Preview

Active Directory – Backup, Restore, and Monitor

Good Essays
Open Document
Open Document
503 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Active Directory – Backup, Restore, and Monitor
Active Directory – Backup, Restore, and Monitor
The first thing I would do in implementing an Active Directory backup strategy is to install Windows Server Backup via the Server Manager console. Alternatively, this can be done via the command line assuming you have already installed the Windows PowerShell, or are running Windows Server 2008 in which it is included. This backup will be created to a CD or DVD and cannot be done to magnetic tapes or dynamic volumes. I would set up a scheduled backup, as opposed to a manual backup, using the Windows Server Backup utility. Again, this can be done via the command line using Wbadmin, but optimally, I’d stick to the Windows interface. It is important to note that these backups format this scheduled backup will format the drive to which it is writing the backup so one should use a local drive that does not host any critical files.
The information this automatic backup would backup is:
The system volume, including bootmgr.exe and the Boot Configuration Data
The boot volume, which hosts the Windows OS and the Registry The SYSVOL volume
The Ntds.dit that hosts the Active Directory Database.
The volume containing Active Directory Log Files
The volume that one writes this backup to must be at least 1MB larger than the critical volumes one is backing up.
I would ensure that replication exists between each domain controller in the forest. This replication would ensure fault tolerance, as well as availability and accessibility. I would use WBadmin to restore the database to its last known good configuration via a non-authoritative restore. Following this restoration method, replication will update information on all other domain controllers. If the Administrator fears that a mistake has already been written to other Domain Controllers via replication, an authoritative restore can be done through the NTDSutil command line utility that would mark that restored database as authoritative and thus overwrite the erroneous

You May Also Find These Documents Helpful

  • Satisfactory Essays

    I am the IT Administrator for the company and I have been asked to give my recommendations for the Active Directory Replication Design of the two new Branches. The first I can recommend for you is that all the information that is needed for each new site is correctly documented and added to the Root Active Directory through the Active Directory sites and services. This is done because the Root AD automatically builds the inter-site replication topology based on the information provided about the new site connections. Each new site’s AD will have one each domain controller that is known as the inter-site topology generator and they are assigned to build the topology at their sites.…

    • 670 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    5. In the console tree, right-click Active Directory Schema, and then click Operations Master. The Change Schema Master box displays the name of the server that is currently holding the schema master role. The targeted domain controller is listed in the second…

    • 585 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    When creating a multi-layered security plan, I would look at all seven domains of the IT infrastructure and then increase the security on each of those domains because that will increase the security for the whole plan. In the user domain, this is the quickest way for the system to be compromised the users. So I would implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will also need to be changed every 90 days and the same password cannot be used again for three calendar years. In the workstation domain, I would make sure that each workstations, whether desktop or laptop has some security on it like antivirus and malware protection installed. Laptops can be very vulnerable for loss or theft, which would make me install an encrypted hard drive so if it is stolen the data can only be retrieved by the owner. For the LAN domain, just train all users about email scams. I would guess that most users know not to access suspicious emails when on our system but I would still implement to the users a quick training course. Then I we should add spam filters this will help get rid of most of the junk email. In the LAN-to-WAN domain, we need to shut down the File Transfer Protocol (FTP) server we have running and switch it over to use secure FTP so that only users allowed on our system can access our FTP server. In the WAN domain, we need to make sure that we have firewalls set up on our network that will filter all incoming traffic. This firewall will stop all traffic coming on to our system that is not meant or not wanted our network. In the Remote Access Domain, we need to establish strict user password policies, as well as lockout policies to defend against brute force attacks, require the use of authorization tokens have a real-time lockout procedure if token is lost, or stolen. The last domain is System/Application domain we need to…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    2. If you wanted to restore the entire Active Directory database authoritatively, what command in ntdsutil do you use instead of restore subtree?…

    • 1334 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    disk as your system drive? The K: Drive is on the same internal harddisk if the Harddisk fails the backup is lost also. That is why it is important that OM image is backed up externally in case of hard disk failure. If windows becomes corrupt on the system partition you can use the OM image that was partitioned to recover it. That is the one instance that image is viable.…

    • 776 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    storage reports, configuration of disk quotas, and use of filters for files users can store on the server…

    • 103696 Words
    • 415 Pages
    Powerful Essays
  • Satisfactory Essays

    There are many was to secure a business either small or large. If synchronizing the servers between each other, this process will create a backup of all the data between the servers, as well for arranging an off-site backup location to protect any further loss or corruption.…

    • 268 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    A reasonable approach for an AD password policy, this will be determined by how, & what your ideas are and what your trying to accomplish. I know that you’d mention that a competitor has recently been hack into and security is the number one thing that should be addressed. This does not have to mean that you have to lose productivity over trying to secure your networks information. Simple measure like user names and passwords can be used to protect less sensitive information however how strong you make those usernames and passwords can have a great effect on how well your information is protected.…

    • 428 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    There are four backup types: mirror backup, full backup, differential backup and incremental backup. Following is a quick overview of each type of backup.…

    • 397 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Fail-safe Equipment

    • 497 Words
    • 2 Pages

    Corporations today budget for the purchase of extra servers for the main servers for their organization. These extra servers are configured so that they will automatically take over functionality if the main servers stop processing services due to outside attacks or even hardware failures. Any event or transaction that occurs in the main server is continuously replicated to the hard-drive memory of the redundant servers. This replication allows for either server to take control when one of them fails. The dis-advantages for this concept is the extra cost of equipment, additional maintenance, and the need for constant testing in order to verify functionality in case of emergency.…

    • 497 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Video Cards

    • 330 Words
    • 2 Pages

    An internal hard drive serves as a bootable device containing operating system information as well as storage for a…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    History of Dos

    • 2804 Words
    • 12 Pages

    Makes a backup copy of one or more files. (In DOS Version 6, this program is stored on the DOS supplemental disk.)…

    • 2804 Words
    • 12 Pages
    Good Essays
  • Satisfactory Essays

    windows 7 boot process

    • 346 Words
    • 2 Pages

    1. The MBR at 0000h:7C00h finds and loads the Volume Boot Sector and the NT Boot…

    • 346 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    6. This will bring you back to the Disc Content window. You can see ‘how much space’ you will use with this write operation. Click ‘Next’ to move on to the next step, or on the ‘More’ button for additional options.…

    • 776 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Bootable Media

    • 423 Words
    • 2 Pages

    Bootable media is physical media (CD, DVD, USB flash drive or other removable media supported by a machine BIOS as a boot device) that boots on any PC-compatible machine and enables you to run Acronis Backup & Recovery 11.5 Agent either in a Linux-based environment or Windows Preinstallation Environment (WinPE), without the help of an operating system. Bootable media is most often used to:…

    • 423 Words
    • 2 Pages
    Satisfactory Essays