This procedure is very dependent on the Active Directory infrastructure in place. In the context of the demo, AD Windows 2008 R2 architecture in place is composed of the following elements:
To achieve this recovery procedure, it is necessary to have a backup "System State" of a DC in the domain. In the case of a multi-domaine infrastructure, you need to have a CD by area. The best Backup will be the one that has the greatest number of FSMO roles. In our case, it will be better to use a Backup of the DC1. This evaluators us stages of recovery of FSMO roles missing (16)
To restore AD DS, it is necessary to have the password to restore Active Directory. This password was positioned at the initial installation, it may has not been retained. If this is the case, follow the detailed here KB322672 today.
This procedure must - be carried out in the following cases:
Retrieve an an Active Directory forest is to recreate "from scratch" AD DS on all DC or restore the forest from a Backup. As a result, the AD recovery operation causes data loss where changes has been made since the last Backup execution
The recovery steps are following:
Each is detailed in the following section
Before the recovery procedure, it is important to know the backup in place strategy to identify the good backups.
The Backup of the domain controller operation is done via Windows Backup (Wbadmin.exe). Ideally, the Backup files are then outsourced.
To back up the System State of a domain controller, this is the command to use:
To avoid replication of corrupted or obsolete data with the directory that we will go back, it is essential to make inactive all domain controllers in the forest, in particular the FSMO role holders.
In our case, the DC to restore is unquestionably the DC1.intra.domain.local server. There roles DNS, and all forest and domain FSMO roles.
In a multidomain, a domain controller in the domain context root of the forest should be chosen because it contains both the structure of the forest (trusts) and the root DNS integrated with the AD and the AD resource records.
On a new machine DC-RESTO installed in WorkGroup, we will restore the Backup of System State of the DC1 server. This new server in Directory restore mode
The Backup file may contain different Backup files. It is necessary for the restoration of the most suitable file (careful, this is not necessarily the most recent!).
To find the "Version Identifier" of the backup file that we want to use, it runs:
The name ID for my backup file preferred is "12/07/2009-09: 21″"
The restoration of the SYSVOL directory must - be "Authoritarian" type for this DC will be the first directory. Here is the command is run on the new server:
Respond YES to 5 warnings:
On the restart, connect local administrator of the machine. Attention, the password of the account is the recovery password (DSRM)
Disable the boot in Directory restore mode:
Once restored, the first CD "supports" the new forest. It is therefore essential to carry out some tests to validate the relevance of the restoration.
Some actions are required to initialize the AD, escape corrupt DC elders and prepare for the integration of new servers.
Between the time of the Backup and recovery, it may be that a "Security Principals" have been created in the AD. Therefore, these objects recovered a SID in their creation. They no longer exist because the prior to their creation backup has been restored. To avoid that new created users retrieve the same SID, it is essential to increase the beginning of the range of the RID Pool.
Start ldp.exe
Click Connection and then Connect
Click on Browse and then Modify
In the DN field, type
cn=RID Manager$,cn=System,dc=intra,dc=domain,dc=local
In the Attribute field, type rIDAvailablePool.
In the case of the restoration of a CD is not all FSMO roles, it is necessary to restore to be all present in the new forest.
In a command prompt, run NTDSUtil.exe
Type roles
At the prompt "fsmo maintenance", type connections
At the prompt "server connections", type connect to server dc1.intra.domain.local
Then type the following commands to retrieve each of the forest and the domain FSMO roles:
We now have a new forest consisting of a DC, DNS which has all FSMO roles.
In an AD DS 2008 or 2008 R2, the cleaning of the metabase Active Directory is done automatically when it deletes an object of type Domain Controller.
In the ADUC console, open the or Domain Controllers
In the case of DC that would possibly be still online despite the previous steps of the procedure, we need to reset the machine and the account krbtgt account. We make sure to not respond with "old" DC
In a command prompt, type:
The command must be run 2x
To reset the password on the krbtgt account, connect to the ADUC console and do a right click / change password on the account in question
The Active Directory environment is now ready to receive new DC.
The DC1 server can be re-promoted as a Global catalog
Once the AD stable environment, your organization and the reasons for the break, some actions and developments can be carried out if necessary:
Richard Mueller edited Revision 1. Comment: Added TOC and tag
Richard Mueller edited Original. Comment: Remove (en-US) from title