Chat now with support
Chat with Support

Quest has tools and processes in place to identify, protect, detect, and remediate vulnerabilities and incidents when they occur, including external security partners. As part of our standard security operations, Quest does not use CrowdStrike in any of our operations. We are reviewing our third parties, and so far, there is minimal affect. It is Quest's policy not to provide further technical details unless they directly impact customer data.

Recovery Manager for AD Disaster Recovery Edition 10.2.2 - User Guide

Overview Getting started
Permissions required to use Recovery Manager for Active Directory Recovery Manager Console Getting and using help Configuring Windows Firewall Using Computer Collections Cloud Storage Secure Storage Server Hybrid Recovery with On Demand Recovery Managing Recovery Manager for Active Directory configuration Licensing
Backing up data
Permissions required for the Backup operation Managing Backup Agent Using a least-privileged user account to back up data Using Managed Service Accounts Active Directory backups vs Windows System State backups Creating BMR and Active Directory backups Using the Backup Wizard Retrying backup creation Enabling backup encryption Backing up AD LDS (ADAM) Backing up cross-domain group membership Backing up distributed file system (DFS) data Backup scheduling Setting performance options Setting advanced backup options Using Forest Recovery Agent Unpacking backups Using e-mail notification Viewing backup creation results
Restoring data
Getting started with Active Directory recovery Managing deleted or recycled objects Restoring backed up Active Directory components Integration with Change Auditor for Active Directory Using granular online restore Restoring AD LDS (ADAM) Selectively restoring Active Directory object attributes Restoring objects in an application directory partition Restoring object quotas Restoring cross-domain group membership Performing a restore without having administrator privileges Reports about objects and operations Using complete offline restore Offline restore implications Restoring SYSVOL authoritatively Performing a granular restore of SYSVOL Recovering Group Policy Restoring data from third-party backups Using the Extract Wizard Restoring passwords and SID history
Full Replication Consolidating backup registration data Monitoring Recovery Manager for Active Directory Recovering an Active Directory forest
Forest recovery overview Deploying Recovery Manager for Active Directory Forest Edition (Disaster Recovery Edition) Permissions required to use Forest Recovery Console Forest Recovery Console Managing a recovery project Recovery methods Phased recovery Managing Forest Recovery Agent Rebooting domain controllers manually Resetting DSRM Administrator Password Purging Kerberos Tickets Managing the Global Catalog servers Managing FSMO roles Manage DNS Client Settings Configuring Windows Firewall Developing a custom forest recovery plan Backing up domain controllers Assigning a preferred DNS server during recovery Handling DNS servers during recovery Forest recovery approaches Deciding which backups to use Running custom scripts while recovering a forest Overview of steps to recover a forest Viewing forest recovery progress Viewing recovery plan Viewing a report about forest recovery or verify settings operation Handling failed domain controllers Adding a domain controller to a running recovery operation Selectively recovering domains in a forest Recovering SYSVOL Deleting domains during recovery Resuming an interrupted forest recovery Recovering read-only domain controllers (RODCs) Checking forest health Collecting diagnostic data for technical support
Restore Active Directory on Clean OS method Bare metal forest recovery Using Management Shell Creating virtual test environments Appendices
Frequently asked questions Best practices for using Computer Collections Technical characteristics Best practices for creating backups Best practices for creating backups for forest recovery Best practices for recovering a forest Descriptions of recovery or verification steps Ports Used by Recovery Manager for Active Directory Forest Edition (Disaster Recovery Edition) Backup Wizard Online Restore Wizard Online Restore Wizard for AD LDS (ADAM) Group Policy Restore Wizard Repair Wizard Extract Wizard Events generated by Recovery Manager for Active Directory

AD LDS (ADAM) recovery

Recovery Manager for Active Directory provides easy-to-use, wizard-based procedures for recovering AD LDS (ADAM). Individual AD LDS (ADAM) objects or a single subtree can be restored remotely, without the need for an administrator to be physically present at the computers hosting AD LDS (ADAM) instances involved in the restoration.

 

Granular selective restore

To achieve near-zero downtime when restoring Active Directory® or AD LDS (ADAM) data, Recovery Manager for Active Directory offers selective, online restore. Individual objects or object attributes can be selected in a backup and then restored to Active Directory® or AD LDS (ADAM) without affecting other objects or attributes. Using the granular restore feature, objects that were inadvertently deleted or modified can be recovered in a few minutes. Unlike conventional alternatives, it is not necessary to restore the entire Active Directory® or AD LDS (ADAM) database, nor is it necessary to restart domain controllers or AD LDS (ADAM) service.

As granular restore can be done online, the domain controller is never unavailable to users. Online restore function greatly reduces the restore time, thus eliminating the costs associated with downtime.

One more valuable characteristic of granular online restore is the unattended restoration of linked attributes, such as the Member Of attribute. When recovering a user object with granular online restore, you do not need to worry about group memberships: Recovery Manager for Active Directory ensures that the restored object is a member of the proper groups.

Recovery Manager for Active Directory supports granular online restore from Bare Metal Recovery (BMR) backups.

 

Group Policy recovery

One of the key features of Recovery Manager for Active Directory (RMAD) is the ability to quickly recover individual Group Policy objects using a backup of domain controller AD components, eliminating the need for special, Group Policy-related backups. By providing straightforward, wizard-driven procedures for Group Policy restoration, RMAD makes it easy to recover Group Policy information and recoup the time spent configuring Group Policy. Individual Group Policy objects, along with Group Policy links and permission settings can be restored remotely, without the need for an administrator to be present at the domain controllers on which the restore is being performed, and without the need to restart domain controllers.

 

Restore on Clean OS

The Restore Active Directory on Clean OS method allows you to restore the entire forest or any of its parts on the freshly installed Windows® machines. For example, when existing BMR backups contain the infected OS image, clean Active Directory® backups can be used for the restore process.

 

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating