection.

  • An account to read data from remote storage location. Select an account that has read permission to the remote storage location. This account will be used to read the backup from the remote storage location and copy to all secondary storage locations. The Secure Storage agent on the Secure Storage server and the Recovery Manager Cloud Upload service on the Recovery Manager console, use this account. If an account is incorrect and does not have the proper permissions, the copy of the backup to secondary storage will fail.

  • An account to read data from local storage location. Select an account that has read permission to the local storage location. This account will be used to read the backup from the local storage location and copy to all secondary storage locations. The Secure Storage agent on the Secure Storage server and the Recovery Manager Cloud Upload service on the Recovery Manager console, use this account. If an account is incorrect and does not have the proper permissions, the copy of the backup to secondary storage will fail.

 

Schedule tab

The Schedule tab is used to specify the backup creation scheduling.

On this tab, you can use the following elements:

  • Backup creation schedule. Displays a list of backup creation schedules for the currently selected Computer Collection.

  • Schedule enabled. Enables the backup creation schedules listed in the Backup creation schedule box. To disable the schedules, clear this check box. All the task schedules are retained, and you can enable them when needed by selecting this check box.

  • Modify. Modifies the Backup creation schedule list. In the dialog box that appears on the screen, specify new triggers or delete existing triggers.

  • User account the product will run under when creating backups. Identifies the user account under which Task Scheduler performs the backup creation task for the currently selected Computer Collection. To change the user account, click Select Account.

  • Select Account. Click this button to change the user account under which Task Scheduler performs the backup creation task for the currently selected Computer Collection.

 

Alerts tab

The Alerts tab is used to specify the alert settings for the given Computer Collection.

NOTE

SSL data encryption is not supported for email notifications.

On this tab, you can use the following elements:

  • E-mail notification. Specifies whether to send information about backup creation sessions by e-mail.

  • To. Provides a space for you to type a recipient's e-mail address

  • What to record. Use this list to select what sort of information you want to be included in the notification e-mail message or written to the text file.

  • Send notification upon errors or warnings only. Select this check box to not receive notification unless an error and/or warning is written to the log.

  • Text file. Specifies whether to log information about backup creation sessions to an additional text file.

  • File name. Provides a space for you to enter the path and name of a text file to be used as an additional log file.

  • View. Click this button to view the additional log (text file) using Notepad.

  • Browse. Click this button to locate a text file to be used as the additional log file.

  • Append to file if it already exists. Select this check box if you never want to overwrite the log records, and always want to append entries.

  • What to record. Use this list to select what sort of information you want to be included in the notification e-mail message or written to the text file.

  • Write to file upon errors or warnings only. Select this check box if you want a record to be added to the text file upon errors and/or warnings only.

 

Performance tab

The Performance tab is used to configure the throttling and performance tuning settings to be applied when creating backups for the given Computer Collection.

On this tab, you can use the following elements:

  • Enable bandwidth throttling. Limits the total bandwidth used by Backup Agent when transferring data over network links. Use bandwidth throttling to prevent excessive network traffic Backup Agent may cause.

  • Maximum network use. Provides a space for you to specify the maximum total bandwidth Backup Agent can use when transferring data over network links.

  • Enable backup agent CPU throttling. Limits the percentage of CPU processing time Backup Agent can use on each computer.

  • Maximum CPU use. Provides a space for you to specify the maximum percentage of CPU processing time Backup Agent can use on each computer.

  • Create backups on at most <Number> computers in parallel. Specifies the maximum number of computers serviced in parallel when creating backups. Increasing this number can speed backup creation. However, network saturation problems may occur. Symptoms of network saturation include slow network response when transferring data by Backup Agent, and possibly “RPC server unavailable” error messages when connecting to Backup Agent.

  • Data compression. Specifies the compression method Backup Agent uses when processing the data before sending it over network links. Using higher compression reduces network traffic, but increases CPU load on the computers being backed up. If you are planning that backups created with Recovery Manager for Active Directory be used by other MTF-compliant backup tools, set data compression to None.

 

관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택