You can use the Recovery Manager Console to uninstall Backup Agent preinstalled on a computer added to a Computer Collection. You can only perform this operation on discovered instances of the Backup Agent. For more information, see Discovering preinstalled Backup Agent.
In the Recovery Manager Console tree, select the Backup Agent Management node.
In the right pane, right-click the computer from which you want to uninstall Backup Agent.
From the shortcut menu, select Uninstall Backup Agent and wait for the uninstall operation to complete.
After the uninstallation operation completes, Recovery Manager for Active Directory removes the uninstalled Backup Agent entry from the list in the Backup Agent Management node.
You can selectively remove Backup Agent entries from the list provided in the Backup Agent Management node. Removing a Backup Agent entry from that list does not affect the corresponding preinstalled agent instance in any way. Rather, it removes the agent’s registration information from the Recovery Manager Console.
You may want remove a Backup Agent entry from the list when, for example, you have uninstalled the corresponding Backup Agent instance from the computer without using the Recovery Manager Console, and the agent entry remained in the Backup Agent Management node.
In the Recovery Manager Console tree, select the Backup Agent Management node.
In the right pane, right-click the Backup Agent entry you want to remove from the list.
From the shortcut menu, select Remove from List.
You can configure Recovery Manager for Active Directory to back up data in an Active Directory domain under a least-privileged user account. A least-privileged user account is an account that has no other permissions except for those required to back up data with Recovery Manager for Active Directory.
Using a least-privileged account to back up Active Directory offers greater protection from unwanted changes to your Active Directory environment, security attacks, or unsolicited access to sensitive documents or settings.
To run backup operations under a least-privileged user account, in the domain you want to back up, create an Active Directory group named RMAD Backup Operators. Add the least-privileged user account you want to that group, and then preinstall the Backup Agent in the domain. As a result, members of the RMAD Backup Operators group are automatically granted the necessary permissions to back up data in the domain with Recovery Manager for Active Directory.
In the Active Directory domain you want to back up, create a new Active Directory group with the following name: RMAD Backup Operators
To the RMAD Backup Operators group, add the least-privileged user account under which you want to back up the domain.
On the domain controllers you want to back up, preinstall the Backup Agent version supplied with this release of Recovery Manager for Active Directory.
Make sure you first create the RMAD Backup Operators group, and then install the Backup Agent in the domain. During its installation, the agent locates that group and saves the group SID in the registry. Then the Backup Agent uses this group SID to check that the user account is a member of the RMAD Backup Operators group.
If the Backup Agent supplied with this release is already preinstalled, you can repair the agent’s installation so that the agent could locate the RMAD Backup Operators group.
Add the domain controllers on which you preinstalled the Backup Agent to a new Computer Collection.
In the Computer Collection properties, on the Agent Settings tab, do the following:
Specify to access the Backup Agent with the least-privileged account you have added to the RMAD Backup Operators group.
Select the check box to use preinstalled Backup Agent. For more information, see Agent Settings tab subsection in Properties for an existing Computer Collection.
Back up the Computer Collection.
Recovery Manager for Active Directory supports MSA/gMSA accounts for:
Scheduled backups - the account can be specified for scheduled tasks in the Computer Collection properties on the Schedule tab or in Task Scheduler.
Scheduled replication tasks (Fault Tolerance)
Scheduled verification of a Forest Recovery project
The Recovery Manager Portal can be run under the MSA/gMSA account. During the Recovery Manager Portal installation, specify the MSA/gMSA on the Specify Web Site Settings step of the wizard.
MSA/gMSA account requirements:
You can use Managed Service Account (in Windows Server 2008 or higher) or Group Managed Service Account (in Windows Server 2012 or higher).
Add the $
character at the end of the account name (e.g. domain\computername$) and leave the Password field blank.
The MSA/gMSA account must be a member of the local Administrator group on the Recovery Manager for Active Directory machine.
For more details about account requirements and limitations related to Recovery Manager Portal, see the Install or uninstall Recovery Manager Portal section in Permissions required to use Recovery Manager for Active Directory.
How to create a Group Managed Service Accounts (gMSA)
Create a gMSA account in Active Directory using the following command: New-ADServiceAccount -name @<gMSA account name> -DNSHostName @<DNS host name>
Run Install-AdServiceAccount @<gMSA account name>
on each host where you are going to use this gMSA account.
What are the steps to configure a gMSA account for use as the backup agent account using the minimum permissions model?
Create а gMSA and associate its principal with the computer accounts of the member hosts. If you want to manage the service host permission to use a gMSA account by a security group, you can associate the account principal with a security group. And then assign the Recovery Manager for Active Directory server(s) machine accounts as members of the linked security group.
Create the Active Directory group RMAD Backup Operators and add the gMSA account to this group directly.
If using pre-installed agents, uninstall and reinstall the agents. This is required to populate the RMAD Backup Operators group SID locally on the DCs.
Configure the collection properties to set the backup agent access account. When entering the gMSA credentials, input the username as "domain\gMSA$", where gMSA is the service account login name followed by the $ sign, and leave the password fields blank.
Take consideration that some items are not possible to configure when using the minimum permissions group, such as "Ensure Forest Recovery Agent is deployed".
This setting requires that you have DC Administrator access, and access to the admin$ share.
If you want to have this set up, the gMSA will need to be a member of Domain Admins, instead of RMAD Backup Operators.
For more details, see https://docs.microsoft.com/en-us/windows-server/security/group-managed-service-accounts/getting-started-with-group-managed-service-accounts.
© ALL RIGHTS RESERVED. 使用条款 隐私 Cookie Preference Center