Chat now with support
Chat with Support

Recovery Manager for AD Disaster Recovery Edition 10.0.1 - User Guide

Overview Backing up data
Permissions required for the Backup operation Managing Backup Agent Using a least-privileged user account to back up data Creating backups Retrying backup creation Enabling backup encryption Backing up AD LDS (ADAM) Backing up cross-domain group membership Backing up distributed file system (DFS) data Backup scheduling Setting performance options Setting advanced backup options Using Forest Recovery Agent Unpacking backups Using e-mail notification Viewing backup creation results Getting started
Permissions required to use Recovery Manager for Active Directory Recovery Manager Console Icons in the user interface Getting and using help Configuring Windows Firewall Using Computer Collections Managing Recovery Manager for Active Directory configuration Licensing
Restoring data
Getting started with Active Directory recovery Managing deleted or recycled objects Restoring backed up System State components Using granular online restore Restoring AD LDS (ADAM) Selectively restoring Active Directory object attributes Restoring objects in an application directory partition Restoring object quotas Restoring cross-domain group membership Performing a restore without having administrator privileges Reports about objects and operations Using complete offline restore Offline restore implications Restoring SYSVOL authoritatively Performing a granular restore of SYSVOL Recovering Group Policy Restoring data from third-party backups Using the Extract Wizard Restoring passwords and SID history
Fault tolerance Consolidating backup registration data Monitoring Recovery Manager for Active Directory Recovering an Active Directory forest
Permissions required to use Forest Recovery Console Forest Recovery Console Managing a recovery project Install Active Directory from Media recovery method Install Active Directory recovery method Managing Forest Recovery Agent Rebooting domain controllers manually Specifying fallback IP addresses to access a domain controller Resetting DSRM Administrator Password Purging Kerberos Tickets Managing the Global Catalog servers Managing FSMO roles Manage DNS Client Settings Configuring Windows Firewall Forest recovery overview Selectively recovering domains in a forest Recovering SYSVOL Deleting domains during recovery Resuming an interrupted forest recovery Recovering read-only domain controllers (RODCs) Checking forest health Collecting diagnostic data for technical support
Bare metal forest recovery Using Management Shell Creating virtual test environments Using Recovery Manager for Active Directory web interface Appendices
Frequently asked questions Best practices for creating backups for forest recovery Best practices for recovering a forest Descriptions of recovery or verification steps Backup Wizard Online Restore Wizard Online Restore Wizard for AD LDS (ADAM) Group Policy Restore Wizard Repair Wizard Extract Wizard Events generated by Recovery Manager for Active Directory

When an object is undeleted, what is restored from the tombstone and what is restored from the backup?

When Microsoft’s Active Directory Recycle Bin feature is enabled in the Active Directory forest, Recovery Manager for Active Directory can use the functionality provided by Microsoft’s Active Directory Recycle Bin feature to undelete the object with all its attributes and links to the state the object was in immediately before deletion. No backups required in this recovery scenario.

In other recovery scenarios, when Microsoft’s Active Directory Recycle Bin feature is disabled or not supported, Recovery Manager for Active Directory first restores all the attributes preserved in the object’s tombstone. The remaining attributes are then restored from backup. If the backed-up value of an attribute differs from the value restored from the tombstone, then the backed-up value is restored. As a result, after the recovery operation completes, the restored object has the same attribute values, group memberships, and security descriptor as it had when the backup was created.

It is possible to determine which attributes are preserved in object tombstones by analyzing the AD schema. In such attributes, the third bit in the searchFlags property is set to 1. You can therefore enumerate these attributes using a filter that contains a matching rule such as the following:


What's the difference between an online restore and an authoritative restore?

What’s the difference between an online restore and an authoritative restore?

An online restore is authoritative meaning that Active Directory replication updates all domain controllers with the restored data. However, online restore includes some additional functions. This method is designed to overcome the limitations inherent in a normal authoritative restore performed using native Windows tools. These limitations are as follows:

  • Domain controllers must be restarted in Directory Services Restore mode, and the entire Active Directory database must be restored.
  • When restoring an object, you must restore all attributes, which may overwrite valuable data stored in the object.
  • When restoring a container, you must restore the entire sub-tree rooted in that container. There is no ability to restore only child objects of certain types.
  • To restore an object’s linked attributes, you need to restore both the object, and all objects to which the linked attributes refer; for example, if you only restore a deleted user, the user’s group memberships are not restored.
  • It is not possible to select individual objects for restore based on changes that occurred in Active Directory since backup creation.

To overcome these limitations, the online restore method includes the following capabilities:

  • Selective restoration of objects without putting Active Directory offline, and without restoring the entire Active Directory database.
  • Selective restoration of attribute values in directory objects; this allows you to specify exactly what object data should be restored.
  • Selective restoration of child objects by object type. This allows you, for example, to restore only those users in a certain container and leave other child objects intact.
  • Unattended restoration of linked attributes, such as the Member Of attribute. For example, when you undelete a user with online restore, the user’s group memberships are also restored.
  • Comparison of a backup with Active Directory, or with another backup, to facilitate Active Directory change tracking and troubleshooting: this allows you to select precisely the objects that should be restored.

What's the difference between the agentless restore method and the agent-based restore method?

What’s the difference between the agentless restore method and the agent-based restore method?

Recovery Manager for Active Directory provides two different methods of restoring objects online. A check box in the Online Restore Wizard allows you to specify which method to use. The agentless method uses Microsoft Tombstone Reanimation interface to undelete the object and then re-applies all attributes that are not stored in the object's tombstone from the backup using ADSI calls. This method requires that the target domain controller be running Windows Server 2008 or later.

Aside from operating system support, there are some additional differences between the two methods. The agentless and agent-based methods require different permissions to run. For example, the agentless method supports delegated permissions as outlined in the User Guide. The agentless method may not restore some attributes, depending on the operating system and service pack level, namely user passwords and SIDHistory, as these attributes cannot be set using ADSI. In order to restore these attributes using the agentless method, you can configure the Active Directory schema to store these attributes in the object tombstone as described in the User Guide.

Can I undelete a mailbox-enabled user?

Yes, you can undelete mailbox-enabled users with the online restore function of Recovery Manager for Active Directory. When you undelete a mailbox-enabled user within the mailbox retention period, the user’s access to the mailbox is also restored.

After a user is deleted, the Exchange Server retains the user’s mailbox for a specified period, before permanently deleting the mailbox. If the mailbox retention period has expired, the mailbox access associated with the undeleted user is not recovered. Recovery Manager for Active Directory cannot restore mailboxes that have been permanently deleted.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating