지금 지원 담당자와 채팅
지원 담당자와 채팅

Recovery Manager for AD Disaster Recovery Edition 10.3 - User Guide

Overview Getting started
Permissions required to use Recovery Manager for Active Directory Recovery Manager Console Getting and using help Configuring Windows Firewall Using Computer Collections Cloud Storage Secure Storage Server Hybrid Recovery with On Demand Recovery Managing Recovery Manager for Active Directory configuration Licensing
Backing up data
Permissions required for the Backup operation Managing Backup Agent Using a least-privileged user account to back up data Using Managed Service Accounts Active Directory backups vs Windows System State backups Creating BMR and Active Directory backups Using the Backup Wizard Retrying backup creation Enabling backup encryption Backing up AD LDS (ADAM) Backing up cross-domain group membership Backing up distributed file system (DFS) data Backup scheduling Setting performance options Setting advanced backup options Using Forest Recovery Agent Unpacking backups Using e-mail notification Viewing backup creation results
Restoring data
Getting started with Active Directory recovery Managing deleted or recycled objects Restoring backed up Active Directory components Integration with Change Auditor for Active Directory Using granular online restore Restoring AD LDS (ADAM) Selectively restoring Active Directory object attributes Restoring objects in an application directory partition Restoring object quotas Restoring cross-domain group membership Performing a restore without having administrator privileges Reports about objects and operations Using complete offline restore Offline restore implications Restoring SYSVOL authoritatively Performing a granular restore of SYSVOL Recovering Group Policy Restoring data from third-party backups Using the Extract Wizard Restoring passwords and SID history
Full Replication Consolidating backup registration data Monitoring Recovery Manager for Active Directory Recovering an Active Directory forest
Forest recovery overview Deploying Recovery Manager for Active Directory Forest Edition (Disaster Recovery Edition) Permissions required to use Forest Recovery Console Forest Recovery Console Managing a recovery project Recovery methods Phased recovery Managing Forest Recovery Agent Rebooting domain controllers manually Resetting DSRM Administrator Password Purging Kerberos Tickets Managing the Global Catalog servers Managing FSMO roles Manage DNS Client Settings Configuring Windows Firewall Developing a custom forest recovery plan Backing up domain controllers Assigning a preferred DNS server during recovery Handling DNS servers during recovery Forest recovery approaches Deciding which backups to use Running custom scripts while recovering a forest Overview of steps to recover a forest Viewing forest recovery progress Viewing recovery plan Viewing a report about forest recovery or verify settings operation Handling failed domain controllers Adding a domain controller to a running recovery operation Selectively recovering domains in a forest Recovering SYSVOL Deleting domains during recovery Resuming an interrupted forest recovery Recovering read-only domain controllers (RODCs) Checking forest health Collecting diagnostic data for technical support
Restore Active Directory on Clean OS method Bare metal forest recovery Using Management Shell Creating virtual test environments Appendices
Frequently asked questions Best practices for using Computer Collections Technical characteristics Best practices for creating backups Best practices for creating backups for forest recovery Best practices for recovering a forest Descriptions of recovery or verification steps Ports Used by Recovery Manager for Active Directory Forest Edition (Disaster Recovery Edition) Backup Wizard Online Restore Wizard Online Restore Wizard for AD LDS (ADAM) Group Policy Restore Wizard Repair Wizard Extract Wizard Events generated by Recovery Manager for Active Directory

Managing Recovery Manager for Active Directory configuration

In this section:

 

Preparing for working with Active Directory or AD LDS (ADAM) backups

To restore data from Active Directory® or AD LDS (ADAM) backups, Recovery Manager for Active Directory (RMAD) requires specific dynamic link libraries (DLLs) supplied with the Windows operating system. In case RMAD cannot find these DLLs, the backup restore operation may fail with an error message similar to the following:

“The Active Directory® database (ntds.dit) file in the backup is incompatible with the esent.dll file version found on this computer.”

Before you start using RMAD to extract and restore data from Active Directory® or AD LDS (ADAM) backups, it is recommended to ensure the required DLLs are available on the RMAD computer.

Requirements

Operating system on the Recovery Manager for Active Directory computer

NOTE

The OS version on the domain controller cannot be higher than the OS version on the Recovery Manager Console machine. For the list of supported OS, see Release Notes.

 

Settings

To configure the various settings of Recovery Manager for Active Directory, you can use the Settings dialog box. In the Settings dialog box, you can define a TCP port for communications with the Backup Agent, Online Restore Agent, Offline Restore Agent and Management Agent, specify the default location for storing Active Directory® backups, select a default method for compare and restore operations, configure settings for creating unpacked backups, or set up e-mail notifications or diagnostic logging.

To open the Settings dialog box
  • In the Recovery Manager Console, select the Recovery Manager for Active Directory console tree root.

  • On the Action menu, click Settings.

The Settings dialog box has the following tabs:

 

General tab

On this tab, you can specify the default location for storing Active Directory backups or select a default method for compare and restore operations.

This tab provides the following options:

  • Default backup location. Allows you to specify the path to the folder where to store backups. You can either type the path or click Browse to locate and select the folder.

  • Maximum number of items displayed per folder under the Active Directory node. Use this box to type the maximum number of objects (default 2000) that you want to be displayed for any single folder in the console tree under the Active Directory® node.

  • Default method for compare and restore operations. Allows you to select the default method to perform compare and restore operations in the Online Restore Wizard. For more information about the methods that you can select, see Using the agentless or agent-based method.

  • Change Auditor (CA)

    • Include Change Auditor "Who" data in reports. Includes information on users who modified certain Active Directory objects into the reports you can generate in the Online Restore Wizard. To use this option, you must have Change Auditor for Active Directory installed in the home Active Directory forest of RMAD.

    • Include subsequent changes from CA on deleted objects. When this option is selected, Recovery Manager for Active Directory restores the deleted object(s) and continuously restores the last change (if any) that was made to the object attributes after creating the backup, using data from the Change Auditor database.

    • Database. Allows you to specify the name of Change Auditor database.

      To specify the CA database server, instance, port, and name, use the following format: <Server Name>\<Instance Name>,<Port>\<Database Name>. Example: testserver.domain.com\testinstance,1432\ChangeAuditorDB

      For details about the Change Auditor-related options, see Integration with Change Auditor for Active Directory.

  • Default Active Directory connection

    • Use Secure Sockets Layer (SSL) to encrypt the connection. Allows you to use LDAP over SSL when accessing the AD forests. This selection affects all the LDAP connections in RMAD and sets the default value for this check box in the other dialogs where it is displayed.
Note

You must reopen the Forest Recovery console after updating the Use Secure Socket Layer (SSL) to encrypt the connection setting for the changes to take effect.

 

관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택