立即与支持人员聊天
与支持团队交流

Recovery Manager for AD Forest Edition 10.2 - User Guide

Overview Getting started
Permissions required to use Recovery Manager for Active Directory Recovery Manager Console Getting and using help Configuring Windows Firewall Using Computer Collections Managing Recovery Manager for Active Directory configuration Licensing
Backing up data
Permissions required for the Backup operation Managing Backup Agent Using a least-privileged user account to back up data Using Managed Service Accounts Active Directory backups vs Windows System State backups Creating BMR and Active Directory backups Using the Backup Wizard Retrying backup creation Enabling backup encryption Backing up AD LDS (ADAM) Backing up cross-domain group membership Backing up distributed file system (DFS) data Backup scheduling Setting performance options Setting advanced backup options Using Forest Recovery Agent Unpacking backups Using e-mail notification Viewing backup creation results
Restoring data
Getting started with Active Directory recovery Managing deleted or recycled objects Restoring backed up Active Directory components Integration with Change Auditor for Active Directory Using granular online restore Restoring AD LDS (ADAM) Selectively restoring Active Directory object attributes Restoring objects in an application directory partition Restoring object quotas Restoring cross-domain group membership Performing a restore without having administrator privileges Reports about objects and operations Using complete offline restore Offline restore implications Restoring SYSVOL authoritatively Performing a granular restore of SYSVOL Recovering Group Policy Restoring data from third-party backups Using the Extract Wizard Restoring passwords and SID history
Full Replication Consolidating backup registration data Monitoring Recovery Manager for Active Directory Recovering an Active Directory forest
Forest recovery overview Deploying Recovery Manager for Active Directory Forest Edition (Disaster Recovery Edition) Permissions required to use Forest Recovery Console Forest Recovery Console Managing a recovery project Recovery methods Phased recovery Managing Forest Recovery Agent Rebooting domain controllers manually Resetting DSRM Administrator Password Purging Kerberos Tickets Managing the Global Catalog servers Managing FSMO roles Manage DNS Client Settings Configuring Windows Firewall Developing a custom forest recovery plan Backing up domain controllers Assigning a preferred DNS server during recovery Handling DNS servers during recovery Forest recovery approaches Deciding which backups to use Running custom scripts while recovering a forest Overview of steps to recover a forest Viewing forest recovery progress Viewing recovery plan Viewing a report about forest recovery or verify settings operation Handling failed domain controllers Adding a domain controller to a running recovery operation Selectively recovering domains in a forest Recovering SYSVOL Deleting domains during recovery Resuming an interrupted forest recovery Recovering read-only domain controllers (RODCs) Checking forest health Collecting diagnostic data for technical support
Using Management Shell Creating virtual test environments Using Recovery Manager for Active Directory web portal Appendices
Frequently asked questions Best practices for using Computer Collections Technical characteristics Best practices for creating backups Best practices for creating backups for forest recovery Best practices for recovering a forest Descriptions of recovery or verification steps Ports Used by Recovery Manager for Active Directory Forest Edition (Disaster Recovery Edition) Backup Wizard Online Restore Wizard Online Restore Wizard for AD LDS (ADAM) Group Policy Restore Wizard Repair Wizard Extract Wizard Events generated by Recovery Manager for Active Directory Descriptions of PowerShell commands
Add-RMADBackup Add-RMADCollectionItem Add-RMADReplicationConsole Add-RMADStorageServer Backup-RMADCollection Close-RMADFEProject Compare-RMADObject Convert-RMADBackup ConvertTo-RMADRecycledObject Copy-RMADFEBackup Create-RMADStorageAgentSetup Expand-RMADBackup Export-RMADBackup Export-RMADFERecoveryCertificate Export-RMADFEResult Export-RMADSecureStorageBackup Get-RMADBackup Get-RMADBackupAgent Get-RMADBackupInfo Get-RMADBackupObject Get-RMADBackupSecurityStatus Get-RMADCollection Get-RMADCollectionItem Get-RMADDeletedObject Get-RMADFEAvailableSubnet Get-RMADFEComputer Get-RMADFEConsole Get-RMADFEDnsCache Get-RMADFEDomain Get-RMADFEEvent Get-RMADFEGlobalOptions Get-RMADFEOperation Get-RMADFEPersistenceConnection Get-RMADFEProject Get-RMADFERecoveryAgent Get-RMADFESchedule Get-RMADGlobalOptions Get-RMADLicenseInfo Get-RMADObject Get-RMADReplicationConsole Get-RMADReplicationSchedule Get-RMADReplicationSession Get-RMADReplicationSessionItem Get-RMADReportObject Get-RMADReportObjectAttributes Get-RMADReportObjectChildren Get-RMADReportSession Get-RMADSession Get-RMADSessionItem Get-RMADSessionItemEvent Get-RMADStorageServer Get-RMADStorageServerHardeningStatus Get-RMADStorageServerRetentionPolicy Import-RMADBackup Import-RMADFERecoveryCertificate Install-RMADBackupAgent Install-RMADFERecoveryAgent New-RMADCollection New-RMADFEProject New-RMADFERecoveryMedia New-RMADSchedule Open-RMADFEProject Protect-RMADSecureStorageServer Publish-RMADBackupSecurityStatus Refresh-RMADStorageServer Register-RMADSecureStorageBackups Remove-RMADBackup Remove-RMADBackupAgent Remove-RMADCollection Remove-RMADCollectionItem Remove-RMADFERecoveryAgent Remove-RMADFESchedule Remove-RMADReplicationConsole Remove-RMADReplicationSchedule Remove-RMADReplicationSession Remove-RMADStorageServer Remove-RMADUnpackedComponent Rename-RMADCollection Restore-RMADDeletedObject Restore-RMADDomainController Restore-RMADObject Resume-RMADFERecovery Save-RMADFEProject Set-RMADCollection Set-RMADFEComputer Set-RMADFEDnsCache Set-RMADFEDomain Set-RMADFEGlobalOptions Set-RMADFEPersistenceConnection Set-RMADFERecoveryMode Set-RMADFESchedule Set-RMADGlobalOptions Set-RMADReplicationConsole Set-RMADReplicationSchedule Set-RMADStorageServerRetentionPolicy Start-RMADFERecovery Start-RMADFERecoveryAgentOperation Start-RMADFEVerification Start-RMADReplication Start-RMADReportViewer Stop-RMADFEWorkflow Test-RMADSecureStorageBackup Unprotect-RMADStorageServer Update-RMADBackupAgent Update-RMADFEProject Update-RMADLicense

Restoring object quotas

Object quotas are used to determine the number of objects that can be created in a given directory partition by a given administrator. Object quotas help prevent the denial of service situations that can occur if an administrator accidentally or intentionally creates so many objects that the domain controller runs out of storage space.

Object quotas are specified and administered separately for each directory partition. On a directory partition, object quotas can be assigned to any user or group.

Object quotas for a directory partition are stored as objects in the partition's child container called NTDS Quotas. With Recovery Manager for Active Directory, you can use the Online Restore Wizard to restore selected objects in the container NTDS Quotas, or restore the entire container NTDS Quotas.

To restore an object in the container NTDS Quotas
  1. Start the Online Restore Wizard.

  2. Follow the instructions in the wizard. On the Objects to Be Processed page, click Add, and then click Browse.

  3. In the Browse and Select Object in Backup dialog box, expand the directory partition that contains the object quotas you want to restore, expand NTDS Quotas, and select the object to restore.

    Resources/Images/BrowseAndSelect_1.png

  4. Ensure that the Show advanced objects check box is selected. Otherwise, the NTDS Quotas container will not be displayed.

  5. Click OK, and follow the instructions in the wizard to complete the operation.

 

Restoring cross-domain group membership

When restoring an object, such as a user or computer, the Online Restore Wizard allows the restore of the object’s membership in all groups, including those groups that reside in domains outside the object’s home domain. This requires a backup that meets the following requirements:

  • The backup must be taken from a domain controller that holds the Global Catalog role.

  • The backup must have been created with the following option: When backing up Global Catalog servers, collect group membership information from all domains within the Active Directory forest.

It is recommended that you restore objects from Global Catalog backups that were created with this option. Otherwise, restored objects may not retrieve their membership in some local groups. For example, suppose a user belongs to a local group defined in a resource domain other than the user’s home domain. If the restored user object were to lose its membership of that group, the user would no longer have the corresponding group permissions, and would therefore be unable to access some resources. This option is designed to overcome such issues.

To restore cross-domain group membership information
  1. Start the Online Restore Wizard.

  2. Follow the instructions in the wizard.

  3. On the Backup Selection page, select a backup of a Global Catalog server. The backup must be created with the option When backing up Global Catalog servers, collect group membership information from all domains within the Active Directory forest.

  4. Follow the instructions in the wizard to complete the operation.

 

Performing a restore without having administrator privileges

With the Online Restore Wizard, you can perform a restore without having administrative access to the target domain controller. To restore object attributes, you must only have write access to the attributes being restored.

Restoration of deleted objects requires a target domain controller running Windows Server 2008 or later. To restore a deleted object, the user account under which Recovery Manager for Active Directory runs must have sufficient permissions to selectively recover Active Directory objects. For more information about these permissions, see Permissions required to use Recovery Manager for Active Directory.

To perform a restore without having administrator privileges
  1. Start the Online Restore Wizard.

  2. Follow the instructions in the wizard.

  3. If you are going to restore deleted objects, on the Domain Access Options page ensure that the target domain controller is running Windows Server 2008 or later.

  4. Follow the instructions in the wizard to complete the operation.

By default, the “Reanimate Tombstone” control access right is granted only to domain administrators. Domain administrators can grant the permission necessary to restore deleted objects to other users and groups by granting the user or group the “Reanimate Tombstone” control access right.

A security risk can be introduced by granting this permission, because it allows a user to restore an account that may have a level of access greater than that of the user. By restoring such an account, the user in effect gains control of that account. This is because the LDAP API does not restore the backed up account password, and so the user can set the initial password on the account.

 

Reports about objects and operations

Recovery Manager for Active Directory provides a number of reports that allow you to track changes made to Active Directory, AD LDS (ADAM), and Group Policy objects and view summary information about the compare and restore operations performed on Active Directory and AD LDS (ADAM) objects with Recovery Manager for Active Directory.

To generate and view these reports, you can use the Online Restore Wizard, the Online Restore Wizard for AD LDS (ADAM), and the Group Policy Restore Wizard.

In this section:

 

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级