Converse agora com nosso suporte
Chat com o suporte

Recovery Manager for AD Disaster Recovery Edition 10.3 - User Guide

Overview Getting started
Permissions required to use Recovery Manager for Active Directory Recovery Manager Console Getting and using help Configuring Windows Firewall Using Computer Collections Cloud Storage Secure Storage Server Hybrid Recovery with On Demand Recovery Managing Recovery Manager for Active Directory configuration Licensing
Backing up data
Permissions required for the Backup operation Managing Backup Agent Using a least-privileged user account to back up data Using Managed Service Accounts Active Directory backups vs Windows System State backups Creating BMR and Active Directory backups Using the Backup Wizard Retrying backup creation Enabling backup encryption Backing up AD LDS (ADAM) Backing up cross-domain group membership Backing up distributed file system (DFS) data Backup scheduling Setting performance options Setting advanced backup options Using Forest Recovery Agent Unpacking backups Using e-mail notification Viewing backup creation results
Restoring data
Getting started with Active Directory recovery Managing deleted or recycled objects Restoring backed up Active Directory components Integration with Change Auditor for Active Directory Using granular online restore Restoring AD LDS (ADAM) Selectively restoring Active Directory object attributes Restoring objects in an application directory partition Restoring object quotas Restoring cross-domain group membership Performing a restore without having administrator privileges Reports about objects and operations Using complete offline restore Offline restore implications Restoring SYSVOL authoritatively Performing a granular restore of SYSVOL Recovering Group Policy Restoring data from third-party backups Using the Extract Wizard Restoring passwords and SID history
Full Replication Consolidating backup registration data Monitoring Recovery Manager for Active Directory Recovering an Active Directory forest
Forest recovery overview Deploying Recovery Manager for Active Directory Forest Edition (Disaster Recovery Edition) Permissions required to use Forest Recovery Console Forest Recovery Console Managing a recovery project Recovery methods Phased recovery Managing Forest Recovery Agent Rebooting domain controllers manually Resetting DSRM Administrator Password Purging Kerberos Tickets Managing the Global Catalog servers Managing FSMO roles Manage DNS Client Settings Configuring Windows Firewall Developing a custom forest recovery plan Backing up domain controllers Assigning a preferred DNS server during recovery Handling DNS servers during recovery Forest recovery approaches Deciding which backups to use Running custom scripts while recovering a forest Overview of steps to recover a forest Viewing forest recovery progress Viewing recovery plan Viewing a report about forest recovery or verify settings operation Handling failed domain controllers Adding a domain controller to a running recovery operation Selectively recovering domains in a forest Recovering SYSVOL Deleting domains during recovery Resuming an interrupted forest recovery Recovering read-only domain controllers (RODCs) Checking forest health Collecting diagnostic data for technical support
Restore Active Directory on Clean OS method Bare metal forest recovery Using Management Shell Creating virtual test environments Appendices
Frequently asked questions Best practices for using Computer Collections Technical characteristics Best practices for creating backups Best practices for creating backups for forest recovery Best practices for recovering a forest Descriptions of recovery or verification steps Ports Used by Recovery Manager for Active Directory Forest Edition (Disaster Recovery Edition) Backup Wizard Online Restore Wizard Online Restore Wizard for AD LDS (ADAM) Group Policy Restore Wizard Repair Wizard Extract Wizard Events generated by Recovery Manager for Active Directory

Resetting DSRM Administrator Password

You can use the Forest Recovery Console to selectively reset the Directory Services Restore Mode (DSRM) administrator password on domain controllers in the current recovery project. You can reset the DSRM administrator password to the value specified in the domain controllers’ recovery settings or specify a new DSRM administrator password.

To reset DSRM administrator password
  1. Use the List of Domain Controllers area to select the domain controllers on which you want to reset the DSRM administrator password.

    To select multiple domain controllers, hold down CTRL, and click the domain controllers you want to select.

  2. On the menu bar, select Tools | Manage | Forest Recovery Agent or DCs.

  3. In the dialog box that opens, click More, and then click Reset DSRM Password.

  4. Use one of the following options:

    • Reset password to the value in recovery settings. Allows you to reset the DSRM administrator password to the value specified in the recovery settings for each domain controller. For more information about recovery settings, see Domain controller recovery settings and progress.

    • Reset password to this value. Allows you to reset the DSRM administrator password to the value you type in this option.

  5. When you are finished, click Apply.

 

Purging Kerberos Tickets

During the forest recovery process, the Key Distribution Center Service Account (KRBTGT) password is automatically reset to different values on all domain controllers. As a result, after the restore, incorrect Kerberos tickets may be cached on domain controllers and other servers in the domain. This can lead to authentication errors for various services after the forest recovery operation within renew ticket lifetime (10 hours by default).

In order to avoid authentication errors, make sure that the KRBTGT account has been successfully replicated and then reset Kerberos tickets.

NOTE

Recovery Manager for Active Directory uses the domain controller access credentials to purge Kerberos tickets. For more details see the General tab section.

To purge Kerberos tickets
  1. After the restore process is completed, in Forest Recovery Console, click the Purge Kerberos Tickets option in the Post-Recovery Actions window or select Tools | Manage | Purge Kerberos Tickets.

  2. In the Purge Kerberos Tickets window, click Apply to start replicating the KRBTGT account in the domains and then purge the tickets on the domain controllers.

  3. Click OK to close the window.

    • For read-only domain controllers, the option purges Kerberos tickets and does not perform the replication of KRBTGT account.

    • The purge Kerberos tickets operation does not affect domain controllers that were excluded from the forest.

  4. Then, all users have to re-logon to get a new Ticket Granting Ticket (TGT).

 

Managing the Global Catalog servers

You can use Recovery Manager for Active Directory (RMAD) to manage the global catalog servers in your Active Directory® forest before or after the recovery. For example, you can view which domain controllers currently hold the global catalog server role and manually remove or assign the global catalog server role to the domain controllers you want.

NOTE

RMAD uses the domain controller access credentials to manage the Global Catalog servers. For more details see the General tab section.

To manage the global catalog servers
  1. In the Forest Recovery Console, open the recovery project in which you want to manage the global catalog servers.

  2. On the menu bar, select Tools | Manage | Global Catalog Servers.

  3. Do one of the following:

    • To assign the global catalog server role to a domain controller, select the check box in the Global Catalog Server column next to that domain controller.

    • To remove the global catalog server role from a domain controller, clear the check box in the Global Catalog Server column next to that domain controller.

    • To sort or group the domain controllers in the list by the criteria you want, right-click anywhere in the list, and then select an appropriate command from the shortcut menu.

  4. When you are finished, click the Apply button for your changes to take effect.

TIP

To avoid excessive replication traffic, it is recommended to assign one global catalog server role at a time.

 

Managing FSMO roles

You can use the Forest Recovery Console to view the current Flexible Single Master Operations (FSMO) role owners in your recovered Active Directory forest and manually change the FSMO role owners if necessary.

During the recovery, Recovery Manager for Active Directory uses an internal algorithm to automatically assign FSMO roles to the recovered domain controllers. After the recovery completes, you can view the current FSMO role owners and selectively reassign the FSMO roles if necessary.

NOTE

Recovery Manager for Active Directory uses the domain controller access credentials to manage FSMO roles. For more details see the General tab section.

To view and assign FSMO role owners
  1. In the Forest Recovery Console, open the recovery project in which you want to view the current FSMO roles.

  2. On the menu bar, select Tools | Manage | FSMO Roles.

  3. Use the dialog box that opens to view the current FSMO role owners and reassign FSMO roles as necessary.

    You can use the following elements:

    Elements you can use

    Element Description
    Suggest Previous Owners Allows you to automatically distribute FSMO roles to the domain controllers (owners) that held these roles before the recovery (that is, the owners stored in the recovery project). After you click this button, use the Assign Role To column to view or specify new role owners. If a FSMO role owner no longer exists, the most optimal existing owner will be selected for that role.
    Suggest Optimal Owners Click this button to automatically distribute FSMO roles to the most optimal existing owners in the recovered Active Directory forest.
    Clear Click this button to undo the changes you have made in the Assign Role To column. You can only use this button before you apply the changes you have made.
    FSMO Roles Lists all FSMO roles in the recovered Active Directory forest.
    Current Owners Lists the current owner of each FSMO role in the recovered Active Directory forest.
    Assign Role To Use this column to manually select a new owner for the corresponding FSMO role. You can also use this column to view the automatically selected new owners after you click the Suggest Prerecovery Owners or Suggest Optimal Owners button.
  4. When you are finished, click Apply.

 

Documentos relacionados

The document was helpful.

Selecione a classificação

I easily found the information I needed.

Selecione a classificação