Preventing Active Directory failures should be a key component of any disaster recovery plan. There are steps every Windows shop can take to reduce the chances of an AD disaster. The best way to minimize downtime is to have a proactive plan in place.
Need to restore a single domain controller? Want to prevent the accidental bulk deletion of objects? Microsoft MVP Gary Olsen offers his advice on how to plan for the worst and what to do to get your Active Directory up and running again.
Disaster Recovery Planning for Active Directory
Part 1: How creating an Active Directory replication lag site minimizes disasters
It is a good idea to have a disaster recovery plan for major catastrophes, but there are a number of actions you can take to prevent disaster -- or at least minimize the chances of an Active Directory disaster such as the accidental bulk deletion of objects.
One of those actions is to create a replication lag site. Very simply, the lag site is an Active Directory site that is intentionally a few days to a week behind the rest of the domain. Of course, there are some gotchas when doing this, which we
You create a lag site by putting a domain controller from the hub site into its own site (we
Now, remember that administrator who -- mistakenly, of course -- recently deleted an organizational unit (OU) with 10,000 users? Your only alternative is to do an authoritative restore (and hope your backup media is valid). That means you have to perform the following authoritative restore process:
- Unplug the domain controller that has the authoritative copy of the Active Directory from the network.
- Get the appropriate system state backup tape that you made before the deletion.
- Make sure the tape is valid and that it is no older than the TombstoneLifetime (60 days by default).
- Boot the restore domain controller into Directory Service Restore Mode (DSRM).
- Do a system state restore to this domain controller. Note that you have to do this twice to get the groups and users restored properly. This is not trivial.
- Plug the domain controller into the network.
- Replication will force the Active Directory objects from the restored domain controller to the other domain controllers in the network.
Note: Refer to Microsoft
With the lag site, however, you now have a domain controller that has a copy of the Active Directory before the deletion took place (assuming you noticed it within four days of the occurrence). Let
Get control of the gotchas
It is important that you take steps to prevent authentication from the lag site domain controllers since it has security data (accounts, passwords, locked accounts, group membership, etc.) that is a week old. You can accomplish this by defining a site policy for the lag site and defining the "DCLocator DNS Records Not Registered by the DCs" setting. The Mnemonics field is described in the Explain tab. You need to include all of the Mnemonics except CNAME record (needed for replication). The Explain tab is a bit confusing, but it
The minimum configuration to implement a Active Directory lag site is to have a single site with at least one domain controller from each domain in the site. The preferred configuration is to have two domain controllers from each domain in the site. Set their replication frequency for 168 hours (seven days) and stagger the schedule so they replicate every 3.5 days. Thus, you have two old copies to choose from, mitigating the problem just noted.
You can also use a Virtual Server as the lag site domain controllers to save hardware costs.
If you have a multiple (parent/child) domain structure, then you have a lot of unseen problems. When you attempt a restore on one domain, it will fail to restore cross-domain group memberships. Hewlett-Packard Co. was the first to discover this problem, and the company developed a tool called Active Directory Link Replication Manager (ADLRM) that stores these links in a SQL database and restores them quite nicely. The tool also can store and restore individual attributes. For instance, if you have an HR application that modifies certain user attributes, and you need to restore the attribute to the pre-modified value, ADLRM can do that without requiring a full-scale authoritative restore.
Very informative blog... This blog share helpful strategy for disaster recovery site. Thanks for sharing.
ReplyDeleteThankfulness to my dad who informed me relating to this blog, this website is really amazing.
ReplyDeleteA safe haven and brief accommodations are a have to in all catastrophe hit regions. Community households need someplace warmth and relaxed to sleep. https://www.rebuildrecover.org/highlighting-usefulness-federal-disaster-assistance-website/
ReplyDeleteYour website is terribly informative and your articles are wonderful.
ReplyDeleteinpatient rehab georgia
Wonderful, just what a blog it is! This blog has provided the helpful data to us continue the good work.
ReplyDeletealcohol detox centers in nj
If you really desire to get such type of information, visit this blog quickly.
ReplyDeleteneuropathy pain relief
Keep the ball rolling you have done the great job here.
ReplyDeletealcohol rehab northern virginia
Keep the ball rolling you have done the great job here.
ReplyDeleteinpatient rehab georgia
I'm in no doubt coming back again to read these articles and blogs.
ReplyDeleteDrug addiction Atlanta
No wonder why you receive countless of feedbacks.
ReplyDeletebest fitness tracker or watch with o2 sensor and blood pressure