Win2003(Commands).Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Win2003(Commands).Pdf SYSTEM At macfile directory: This command modifies directories in "@file.bks" The name of the file created with the GUI version Macintosh-accessible volumes. It allows you to do such of NTBackup which includes the list of files to back up. {System root}\system32 things as changing the owner of the directory, specifying or /j "job": The name of the job. You should put this in quotes. Schedules tasks to run on the specified system at a specific changing the Macintosh primary group associated with the [/p "pool"]: The media pool you would like to use for the date and time. directory, and setting permissions on the directory. backup. Invalidates use of the /a, /f, /g and /t parameters. at [\\computer name] [{[task id] [/delete [/yes]]}] macfile directory [/server:\\computer] /path:directory [/g "GUIDName"]: Specifies that the target tape should be at {[\\computer name] time [/interactive] [/every: | /next:] [/owner:name] [/group:group] [/permissions:permissions] overwritten or appended to. [/t "tape"]: The name of the tape. command} [/server:\\computer]: The server on which the directory should [/n "media"]: The new name of the tape. No parameters: Displays a list of the scheduled tasks on the be changed. The default is the local machine. [/f "file"]: The file to which you would like to write the contents local system. directory: The directory you would like to change. /path: of the backup. \\computer name: Run the command against the name of the [/owner:user]: Changes the ownership of the directory to the [/d "description"]: The description of the backup set. system specified. specified user. [/ds "server"]: The name of an Exchange server for which the [task id] [/delete [/yes]]: The ID of the task you wish to view group]: Changes the Macintosh primary group to the [/group: directory service file should be backed up. or delete. Specify /delete to delete this task and /delete /yes name specified. [/hc: {on | off}]: Enable or disable hardware compression. to delete it without a warning prompt. [/permissions:permissions]: Sets permissions on the [/is "server"]: The name of an Exchange server for which the time: Specify the hour:minute in 24 hour notation at which you directory. information store should be backed up. would like to run the command. macfile server: This command changes the SFM server [/a]: Appends the backup to the media set. Requires the use of [/interactive]: Allows the command specified to interact with configuration. You’ll use it to specify the maximum number of /g or /t. the desktop with the credentials of the logged in user. users that can use SFM, change the logon message [/l:{f | n | s}]: The type of log file that will be created for this [/every: | /next:]: Enter the name of the day (M,T,W,Th,F,S,Su) Macintosh users see, and specify whether guest users are job. f=full, n=none, s=summary only. or the day of the month that the command should be run. allowed to access the server. [/m {normal | copy | differential | incremental | daily}]: Multiple entries can be entered by separating them with Specifies the type of backup that should be performed. commas. /every runs the command on every day specified macfile server [/server:\\computer] [/maxsessions: Only these five options are permitted. The default is normal. while /next runs it on the next occurrence of that date. {number | unlimited}] [/loginmessage:message] [/r:{yes | no}]: Restricts access to the resulting to the owner of command: The command that is scheduled to be run. [/server:\\computer]: The server on which you wish to change parameters. The default is the local machine. the job or a member of the Administrators group. Cprofile [/maxsessions:{number | unlimited}]: The maximum number [/rs:{yes | no}]: Backs up migrated data files in Remote Storage. {System root}\system32 of users that can use the service simultaneously. [/loginmessage:message]: Provide a message of up to 199 [/snap:{on | off}]: Should the backup use the raw data or Cleans profiles of wasted space to free up disk space and characters that is shown to the Macintosh user upon login. should it back up from the contents of a volume shadow optimize system performance. To remove a message, include this parameter but leave the copy? On=use the shadow, off=use the raw data. cprofile [/i] [/l] [/v] file list value blank. [/v:{yes | no}]: Should the integrity of the backup be verified when it is complete? [/I]: For each profile, the user is prompted to approve the action. macfile forkize: This command joins the data fork and [/l]: Cleans all local profiles. When /l is specified, a file list is resource fork of a Macintosh file into one file. You can also Regsvr32 not required. use Macfile forkize to change the type or creator of the file. [/v]: Verbose. Provides detailed information on the progress of {System root}\system32 macfile forkize [/server:\\computer] [/creator:name] the operation. Registers a DLL. [/type:name] [/datafork:path] [/resourcefork:path] file list: The list of files from which user-specific file /targetfile:path regsvr32 [/i[:cmdline]] [/n] [/s] [/u] dllName associations should be removed. [/server:\\computer]: The server on which you wish to [/i[:cmdline]]: A command line that will be passed through to dllinstall. on of this publication in any form is prohibited. Date change parameters. The default is the local machine. [/n]: Used with /i only. Indicates that DllRegisterServer is not to {No executable. Part of the command shell.} [/creator:name]: Specify the name of the person who created the file. be called. Shows or sets the system date [/type:name]: The type of the file [/s]: Run regsvr32 in silent mode with no messages. date [month-day-year]] [/t] [/datafork:path]: The location of the data fork to join. A remote [/u]: Uninstall the dll specified. dllName: The name of the dll to register or uninstall. No parameters: Prompts the user for the date. location is allowed. [/resourcefork:path]: The location of the resource fork to join. month-day-year: The month, day and year to which to set the Runas date. The year can be provided with two or four digits. A remote location is allowed. [/t]: Just displays the current date. /targetfile:path: The location of the resulting file. {System root}\system32 Allows a program to be run within the context of a different Exit Ntbackup user. {No executable. Part of the command shell.} {System root}\system32 runas [/env] [/netonly] [/profile | /noprofile] /user: Exits the command shell or script. The built-in Windows backup utility. Supports Exchange when username program Exchange is installed. exit [/b] [code] [/env]: Uses the current network environment rather than the ntbackup backup [systemstate] "@file.bks" /j "job" user’s local environment. No parameters: Exit the current shell. [/p "pool"] [/g "GUIDName"] [/t "tape"] [/n "media"] [/netonly]: The information provided is for remote access only. [/b]: Exits the running batch script. [/f "file"] [/d "description"] [/ds "server"] [/hc:{on | off}] [/profile | /noprofile]: /profile will load the user’s profile and is [code]: The code with which to terminate the command shell [/is "server"] [/a] [/l:{f | n | s}] [/m {normal | copy | the default behavior. Specify /noprofile to avoid loading the or script. differential | incremental | daily}] [/r:{yes | no}] user’s profile. Macfile [/rs:{yes | no}] [/snap:{on | off}] [/v:{yes | no}] /user:username: The account under which the application should run in domain\user format. {System root}\system32 backup: Required parameter [systemstate]: Will include system state information in the program: The program to run. Allows command line management of the Services for backup. Macintosh. FILE SYSTEM Cacls /p: user:permission: Replaces the current access rights with chkntfs /x volume:[volume:] […] the specified permissions for the user provided. (see below {System root}\system32 volume: Required unless other parameters are specified. for permission table) Shows the volume type (FAT/FAT32/NTFS) of the volume as View or modify the access control list (ACL) on the files specified. [/d]: Denies access to the specified user. well as whether or not it is dirty. cacls <filename> [Options] Permission table /c: Includes the volume in the list to be checked at system start. [Options] n: none /d: Restores chkntfs settings to their defaults which scan each [/t] [/e [/r user [/r user] […]]] [/c] [/g user:permission] r: read volume at system boot. [/p user:permission [...]] [/d user [/d user] […]] w: write /t[:time]: When a time is specified, this is the amount of time Filename: The filename for which to view or modify ACLs. c: write/change/modify that is used by the countdown timer. When specified without When specified without options, displays the ACL. f: full control a time: displays the current value for the parameter. [/t]: Changes the ACL of the specified file(s) in both the current /x: Excludes the volume from being checked at system start. and all subdirectories. Chkntfs [/e]: Specifies that the ACL is edited rather than replaced. {System root}\system32 Cipher [/r user]: Revokes the access rights for the user specified. Manages whether or not an automatic volume check of a FAT, {System root}\system32 Must be used with /e. FAT32 or NTFS drive will take place at system start. Show or modify the state of encryption on files and folders. [/c]: Continues with the process even when errors are chkntfs volume: [volume:] cipher encountered. chkntfs /c volume: [volume:] […] No parameters: Shows the encryption status of every file in [/g]: user:permission: Grants the permission specified to the chkntfs /d the current directory. user provided. (see below for permission table) chkntfs /t[:time] Continued on next page © 1995-2003 CNET logo are trademarks of CNET and its reserved.
Recommended publications
  • Backing up and Recovering Virtual Machines
    4959_Ch07_CMP3 4/20/05 5:30 PM Page 223 CHAPTER 7 ■ ■ ■ Backing Up and Recovering Virtual Machines For virtual machines running in a production environment, backup and recovery is just as serious as for all the other servers on the network. When running servers inside VMs, you’ll be faced with several new challenges, as well as advantages, when planning and implementing a backup strategy. In this chapter, you’ll explore the process of planning for and administering backup and recovery operations on VMs and VM hosts. Along the way, you’ll see the different approaches you can take to secure VM data, which include the following: •Traditional agent-based backups •Non-agent-based backups •Flat-file backups Also, many organizations have embraced the idea of maintaining a warm standby VM server that can be brought online if a primary server fails. This approach, for many organiza- tions, may mean that data is unavailable for a few minutes following the loss of a server. If you can’t afford to cluster all your systems, or if some of your applications don’t support clustering, then you may find this approach to be a perfect fit. Since the focus of this chapter is purely on VM backup and recovery, we’ll walk you through the process of maintaining a standby VM server in Chapter 14. Optimizing your backup strategy often means much more than simply installing software and letting it do its magic. Oftentimes, custom scripting is required to get the backup results you desire. Because of the importance of getting your virtual infrastructure to work around your needs (instead of the other way around), we’ll also show you several scripting ideas to both enhance and automate the backup, recovery, and availability of your VMs.
    [Show full text]
  • Don't Hyper-Ventilate Over Hyper-V Backup!
    Don’t Hyper-Ventilate over Hyper-V backup! A straightforward solution to Hyper-V backup Presented by Linus Chang, Lead Developer of BackupAssist The theme of today is... Hyper-V! Today’s agenda 1. The causes of discomfort and concern 2. Solving the difficulty problem 3. Solving the price problem 4. What else can BackupAssist do? The causes of discomfort and concern Quick recap of the causes of Hyper-V hyperventilation: 1 Difficulty = stress = nervous breakdown Traditional backup methods don’t hit the spot! Not straightforward to image guests: no USB pass through How to back up multiple machines? 2 Price gives your client a heart attack Install a license on each guest machine? Install an expensive “special version” or “agent” to allow unlimited guest backups? Solving the difficulty problem The difficulty problems The difficulty problems: Recovery scenarios with a normal server Recovery scenarios Installation – on host or guest or both? Recovery scenarios with a hyper-v server One-pass or two-pass backup? BackupAssist handles all recovery scenarios One pass – backup the physical host only VM #1 VM #2 VM #3 Backup device Physical Server Two pass – backup the physical host first, VM #1 then the virtual guests VM #2 VM #3 Backup device Physical Server Solving the difficulty problem The problems Recovery scenarios with a normal server: Recovery scenarios with a normal server Recover the entire server from bare metal Recovery scenarios Recover specific files and folders with a hyper-v server Recover a complete Exchange Server BackupAssist
    [Show full text]
  • Dell Feature and Functional Testing for Windows Server 2008
    Dell Feature and Functional Testing for Windows Server 2008 By Barun Chaudhary and Manjunath Narayanan April 2008 Windows Server® 2008 is Microsoft’s first major Server Operating System release in five years. Dell’s close partnership with Microsoft has allowed engagement with the testing and development of this operating system for more than 4 years. Some of the highlights of Dell’s testing efforts include compatibility tests on Dell™ PowerEdge™ server platforms, testing upgrade and migration scenarios, and testing compatibility of OpenManage™, the Dell systems management software. Whenever there were new features or technology included with the Milestone or Beta releases, Dell endeavored to ensure that as many of our platforms and OpenManage components were ready to support those features as possible. Based on the current status of testing, Dell is committed to supporting more than 40 currently shipping and legacy server platforms across 5 generations with Windows Server 2008. Supporting this number of servers has required significant development efforts to help ensure good customer experience. Dell has a set of internal tools to track various parameters like test results, defect tracking, total time spent, driver or firmware changes, etc. Dell estimates it has spent more than 1800 hours testing currently shipping and future Dell servers for compatibility with Windows Server 2008. An additional 1700+ hours were spent at Dell to help ensure OpenManage will be compatible with Windows Server 2008 on as many platforms as possible. To serve this purpose more than 30 different configurations were tested on different Dell platforms. In addition to these efforts, Dell has spent more than 750 hours testing various Windows Server 2008 features on the entire supported server line.
    [Show full text]
  • Windows Tool Reference
    AppendixChapter A1 Windows Tool Reference Windows Management Tools This appendix lists sets of Windows management, maintenance, configuration, and monitor- ing tools that you may not be familiar with. Some are not automatically installed by Windows Setup but instead are hidden away in obscure folders on your Windows Setup DVD or CD- ROM. Others must be downloaded or purchased from Microsoft. They can be a great help in using, updating, and managing Windows. We’ll discuss the following tool kits: ■ Standard Tools—Our pick of handy programs installed by Windows Setup that we think are unappreciated and not well-enough known. ■ Support Tools—A set of useful command-line and GUI programs that can be installed from your Windows Setup DVD or CD-ROM. ■ Value-Added Tools—Several more sets of utilities hidden away on the Windows Setup CD-ROM. ■ Windows Ultimate Extras and PowerToys for XP—Accessories that can be downloaded for free from microsoft.com. The PowerToys include TweakUI, a program that lets you make adjustments to more Windows settings than you knew existed. ■ Resource Kits—A set of books published by Microsoft for some versions of Windows that includes a CD-ROM containing hundreds of utility programs. What you may not have known is that in some cases you can download the Resource Kit program toolkits with- out purchasing the books. ■ Subsystem for UNIX-Based Applications (SUA)—A package of network services and command-line tools that provide a nearly complete UNIX environment. It can be installed only on Windows Vista Ultimate and Enterprise, and Windows Server 2003.
    [Show full text]
  • The Real MCTS MCITP Exam 70-648 Prep
    Chapter 5 MCTS/MCITP Exam 648 Maintaining an Active Directory Environment Exam objectives in this chapter: ■ Backup and Recovery ■ Offline Maintenance ■ Monitoring Active Directory Exam objectives review: ˛ Summary of Exam Objectives ˛ Exam Objectives Fast Track ˛ Exam Objectives Frequently Asked Questions ˛ Self Test ˛ Self Test Quick Answer Key 355 356 Chapter 5 • Maintaining an Active Directory Environment Introduction Being able to implement a Windows Server 2008 Active Directory environment is only half the battle. You must also be able to maintain the environment to provide minimum downtime and optimum performance of your enterprise. Various solutions and strategies come into play as part of maintenance. Some can be seen as larger “disaster recovery” components, whereas others may simply be “tweaking” the environment to improve user experience. In some situations, “maintenance” may fall somewhere in between—a user account is accidentally deleted, a file is accidentally deleted, or replication is under- performing or not performing at all! In this chapter, you will learn about the many maintenance and management tools offered as a part of Windows Server 2008, as well as some solutions to better improve your Windows Active Directory environment. These topics will be critical not only to your exam success, but also to your success as an IT professional. We will begin this section with a discussion of Windows Server Backup and how it has changed drastically from earlier versions of the Windows server product. Backup and Recovery Most people never think about backup and recovery until they need it. Microsoft has been shipping a simple backup solution with Windows since Windows NT 3.1 back in 1993.
    [Show full text]
  • OTRS: FAQ#100066 / How to -- Backup Exchange
    FAQ#100066 How To -- Backup Exchange Server Stores 09/27/2021 20:25:14 FAQ Article Print Category: Vault Votes: 0 State: public (all) Result: 0.00 % Language: en Last update: 12:05:29 - 11/03/2015 Keywords backup,Exchange,stores Symptom (public) Problem (public) Solution (public) Overview When using the Select service plan we support live backup of Exchange 2003, Exchange 2007, Exchange 2010 (or better) on Windows Server 2003 or 2008 (or better). For these configurations backup is done natively using the Volume Shadow Copy Service (VSS). We fully support older versions of Exchange on Windows Server 2003, but require a few seconds of downtime while a volume snapshot is taken. For older versions of Exchange Server on older versions of Windows you can either (a) backup a copy of Exchange database (recommended), or (b) use the ntbackup program that comes with Windows (or other backup software) to backup your Exchange Server Database to a file on a regular basis and use our software to backup these backup files remotely. Exchange Server 2003 or 2008 or 2010 (or better) on Windows Server 2003 or 2008: - Create a sub-account for each Exchange Server machine, as needed. - Login to each Exchange Server machine as a windows user that has rights to read the Exchange Server database files (*.edb, *.stm, *.log, *.chk). - Install and configure our software on each Exchange Server. - Use the Folders page to add the folder (directory) containing your Exchange Server database files (*.edb, *.stm, *.log, *.chk) to the backup. If your logs are stored in a separate directory (recommended) then you should also add the folder containing the transaction logs to the Folders page also.
    [Show full text]
  • Primary Backup Objective Is Fast Server Recovery
    Primary Backup Entire System Data – Files, Emails, Databases, Documents Including Windows Installation Not Important Important Critical Ultra Critical Primary Backup – Drive Imaging Primary Backup objective is fast server recovery www.BackupAssist.com Drive Imaging – Server 2008 Highlights: Fast recovery – boot from CD to start restore VSS Aware Automatic disk management Fast differential images Built into the Operating System Lowlights: Technology limitations, poor usability, management and reporting www.BackupAssist.com Drive Imaging – Server 2008 How it works – first backup www.BackupAssist.com Drive Imaging – Server 2008 How it works – second backup www.BackupAssist.com Drive Imaging – Server 2008 How it works – third backup www.BackupAssist.com Drive Imaging – Server 2008 From our testing, it handles Hardware Independent Restores (HIR) Physical to physical (P2P) Intel Xeon Dual Processor Dual Core Server AMD Phenom Single Processor Quad Core Desktop Acer Laptop AMD Sempron Desktop Physical to virtual to physical (P2V, V2P) using VMWare Server AMD Phenom Quad Core VM on AMD Sempron Single Core Intel Xeon Dual Proc Dual Core Intel Xeon Dual Proc Dual Core VM on AMD Sempron Single Core AMD Phenom Quad Core Despite our best efforts, we couldn’t actually break it! www.BackupAssist.com Drive Imaging – Server 2008 Technological limitations / gotchas of the Windows Backup Engine: Backups are not copyable You must restore to a disk of the same size or bigger You are not guaranteed any level of backup history No tape drive support www.BackupAssist.com Drive Imaging – Server 2008 Wizard Limitations Wizards are built-into Server 2008 and SBS 2008 Unfortunately there are many limitations in the wizards that limit their usefulness Enter BackupAssist Just like we added scheduling, management and reporting features for NTBackup, so too we do it for Windows Server Backup, so it’s as reliable as other imaging products that cost thousands of dollars.
    [Show full text]
  • Snapmanager for Microsoft Exchange Server Administration Guide
    SnapManager® 7.2 for Microsoft® Exchange Server Administration Guide January 2019 | 215-10626_C0 [email protected] Table of Contents | 3 Contents Product overview .......................................................................................... 8 Backing up and verifying your databases ................................................ 10 SnapManager backup overview ................................................................................ 10 SnapManager naming conventions ............................................................................ 10 Defining a backup strategy ........................................................................................ 11 Backing up your databases for the first time ............................................................. 14 Verifying the initial backup set .................................................................................. 15 Scheduling recurring backups ................................................................................... 16 Scheduling frequent recovery point backups ............................................................ 17 Backup planning for databases in DAGs ................................................................... 17 Backing up using the Backup wizard ........................................................................ 19 Creating backups using the Backup and Verify window ........................................... 20 Using the remote additional copy backup feature ....................................................
    [Show full text]
  • Online Or Offline Backup? Volume Shadow Copy
    environment and when you had installed Exchange 2003 on this system, NTBACKUP is enhanced to allow backups of your Exchange Server databases. NTBACKUP features • Local and remote backup of data • Exchange Backup ready • Scheduled Backups • Volume Shadow Copy support • Integration with Removable Storgae from Windows 2003 How do you enhance NTBACKUP with the capability to Backup Exchange 2003 without installing Exchange Server? You must install the Exchange System Manager on the Backup Server to backup Exchange Server. It is possible to backup the Exchange Server without Exchange System Manager with the following trick: Copy ESEBCLI2.DLL from the Exchange 2003 CD into the EXCHSRVR\BIN folder Add the following registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\BackupRestore\DLLPaths – REG_EXPAND_SZ - esebcli2 - c:\exchsrvr\bin\esebcli2.dll. After modifying the registry you can use NTBACKUP to backup the remote Exchange Server by clicking – Tools – Remote Store. Online or Offline Backup? It is possible to Backup Exchange Online or Offline. The recommended method is to Backup the Exchange Server Online. An online backup can backup the Exchange Server databases without the interruption of Exchange services. An offline backup is a simple copy of the Exchange database files. The Exchange Information store must be stopped before NTBACKUP can be used to Backup your Information store. Volume Shadow Copy Beginning with Exchange 2003 it is possible to do Exchange 2003 Volume Shadows Copy backups with 3rd party Backup applications, but not with the built-in Windows Server 2003 NTBACKUP utility. The Volume Shadow Copy service coordinates its communication between Requestors (backup applications), Writers (applications like Exchange Server 2003), and Providers (software or hardware components that create the shadow copies).
    [Show full text]
  • Restoring Exchange Server 2003 with Ntbackup Version 1.00
    3:20:39 PM 20/05/2005 TM Restoring Exchange Server 2003 with NTBackup Need to Know Version 1.00 Exchange server holds all the email messages for network users. NTBackup software can backup the Exchange data for recovery. There are two ways that you can recover Exchange email data. You can firstly restore the complete Information Store. This will over write any existing email information. Alternatively, you can restore a recovery mail store and then merge or copy the email data into the active Exchange information store. The procedures below out line how to complete both of these options when using NTBackup software to restore your Exchange information. To Restore the complete Exchange Information Store 1. Ensure that Exchange services are running. You can do this from Services in the Administration Tools. 2. Open the Exchange System Manager via Start | All Programs | Microsoft Exchange | System Manager. 3. In Exchange System Manager navigate to Servers | <Servername> | First Storage Group. Underneath this folder you should see Mailbox store (SERVER) and Public Folder Store (SERVER) © Computer Information Agency 2005 http://www.ciaops.com 3:20:39 PM 20/05/2005 4. Dismount both stores. Right mouse click on Mailbox store (SERVER) and select “Dismount store”. Repeat the process with the Public Folder Store (SERVER). You can tell whether the mail store is dismounted by the fact it has a small red icon over the picture for the store name. © Computer Information Agency 2005 http://www.ciaops.com 3:20:39 PM 20/05/2005 5. Right mouse click on the Mailbox store (SERVER) again and select “Properties”.
    [Show full text]
  • Backup and Restore
    CIST2414 Microsoft Server Administrator Module 8 – Disaster Recovery and Availability This module discusses how to protect the server from disaster through backup and recovery, Group Policy strategies, network load balancing, and failover clustering. Section 8.1: Backup and Restore Summary This section discusses using Windows Server Backup to perform backup and recovery. Details include: • Types of backups that can be performed using Windows Server Backup: o Automatic Backup o Manual Backup o System State Backup • Methods to perform a recovery using Windows Server Backup: o Files and folders o Volumes o Applications o Backup catalog o Operating system or full server o System state o Backup created with Ntbackup • The role of Volume Shadow Copy Service (VSS) Students will learn how to: • Install Windows Server Backup. • Create a backup schedule. • Perform a Backup Once operation. Windows Server 2008 Server Administrator • 503. Plan for backup and recovery. Video/Demo Time 8.1.1 Windows Server Backup 3:26 8.1.2 Using Windows Server Backup 7:22 8.1.3 Using Volume Shadow Copies 3:38 8.1.6 Recovery 5:16 8.1.7 Performing a Bare Metal Restore 5:42 CIST2414 Microsoft Server Administrator Total 24:24 Lab/Activity • Back Up a Server Number of Exam Questions: 7 questions Total Time: About 40 minutes Section 8.2: Active Directory Recovery Summary This section provides the following details about recovering Active Directory data: • Methods to restore lost Active Directory data: o Nonauthoritative restore o Authoritative restore o Active Directory
    [Show full text]
  • Granular Recovery of Active Directory Objects
    Granular Recovery of Active Directory Objects Andrew Zhelezko Veeam Technical Marketing Engineer Granular Recovery of Active Directory Objects Contents Introduction .......................................................................... 3 Reanimating Active Directory tombstone objects ..................................................................... 4 Active Directory recycle bin............................................................. 5 Windows Server Backup ...............................................................7 Active Directory application restore from a system state . 10 Active Directory snapshots ............................................................ 14 Veeam Explorer for Microsoft Active Directory ........................................... 16 Virtual Domain Controller . 16 Physical Domain Controller . 18 Active Directory object restore . 19 Conclusion ........................................................................... 24 Appendix A: Resources used ........................................................... 24 About the Author ..................................................................... 25 About Veeam Software ...............................................................25 © 2016 Veeam Software 2 Granular Recovery of Active Directory Objects Introduction Microsoft Active Directory is a standard in corporate environments where policy-based management and easy scalability are required . It’s almost impossible to imagine how system administrators would be able to do their jobs effectively
    [Show full text]