11 Things to Know About Active Directory Recovery



Similar documents
Microsoft Active Directory Backup and Recovery in Windows Server written by Shawn Barker Product Manager, Quest Software, Inc.

8.3. Competitive Comparison vs. Microsoft ADMT 3.1

Quest InTrust for Active Directory. Product Overview Version 2.5

Active Directory backup and restore with Acronis Backup & Recovery 11. Technical white paper. o o. Applies to the following editions: Advanced Server

WHITE PAPER: ENTERPRISE SOLUTIONS. Quick Recovery of Microsoft Active Directory Using Symantec Backup Exec 11d Agent for Active Directory

Active Directory 2008 Operations

Dell Recovery Manager for Active Directory 8.6. User Guide

4.0. Offline Folder Wizard. User Guide

Manage, Extend, and Simplify Group Policy using Quest Group Policy Solutions

2.0. Quick Start Guide

Active Directory backup and restore with Acronis Backup & Recovery 10

Don t Let Your Active Directory Forest Burn Around You: The Essential Planning Guide for AD Forest Recovery. By Brian Desmond

Quickly Recovering Deleted Active Directory Objects

Defender Delegated Administration. User Guide

Gain Control of Space with Quest Capacity Manager for SQL Server. written by Thomas LaRock

Best Practices for an Active Directory Migration

Directory Backup and Restore

Active Directory Disaster Recovery Workshop. Lab Manual Revision 1.7

Windows Server 2003 Active Directory: Perspective

Quest ChangeAuditor 4.8

Resolving Active Directory Backup and Recovery Requirements with Quest Software

VMware and VSS: Application Backup and Recovery

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

Microsoft. Jump Start. M11: Implementing Active Directory Domain Services

Dell Recovery Manager for Active Directory 8.6. Deployment Guide

Quick Connect Express for Active Directory

Pragmatic Business Service Management

About Recovery Manager for Active

Dell InTrust 11.0 Best Practices Report Pack

Quest Collaboration Services How it Works Guide

6.7. Quick Start Guide

SAM Backup and Restore Guide. SafeNet Integration Guide

SAM 8.0 Backup and Restore Guide. SafeNet Integration Guide

Symantec NetBackup Blueprints

SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR EROOM

Quest Collaboration Services 3.5. How it Works Guide

2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer

Spotlight on Messaging. Evaluator s Guide

Maximum Availability Architecture. Oracle Best Practices For High Availability. Backup and Recovery Scenarios for Oracle WebLogic Server: 10.

Legal Considerations for Archiving Why implementing an effective archiving solution can help reduce legal risk

Dell Migration Manager for Active Directory Product Overview

Investigating the Use of Virtual Servers to Improve the Restoration Process of an Active Directory Forest

Dell InTrust Preparing for Auditing Microsoft SQL Server

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide

CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft Exchange

FOR WINDOWS FILE SERVERS

Module 10: Maintaining Active Directory

8.7. Target Exchange 2010 Environment Preparation

Big Brother Professional Edition Windows Client Getting Started Guide. Version 4.60

Active Directory Recovery: What It Is, and What It Isn t

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Windows Server 2008 Active Directory Resource Kit

Symantec AntiVirus Corporate Edition Patch Update

Technical Brief. Unify Your Backup and Recovery Strategy with LiteSpeed for SQL Server and LiteSpeed Engine for Oracle

Protecting Active Directory

Dell Client Profile Updating Utility 5.5.6

Lesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure

Microsoft Virtual Labs. Active Directory New User Interface

How To Backup A Database In Navision

Backup and Restore of CONFIGURATION Object on Windows 2008

Defender 5.7. Remote Access User Guide

ActiveRoles 6.9. Quick Start Guide

Active Directory Change Notifier Quick Start Guide

WHITE PAPER: customize. Confidence in a connected world. Fast and Simple Recovery of Your Critical Microsoft Applications with Symantec Backup Exec

formerly Help Desk Authority Upgrade Guide

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

10 Things DBAs Probably Don t Know LiteSpeed Can Do. written by Brent Ozar, SQL Server DBA

8.7. Resource Kit User Guide

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide

Desktop Authority vs. Group Policy Preferences

Administering Group Policy with Group Policy Management Console

Overcoming Active Directory Audit Log Limitations. Written by Randy Franklin Smith President Monterey Technology Group, Inc.

Exchange Data Protection: To the DAG and Beyond. Whitepaper by Brien Posey

ADMT v3.1 Guide: Migrating and Restructuring Active Directory Domains

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Dell Recovery Manager for Active Directory 8.6.0

Enterprise Reporter Report Library

Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Storage Capacity Management for Oracle Databases Technical Brief

Built-in Plug-ins User s Guide

ChangeAuditor. Migration Guide CA-MG

Introduction to Active Directory Services

Best Practices for Designing a Secure Active Directory: Multi-Org Exchange Edition. written by Dmitry Sotnikov, Aelita Software.

6.7. Administrator Guide

EMC Replication Manager and Kroll Ontrack PowerControls for Granular Recovery of SharePoint Items

Dell Spotlight on Active Directory Deployment Guide

Backup with synchronization/ replication

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Restructuring Active Directory Domains Within a Forest

Windows.NET Beta 3 Active Directory New Features

ADMT v3 Migration Guide

Transcription:

11 Things to Know About Active Directory Recovery White Paper written by Guido Grillenmeier, HP and Shawn Barker Windows Management Quest Software, Inc.

Copyright Quest Software, Inc. 2005. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser's personal use without the written permission of Quest Software, Inc. WARRANTY The information contained in this document is subject to change without notice. Quest Software makes no warranty of any kind with respect to this information. QUEST SOFTWARE SPECIFICALLY DISCLAIMS THE IMPLIED WARRANTY OF THE MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Quest Software shall not be liable for any direct, indirect, incidental, consequential, or other damage alleged in connection with the furnishing or use of this information. TRADEMARKS All trademarks and registered trademarks used in this guide are property of their respective owners. World Headquarters 8001 Irvine Center Drive Irvine, CA 92618 www.quest.com e-mail: info@quest.com U.S. and Canada: 949.754.8000 Please refer to our Web site for regional and international office information. Quest Recovery Manager for Active Directory Updated May 26, 2005

CONTENTS ABOUT QUEST WINDOWS MANAGEMENT... III ABOUT QUEST SOFTWARE, INC.... III CONTACTING QUEST SOFTWARE... III CONTACTING CUSTOMER SUPPORT... IV INTRODUCTION...5 11 THINGS TO KNOW ABOUT ACTIVE DIRECTORY RECOVERY...6 1. NON-AUTHORITATIVE RESTORES ARE EASY BUT OFTEN INSUFFICIENT... 6 2. YOU NEED TO KNOW THE EXACT PATH TO AN OBJECT TO RESTORE IT AUTHORITATIVELY... 8 3. BACKUPS ARE ONLY VALID FOR 60 DAYS... 9 4. RECOVERING DELETED OBJECTS IN WINDOWS SERVER 2003 ISN T AS EASY AS IT MAY SEEM... 10 5. SOME CHANGES CAN T BE UNDONE... 11 6. THE PROBLEM MAY BE BIGGER THAN YOU THINK... 12 7. RESTORING A USER DOESN T NECESSARILY RESTORE GROUP MEMBERSHIP... 12 8. SYSVOL REQUIRES SPECIAL RESTORATION PROCEDURES... 14 9. YOU DON T HAVE TO BACK UP EVERY DOMAIN CONTROLLER... 15 10. FOREST-LEVEL RECOVERY IS TIME-CONSUMING AND ERROR-PRONE. FORTUNATELY, YOU MAY BE ABLE TO AVOID IT... 16 11. TAKING A DOMAIN CONTROLLER OFFLINE CAN ALLOW YOU TO RECOVER DELETED OBJECTS, BUT BE AWARE OF THE CAVEATS... 16 SUMMARY...18 ABOUT THE AUTHORS...19 i

ABOUT QUEST WINDOWS MANAGEMENT Quest Software, Microsoft s 2004 Global Independent Software Vendor Partner of the Year, provides solutions that simplify, automate, and secure Active Directory, Exchange, and Windows environments. The Quest Windows Management group delivers comprehensive capabilities for secure Windows management and migration. For more information on Quest Software s Windows Management group, please visit www.quest.com/microsoft. ABOUT QUEST SOFTWARE, INC. Quest Software, Inc. delivers innovative products that help organizations get more performance and productivity from their applications, databases, and infrastructure. Through a deep expertise in IT operations and a continued focus on what works best, Quest helps more than 18,000 customers worldwide meet higher expectations for enterprise IT. Quest Software, headquartered in Irvine, Calif., can be found in offices around the globe and at www.quest.com. Contacting Quest Software Phone: Email: Mail: Web site 949.754.8000 (United States and Canada) info@quest.com Quest Software, Inc. World Headquarters 8001 Irvine Center Drive Irvine, CA 92618 USA www.quest.com Please refer to our Web site for regional and international office information. iii

Contacting Customer Support Quest Software s world-class support team is dedicated to ensuring successful product installation and use for all Quest Software solutions. SupportLink Email at www.quest.com/support support@quest.com. You can use SupportLink to do the following: Create, update, or view support requests Search the knowledge base Access FAQs Download patches iv

INTRODUCTION Active Directory is the gatekeeper to the network resources your employees depend on, so Active Directory is critical to your business. Accordingly, having a reliable and practiced set of recovery strategies is vital. Preparing for a catastrophic event for example, a hardware failure or physical disaster is necessary, but so is preparing for everyday disasters. Problems can arise in the normal course of day-to-day operations from a variety of causes, including: Human error. For example, an administrator might delete an entire organizational unit (OU) instead of a particular user, or accidentally delete a service account, which could affect hundreds of users. Unexpected consequences. For example, an administrator might use a script to set one of the Extension Attributes in Active Directory only to find out that Extension Attribute contained data for another missioncritical application that won t work any more because of the changes. The data must be restored as soon as possible. Malicious activity. Both current and recently-terminated employees, as well as external service providers, might find ways to access your sensitive systems and data, and their knowledge can enable them to cause significant damage. According to Entrepreneur, four out of five IT-related crimes are committed from within an organization (http://www.entrepreneur.com/your_business/yb_segarticle/0%2c46 21%2C298386%2C00.html). Moreover, CSO Online reports that inside security breaches affect 49% of companies (http://www.csoonline.com/metrics/viewmetric.cfm?id=277). Once your network is under attack, it's too late to plan you need to have your diagnostic and recovery tools in place. Viruses. Viruses can damage Active Directory data, and the replication process propagates those unwanted changes. Anti-virus software, of course, provides protection, but it is critical to be able to respond quickly to viruses that get through. This document details important considerations when creating and testing your Active Directory recovery plan. It discusses restoration of data using native tools provided by Microsoft, particularly Ntdsutil.exe, Microsoft s command-line tool for managing Active Directory, including restoring data. The document does not attempt to serve as a comprehensive guide; instead, it provides administrators with important insights into the finer points of Active Directory recovery. 5

11 Things to Know About Active Directory Recovery 11 THINGS TO KNOW ABOUT ACTIVE DIRECTORY RECOVERY 1 Non-Authoritative Restores Are Easy But Often Insufficient The domain controllers (DCs) in each domain keep a variety of information in the directory data store (or simply the directory). Changes made to the directory are replicated from one DC to other DCs in the domain. Replication occurs at intervals, not continuously. Therefore, the directory on any DC is normally in loose consistency with those on other DCs, since the most recent changes on each DC may not have been replicated to the others. Objects attributes are assigned version numbers that are incremented when the attributes are changed so that the replication process can determine which changes are the most current. Directory data stored on DCs and replicated between them includes information about objects, configuration data (such as a list of all domains and the locations of their DCs), and schema data, which defines the types of objects that can be stored in the directory and the attributes they can have. This information is used by network applications and services. The first step in restoring Active Directory data is to boot a domain controller into Directory Services Restore Mode (DSRM). Then the Active Directory database (NTDS.dit) can be restored with a utility such as the native Backup utility provided by Microsoft. The restore of the actual database file can only be performed in non-authoritative mode; however, it is important to understand the concepts of non-authoritative and authoritative restores with respect to the objects stored in the database: Using native tools provided by Microsoft, the default method is the non-authoritative restore: settings and entries maintain the version numbers they had at the time of backup. After the DC is restored, it is updated using normal replication methods. Note that any object that was deleted after the last backup will be restored with the database file, but if the DC is then booted to normal Active Directory mode, the object will be deleted again during the replication process. 6

White Paper An authoritative restore, on the other hand, allows you to selectively increment the version numbers of attributes to make them authoritative in the directory. That is, during the replication following the restoration, when the version numbers of objects are compared, the objects and attributes on the restored DC that were restored authoritatively will have higher version numbers than those on the other DCs, and will replicate out to the other DCs instead of themselves being overwritten as out-of-date. This allows you to recover deleted objects even after the deletion has been replicated throughout the enterprise. Usually, an authoritative restore of selected objects and attributes follows a non-authoritative restore of the whole database (for example, from a backup tape). Accordingly, when you need to recover deleted objects from a backup or roll back changes to objects, you typically first need to perform a nonauthoritative restore and then do an authoritative restore, even though it is more difficult. Simple non-authoritative restores are valuable primarily if you need to recover a DC that has crashed and that has a slow connection to the next DC. This restores an old version of Active Directory and only the differences between the restored DC and its replication partners need to be transmitted. If bandwidth is not a concern, you do not need to do a restore at all: if a DC crashes, you can simply promote a Windows 2000/2003 server to be a DC, and a clean version of Active Directory will replicate to it from an existing DC. If you're running Windows Server 2003, you can do this very efficiently by promoting a server to be a DC using the Install from Media feature. Note that when you perform a non-authoritative or an authoritative restore, the DC must be offline for user access. Specifically, the DC must be booted into a special mode, Directory Services Restore Mode. The machine at that point is online but is not functioning as a DC in the Active Directory. While the DC is in Directory Services Restore Mode, it is unavailable for any functions associated with Active Directory, such as validating logons or replicating directory data. 7

11 Things to Know About Active Directory Recovery 2 You Need to Know the Exact Path to an Object to Restore It Authoritatively An authoritative restore is an extension of a non-authoritative restore: once you ve done a non-authoritative restore, you can mark particular objects to be restored authoritatively using the Ntdsutil utility from the command line. The first step is to locate and retrieve the object. This requires knowing its distinguished name (DN). The DN is made up of the nodes from the root domain down through the hierarchy of directory containers to the object. The DN of each object is unique within a given Active Directory forest. The following is an example of a distinguished name: CN=Chris Smith,OU=Sales,OU=North America,DC=Acme,DC=com This uses the following abbreviations: CN: common name OU: organizational unit DC: domain component Accordingly, authoritatively recovering a single object is not too much additional work provided that you have this detailed information about its name. However, if many non-contiguous objects have been mistakenly deleted, restoration is difficult, time-consuming, and error-prone, since all the data must be keyed into a command-line interface. In any case, reconstructing a deleted object s distinguished name may not be a simple matter; you will need to have procedures in place to capture this information in case an authoritative restore is necessary. 8

White Paper 3 Backups Are Only Valid for 60 Days When an object is deleted from Active Directory, Windows does not remove it right away. Instead, most of the attributes associated with that object are removed, and the object is renamed and moved to the Deleted Objects container, a special hidden container in Active Directory. The object is now referred to as a tombstone. At the next replication interval, this tombstone is replicated to the other DCs. A deleted object is permanently removed at a set interval after being tombstoned. By default, this interval is 60 days. During this interval, the tombstone can be reanimated and the object restored, at least in part, to its previous state. Starting in Windows Server 2003 Service Pack 1, the default tombstone interval has been changed to 180 days, but only for new deployments of Active Directory. If an organization upgrades to Windows 2003 SP1, the 60 day interval remains, unless changed manually on the Directory Service (NTDS) config object. After 60 days, a backup of one DC may contain objects whose tombstones have been permanently removed on other DCs. Even though the backup includes these objects, they cannot be restored. So if a user account was removed in error and the error wasn t discovered until sometime later (for example, in the case of an employee on an extended leave), the user account cannot be recovered. Note that this process of tombstoning can lead to a problematic situation if you disconnect a DC from your network for more than 60 days: if an object is deleted during this time, this change cannot, of course, be replicated to the disconnected DC. If that DC is reconnected after the object s tombstones have been removed from the other DCs, then it will have an object that the other DCs do not, sometimes called a lingering object. For Microsoft s best practice recommendations for managing long DC disconnections, see: http://www.microsoft.com/technet/treeview/default.asp?url=/technet/prodtec hnol/ad/windows2000/maintain/opsguide/part1/adogd14.asp. 9

11 Things to Know About Active Directory Recovery 4 Recovering Deleted Objects in Windows Server 2003 Isn t As Easy As It May Seem In Windows Server 2003, Microsoft introduced an online facility for recovering deleted objects. This facility does not allow you to selectively restore attributes or roll back changes to an object, nor does it provide any method for determining which objects or attributes have been changed. Moreover, it does not include a GUI. Rather, it is a programming interface that allows you to reanimate a deleted object's tombstone. It requires you to first retrieve and then restore the deleted object, once you have managed to ascertain its fully qualified distinguished name (DN). For samples of code from Microsoft for both steps in this operation, see: and http://msdn.microsoft.com/library/default.asp?url=/library/enus/ad/ad/retrieving_deleted_objects.asp http://msdn.microsoft.com/library/default.asp?url=/library/enus/ad/ad/restoring_deleted_objects.asp. As mentioned in the previous section, most of the attributes associated with an object are removed when the object is deleted and its tombstone is created. Although you can configure in the schema which attributes of the original object are to be kept in the tombstone, by default only a very limited number of attributes are retained in the tombstone. So, if you do manage to use the online recovery facility, the object will be only partially restored: only the attributes of the object that are required for its existence are restored. Other attributes, which may be equally critical for your business, such as SIDHistory and password, are not restored. Starting in Windows Server 2003 Service Pack 1, the SIDHistory attribute is now stored in the tombstone, so a user s SIDHistory will be recovered when that user is undeleted. To restore other attributes of a user account such as the password in Windows Server 2003, it is still necessary to modify the schema to configure these additional attributes to be stored in the object's tombstone. 10

White Paper 5 Some Changes Can t Be Undone Active Directory objects are sometimes moved between domains in a forest, such as when organizational or administrative functions change (for example, when an employee moves from one department to another, or you decide to outsource a function). When an object is moved to a new domain, no tombstone is left in the domain where the object was moved from. This is because each object is assigned a globally unique identifier (GUID) when it is created. Unlike a security identifier (SID), a GUID is unique within a forest and never changes, even if the object is moved or renamed. Applications can store the GUID of an object and use the GUID to retrieve that object regardless of its current distinguished name (DN). Therefore, when an object is moved between domains in a forest, it is assigned a new SID but retains its unique GUID. No tombstone object can be created in the old domain, since it would have the same GUID. 1 GUID: 123 SID: 456 2 Move user to different domain in forest 3 GUID: 123 SID: 789, 678, 456 GUID: 123 SID: 678, 456 Move user back to original domain Accordingly, a move of an object between domains in a forest cannot be undone without performing a labor-intensive authoritative restore. The object can be moved back, but its SIDHistory becomes increasingly complex: it includes information about the object s original existence in the first domain, its existence in the second domain after the move, and its new existence in the first domain after its move back. Increased complexity of SIDHistory can cause a variety of issues, including longer logon and authentication time. 11

11 Things to Know About Active Directory Recovery 6 The Problem May Be Bigger Than You Think Whenever you discover a problem in Active Directory, it is critical to evaluate it carefully and determine its scope. For example, if a user reports that he can t log in, and you determine that the user account was deleted, check further to see if the entire OU was deleted the user may simply be the first user to call in. Or if a user reports access problems, consider whether an administrator may have run a script to make certain changes and affected many users in unanticipated ways. When problems are reported in Active Directory, it s useful to be able to compare the current state with a last-known good state to help troubleshoot the problem. This can save a lot of time and headache and help you accurately diagnose and solve the problem quickly. Time is critical here: it is best to find and repair the problem before it can impact your business. 7 Restoring a User Doesn t Necessarily Restore Group Membership and in fact, an authoritative restore can lead to inconsistent group membership on different DCs. Restoring group membership presents unique challenges. Users are usually members of various groups, and correctly restoring these group memberships along with the user object is critical. Each user who is a member of a group has all the access permissions and rights assigned to that group. Losing group membership means loss of those permissions and rights. Additionally, in an Exchange 2000/2003 environment, losing membership in a group means no longer receiving email sent to that group. Therefore, when restoring a user, you must also restore the group membership information. Group membership information is stored with the group object (in the group s member attribute) as a so-called forwardlink. The user object itself contains (in the memberof attribute) a backlink to each group where the user is a member. When a user is deleted, the group objects in the Active Directory forest are cleaned appropriately that is, the user is removed from each group s member attribute. As the deleted user object (tombstone) replicates to other DCs in the forest, the DCs also clean their local copies of the respective groups and remove the membership of the deleted user without actually changing the version numbers of the groups themselves. There are other linked attributes between Active Directory objects (for example, the manager and directreports attributes), which behave the same way during object deletion; however, they are not as security-sensitive as group membership. 12

White Paper If any DC in the forest is running Windows 2000, restoring a deleted user using native tools will not restore group membership. Even when all Windows 2000 DCs have been upgraded, the native tools will not restore group memberships that existed before the forest was switched to Windows Server 2003 Forestfunctional level. Instead, you have to determine which groups to update and then update each of those groups to correctly restore the membership. Alternatively, once you have determined which groups the user belonged to, you can do an authoritative restore of those groups; however, this can potentially lead to inconsistent group membership on different DCs. Specifically, if the group object is authoritatively restored before the user object, during the replication of the group to other DCs, Active Directory detects that the restored group object has members that do not exist and removes those users from the group s member attribute. When the users are then authoritatively restored, the group s member attribute is not updated. To prevent this problem, users must be restored and replicated first, and then groups can be restored and replicated. Similarly, contact objects are often members of mail-enabled groups and are thus affected in the same way as a deleted user object. Even computer objects may be made members of security groups, for example, to control Group Policy application to specific computers in an OU. Like in the previous examples, losing the group membership of a computer object can have a negative impact on a computer s behavior in the Active Directory infrastructure. Furthermore, groups can be members of other groups (nesting global groups in local groups or even nesting groups of the same type in Windows 2000 native mode or in Windows Server 2003 Domain-functional Level domains). As a result, restoring a group object that is a member of other group objects leads to the same challenges as restoring a user object. Cross-domain group membership in a multi-domain Active Directory forest presents particular problems. Consider a user who has an account in domain A, and is a member of a universal or domain local group in domain B. This is cross-domain membership. If the user is deleted from domain A, the group in domain B is also cleaned the member attribute of the group is updated to reflect the deletion. If the user s account is restored, however, the group is not updated to reflect the user s membership. This is even the case if you are running Windows Server 2003 Forest-functional level. The administrator must determine which groups the user was previously a member of and either add the user back to those groups manually or restore the groups in domain B from a backup of domain B. 13

11 Things to Know About Active Directory Recovery 8 SYSVOL Requires Special Restoration Procedures SYSVOL is the system volume, a component of the System State. On domain controllers, SYSVOL provides a standard Active Directory location for files that must be shared for common access throughout a domain. SYSVOL contains user logon scripts, Group Policy objects, Net Logon shares, and file replication service (FRS) staging directories and files that must be available and synchronized between DCs. It is critical that SYSVOL data be complete and accurate. Loss of Group Policy information, for example, can lead to serious security vulnerabilities and make it impossible for users to log on to the domain. Since SYSVOL is a series of files and directories and not a database, restoring it requires special care. If at least one other DC in the domain is still functioning, then similar to object-level restores in the Active Directory database SYSVOL can be restored either non-authoritatively or authoritatively: If you choose a non-authoritative restore, then when the restored DC reboots, the SYSVOL information will be compared with the other DCs in the domain and updated. If you restore SYSVOL authoritatively, the local SYSVOL will be replicated to the other DCs in the domain, enabling you to recover from an error that has been replicated to the other DCs, such as accidental deletion of a Group Policy object. Note that using native tools, authoritative restore of SYSVOL is not automatic upon an authoritative restore of other objects in Active Directory; you must take additional steps. If no other DC in the domain is functioning, you must do a primary restore of SYSVOL. This builds a new NTFRS (Windows NT File Replication Service) database by loading the data present under SYSVOL on the local DC. This method is the same as a non-authoritative restore except that SYSVOL is marked as primary. It is even more challenging to restore specific files or subfolders of SYSVOL (for example, a logon script that was accidentally deleted) because the normal method to do a primary restore affects the whole SYSVOL folder. 14

White Paper 9 You Don t Have to Back Up Every Domain Controller Because changes made to the directory are replicated from one DC to other DCs, the directory on any DC is normally in loose consistency with those on other DCs. Therefore, you do not need to back up every DC: if one DC fails, you can either restore it from backup (if you have backed up that particular DC) or by Active Directory replication from its partner DCs. The number of DCs you should back up depends on a variety of factors, including WAN performance. It is wise to back up at least two DCs for redundancy, and also to back up your Flexible Single Master Operations (FSMO) roles (also known as operations master roles). Note: Correct restoration of a failed relative ID (RID) master is particularly critical: if the RID master is restored improperly, you risk having objects with duplicate SIDs created in the domain. Therefore, rather than restoring the RID master, the recommended procedure is to seize the RID FSMO role to a different domain controller. It may at first seem beneficial to perform a full backup to tape of DCs that are connected across slow WAN links: this would allow restoration from tape in case of a hardware failure. However, tape handling in this scenario becomes increasingly complex and risky. Instead, it may be a better to store the backup to a local disk on the DC. Although this doesn t provide the same restore capabilities, it allows quick restore of Active Directory in case of nondisk related hardware failures and is also easier to manage and secure. How often you should back up your data depends, of course, on how often it changes and how critical those changes are. In general, you should back up at least once a day. You should also back up before and after you make changes to Active Directory; for instance, if you run a script to update user objects, back up Active Directory both before and after running the script. If your script runs via a scheduled process, make sure that your backup solution is scheduled to run (and has enough time to finish) before and after the script is automatically run. 15

11 Things to Know About Active Directory Recovery 10 Forest-Level Recovery Is Time- Consuming and Error-Prone. Fortunately, You May Be Able to Avoid It Forest-level recovery is extremely difficult, time-consuming, and error-prone. In addition, it can result in the loss of all changes since the last good backup was made. Microsoft has published a 22-page guide titled Best Practice Recommendation for Recovering your Active Directory Forest (available for download from http://www.microsoft.com/windows2000/downloads/tools/redir-netdom.asp). Accordingly, forest-level recovery should be undertaken only as a last resort. Fortunately, careful research using the proper tools can enable you to determine the cause of the failure and evaluate possible remedies. In particular, comparison of the current state of your Active Directory to a good backup can help you determine what changes have occurred, and selective restoration of objects may be all that s needed to solve the problem. In particular, examination of the critical objects in your Configuration container can help you resolve problems without a full-forest recovery. 11 Taking a Domain Controller Offline Can Allow You to Recover Deleted Objects, but be Aware of the Caveats Another method of native AD recovery involves isolating a DC from the network for some period of time, such that replication is delayed with that DC, and the DC does not receive updates during that time. If a problem occurs in AD, you can use the backup that the isolated DC offers to authoritatively restore the deleted objects. The DC can then be reintroduced to the live AD, a process known as a lag site or the delayed replication method. While delaying replication with a DC provides the ability to restore deleted objects if something goes wrong, it is important to be aware of the limitations of this method. In particular, when using a lag site, changes made to the affected objects since the last replication occurred will be lost. Organizations that employ this method typically delay replication with the offline DC for days, or even a week. Therefore, when you finally restore an object from your offline DC, you will be restoring from a days-old backup. Any changes made to the object being restored in the last few days will be lost. In order to ensure that AD data is accurately recovered, it is important to maintain regular backups of the directory, resulting in a restoration from the most recent data possible. 16

White Paper In another example, when it is necessary to restore deleted objects, not all data can be recovered with delayed replication. The basic approach to restoring objects with this method is the same as the native recovery process discussed earlier. When objects are accidentally deleted from AD, you first go to your offline DC. Using the unaffected copy of AD on the isolated DC, you reboot the DC to DSRM mode, and use Ntdsutil to authoritatively restore the deleted objects. The limitations that exist with the native recovery approach are still applicable with delayed replication the process is manual and time intensive. As a result, you must know the exact path to the objects being restored, and the recovery is incomplete (as group memberships and backlinked attributes are not restored). Additionally, not all changes can be undone. For example, while you can restore deleted AD objects using an isolated DC, it is not possible to roll-back attribute level changes to objects that haven t been deleted. When the non-authoritative restore is complete, you reconnect the lag site to the network so the restored objects can be reintroduced to AD. Unfortunately, the recovery attempt is a one-shot opportunity; if you miss any objects that need to be restored on the first attempt, there is no option to go back and recover those as well, since your backup is now lost. Finally, there are significant hardware costs associated with this recovery approach, since every domain requires at least one extra DC, which is only used to maintain a non-replicated copy of AD and does not otherwise contribute to the AD infrastructure. Regardless of the AD recovery plan you implement, you should maintain regular backups (i.e. at least daily) of AD. When a disaster does happen, it is important to restore from as recent a copy of the directory as possible, so that no changes are lost. Your plan should provide you the flexibility to create backups before and after significant changes are made to AD (such as running an automated script that updates AD attributes). Finally, it is important that your recovery plan adequately addresses all of the possible disasters that could occur to AD data. If You Use Microsoft ADAM, Your Recovery Plan Should Account For It! Active Directory in Application Mode (ADAM) is often used as the directory deployment option of choice for storing application data. When data is lost in ADAM, it s just as important to be able to restore the data quickly and completely. The same basic principles that apply to restoring AD objects also apply to restoring ADAM objects. When objects in the ADAM directory are inadvertently deleted or modified, it is necessary to stop the ADAM instance, perform a non-authoritative restore of the ADAM database from backup, and then use the Dsdbutil command-line utility to authoritatively restore the affected objects. The same challenges and limitations that are discussed in this paper regarding AD recovery also apply to recovering from ADAM disasters. 17

11 Things to Know About Active Directory Recovery SUMMARY Because your Active Directory is critical to your business, you need a good understanding of how Active Directory recovery really works, as well as tools to help you quickly diagnose and rectify problems. Quest Recovery Manager for Active Directory does just that. It maintains a historical repository of directory data and offers remote, online, granular restore options to repair the entire directory, a portion of it, or a single directory object or object attribute. Recovery Manager provides easy-to-use wizards and clear reports that reduce your recovery time, increase Active Directory and Group Policy reliability, reduce administrator workload, and lower your overall costs. In particular, Recovery Manager offers the following solutions: Troubleshooting tools, including quick snapshot comparisons of backups with the live Active Directory and granular comparison of directory objects at the attribute level. This helps you to quickly and accurately determine what changes have taken place so you can evaluate what might need to be rolled back. Restoration tools, including online, granular restore options that let you easily restore individual objects or attributes without having to know their fully qualified distinguished names and container information. Objects can be fully restored, with all their attributes, including group membership, without the need for separate backups or additional steps. What if tools, including comparison reports that show how properties of objects would change during a proposed restoration, without actually applying changes to Active Directory. Administrative tools, such as remote restoration of Active Directory and Group Policy data from one central location, without requiring the administrator to go to the DC. Backup tools, including centralized management of the creation and storage of System State backups for Active Directory domain controllers and scheduling of backups during off-peak hours. User-friendly GUIs and wizards that eliminate the need for painful and often inaccurate typing using command-line utilities. A choice of offline or fully online recovery, eliminating the need to reboot DCs and interfere with the work of your users and your business. In addition, you can control the recovery process remotely, instead of moving physically to each affected DC. Easy and effective backup and restore of SYSVOL to assist in the total management of your Group Policy environment. Backup and online, granular restore of ADAM instances. 18

White Paper ABOUT THE AUTHORS Guido Grillenmeier is a Senior Consultant within the Technology Solutions Group at Hewlett Packard. Based in Germany, Guido joined HP in 1996 and has been working with directory security and delegation of administrative rights since the early days of Windows NT. Today, Guido deals primarily with global Windows 2000/2003 deployments and migrations, designing and implementing efficient Active Directory security and delegation models for HP's customers. He has further specialized in Disaster Recovery methodologies for Active Directory and is working very closely with Microsoft to investigate and understand this critical task. Guido is a frequent speaker at technical conferences such as the Microsoft Exchange Conference and Microsoft IT- Forum, and he was one of five developers and tutors for HP's Windows Server 2003 Academies. He is a Microsoft MVP. Shawn Barker is a product manager at Quest Software for Recovery Manager for Active Directory and other Windows Management solutions. For nearly 10 years, Shawn has worked with Global 2000 and other large enterprises to understand their network and operational challenges. Armed with this experience, he has worked with the R&D team at Quest Software to develop Active Directory management solutions. 19