Thursday, 20 April 2017

Prerequisites: Getting Server 2008 Ready for Backup

Before you can backup Server 2008 you need to install the backup features from the Server Manager.

1. To install the backup features click Start → Server Manager.
How to Backup and Restore Active Directory on Server 2008 - 1
2. Next click Features → Add Features
How to Backup and Restore Active Directory on Server 2008 - 2
3. Scroll to the bottom and select both the Windows Server Backup and the Command Line Tools
How to Backup and Restore Active Directory on Server 2008 - 3
4. Click Next, then click Install

Backing up Server 2008 Active Directory

Now that we have the backup features installed we need to backup Active Directory. You could do a complete server backup, but what if you need to do an authoritative restore of Active Directory?
As you'll notice in Server 2008, there isn't an option to backup the System State data through the normal backup utility.
How to Backup and Restore Active Directory on Server 2008 - 4
So what do we do? We need to go "command line" to backup Active Directory.
1. Open up your command prompt by clicking Start and type "cmd" and hit enter.
2. In your command prompt type "wbadmin start systemstatebackup -backuptarget:e:" and press enter.
Note: You can use a different backup target of your choosing
3. Type "y" and press enter to start the backup process.
How to Backup and Restore Active Directory on Server 2008 - 5
When the backup is finished running you should get a message that the backup completed successfully. If it did not complete properly you will need to troubleshoot.
How to Backup and Restore Active Directory on Server 2008 - 6
Now you have a system state backup of your 2008 Server!

Authoritative Restore of Active Directory

So now what if you accidentally delete an OU, group, or a user account and it's already replicated to your other servers? We will need to perform an authoritative restore of the Active Directory object you accidentally deleted.
1. To do this you will need to boot into DSRM (Directory Services Restore Mode) by restarting your server and pressing F8 during the restart.
2.Choose Directory Services Restore Mode from the Advanced Boot menu.
How to Backup and Restore Active Directory on Server 2008 - 7
3. Login to your server with your DSRM password you created during Active Directory installation.
4. Once you're logged into your server and in DSRM safe mode, open a command prompt by clicking Start, type "cmd", and press enter.
5. To make sure you restore the correct backup it's a good idea to use the "wbadmin get versions" command and write down the version you need to use.
How to Backup and Restore Active Directory on Server 2008 - 8
6. Now we need to perform a non-authoritative restore of Active Directory by typing "wbadmin start systemstaterecovery -version:04/14/2009-02:39".
Note: The version of backup will vary depending on your situation. Type "y" and press enter to start the non authoritative restore.
7. Go grab some coffee and take a break while the restore completes.
How to Backup and Restore Active Directory on Server 2008 - 9
8. You can mark the sysvol as authoritative by adding the –authsysvol switch to the end of the wbadmin command.
How to Backup and Restore Active Directory on Server 2008 - 10
9. But if you want to restore a specific Active Directory object then you can use the ever familiar ntdsutil.
For this example we are going to restore a user account with a distinguished name of CN=Test User,CN=Users,DC=home,DC=local. So the commands would be:
ntdsutil
activate instance ntds
authoritative restore

restore object "cn=Test User,cn=Users,dc=home,dc=local"
Note: The quotes are required
How to Backup and Restore Active Directory on Server 2008 - 11
10. Reboot your server into normal mode and you're finished. The object will be marked as authoritative and replicate to the rest of your domain.

Using Active Directory Snapshots

There is a really cool new feature in Windows Server 2008 called Active Directory Snapshots. Volume Shadow Copy Service now allows us to take a snapshot of Active Directory as a type of backup. They are very quick to create and serve as another line of defense for your backup strategy.
With your server booted into normal mode open a command prompt by clicking Start, type "cmd", and press enter.
We are going to use the ntdsutil again for creating the Active Directory snapshots. The commands are:
ntdsutil
snapshot
activate instance ntds
create
quit
quit

How to Backup and Restore Active Directory on Server 2008 - 12
So now that you have a snapshot of AD, how do you access the data? First we need to mount the snapshot using ntdsutil. The commands are:
ntdsutl
snapshot
list all

mount 1 -- (Note: You should mount the correct snapshot you need; for this example there is only 1.)
quit
quit
How to Backup and Restore Active Directory on Server 2008 - 13
Your snapshot is mounted, but how do you access the data? We need to use the dsamain command to accomplish this. Then we need to select an LDAP port to use. The command is as follows:

dsamain –dbpath c:\$SNAP_200905141444_VOLUMEC$\WINDOWS\
TDS\
tds.dit –ldapport 10001
The result should look like this:
How to Backup and Restore Active Directory on Server 2008 - 14
Now we need to go to StartAdministrative Tools, then Active Directory Users and Computers.
Right click Active Directory Users and Computers and select Change Domain Controller.
How to Backup and Restore Active Directory on Server 2008 - 15
In the area that says < Type a Directory Server name [:port] here > enter the name of your server and the LDAP port you used when running the dsamain command.
For my example it would be: WIN-V22UWGW0LU8.HOME.LOCAL:10001
How to Backup and Restore Active Directory on Server 2008 - 16
Now you can browse the snapshot of Active Directory without affecting anything else negatively.

Your AD Backup Strategy

It's always good to have a solid backup plan for your Active Directory. You can use a combination of backup strategies or just one of these methods for backing up your Active Directory.

Source: https://www.pluralsight.com/blog/tutorials/backup-and-restore-active-directory-on-windows-server-2008

Friday, 25 November 2016

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-Vw5h-E_bqgha_OiTUS3_nIpcuUQPkicLBY_DiHgdN6sAxW3ceddvSEkUPnVtJC8SQIWTIHmzOoSPhuIMUbKDbskFM05_9sf6TIIH1huytr51YNWq3Yxpo86eBGBLMWNdzAAvdXIDtsU/s400/boot_error_status_0xC000000F.png

Cause and Fix
The most likely cause of this error is that you tried to dual boot two operating systems and then later decided to remove one. This inadvertently may have deleted the bcd boot store. The trick here is to run the above commands in the right order and set your boot partition to active. Let’s get started.
Make sure your boot partition is set to Active
Boot from your DVD and choose the repair option. From the recovery console type “diskpart” and press enter and then type “list disk” to get a list of physical disks installed.
Running diskpart to fix bcd bood errorIn the example here I only have one disk in my machine, if you have more than one identify the disk which has the Windows boot partition on it and then select it. Select it by typing “select disk 0” (in my case). Now type “list partition”. The Windows 7 boot partition is a 200 MB primary partition. As you can see here it was on disk 0. Select it by typing “select partition 2” or whichever number matches your 200MB partition.
Set the partition to ActiveNow type “detail partition” and look where it says “Active”. If it says yes then move onto the next section otherwise type “Active” and press enter, Windows should report the partition is now marked as active. Now reboot and boot into the recovery console again.
Repair the MBR and boot sectors
From the recovery console run these commands in this order:
§  bootrec /fixmbr
§  bootrec /fixboot
Now reboot the machine again into the recovery console and type “bcdboot path to your windows folder“.  Your windows folder will normally be c:\windows but in the recovery console it may show up as D:\windows so make sure you get the path right. In my case it was “bcdboot d:\windows”. This will will build a new bcd boot store and copy over all boot files needed to boot. Now reboot your machine one last time and it should work. If it doesn’t run the two bootrec commands again.
If you have any additional operating systems you want to add use the bootrec /scanos command.


Monday, 21 November 2016

Tuesday, 23 August 2016


  1. Workplace Join - Allow a user to associate their personal device with the company directory.
    Web Application Proxy Topology
  2. Web Application Proxy - Provides access to web application using a new Remote Access role service. Web Application Proxy “provides reverse proxy functionality for web applications inside your corporate network to allow users on any device to access them from outside the corporate network.
  1. Active Directory Federation Services - AD FS has simplified deployment and improvements to enable users to access resources from personal devices and help IT departments manage access control.
  2. SPN and UPN uniqueness - Domain Controllers running Windows Server 2012 R2 block the creation of duplicate service principal names (SPNs) and user principal names (UPNs).
  3. Winlogon Automatic Restart Sign-On (ARSO) - Enables lock screen applications to be restarted and available on Windows 8.1 devices.
  4. TPM Key Attestation - Enables CAs to cryptographically attest in an issued certificate that the certificate requester private key is actually protected by a Trusted Platform Module (TPM).
  5. Credentials Protection and Management - New credential protection and domain authentication controls to reduce credential theft.
  6. Deprecation of File Replication Service (FRS) - The Windows Server 2003 domain functional level is also deprecated because at the functional level, FRS is used to replicate SYSVOL. That means when you create a new domain on a server that runs Windows Server 2012 R2, the domain functional level must be Windows Server 2008 or newer. You can still add a domain controller that runs Windows Server 2012 R2 to an existing domain that has a Windows Server 2003 domain functional level; you just can’t create a new domain at that level.
  7. New domain and forest functional levels - There are new functional levels for Windows Server 2012 R2. New features are available at Windows Server 2012 R2 DFL.
  8. LDAP query optimizer changes - Performance improvement in LDAP search efficiency and LDAP search time of complex queries.
  9. 1644 Event improvements - LDAP search result statistics were added to event ID 1644 to aid in troubleshooting.
  10. Active Directory replication throughput improvement - Adjusts the maximum AD Replication throughput from 40Mbps to around 600 Mbps
WHICH FEATURES ARE INCLUDING IN ADDS IN SERVER 2012 ?
  1. Dynamic Access Control - New claims-based authorization platform that enhances the legacy access control model.
  2. DirectAccess Offline Domain Join - Extends offline domain-join by including DirectAccess prerequisites.
  3. Active Directory Federation Services (AD FS) - Adds role install via Server Manager, simplified trust-setup, automatic trust management, SAML-protocol support, and more.
  4. Windows PowerShell History Viewer - Allow administrators to view the Windows PowerShell commands executed when using ADAC
  5. Active Directory Recycle Bin User Interface - Recycle bin feature originally introduced in Windows Server 2008 R2. But in this edition Active Directory Administrative Center (ADAC) adds GUI management of Recycle Bin User Interface.
  6. Fine-Grained Password Policy User Interface - ADAC adds GUI support for the creating, editing and assignment of PSOs originally added in Windows Server 2008.
  7. Active Directory Replication and Topology Windows PowerShell cmdlets - Supports the creation and management of Active Directory sites, site-links, connection objects, and more using Windows PowerShell.
  8. Active Directory Based Activation (AD BA) -
  9. Group Managed Service Accounts (gMSA)
ADDS INCLUDES SOME INSTALLATION FEATURES IN SERVER 2012.
  1. Adprep.exe integration into the AD DS installation process
  2. The AD DS server role installation, which is built on Windows PowerShell and can be run remotely on multiple servers
  3. Prerequisite validation in the AD DS Configuration Wizard. Identifies potential errors before the installation begins. You can correct error conditions before they occur without the concerns that result from a partially complete upgrade.
  4. Configuration pages grouped in a sequence that mirror the requirements of the most common promotion options, with related options grouped in fewer wizard pages.
  5. A wizard that exports a Windows PowerShell script that contains all the options that were specified during the graphical installation

Courtesy: http://solveme.net/index.php/windows-ad/23-what-s-new-in-active-directory-domain-services-in-server-2012.html

Friday, 27 May 2016


Friday, 20 May 2016

Simply get to a run command (Start>Run) or a  command prompt (Start>Run>CMD [enter])

Admin Applet
Command
AD Domains and Trusts
domain.msc
Active Directory Management
admgmt.msc
AD Sites and Services
dssite.msc
AD Users and Computers
dsa.msc
ADSI Edit
adsiedit.msc
Authorization manager
azman.msc
Certification Authority Management
certsrv.msc
Certificate Templates
certtmpl.msc
Cluster Administrator
cluadmin.exe
Computer Management
compmgmt.msc
Component Services
comexp.msc
Configure Your Server
cys.exe
Device Manager
devmgmt.msc
DHCP Management
dhcpmgmt.msc
Disk Defragmenter
dfrg.msc
Disk Manager
diskmgmt.msc
Distributed File System
dfsgui.msc
DNS Management
dnsmgmt.msc
Event Viewer
eventvwr.msc
Indexing Service Management
ciadv.msc
IP Address Manage
ipaddrmgmt.msc
Licensing Manager
llsmgr.exe
Local Certificates Management
certmgr.msc
Local Group Policy Editor
gpedit.msc
Local Security Settings Manager
secpol.msc
Local Users and Groups Manager
lusrmgr.msc
Network Load balancing
nlbmgr.exe
Performance Monitor
perfmon.msc
PKI Viewer
pkiview.msc
Public Key Management
pkmgmt.msc
Quality of Service Control Management
acssnap.msc
Remote Desktop
tsmmc.msc
Remote Storage Administration
rsadmin.msc
Removable Storage
ntmsmgr.msc
Removable Storage Operator Requests
ntmsoprq.msc
Routing and Remote Access Manager
rrasmgmt.msc
Resultant Set of Policy
rsop.msc
Schema management
schmmgmt.msc
Services Management
services.msc
Shared Folders
fsmgmt.msc
SID Security Migration
sidwalk.msc
Telephony Management
tapimgmt.msc
Terminal Server Configuration
tscc.msc
Terminal Server Licensing
licmgr.exe
Terminal Server Manager
tsadmin.exe
Teminal Services RDP
MSTSC
Teminal Services RDP to Console
mstsc /v:[server] /console
UDDI Services Managment
uddi.msc
Windows Mangement Instumentation
wmimgmt.msc
WINS Server manager
winsmgmt.msc

Unordered List

Sample Text

Popular Posts