Protecting Active Directory

Size: px
Start display at page:

Download "Protecting Active Directory"

Transcription

1 Network Frontiers..... Protecting Active Directory..... Whitepaper Active Directory has become a very critical piece of every Windows organization. So critical in fact, that tolerance to downtime for an Active Directory server is almost nil. And yet, most tape-based backup and restoration systems can take from half a day to over a day for restoration of an Active Directory server. By understanding your Active Directory environment, and employing the Symantec Recovery Environment, you can easily set up recovery point objectives of less than an hour or so.

2 Contents CONTENTS... 2 THE CRUCIAL ROLE OF ACTIVE DIRECTORY... 3 UNDERSTANDING THE LAYERS WITHIN AN AD SYSTEM... 4 BACKING UP YOUR DOMAIN CONTROLLER... 9 RESTORING A DOMAIN CONTROLLER RESTORING THE DATA OF A DOMAIN CONTROLLER RESTORING THE DATABASE OF A DOMAIN CONTROLLER Brought to you by Copyright 2004 Network Frontiers, LLC. All rights reserved. Portions derived from 1994, 1996, 2003 The Backup Book ISBN No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the copyright holder. Contact information is copyright@netfrontiers.com. Limit of Liability/Disclaimer of Warranty: While the copyright holder, publisher, and author have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be useable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. All trademarks are the property of their respective owners. 2 of 34 Pages

3 The crucial role of Active Directory Regulatory requirements whether Sarbanes-Oxley, California SB1386 or the Health Insurance Portability and Accountability Act (HIPAA) require that your organization protect sensitive information at all times, regardless of where it is stored. The key to compliance is the ability to monitor and enforce security policies at all times a task which poses challenges for many organizations. As a critical component of most network infrastructures, Active Directory is positioned to help meet many of these requirements with greater ease and fewer headaches. Active Directory provides a central service for administrators to organize network resources, manage users, computers, and applications. Many different objects can be stored in the Active Directory, including: Users Groups Security credentials such as certificates System resources such as computers (or servers) and printers Replication components, settings are themselves objects in the Active Directory COM component configuration, which was stored in the registry in Windows NT, is now stored in the class store in the Active Directory Rules and policies to control the working environment You can think about AD in one of two ways as a key part of your network wherein you spend a lot of time designing and tweaking it s architecture, or simply as another database that exists on a server in your organization (in larger organizations AD would be a distributed database system). As a database that exists on a server in your network, you should be following your best practices guidelines for backing it up and protecting it. As a key component of your network s infrastructure, you should be planning on where it fits in the restoration chain in case you lose your network or building. 3 of 34 Pages

4 Understanding the layers within an AD system Each AD server, called a Domain Controller (DC) uses a three-layer model when creating and accessing Active Directory databases and records. Directory System Agent Database layer Extensible Storage Engine Active Directory model Directory Systems Agent (DSA) Let s say that you want to access a server s directory over your network. When you double-click one of the server s within your Network Neighborhood, Active Directory is being accessed for verification of privileges, and therefore, the DSA is the first step in the access process. The DSA sits at the top of the three-layer AD model and creates an instance of the directory service, making it available for use. DSA also has the job of then communicating with the underlying layers as well as facilitating AD replication between servers. The Database layer The database layer of AD manages and interprets the database tables, and all of the parent-child relationships within the AD database structure. We ll discuss the actual files that the database maintains below. For now, know that there are really only two tables within the database the object table holds the database and the link table holds the relationship information. The Extensible Storage Engine (ESE) The ESE is the underlying engine that stores and reads AD data tables. Active Directory is a transacted database system that uses log files to support rollback semantics to ensure that transactions are committed to the database. Even though this is not a high change rate database, it is a database nonetheless. The files associated with Active Directory are: Ntds.dit, which is the actual AD database (DIT stands for Directory Information Table), grows as the database fills up. It contains both the object tables and the 4 of 34 Pages

5 link tables. Any change made to the database is also appended to the current log file, and its disk image is always kept up to date. Edbxxxxx.log is the current log file. When a change is made to the database, it is written to the Edb.log file first. When the Edb.log file is full of transactions (10 MB), it is renamed to Edbxxxxx.log (it starts at and continues to increment using hexadecimal notation). Since Active Directory uses circular logging, old log files are constantly deleted, once their transactions have been written to the database. At any point in time, you will find the edb.log file, and maybe one or more Edbxxxxx.log files. Res1.log & Res2.log are placeholders designed to reserve (in this case) the last 20 MB of disk space on this drive. This is designed to give the log files sufficient room for a graceful shutdown if all other disk space is consumed. Edb.chk stores the database checkpoint, which identifies the point where the database engine needs to replay the logs, generally at the time of recovery or initialization. By examining this checkpoint file, AD can write any uncommitted transactions to the database during system startup after a crash. Tertiary files and components The Domain Controller is just that, a controller of many network objects within your Windows environment. Therefore, any discussion about the layers and structures of your DC will also have to include some of the key tertiary files and services that also have to be taken into account. System State data on your computer holds vital information for the launching and operation of the computer. You have to plan for the protection, and restoration, of the system state data if you are to be able to restore an Active Directory server. The system Registry is also vital to the restoration of a Domain Controller. A corrupt or missing Registry is fatal to a Windows system. The other components and services that interact with the Active Directory are DNS, Certificate Server, and all File Replication Service settings. How data is written to the database When data is being changed (added, deleted, modified) on a domain controller, there is a very definite process that takes place. 1 DSA 2 Edbxxx.log Ntds.dit AD transaction process 3 5 of 34 Pages

6 1. Once the DSA knows that is going to happen (let s say a new record is going to be added) a transaction is created by the DSA. 2. The transaction is then written to the transaction log (Edbxxx.log) before being committed to the AD database. 3. Once the transaction has been written to the transaction log, it is then written to page memory within the DC s RAM and then onto disk in the form of a table entry in the Ntds.dit database. This process isn t as immediate as it might have seemed when reading it above. The changes aren t committed to disk until the DC has a period of idle time. Therefore, if the computer crashes after a transaction has been process and written to the log file, but before the changes have been committed to disk, the DC will use the log file to update the AD database. If the DC crashes after a transaction has taken place, but before the transaction can be fully written to the log file, the DC will then roll back the transaction as if it never occurred. Setting up the AD server For performance reasons, the log files and checkpoint file should be located on a different disk than the database to reduce disk contention. For disaster recovery reasons, having the log and checkpoint files on a different disk ensures that if the primary disk fails, the data can be rebuilt from the logs and checkpoint files. If these log files aren t reconfigured for a different storage location during setup, they will reside in the Ntds directory within C:\WINNT. During the setup of your system, the AD wizard will default install all of the above listed files within the NTDS directory within the WINNT directory. If you have a single hard drive with a single volume, then so be it. Default setup for a single volume AD server (left) and better setup for an AD server (right) However, if you do have multiple hard drives within the AD server, then the better setup is shown below. By separating your drives into three distinct volumes and having your operating system and the AD database log files on one drive with the actual AD Ntds directory information tables on a second drive and it s own volume. 6 of 34 Pages

7 Understanding your AD server s role In order to backup and restore your Domain Controllers properly, you must understand their role as a service provider in your organization, and in relation to each other. Your DC is a server that hosts a domain database and performs authentication services. In Windows 2000/2003 Server, the domain database is a part of the Active Directory database. In Windows 2000/2003, object changes can be made on any DC within the environment instead of just a primary domain controller (PDC), as in Windows NT Server 4.0. DCs must initiate and perform replication operations to ensure that all DCs in the environment host a current and accurate version of the directory. In case of failure, it is important to know if the particular DC was a GC or operations master role holder so that appropriate action can be taken. The global catalog The global catalog's primary function is to provide fast and efficient searches that extend across the entire Active Directory forest. A GC holds a read/write full replica of all objects within the domain for which it is a member and a read-only partial replica (all objects but only a partial attribute set) of every other domain within the forest. The global catalog, therefore, makes directory structures within a forest transparent to end users, creating a search mechanism that makes finding objects in the directory uncomplicated and efficient. In addition, the global catalog is also required for the enumeration of universal group memberships and user principal names (UPNs) in a native Windows 2000/2003 domain. As a result, if a DC cannot contact a GC at the point of client logon, cached local logon credentials are all the client will receive, and access to remote resources will be denied. If you don t know, and want to find out if the server is the global catalog, launch the Active Directory Sites and Services application within your Administrative Tools directory, navigate to your Domain Controller and right-click on it to bring up it s properties. The check mark will either be on (meaning that it is), or off (meaning that it isn t). Hint here, if you are a small organization with only one DC, then it is the global catalog. 7 of 34 Pages

8 Global Catalog setting As Windows 2000/2003 DCs hold a replica of all objects belonging to their domain and have full read/write access to these objects, administration (and recovery of the data) of the domain can be done via any DC participating within that domain. These operations affect the state of an object and must therefore be replicated to the other DCs. However, the replication of changed objects does not occur immediately. Replication is triggered after a period of time, gathering all changes and providing them to other DCs in collections. As a result, in normal operation the Active Directory on any DC can be regarded as always being in a state of loose consistency. That is, the information on all DCs within a Windows 2000/2003 environment is likely to be different as replication changes may be on the way from other DCs or waiting to be triggered. Let s say that you have to DCs in your organization one for production and one for sales. An administrator adds a new server (keyserve1) to the production domain and a different administrator adds a new ordering server (orders) to the sales domain. keyserve1.production.yourco.com Global prod.yourco.com orders.sales.yourco.com Loose consistency sales.yourco.com Eventually the changes arrive at each other and the DCs then synchronize with each other. Replication and loose consistency are important concepts when considering the recovery techniques of Active Directory. 8 of 34 Pages

9 Backing up your Domain Controller There are three things you need to understand in order to back up your domain controller; what you are going to back up, how often you need to perform your backups, and the access rights you ll need. Backing up the System State Active Directory must be backed up as a part of the computer's System State. Depending upon how you set up your files and where you chose to store files, this collection might either be in the WINNT directory of the boot drive, or some of the files might be on other volumes and drives. System Start-up Files (boot files) are the files required for Windows 2000/2003 to boot. They are automatically backed up as part of the System State. System registry contents are automatically backed up when you back up System State data. In addition, a copy of your registry files are saved in the folder %SystemRoot%\Repair\Regback allowing you to restore the registry without doing a complete restore of the System State. Class registration database of COM+, the Component Object Model (COM), is a binary standard for writing component software in a distributed systems environment. The Component Services Class Registration Database is backed up and restored with the System State data. SYSVOL, or the system volume, provides a default Active Directory location for files that must be shared for common access throughout a domain. Active Directory, including the Ntds.dit, Edb.chk, Edbxxx.log, Res1.log and Res2.log files. Before you get started, there are a few things you should know: The procedure adds a command line instruction to a scheduled LiveState Recovery backup job. This procedure is to be executed when creating a LiveState Recovery backup job for a domain controller. When restoring a system state, the DC will be down. If it is the only DC in your network, end users will not be able to access domain resources until the procedure is completed. You do not want to find that your system state backup is older than the Active Directory tombstone age (by default, 60 days). Successful execution is indicated by the proper operation of the restored Active Directory. To create the system state backup, use the Live State Recovery Server Edition custom command feature. Commands must be in the form of.exe,.cmd, or.bat files placed in the Live State Recovery CommandFiles folder. This example shows creating a.bat file to run the Windows native ntbackup program. 9 of 34 Pages

10 On the server, run Notepad (Start > Programs > Accessories > Notepad) and type this line in: ntbackup backup systemstate /f C:\systemstate.bkf The ntbackup command line From the File menu, select Save as, and browse to the CommandFiles folder. On the example server, it is in the default location of C:\Program Files\Symantec\Live State Recovery\Advanced Server 3.0\Agent\CommandFiles. Make sure the filename has a.bat suffix and that the Save as type field is set to All Files. Click Save. Save the command file Start LiveState Recovery (Start > Programs > Symantec >Live State Recovery) and click the Tools menu. Choose Create Backup Job. The LiveState Recovery Tools menu The Backup Job Wizard starts. Click Next. 10 of 34 Pages

11 The LiveState Recovery Backup Job Wizard Select the type of backup job you want to create. The example shows weekly Full Backups. You may also want to schedule daily incrementals if your backup policy calls for it. Click Next. Backup type selection Select the drive or drives necessary for the backup. The example server needs only its C:\ drive. Click Next. Backup Job Wizard drive selection 11 of 34 Pages

12 Specify the location you want to write the backup image to. Enter a filename for the image. The example writes the image to a network share, \\backupserver\livestaterecovery_images. Backup location selection Next, schedule the job. The server s performance will be impacted for a short time while the backup job runs, so schedule it at an appropriate time when usage is low. Backup Job Wizard Schedule screen Choose the compression level. The default is a good compromise between file size and backup speed. If you have limited backup storage space you can also specify Medium or High compression. Limiting the number of backups saved will also help manage storage space. 12 of 34 Pages

13 Backup job options The Advanced button on the Options screen allows you to set password security on the image file itself. Click OK. Advanced Options dialogue In the Command Files screen, select the system_state.bat command file under Before data capture. The Command Files configuration screen The Backup Job Wizard displays a summary of the job. Confirm that all parameters are correct, and click Finish. The job will run as scheduled. 13 of 34 Pages

14 Backup job settings summary You will now have a system state backup file included in the server s regular backup image. Ensuring that your backup isn t on a tombstone If the backup is older than the tombstone age set in Active Directory, then it is not considered to be a good backup. When an object is deleted in Windows 2000/2003, the DC from which the object was deleted informs the other DCs in the environment about the deletion by replicating what is known as a tombstone. A tombstone is a representation of an object that has been deleted but not fully removed from the directory. The tombstone will eventually be removed based on the tombstone lifetime setting, which by default is set to 60 days. If a DC is restored to a state prior to the deletion of an object, and the tombstone for that object is not replicated to the restored DC before the tombstone expires, the object remains present only on the restored DC, resulting in an inconsistency. Thus it is important that the DC be restored prior to expiration of the tombstone, and that inbound replication from a DC containing the tombstone to the restored DC is completed prior to expiration of the tombstone. Active Directory protects itself from restoring data older than the tombstone lifetime by disallowing the restore. As a result, the useful life of a backup is equivalent to the "tombstone lifetime" setting for the enterprise. Required rights for backup purposes To back up Active Directory, you must be a member of either the Backup Operators Group or the Administrators Group. 14 of 34 Pages

15 Restoring a domain controller Restoring a Domain Controller (DC) isn t as straightforward as restoring a normal computer or even a standard database server. Because of it s role as a centralized security clearing house, and its replicated peer-to-peer relationship with other Domain Controllers in your organization, you have to take a few more steps to restore a Domain Controller than other devices. For this reason, we will split the restoration procedure directions into two sets restoring the data of a Domain Controller and restoring the entire database of a Domain Controller. There are several items to note when thinking about the restoration of a Domain Controller: To restore the System State data, the person performing the procedure must be a Local Administrator. You will also need to ensure that the backup you are restoring was taken within the tombstone lifecycle, by default this is set to 60 days. If you are going to restore the Domain Controller to a completely different computer, you need to think about these things: By default, the Hal.dll is not backed up as part of System State, however the Kernel32.dll is. Therefore if you are trying to restore a backup onto a machine that requires a different HAL to support a multiprocessor environment, for example you will run into compatibility issues with the new HAL and the original Kernel32.dll. The only workaround for this situation is to explicitly copy the Hal.dll from the original machine and install it on the new machine. The limitation is that the new machine will now be bound to using only a single processor. If you backup and restore the boot.ini file, you may have some incompatibility with your new hardware configuration, resulting in a failure to boot. Before restore, ensure that the boot.ini file is correct for your new hardware environment. If your new hardware has a different video adapter or multiple network adapters, uninstall your video adapters and NICs before you restore data. When you restart the computer; the normal Plug and Play functionality will make the necessary changes. It is direly important that the partitions on the new machine match those on the original machine. Specifically, all the drive mappings must be the same and the partition size must be at least the same as on the original machine. The types of Active Directory restorations If you do have to restore Active Directory from a backup, there are two types of restoration the authoritative and the non-authoritative restore. These two methods allow you to manipulate two important components of the System State during the restore process, the Active Directory and SYSVOL. 15 of 34 Pages

16 Elements of a primary SYSVOL restore for a single Domain Controller If there is no other functioning DC in the domain, a PRIMARY restore of the SYSVOL should be done. A primary restore builds a new ntfrs (Windows NT File Replication Service) database by loading the data present under SYSVOL on the local DC. This method is the same as non-authoritative except that the SYSVOL should be marked PRIMARY. Elements of a non-authoritative restore Using this method, settings and entries that existed in the domain, schema, configuration, and optionally the global catalog naming contexts maintain the version number they had at the time of backup. As such, a non-authoritative restore is the default method for restoring Active Directory. A non-authoritative restore is performed by restoring the SYSVOL of the Domain Controller in a non-authoritative manner. This is the default SYSVOL restoration method, and during this process the local copy that is held on the restored DC will be compared with that of its replication partners (using MD5 Checksums). Once a non-authoritative restore has been completed, the DC will examine the version number of an object s attribute in its tables. If the version in the newly restored tables is older than versions on other DCs within the domain, the object will then be updated on the newly restored DC, ensuring that the database is up-to-date and synchronized with the rest of its peers. Elements of an authoritative restore An authoritative restore should be used when human error is involved such as when an administrator has accidentally deleted a number of objects; that change has replicated to all the DCs, existence of those objects is removed from the domain; and the administrator is unable to easily recreate these objects. An authoritative restore requires all the steps of a non-authoritative restore before it can be initiated. The primary difference between the two is that an authoritative restore has the ability to increment the version number of the attributes of all objects in an entire directory, all objects in a subtree, or an individual object (provided that it is a leaf object) to make it authoritative in the directory. Completely opposite of the non-authoritative restore, because the version number of the object attributes you wish to be authoritative will be higher than the existing instances of the attribute held on replication partners, the objects on the restored DC will appear to be more recent and therefore be replicated out to the rest of the DCs within the environment. Unlike a non-authoritative restore, an authoritative restore requires the use of a separate tool (ntdsutil.exe) to make it work. No backup utilities including the native Windows 2000/2003 utility can perform an authoritative restore. 16 of 34 Pages

17 You should also note that an authoritative restore will not overwrite new objects that have been created after the backup was taken. Similarly to the Active Directory authoritative restore, this method will typically be used when human error is involved and the error has propagated out to other domain controllers. The authoritative restore of SYSVOL does not occur automatically after an authoritative restore of Active Directory, additional steps are required. By restoring the SYSVOL authoritatively, you are specifying that the copy of SYSVOL that was restored from backup is authoritative for the domain. Once the necessary configurations have been made, the local SYSVOL will be marked as authoritative and be replicated out to the other DCs within the domain. Performing a non-authoritative restore of a DC (new OS) To restore that system state, including the Active Directory, proceed as follows. Install Windows 2000/2003 Server on the computer, following the guidelines in our general caveats discussed earlier. The LiveState Recovery Advanced Server Edition must be installed. Don t worry about what you are going to name your machine, or whether or not you are going to join a domain at this point. This will all be replaced later. Do not promote the machine to a Domain Controller. Reboot the system into Directory Services Restore Mode by pressing the F8 key upon system startup and selecting Directory Services Restore Mode. Log in as Administrator (local system account, no domain selection is available). Start the LiveState Recovery Backup Image Browser (Start > Programs > Symantec LiveState Recovery > Backup Image Browser) and select the backup image containing the system state backup. Click Open. Select backup image in Backup Image Browser 17 of 34 Pages

18 Select the system state backup file. From the File menu, select Restore. Select the file to restore The Image Browser FIle menu The Restore Items dialogue appears. Enter a local destination folder, and click Restore. Restore Items dialogue To apply the backed up system state to the server, use the ntbackup graphical user interface (Start > Run > ntbackup). 18 of 34 Pages

19 The ntbackup GUI Start the Restore Wizard and click the Import File button. Restore Wizard file selection Select the system state backup file and click OK. Enter backup file name Select the System State under What to restore, and then click Next. 19 of 34 Pages

20 The system state marked for restore The wizard presents a summary of its restore task. If everything looks correct, click Finish. Summary of restore task When the system state restore is complete, a report is generated with the time elapsed, file sizes and so on. Click Close and reboot the server. Restore task completion Open a command prompt and type ntdsutil, press Enter. At the next prompt, type authoritative restore and press Enter. At the next prompt, type restore database and press Enter. At the Authoritative Restore Confirmation dialog box, click OK. Type Quit, and repeat until you exit out of the application. Reboot and confirm that the Active Directory is operating correctly. 20 of 34 Pages

21 Restoring the data of a Domain Controller Restoring the data of a DC is much easier than restoring the entire computer s Active Directory database structure. Basically, restoration of the DC s data comes down to whether you can manually reconfigure the DC so that the data is correct, or whether the problem is so drastic that the entire directory needs to be restored from a backup. Process steps for restoring the data of a Domain Controller Simply put, if the error can be resolved manually, do so. You ll save yourself a lot of time and trouble. However, if the error can t be resolved manually, then you ll have to ask yourself whether or not the entire directory has to be restored. If you only have a single Domain Controller, then you shouldn t perform a subtree restore. Instead, you ll need to perform a Global Catalog restore. Restoring a subtree of the Active Directory Restoring a subtree is probably the most common restore method as it corrects an error that concerns only a partial data loss, which is the most common one. Before you get started, there s a few things you should understand: The procedure restores the entire Active Directory from backup, and then specifies what part of that restore is to be kept (authoritative) when the DC comes back online and synchronizes with other domain controllers. The procedure is to be executed in situations where correcting an error manually is not possible. For example, if an Organizational Unit (OU) were deleted by mistake, it may not be possible to recreate it from memory. 21 of 34 Pages

22 The procedure requires downtime for the domain controller. If the domain controller is the only one in your network, the entire network will be affected, so the procedure should be carried out after business hours and a warning sent to all users. You must be aware of the Active Directory tombstone lifecycle, by default 60 days. Active Directory will not allow data older than the tombstone lifetime to be restored, and you don t want to discover that the backup data is too old while performing this procedure. Successful execution is indicated by the desired Active Directory data being restored to the DC and replicated out to any other DCs. To perform an authoritative restore of a subtree follow these steps: Reboot the DC into Directory Services Restore Mode by pressing the F8 key upon system startup and selecting Directory Services Restore Mode. Log in as Administrator with the domain Administrator password. Start the LiveState Recovery Backup Image Browser (Start > Programs > Symantec LiveState Recovery > Backup Image Browser) and select the backup image you want to restore from. Click Open. Select backup image in Backup Image Browser Select the folder containing the Active Directory files. The default location is C:\Winnt\Ntds. 22 of 34 Pages

23 Select the Active Directory folder for the restore From the File menu, select Restore. Point the Ntds folder to its original location, C:\Winnt. Click Restore. The Restore Items dialogue When the restore process has finished, close the Backup Image Browser. Open a command prompt and type ntdsutil, press Enter. At the next prompt, type authoritative restore and press Enter. At the next prompt, type restore subtree <path>. Following is an example for a path: OU=Engineering, OU=Cupertino, DC=Whitepaper, DC=com. At the Authoritative Restore Confirmation dialog box, click OK. Type Quit, and repeat until you exit out of the application. Restart the server. Confirm that the restored Active Directory contains the correct backup information. If this DC is the only one in your network, you re done. If it s not the only one, you may have to force replication of the backed up subtree to the other DCs, as outlined in Microsoft Knowledge Base article #316829, Possible Active Directory Inconsistency After You Restore a Domain Controller. Performing a Global Catalog Restore Basically a Global Catalog Restore is a complete restore of the system volume. In order to be able to perform a global catalog restore you need to have a good backup. 23 of 34 Pages

24 A good backup needs to contain at least the system state, the contents of the system disk and the SYSVOL folder. If you have spread out the log and database files on separate disks, those files must be part of the backup. Also, the backup must be newer than the tombstone age set in Active Directory. Here are a few things you should be aware of: The procedure restores the Global Catalog by recovering the entire system volume of an Active Directory server. The procedure is supported by the Symantec Recovery Environment Boot CD. The procedure is to be executed if the Global Catalog server has failed due to a hardware problem or if the Active Directory itself has become corrupted. The procedure entails downtime for the Active Directory service, so end users will be unable to log on to workstations or access network resources for the duration. Due to the importance of the Active Directory service, any trouble with the procedure is potentially serious. Successful execution of the procedure is indicated by the proper operation of the Active Directory services after recovery. To restore an Active Directory server s system volume using the boot CD, put the CD in and restart the computer. If your computer doesn t start from the CD, check that your system is set to boot from CD-ROM. Here s what you ll see at the bottom of the screen as the recovery CD boots: Recovery Environment boot screen When the system starts, the Recovery Environment is automatically launched. The System Restore feature is used to restore partitions or entire drives. The Backup Image Browser is for restoring individual files and directories, and the Utilities offer a collection of network and disk tools. Symantec Recovery Environment console One utility that you might need to use right away is Configure IP Address. This will be necessary to set up networking if you don t have a DHCP server on your network, or if you want to move the computer to another subnet. Click Utilities and then select Configure IP Address. 24 of 34 Pages

25 Recovery Environment Utilities Enter IP address and other information with the Modify button. Network Configuration Once you re done, head back to the Utilities and test connectivity with your backup server with ping.exe. Enter the name of the machine (in our case, backupserver ) and click OK. Ping Address, from Utilities A successful ping will be a series of replies from the backup server. If the ping doesn t work, try pinging the backup server s IP address instead of its hostname. If that works, you might not have connectivity with a DNS server. You can fix that or decide to skip it. All restore operations can be performed by using the IP address directly. 25 of 34 Pages

26 Ping hostname Ping IP address The next step is connecting to the server where you keep your backups. Click on Utilities and select Map Network Drive. Enter the path to the share. Recovery Environment utilities menu Drive map utility 26 of 34 Pages

27 Use an account that is local to the backup server and has read permission on your domain controller s backup folder. The drive map authentication dialogue Next, start the System Restore wizard from the Recovery Environment console. System Restore for recovering an entire drive System Restore presents you with two choices, Restore drives or Restore files and folders. The Restore files and folders option simply starts the Backup Image Browser. So check Restore drives. System Restore Wizard The wizard then asks you to specify the backup image to restore. Click Browse and open the drive mapped to the backup server. 27 of 34 Pages

28 Backup image drive selection From that drive, select the appropriate image to restore to your system and click Open. Restoring C: drive from 10/17/03 Information about the selected image including creation date, image description, and file system size appears in the System Restore Wizard. If all looks correct click Next. Backup image filename and details Now we re at a potentially confusing point in the process, choosing the destination for the backup image. The wizard doesn t muddy the issue with drive letters, instead 28 of 34 Pages

29 showing volume labels, sizes, and file system types. In this example, I am restoring the C: drive, which is unlabeled on the disk. It s not too hard to figure out which volume it occupies as I previously labeled the other partitions. However, if you have more than one unlabeled volumes of the same size, you ll be guessing. If you re that unlucky, you could boot back into Windows and label the drive with the Disk Management utility. Note the volume management options you have at this point. By deleting volumes, you could free up space and restore a larger backup image to the disk. Click Next. Select the correct volume for the restore The System Restore Wizard then prompts for error checking (ensures accuracy but takes longer) and advanced restore options including disk signature and master boot record. If you re recovering the domain controller because of a failed hard drive, then restoring the disk signature is appropriate as it contains information such as drive letter assignments. The master boot record (MBR) can be restored as well. The MBR occupies the first sector of the hard drive and contains information about disk partitions and OS boot location. Click Next. System Restore options The wizard then gives a summary of your restore operation and the chance to go back and fix it if something s not quite right. You can also have the computer reboot after the restore finishes. If all s well, click Next and the job starts. 29 of 34 Pages

30 Last chance to make changes A progress screen gives you the percent completion and elapsed time. Progress of the C: drive restore Once the restore is finished, you can close the System Recovery Wizard and reboot. 30 of 34 Pages

31 Restoring the Database of a Domain Controller In case of a complete failure of a Domain Controller or an Organisations Master it can be unavoidable to restore the whole database of the server. The reason for this is that secure channel issues come into play when a DC remains disconnected from other DCs for a period greater than that specified in the maximumpasswordage registry entry. This issue can be corrected using the following decision tree: Process Steps for restoring the Database of a Domain Controller If the Domain Controller that you have to restore was the only Domain Controller on your network you need to perform a Global Catalog Restore. If the Domain Controller was an operations master you can seize the roles that have disappeared with the server, otherwise perform a Non-Authoritative Restore. Seizing the Schema Master Role Before you seize the schema master make sure that the current operations master has been removed from the network. Also verify that the copy of the schema on the new operations master is up to date with the rest of the domain controllers in the forest. Next perform the following steps to seize the schema master: 1. Click Start, click Run, type cmd and hit the Enter key 2. At the command prompt type ntdsutil and hit the Enter key 3. At the ntdsutil prompt type roles and hit the Enter key 31 of 34 Pages

32 4, At the fsmo maintenance prompt type connections and hit the Enter key 5. At the server connections prompt type connect to server followed by the fully qualified domain name and hit the Enter key 6. At the server connections prompt type quit and hit the Enter key 7. At the fsmo maintenance prompt type seize schema master and hit the Enter key 8. At the fsmo maintenance prompt type quit and hit the Enter key 9. At the ntdsutil prompt type quit and hit the Enter key After you have seized the schema master make sure that the previous schema master never gets connected to your network again. Seizing the Domain Naming Master Role Before you seize the domain naming master make sure that the current operations master has been removed from the network. Also verify that the new operations master is up to date with the rest of the domain controllers in the forest. Next perform the following steps to seize the domain naming master: 1. Click Start, click Run, type cmd and hit the Enter key 2. At the command prompt type ntdsutil and hit the Enter key 3. At the ntdsutil prompt type roles and hit the Enter key 4. At the fsmo maintenance prompt type connections and hit the Enter key 5. At the server connections prompt type connect to server followed by the fully qualified domain name and hit the Enter key 6. At the server connections prompt type quit and hit the Enter key 7. At the fsmo maintenance prompt type seize domain naming master and hit the Enter key 8. At the fsmo maintenance prompt type quit and hit the Enter key 9. At the ntdsutil prompt type quit and hit the Enter key After you have seized the schema master make sure that the previous schema master never gets connected to your network again. Seizing the Relative ID Master Role Before you seize the relative ID master use Repadmin from the Active Directory support tools to verify whether the new operations master has received any updates performed by the previous operations master. Next perform the following steps to seize the relative ID master: 32 of 34 Pages

33 1. Click Start, click Run, type cmd and hit the Enter key 2. At the command prompt type ntdsutil and hit the Enter key 3. At the ntdsutil prompt type roles and hit the Enter key 4. At the fsmo maintenance prompt type connections and hit the Enter key 5. At the server connections prompt type connect to server followed by the fully qualified domain name and hit the Enter key 6. At the server connections prompt type quit and hit the Enter key 7. At the fsmo maintenance prompt type seize RID master and hit the Enter key 8. At the fsmo maintenance prompt type quit and hit the Enter key 9. At the ntdsutil prompt type quit and hit the Enter key Seizing the PDC Emulator Role Before you seize the PDC emulator master make sure the current operation master has been removed from the network and verify that the new operations master is up to date. Next perform the following steps to seize the PDC emulator: 1. Click Start, click Run, type cmd and hit the Enter key 2. At the command prompt type ntdsutil and hit the Enter key 3. At the ntdsutil prompt type roles and hit the Enter key 4. At the fsmo maintenance prompt type connections and hit the Enter key 5. At the server connections prompt type connect to server followed by the fully qualified domain name and hit the Enter key 6. At the server connections prompt type quit and hit the Enter key 7. At the fsmo maintenance prompt type seize PDC and hit the Enter key 8. At the fsmo maintenance prompt type quit and hit the Enter key 9. At the ntdsutil prompt type quit and hit the Enter key You can return the original PDC emulator to service later and return the role to it. Seizing the Infrastructure Master Role Before you seize the infrastructure master make sure that the current operations master has been removed from the network and verify that the new operations master is up to date. Next perform the following steps to seize the infrastructure master: 33 of 34 Pages

34 1. Click Start, click Run, type cmd and hit the Enter key 2. At the command prompt type ntdsutil and hit the Enter key 4. At the ntdsutil prompt type roles and hit the Enter key 5. At the fsmo maintenance prompt type connections and hit the Enter key 5. At the server connections prompt type connect to server followed by the fully qualified domain name and hit the Enter key 6. At the server connections prompt type quit and hit the Enter key 7. At the fsmo maintenance prompt type seize infrastructure master and hit the Enter key 8. At the fsmo maintenance prompt type quit and hit the Enter key 9. At the ntdsutil prompt type quit and hit the Enter key You can return the original infrastructure master to service later and return the role to it. 34 of 34 Pages

Directory Backup and Restore

Directory Backup and Restore Directory Backup and Restore Overview Active Directory is backed up as part of system state, a collection of system components that depend on each other. You must backup and restore system state components

More information

Active Directory backup and restore with Acronis Backup & Recovery 11. Technical white paper. o o. Applies to the following editions: Advanced Server

Active Directory backup and restore with Acronis Backup & Recovery 11. Technical white paper. o o. Applies to the following editions: Advanced Server Active Directory backup and restore with Acronis Backup & Recovery 11 Technical white paper Applies to the following editions: Advanced Server Virtual Edition o o o Advanced Server SBS Edition Advanced

More information

Module 10: Maintaining Active Directory

Module 10: Maintaining Active Directory Module 10: Maintaining Active Directory Contents Overview 1 Lesson: Introduction to Maintaining Active Directory 2 Lesson: Moving and Defragmenting the Active Directory Database 6 Lesson: Backing Up Active

More information

SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR DOCUMENTUM @ EROOM

SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR DOCUMENTUM @ EROOM SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR DOCUMENTUM @ EROOM Abstract This paper explains how to setup Active directory service on windows server 2008.This guide also explains about how to install

More information

Active Directory 2008 Operations

Active Directory 2008 Operations The Essentials Series Active Directory 2008 Operations sponsored by by Greg Shields Understanding Active Directory Recovery in Windows Server 2008...1 Backing Up AD...1 Full Server Recovery of a Domain

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Windows Domain Network Configuration Guide

Windows Domain Network Configuration Guide Windows Domain Network Configuration Guide Windows Domain Network Configuration Guide for CCC Pathways Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of this publication may

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Active Directory backup and restore with Acronis Backup & Recovery 10

Active Directory backup and restore with Acronis Backup & Recovery 10 Active Directory backup and restore with Acronis Backup & Recovery 10 Table of Contents 1. Introduction... 3 2. Backup and Recovery overview... 3 3. Active Directory backup... 3 4. Active Directory recovery...

More information

Active Directory Disaster Recovery Workshop. Lab Manual Revision 1.7

Active Directory Disaster Recovery Workshop. Lab Manual Revision 1.7 Active Directory Disaster Recovery Workshop Lab Manual Revision 1.7 Table of Contents LAB 1: Introduction to the Lab Environment... 1 Goals... 1 Introduction... 1 Exercise 1: Inspect the Lab Environment...

More information

SAM Backup and Restore Guide. SafeNet Integration Guide

SAM Backup and Restore Guide. SafeNet Integration Guide SAM Backup and Restore Guide SafeNet Integration Guide April 2011 Introduction Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

9. Which is the command used to remove active directory from a domain controller? Answer: Dcpromo /forceremoval

9. Which is the command used to remove active directory from a domain controller? Answer: Dcpromo /forceremoval 1. What is Active Directory schema? Answer: The schema is the Active Directory component that defines all the objects and attributes that the directory service uses to store data. 2. What is global catalog

More information

SAM 8.0 Backup and Restore Guide. SafeNet Integration Guide

SAM 8.0 Backup and Restore Guide. SafeNet Integration Guide SAM 8.0 Backup and Restore Guide SafeNet Integration Guide Revision A November 2012 SAM 8.0 Backup and Restore Guide - SafeNet Integration Guide Introduction Copyright 2012 SafeNet, Inc. All rights reserved.

More information

Use QNAP NAS for Backup

Use QNAP NAS for Backup Use QNAP NAS for Backup BACKUP EXEC 12.5 WITH QNAP NAS Copyright 2010. QNAP Systems, Inc. All Rights Reserved. V1.0 Document revision history: Date Version Changes Apr 2010 1.0 Initial release Note: Information

More information

Acronis Backup & Recovery 11.5 Quick Start Guide

Acronis Backup & Recovery 11.5 Quick Start Guide Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server

More information

Windows Peer-to-Peer Network Configuration Guide

Windows Peer-to-Peer Network Configuration Guide Windows Peer-to-Peer Network Configuration Guide Windows Peer-to-Peer Network Configuration Guide for CCC Pathways Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of this publication

More information

Active Directory Restoration

Active Directory Restoration Active Directory Restoration This document outlines the steps required to recover an Active Directory Infrastructure, running on Windows 2003 R2 Server Standard. The scope of this document covers the scenario

More information

UNIT 5 ADDITIONAL PROJECTS BEFORE YOU BEGIN. Installing a Replica Domain Controller. You want to improve fault tolerance and performance on

UNIT 5 ADDITIONAL PROJECTS BEFORE YOU BEGIN. Installing a Replica Domain Controller. You want to improve fault tolerance and performance on UNIT 5 ADDITIONAL PROJECTS BEFORE YOU BEGIN The RODC must be configured to use the RWDC as its Preferred DNS Server. Active Directory is installed on the RWDC. The RODC must be a member server within the

More information

Microsoft Virtual Labs. Active Directory New User Interface

Microsoft Virtual Labs. Active Directory New User Interface Microsoft Virtual Labs Active Directory New User Interface 2 Active Directory New User Interface Table of Contents Active Directory New User Interface... 3 Exercise 1 User Management and Saved Queries...4

More information

Microsoft Exchange 2003 Disaster Recovery Operations Guide

Microsoft Exchange 2003 Disaster Recovery Operations Guide Microsoft Exchange 2003 Disaster Recovery Operations Guide Microsoft Corporation Published: December 12, 2006 Author: Exchange Server Documentation Team Abstract This guide provides installation and deployment

More information

Setup and Configuration Guide for Pathways Mobile Estimating

Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of

More information

Moving the TRITON Reporting Databases

Moving the TRITON Reporting Databases Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,

More information

How To Install And Configure Windows Server 2003 On A Student Computer

How To Install And Configure Windows Server 2003 On A Student Computer Course: WIN310 Student Lab Setup Guide Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 STUDENT COMPUTER SETUP Hardware Requirements All hardware must be on the Microsoft

More information

In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well.

In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well. QuickBooks 2008 Software Installation Guide Welcome 3/25/09; Ver. IMD-2.1 This guide is designed to support users installing QuickBooks: Pro or Premier 2008 financial accounting software, especially in

More information

Microsoft. Jump Start. M11: Implementing Active Directory Domain Services

Microsoft. Jump Start. M11: Implementing Active Directory Domain Services Microsoft Jump Start M11: Implementing Active Directory Domain Services Rick Claus Technical Evangelist Microsoft Ed Liberman Technical Trainer Train Signal Jump Start Target Agenda Day One Day 1 Day 2

More information

NovaBACKUP. User Manual. NovaStor / November 2011

NovaBACKUP. User Manual. NovaStor / November 2011 NovaBACKUP User Manual NovaStor / November 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

Core Active Directory Administration

Core Active Directory Administration Chapter 7 Core Active Directory Administration In this chapter: Tools for Managing Active Directory............................157 Using the Active Directory Users And Computers Tool............162 Managing

More information

NetVanta Unified Communications Server Backup and Restore Procedures

NetVanta Unified Communications Server Backup and Restore Procedures NetVanta Unified Communications Technical Note NetVanta Unified Communications Server Backup and Restore Procedures 1 Introduction 1.1 Overview This document provides backup and restore procedures to protect

More information

WHITE PAPER: ENTERPRISE SOLUTIONS. Quick Recovery of Microsoft Active Directory Using Symantec Backup Exec 11d Agent for Active Directory

WHITE PAPER: ENTERPRISE SOLUTIONS. Quick Recovery of Microsoft Active Directory Using Symantec Backup Exec 11d Agent for Active Directory WHITE PAPER: ENTERPRISE SOLUTIONS Quick Recovery of Microsoft Active Directory Using Symantec Backup Exec 11d For use with Microsoft Windows 2000 Server and Windows Server 2003 White Paper: Enterprise

More information

Quick Start Guide for Parallels Virtuozzo

Quick Start Guide for Parallels Virtuozzo PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current

More information

EMC Celerra Network Server

EMC Celerra Network Server EMC Celerra Network Server Release 5.6.47 Using Windows Administrative Tools with Celerra P/N 300-004-139 REV A02 EMC Corporation Corporate Headquarters: Hopkintons, MA 01748-9103 1-508-435-1000 www.emc.com

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Backup and Restore of CONFIGURATION Object on Windows 2008

Backup and Restore of CONFIGURATION Object on Windows 2008 Backup and Restore of CONFIGURATION Object on Windows 2008 Technical Whitepaper Contents Introduction... 3 CONFIGURATION Backup... 3 Windows configuration objects... 3 Active Directory... 4 DFS... 4 DHCP

More information

Backup and Disaster Recovery Restoration Guide

Backup and Disaster Recovery Restoration Guide Backup and Disaster Recovery Restoration Guide Page 1 Table of Contents Table of Contents...2 Terms of Use...3 BDR...4 Creating Point-in-Time Restoration Volumes...4 Mounting a Restoration Volume...4 Dismounting

More information

Backup Exec System Recovery 7.0 Best Practices

Backup Exec System Recovery 7.0 Best Practices Backup Exec System Recovery 7.0 Best Practices Windows 2000/2003 Server and Active Directory Domain Controllers Updated By: Bill Felt Authored By: Aimee Barborka NOTE: As Symantec products evolve, some

More information

How to install Small Business Server 2003 in an existing Active

How to install Small Business Server 2003 in an existing Active Page 1 of 6 How to install Small Business Server 2003 in an existing Active Directory domain INTRODUCTION This article describes how to install a Microsoft Windows Small Business Server (SBS) 2003-based

More information

SOS Suite Installation Guide

SOS Suite Installation Guide SOS Suite Installation Guide rev. 8/31/2010 Contents Overview Upgrading from SOS 2009 and Older Pre-Installation Recommendations Network Installations System Requirements Preparing for Installation Installing

More information

WatchGuard Mobile User VPN Guide

WatchGuard Mobile User VPN Guide WatchGuard Mobile User VPN Guide Mobile User VPN establishes a secure connection between an unsecured remote host and a protected network over an unsecured network using Internet Protocol Security (IPSec).

More information

Installation of MicroSoft Active Directory

Installation of MicroSoft Active Directory Installation of MicroSoft Active Directory Before you start following this article you must be aware this is simply a lab setup and you need to assign relevant ip address, hostnames & domain names which

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not

More information

Dell Spotlight on Active Directory 6.8.4. Deployment Guide

Dell Spotlight on Active Directory 6.8.4. Deployment Guide Dell Spotlight on Active Directory 6.8.4 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Course: WIN310. Student Lab Setup Guide. Summer 2010. Microsoft Windows Server 2003 Network Infrastructure (70-291)

Course: WIN310. Student Lab Setup Guide. Summer 2010. Microsoft Windows Server 2003 Network Infrastructure (70-291) Course: WIN310 Student Lab Setup Guide Summer 2010 Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 Published by Wiley & Sons 1 STUDENT COMPUTER SETUP Hardware Requirements

More information

Lotus Notes 6.x Client Installation Guide for Windows. Information Technology Services. CSULB

Lotus Notes 6.x Client Installation Guide for Windows. Information Technology Services. CSULB The goal of this document This document was created by the Information Technology Services department to assist the Lotus Notes Coordinators in the successful installation of Lotus Notes release 6 (R6)

More information

This article was previously published under Q216498 SUMMARY

This article was previously published under Q216498 SUMMARY Article ID: 216498 - Last Review: September 11, 2011 - Revision: 12.0 How to remove data in Active Directory after an unsuccessful domain controller demotion System Tip This article applies to a different

More information

How to Test Out Backup & Replication 6.5 for Hyper-V

How to Test Out Backup & Replication 6.5 for Hyper-V How to Test Out Backup & Replication 6.5 for Hyper-V Mike Resseler May, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication

More information

Setting up Active Directory Domain Services

Setting up Active Directory Domain Services Setting up Active Directory Domain Services Tom Brett CREATING A SINGLE DOMAIN FOREST Once you have Windows Server 2008 R2 installed, it s pretty easy to create a domain you simply run the domain controller

More information

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Installing Active Directory

Installing Active Directory Installing Active Directory 119 Installing Active Directory Installing Active Directory is an easy and straightforward process as long as you planned adequately and made the necessary decisions beforehand.

More information

Symantec Backup Exec 2010 R2. Quick Installation Guide

Symantec Backup Exec 2010 R2. Quick Installation Guide Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with Hyper-V Cluster

StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with Hyper-V Cluster #1 HyperConverged Appliance for SMB and ROBO StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with MARCH 2015 TECHNICAL PAPER Trademarks StarWind, StarWind Software and the

More information

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Installation Guide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations

More information

Exchange Server Backup and Restore

Exchange Server Backup and Restore WHITEPAPER BackupAssist Version 6 www.backupassist.com Cortex I.T. 2001-2007 2 Contents 1. Introduction... 3 1.1 Overview... 3 1.2 Requirements... 3 1.3 Requirements for remote backup of Exchange 2007...

More information

Symantec Backup ExecTM11d

Symantec Backup ExecTM11d Symantec Backup ExecTM11d RM Administration Guide For Community Connect 3 and RM Smart-Tools 3 networks Symantec Backup Exec 11d RM Administration Guide PN 1B0-364 Copyright RM 2007 All rights reserved.

More information

Database Administration Guide

Database Administration Guide Database Administration Guide 013008 2008 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including photocopying,

More information

UltraBac Documentation. UBDR Gold. Administrator Guide UBDR Gold v8.0

UltraBac Documentation. UBDR Gold. Administrator Guide UBDR Gold v8.0 UltraBac Documentation UBDR Gold Bare Metal Disaster Recovery Administrator Guide UBDR Gold v8.0 UBDR Administrator Guide UBDR Gold v8.0 The software described in this guide is furnished under a license

More information

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup

More information

Server & Workstation Installation of Client Profiles for Windows

Server & Workstation Installation of Client Profiles for Windows C ase Manag e m e n t by C l i e n t P rofiles Server & Workstation Installation of Client Profiles for Windows T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W General Notes to Prepare for Installing

More information

About Recovery Manager for Active

About Recovery Manager for Active Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System

More information

Hosting Users Guide 2011

Hosting Users Guide 2011 Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure

More information

EXPRESSCLUSTER X for Windows Quick Start Guide for Microsoft SQL Server 2014. Version 1

EXPRESSCLUSTER X for Windows Quick Start Guide for Microsoft SQL Server 2014. Version 1 EXPRESSCLUSTER X for Windows Quick Start Guide for Microsoft SQL Server 2014 Version 1 NEC EXPRESSCLUSTER X 3.x for Windows SQL Server 2014 Quick Start Guide Document Number ECX-MSSQL2014-QSG, Version

More information

How To Backup A Database In Navision

How To Backup A Database In Navision Making Database Backups in Microsoft Business Solutions Navision MAKING DATABASE BACKUPS IN MICROSOFT BUSINESS SOLUTIONS NAVISION DISCLAIMER This material is for informational purposes only. Microsoft

More information

Universal Management Service 2015

Universal Management Service 2015 Universal Management Service 2015 UMS 2015 Help All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,

More information

Novell ZENworks 10 Configuration Management SP3

Novell ZENworks 10 Configuration Management SP3 AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties

More information

Acronis Backup & Recovery 11

Acronis Backup & Recovery 11 Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

for the VaultDR Online Plugin for Linux-based Operating Systems

for the VaultDR Online Plugin for Linux-based Operating Systems Redefining Data Protection Title Page User s Guide for the VaultDR Online Plugin for Linux-based Operating Systems NVE 7009-36B 01/19-07 Copyrights NetVault:Backup - User s Guide for the VaultDR Online

More information

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 December 2010 COPYRIGHT NOTICE TRADEMARKS 2010 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd., Chip PC GmbH All rights reserved.

More information

Installing Active Directory on Windows Server 2008 by Daniel Petri - January 8, 2009 Printer Friendly Version

Installing Active Directory on Windows Server 2008 by Daniel Petri - January 8, 2009 Printer Friendly Version 1 of 22 7/2/2012 4:32 PM Installing Active Directory on Windows Server 2008 by Daniel Petri - January 8, 2009 Printer Friendly Version Like Send 239 likes. Sign Up to see what your friends like. Microsoft

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

Backup Exec 15. Quick Installation Guide

Backup Exec 15. Quick Installation Guide Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

2003 O/S. when installed (gets installed as a stand alone server) to promoting to D.C. We have to install A.D.

2003 O/S. when installed (gets installed as a stand alone server) to promoting to D.C. We have to install A.D. ACTIVE DIRECTORY AD: Is a centralized database where it contains the information about the objects like users, groups, computers, printers etc. AD is a centralized hierarchical Directory Database. AD is

More information

Active Directory Infrastructure Design Document

Active Directory Infrastructure Design Document Active Directory Infrastructure Design Document Written By Sainath KEV Microsoft MVP Directory Services Microsoft Author TechNet Magazine, Microsoft Operations Framework Microsoft Speaker - Singapore Document

More information

Use it or Lose it: Microsoft Windows Backup By Tom Dell, ntb group partner

Use it or Lose it: Microsoft Windows Backup By Tom Dell, ntb group partner Use it or Lose it: Microsoft Windows Backup By Tom Dell, ntb group partner Learning to use a backup application is one of the most important things a user of a Windows computer can do. It is so important,

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing

More information

Yosemite Server Backup User s Guide

Yosemite Server Backup User s Guide Yosemite Server Backup User s Guide Part number: First edition: October 2010 Legal and notice information Copyright 2004, 2012 Barracuda Networks, Inc. Under copyright laws, the contents of this document

More information

11 Things to Know About Active Directory Recovery

11 Things to Know About Active Directory Recovery 11 Things to Know About Active Directory Recovery White Paper written by Guido Grillenmeier, HP and Shawn Barker Windows Management Quest Software, Inc. Copyright Quest Software, Inc. 2005. All rights

More information

Deploying System Center 2012 R2 Configuration Manager

Deploying System Center 2012 R2 Configuration Manager Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...

More information

Transparent Identification of Users

Transparent Identification of Users Transparent Identification of Users Websense Web Security Solutions v7.5, v7.6 Transparent Identification of Users 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA

More information

Intelligent disaster recovery. Dell DL backup to Disk Appliance powered by Symantec

Intelligent disaster recovery. Dell DL backup to Disk Appliance powered by Symantec Intelligent disaster recovery Dell DL backup to Disk Appliance powered by Symantec The PowerVault DL Backup to Disk Appliance Powered by Symantec Backup Exec offers the industry s only fully integrated

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

High Availability for VMware GSX Server

High Availability for VMware GSX Server High Availability for GSX Server High Availability for GSX Server Revision 1.1.0 published January 2005, GeoCluster, and NSI are registered trademarks of NSI Software, Inc. Balance is a trademark of NSI

More information

Symantec Backup Exec TM 10d for Windows Servers

Symantec Backup Exec TM 10d for Windows Servers Symantec Backup Exec TM 10d for Windows Servers Quick Installation Guide N180808 September 2005 Disclaimer The information contained in this publication is subject to change without notice. Symantec Corporation

More information

Enterprise Vault Installing and Configuring

Enterprise Vault Installing and Configuring Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise

More information

Version 3.8. Installation Guide

Version 3.8. Installation Guide Version 3.8 Installation Guide Copyright 2007 Jetro Platforms, Ltd. All rights reserved. This document is being furnished by Jetro Platforms for information purposes only to licensed users of the Jetro

More information

WINDOWS SERVER 2008 OFFLINE SYSTEM RECOVERY USING WINDOWS SERVER BACKUP WITH NETWORKER

WINDOWS SERVER 2008 OFFLINE SYSTEM RECOVERY USING WINDOWS SERVER BACKUP WITH NETWORKER TECHNICAL NOTES WINDOWS SERVER 2008 OFFLINE SYSTEM RECOVERY USING WINDOWS SERVER BACKUP WITH NETWORKER NETWORKER RELEASE 7.4 SERVICE PACK 2 AND LATER TECHNICAL NOTE P/N 300-010-339 REV A02 Table of Contents

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

ChangeAuditor. Migration Guide CA-MG-0808-470

ChangeAuditor. Migration Guide CA-MG-0808-470 ChangeAuditor Migration Guide CA-MG-0808-470 Copyright 2008 NetPro Computing, Inc. Disclaimer NetPro Computing, Inc. (NetPro) makes no representations or warranties, either expressed or implied, with

More information

Microsoft SQL Server Guide. Best Practices and Backup Procedures

Microsoft SQL Server Guide. Best Practices and Backup Procedures Microsoft SQL Server Guide Best Practices and Backup Procedures Constellation HomeBuilder Systems Inc. This document is copyrighted and all rights are reserved. This document may not, in whole or in part,

More information

Enterprise Remote Control 5.6 Manual

Enterprise Remote Control 5.6 Manual Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote

More information

Database Backup and Recovery Guide

Database Backup and Recovery Guide Scout Diagnostics Database Backup and Recovery Guide P H 803. 358. 3600 F A X 803. 358. 3636 WWW.AVTECINC.COM 100 I N N O VAT I O N P L ACE, L E X I N G T O N SC 29072 Copyright 2013 by Avtec, Inc. All

More information

How To Manage Storage With Novell Storage Manager 3.X For Active Directory

How To Manage Storage With Novell Storage Manager 3.X For Active Directory www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 Legal Notices Condrey Corporation makes no representations or warranties with respect

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information