Professional Windows Server 1002003 Security A Technical Reference [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Professional Windows Server 1002003 Security A Technical Reference [Electronic resources] - نسخه متنی

Roberta Bragg

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید







Active Directory Restore


Part of a successful Active Directory restoration is the planning and fulfillment of adequate directory backup, the selection of the proper type of restore, and practice in a complete restore. Even the smallest Active Directory implementation cannot survive a complete operational failure or disaster without the availability of appropriate backup and planning. As detailed in the section "System State Backup," it is not enough to simply copy the database file ntds.dit. Instead, you must have a complete system state backup. To restore, you must restore the system components. System components must be restored in a specific order. When ntbackup is used to restore the system state files backed up by ntbackup, this order is followed. Do not assume that every backup product understands what files need to be backed up for a system state backup, nor the order in which they must be restored.

Files must be restored in the following order:


1.

Boot files

2.

SysVol, Certificate Server, Cluster database, and COM+ class registration database (as applicable)

3.

Restore Active Directory

4.

Restore the registry


In addition to running ntbackup to restore system state, you must determine what kind of Active Directory restore is necessary:

Primary restore is necessary when restoring the first DC in a domain, or the only working server or a replicated data set. In this case, all the DCs in the domain are lost, and you are working from backup.

Normal (non-authoritative) restore is done to restore a replica of the directory that does not need to propagate any of its differences at the time of restore to the other DCs. Instead, changes that occurred since the backup are replicated to the restored DC from other DCs in the domain.

Authoritative restores a deleted object. A replica is restored from a backup created before the object was deleted, and this object in the restored replica is given precedence over the other domain replicas. That is, the object is replicated to the other DCs in the domain. (The restored replica receives all other changes from the existing DCs via replication.) The end result is simply that the deleted object is restored.

Authoritatively restore an earlier version of Active Directory. A replica is restored from a backup, and the restored replica is given precedence over the other domain replicas. The end result is a return to the Active Directory state of the replica.

Restore from backup older than the Active Directory tombstone lifetime. Although this is not recommended and will not be a complete solution, it may provide a better solution than reloading the entire domain or Active Directory infrastructure from scratch.


Normal Restore


In a normal restore, the restored DC's objects have their update sequence number, which is used to determine if an object needs replicating. Because objects in the Active Directory may have been changed since the backup was created, the objects that are not up-to-date in the restored replica will appear to be old, and the new changes will be replicated to the restored DC in the normal manner. If the reason for the restore is to undelete or recover from changes made to Active Directory, a normal restore will not work because this information will be changed during the next replication and never replicated to other DCs. To replace objects or recover from changes, an authoritative restore must be done.

Authoritative Restore


During an authoritative restore, ntdsutil is used to change the update sequence number of an object to be higher than any other update sequence number in the Active Directory replication system. Objects and subtrees can be restored from an archived Active Directory database. The impact of authoritative restore depends on the type of object restored. For example, trust and computer account passwords are negotiated every 30 days by default. (Computer account password negotiation can be turned off by an administrator, but trust password negotiation cannot.) When performing a partial authoritative restore (only some objects will be restored), restore only the necessary objects. For example, rather than restoring the entire domain-naming context in which trust information, trust passwords, and computer passwords are stored, restore only those objects necessary. User accounts are another object that, if they must be restored, require additional work to return their status to the way it was. The section "Recovering Deleted User Accounts: An Example of a Complex Authoritative Restore" illustrates the authoritative restore process and details the impact the object to be restored can have on the process. Before performing an authoritative restore at the object level, you must understand the implications of such an object restore. Examples of issues that you may encounter during authoritative restore are

Resetting the offline administrator password

Recovering from an authoritative restore's impact on computer accounts and trusts

Recovering deleted user accounts

Restoring using a backup older than the Active Directory tombstone lifetime


Resetting the Offline Administrator Account Password

The offline administrator account is also referred to as the authoritative restore administrative account, and it is created and its password is entered during dcpromo. The password for this account can be reset using the setpwd command-line command on a DC in online mode on a Windows Server 2003 DC or a Windows 2000 DC Service Pack 2 and later. On Windows Server 2003, use the set dsrm password command in ntdsutil.

To reset the offline administrators account, follow these steps:


1.

At Start, Run, enter ntdsutil and click OK.

2.

Type set dsrm password.

3.

If the DC console is the one on which the password should be reset, type reset password on server null.

4.

If the DC console is not the DC on which the password should be reset, type reset password on server servername. servername is the DNS name for the server on which you want to set the password.

5.

Enter the new password.

6.

Type q to quit the dsrm command.

7.

Type q to quit ntdsutil.


Recovering from the Impact of Authoritative Restore on Computer Accounts and Trusts

If the trust passwords that are restored do not match the current trust password, communication with domain controllers in the trusted domain will be blocked. If a computer account password is restored and no longer matches that known to the computer, the member computer will not be able to communicate with its domain. In either case, the solution is the same as that required if these passwords ever get out of synch. (Passwords might get out of synch, for example, if a member computer cannot communicate with the domain during the time at which the password should be renegotiated.) To recover a trust relationship, the trust should be removed from both sides and then recreated. If many trusts must be removed and recreated, use the Netdom utility and do them as a batch. To recover communications between a domain computer and its domain, the computer can be removed from the domain and then rejoined.

Recovering Deleted User Accounts: An Example of a Complex Authoritative Restore

If user accounts are accidentally deleted, there are many ways to recover them:

New accounts can be added, but all previous group memberships and privileges will also have to be recreated. Accounts cannot simply be recreated as new users. If they are, they will receive a new SID, and therefore, any permissions granted to the old account will be invalid. If all permissions are assigned according to group membership, the old status can be recovered by adding the user account as a member of the appropriate groups. Any objects owned by the old account will not be owned by the new account. If it is necessary to return ownership of these objects to the user, an administrator can take ownership of the objects and give the user ownership privileges. In a small environment, if one or few accounts have been deleted, this may be an acceptable solution. In other cases, a more efficient way of recovering from deleted user accounts is to do an authoritative restore of the deleted account.

Perform an authoritative restore of the deleted user account, and then the account can be manually added to the appropriate groups.

Perform an authoritative restore of the deleted account and the groups the account was a member of. To do so, you must use a GC domain controller backup from the domain in which the account was deleted. This is because only this GC stores Universal group membership information. The drawback to this method is that if it is used, the additions to security groups prior to the backup used in the restore will be lost and must be manually entered.

In a Windows Server 2003 Active Directory domain, you may be able to use the Repadmin method to authoritatively restore users, groups, and computers without having a backup. To do so, the following conditions must be true: You must have a latent global catalog DC (a GC that has not yet replicated and deleted the accounts); the forest must be at the Windows Server 2003 or Windows Server 2003 Interim forest functional level; only user or computer accounts must have been deleted; and the deleted accounts must have been added after the move to Windows Server 2003 level. If all these things are true, the group membership links can be rebuilt with the outbound replication after the authoritative restore.

In a Windows Server 2003 domain, you may be able to reanimate deleted user accounts.


When authoritative restore is used and the user account contains attributes such as managedBy and memberOf, you may need to do additional work after the restore. This is because these attributes are back links to other objects in the directory. Back links and forward links are attributes that link objects together; for example, the memberOf attribute is a back link in the user account that links the user account to a group account. The member attribute of the group is a forward link that links the group to user accounts. If you must restore an object with a forward link attribute, you must first make sure that the object containing its back link exists within Active Directory. If you must restore user accounts and groups, you cannot restore groups until all of its member accounts exist in Active Directory. (Member accounts may be user accounts, computer accounts, or the accounts of other groups.) This is why authoritative restore of user accounts and the groups they are members of must be done twiceonce to restore the accounts and once to restore the groups.

The process of authoritative restore requires you to restore the most recent backup of the DC or stop the latent GC DC from replicating and then, in both cases, use ntdsutil to authoritatively restore the deleted objects. This is not a trivial undertaking, and your first attempt should be in a test forest. If you must restore deleted user accounts and group memberships, the Microsoft Knowledge Base article 840001, "How to Restore Deleted User Accounts and Their Group Memberships in Active Directory," provides detailed instructions on the process, including command syntax and pointers to more information. The process is outlined next.

To restore user accounts, computer accounts, or security groups, follow these steps:


1.

If a global catalog domain controller exists that has not replicated any part of the deletion, stop it from replicating the deletion by using the following Repadmin command at the command line. This DC will be referred to as the recovery DC. (If you cannot immediately issue this command, remove the DC from the network until you can issue the command, and then immediately return the DC to the network.)


Repadmin /options recoverydcname +DISABLE_INBOUND_REPL

2.

Temporarily stop making changes to user accounts, computer accounts service accounts, security groups, and attributes on these.

3.

Create a new system state backup in the domain where the deletion occurred.

4.

If a GC in the domain replicated the deletion, back up its system state.

5.

Start the recovery domain controller in Dsrepair mode by pressing F8 during startup. You will need to know the offline administrator account password.

6.

Log on to the console using the offline administrator account.

7.

If the recovery domain controller is a latent global catalog domain controller, do not restore the system state; instead, go to step 8. If you are creating a recovery domain controller using a system state backup, restore the most current system state backup.

8.

Authoritatively restore the deleted user accounts, the deleted computer accounts, or the deleted security groups by using the ntdsutil command tool to increment the version numbers of these objects. Order is important here. First, restore the domain name path for each deleted user account, computer account, or security group. Restore the OU or Common-Name (CN) containers that host the deleted user accounts or groups. Repeat for any peer OU that hosts deleted accounts. The ntdsutil command uses the following syntax for authoritative restore:


ntdsutil "authoritative restore" "restore object objectDNpath" q q

9.

Remove network cables from the recovery domain controller unless it was a latent GC DC whose inbound replication has already been disabled. Restart the recovery domain controller in normal Active Directory mode.

10.

If the recovery DC is not a latent GC DC whose inbound replication has already been disabled, issue the following command to do so and then re-enable network connectivity:


Repadmin /options recoverydcname +DISABLE_INBOUND_REPL

11.

Use the following command to perform outbound replication and replicate the authoritatively restored objects:


repadmin /syncall /d /e /P recoverydcname

12.

If the forest does not meet the conditions necessary for automatic rebuilding of group memberships, wait until the user accounts have replicated to all DCs and all GCs, and then add users or computers back to the groups. Ldifde.exe or Addgroup.exe, which are available from Microsoft Product Services, can be used to automate this task.


Restore from Backup Older than Active Directory Tombstone Lifetime

If other DCs in the domain exist, restore the old backup, and the changes to Active Directory will replicate to the DC. You will have to make other system changes unique to this DC that are not integrated in Active Directory.

If all DCs have been destroyed, restore one server from the old backup and create new DCs. The data from the old, restored DC will replicate to the new DCS.

Manually Deleting Objects Restored from an Outdated Backup

If a backup older than the Active Directory tombstone lifetime must be used to restore Active Directory, objects may exist on the restored replica that do not exist on the other DCs in the domain. Although using such a backup is not recommended, it may still be preferable to recreate the domain from scratch. If the backup is used, these objects must be manually deleted. The deletion process will depend on the object that needs to be deleted. It may be possible to use one of the GUI administration tools to delete the object, or you may need to use the adsitedit.exe support tool or some combination of tools to complete the deletion.

For example, if you must delete a DC object from Active Directory and the DC no longer exists, use the information in KB article 247393 (http://support.microsoft.com/default.aspx?scid=kb;en-us;247393). It may be possible to complete the deletion by removing the object from Active Directory Sites and Services, or you may have to use ntdiutil and Adsiedit as detailed in KB article 216498 (http://support.microsoft.com/kb/216498/EN-US/).


/ 194