Course Title

Total Page:16

File Type:pdf, Size:1020Kb

Course Title "Charting the Course ... ... to Your Success!" Updating Support Skills on Microsoft Windows 7 Course Summary Description The goal of this course is to provide students with the knowledge and skills necessary to update their support skills on the Microsoft Windows 7 operating system. Objectives At the end of this course, students will be able to: Motion Describe the various editions and feature sets of Windows 7. Configure new features in Group Policy Describe the user interface enhancements, user profiles and Internet Explorer 8. Manage devices, printers, and power management Explain the Next Generation Networking Stack, IPv6 and IPsec in Windows 7. Setup the client configuration for Network Access Protection (NAP), VPNs, DirectAccess and BranchCache Manage files and folders with libraries, folder redirection and offline files. Configure instant search and search federation. Manage computers with Remote Desktop, WinRM, Task Scheduler and PowerShell 2.0. Secure Windows 7 using user account control, file and registry virtualization, BitLocker, Credential Manager and AppLocker Configure and manage Windows Firewall with Advanced Security. Backup and restore Windows 7 using files, images and shadow copies. Manage storage via disk partitioning, virtual hard disks (VHD) and how to start Windows 7 from a VHD file. Troubleshoot Windows 7 using Event Viewer, Task Manager, Reliability Monitor, Resource Monitor and the Action Center. Topics Overview of Windows 7 Network Enhancements Managing Desktop Configurations with Securing Windows 7 Group Policy Backup and Storage Configuring User Environments Troubleshooting Windows 7 Managing Files and Folders Managing Desktop Computers Audience This course is intended for Help Desk Personnel, Desktop Support Technicians, IT Professionals, Consultants and other people responsible for supporting and/or administering desktop and mobile computers on Microsoft Windows 7. These individuals will have a need to simplify ongoing management and reduce support costs. Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for informational purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these names generically PT7872_UPDATINGSUPPORTSKILLSONMICROSOFTWINDOWS7.DOC "Charting the Course ... ... to Your Success!" Updating Support Skills on Microsoft Windows 7 Course Summary (cont’d) Prerequisites Students should have a working knowledge of the following: Experience with TCP/IP networks Experience working in a Microsoft Active Directory domain environment Experience using desktop and command-line troubleshooting tools Experience installing and troubleshooting desktop applications Experience configuring registry and group policy settings. Duration Three days Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for informational purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these names generically PT7872_UPDATINGSUPPORTSKILLSONMICROSOFTWINDOWS7.DOC "Charting the Course ... ... to Your Success!" Updating Support Skills on Microsoft Windows 7 Course Outline I. Overview of Windows 7 3. Implementing Group Policy Preferences This module provides an overview of Windows 7. 4. Practice: Working with Group Policy Lessons presented in this module will provide an Preferences understanding of the various editions, features and performance enhancements. You will also learn the III. Configuring User Environments difference between 32 bit and 64 bit versions and This module describes how to configure the user the various supported languages. environment. Lessons presented in this module will A. Comparing Windows 7 Editions provide an understanding of user interface 1. Windows 7 Super Set model enhancements, user profiles and Internet Explorer 8. 2. Feature Summary You will also learn how to manage devices, printers, 3. Choosing the Right Edition and power management. B. Choosing the Right Platform A. User Interface Enhancements 1. Comparison of Windows 7 32-bit and 1. Aero Preview 64-bit 2. Keyboard Shortcuts 2. Patchguard or Kernel Patch Protection 3. Jumplists 3. Driver Signing 4. Window Shake C. Performance Enhancement Technologies 5. Customizing the Notification Area 1. SuperFetch 6. Practice: Working with UI 2. ReadyBoost Enhancements D. Language Support B. User Profiles 1. Multiple Language Support 1. Overview of User Profiles in Windows 7 2. Configuring Region and Language 2. Creating the Default Profile Settings 3. Managing the Profile Size 3. Adding Language Packs 4. Practice: Working with User Profiles C. Devices and Printers II. Managing Desktop Configurations 1. Device Stage This module describes how to manage desktop 2. Adding a Printer configurations on Windows 7. Lessons presented in 3. Location Aware Printing this module will detail how to install the management 4. Print Management Console tools and configure new features in Group Policy. 5. Deploying Printers using Group Policy You will also learn how to implement Group Policy 6. Practice: Working with Devices and preferences. Printers A. Installing Management Tools on Windows 7 D. Power Management 1. Remote Server Administration Tools 1. What's new in Windows Power 2. Managing Administration Tools Management B. New Features in Group Policy 2. Power Plans 1. Group Policy Client Service 3. Configuring Power Management from 2. Group Policy Templates AD 3. New Group Policy Categories 4. Troubleshooting Power Management 4. Local Group Policies 5. Practice: Working with Power 5. Troubleshooting Group Policy Management 6. Practice: Working with Group Policy E. Internet Explorer 8 A. Group Policy Preferences 1. What's new in Internet Explorer 1. What are Group Policy Preferences 2. InPrivate Browsing 2. Prerequisites for Group Policy 3. Accelerators Preferences 4. Configuring IE using Group Policy Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for informational purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these names generically PT7872_UPDATINGSUPPORTSKILLSONMICROSOFTWINDOWS7.DOC "Charting the Course ... ... to Your Success!" Updating Support Skills on Microsoft Windows 7 Course Outline (cont’d) 5. Practice: Working with Internet Explorer 4. Practice: Working with Remote Desktop B. WinRM IV. Managing Files and Folders 1. What is WinRM This module describes how to manage files and 2. Configuring WinRM folders in Windows 7. Lessons presented in this 3. Using WinRM for Remote Console module will explain and how to manage libraries, 4. WinRM for Systems Management folder redirection and offline files. You will also learn 5. Practice: Working with WinRM how to configure instant search and search C. Task Scheduler federation. 1. Triggers A. Libraries 2. Actions 1. What are Libraries 3. Scripting Task Scheduler 2. Managing Libraries 4. Practice: Working with Task Scheduler 3. Remote Locations in Libraries A. PowerShell 2.0 4. Practice: Working with Libraries 1. Introducing PowerShell B. Folder Redirection 2. PowerShell Remoting 1. What is Folder Redirection 3. PowerShell ISE 2. Configuring Folder Redirection 4. PowerShell for Windows Management 3. Practice: Working with • Folder 5. Practice: Working with PowerShell 2.0 Redirection C. Offline Files VI. Network Enhancements 1. Offline Files Enhancements This module describes the network enhancements 2. Configuring a File Server for Offline made in Windows 7 and how to work with them. Files Lessons presented in this module will explain the 3. Managing the Offline Files Cache Next Generation Networking Stack, IPv6 and IPsec. 4. Practice: Working with Offline Files You will also learn how to setup the client D. Instant Search configuration for Network Access Protection (NAP), 1. What is Instant Search VPNs, DirectAccess and BranchCache. 2. Managing Search Indexing A. Next Generation Network Stack 3. Adding Search Locations 1. What is the Next Generation Networking 4. Practice: Working with Instant Search Stack E. Search Federation 2. Performance Enhancements 1. What is Federated Search 3. Network Location Awareness 2. Deploying Search Federation B. IPv6 3. Practice: Working with Search 1. IPv6 in Windows 7 Federation 2. IPv6 Addressing 3. IPv6 Transition Technologies V. Managing Desktop Computers 4. Practice: Working with IPv6 This module describes how to manage Windows 7 C. Network Access Protection desktop computers. Lessons presented in this 1. What is Network Access Protection module will explain remote desktop and how to use 2. NAP Infrastructure Components the WinRM tool. You will also learn how to manage 3. NAP Client Configuration computers with Task Scheduler and PowerShell 2.0. 4. Practice: Working with Network Access A. Remote Desktop Protection 1. What's new in Remote Desktop D. IPsec 2. Using the Remote Desktop Client 1. What's New in IPsec 3. Remote Assistance 2. IPsec Authentication Due to the nature of this material, this document refers to numerous hardware and software products by their
Recommended publications
  • Backing up and Recovering Virtual Machines
    4959_Ch07_CMP3 4/20/05 5:30 PM Page 223 CHAPTER 7 ■ ■ ■ Backing Up and Recovering Virtual Machines For virtual machines running in a production environment, backup and recovery is just as serious as for all the other servers on the network. When running servers inside VMs, you’ll be faced with several new challenges, as well as advantages, when planning and implementing a backup strategy. In this chapter, you’ll explore the process of planning for and administering backup and recovery operations on VMs and VM hosts. Along the way, you’ll see the different approaches you can take to secure VM data, which include the following: •Traditional agent-based backups •Non-agent-based backups •Flat-file backups Also, many organizations have embraced the idea of maintaining a warm standby VM server that can be brought online if a primary server fails. This approach, for many organiza- tions, may mean that data is unavailable for a few minutes following the loss of a server. If you can’t afford to cluster all your systems, or if some of your applications don’t support clustering, then you may find this approach to be a perfect fit. Since the focus of this chapter is purely on VM backup and recovery, we’ll walk you through the process of maintaining a standby VM server in Chapter 14. Optimizing your backup strategy often means much more than simply installing software and letting it do its magic. Oftentimes, custom scripting is required to get the backup results you desire. Because of the importance of getting your virtual infrastructure to work around your needs (instead of the other way around), we’ll also show you several scripting ideas to both enhance and automate the backup, recovery, and availability of your VMs.
    [Show full text]
  • Don't Hyper-Ventilate Over Hyper-V Backup!
    Don’t Hyper-Ventilate over Hyper-V backup! A straightforward solution to Hyper-V backup Presented by Linus Chang, Lead Developer of BackupAssist The theme of today is... Hyper-V! Today’s agenda 1. The causes of discomfort and concern 2. Solving the difficulty problem 3. Solving the price problem 4. What else can BackupAssist do? The causes of discomfort and concern Quick recap of the causes of Hyper-V hyperventilation: 1 Difficulty = stress = nervous breakdown Traditional backup methods don’t hit the spot! Not straightforward to image guests: no USB pass through How to back up multiple machines? 2 Price gives your client a heart attack Install a license on each guest machine? Install an expensive “special version” or “agent” to allow unlimited guest backups? Solving the difficulty problem The difficulty problems The difficulty problems: Recovery scenarios with a normal server Recovery scenarios Installation – on host or guest or both? Recovery scenarios with a hyper-v server One-pass or two-pass backup? BackupAssist handles all recovery scenarios One pass – backup the physical host only VM #1 VM #2 VM #3 Backup device Physical Server Two pass – backup the physical host first, VM #1 then the virtual guests VM #2 VM #3 Backup device Physical Server Solving the difficulty problem The problems Recovery scenarios with a normal server: Recovery scenarios with a normal server Recover the entire server from bare metal Recovery scenarios Recover specific files and folders with a hyper-v server Recover a complete Exchange Server BackupAssist
    [Show full text]
  • Dell Feature and Functional Testing for Windows Server 2008
    Dell Feature and Functional Testing for Windows Server 2008 By Barun Chaudhary and Manjunath Narayanan April 2008 Windows Server® 2008 is Microsoft’s first major Server Operating System release in five years. Dell’s close partnership with Microsoft has allowed engagement with the testing and development of this operating system for more than 4 years. Some of the highlights of Dell’s testing efforts include compatibility tests on Dell™ PowerEdge™ server platforms, testing upgrade and migration scenarios, and testing compatibility of OpenManage™, the Dell systems management software. Whenever there were new features or technology included with the Milestone or Beta releases, Dell endeavored to ensure that as many of our platforms and OpenManage components were ready to support those features as possible. Based on the current status of testing, Dell is committed to supporting more than 40 currently shipping and legacy server platforms across 5 generations with Windows Server 2008. Supporting this number of servers has required significant development efforts to help ensure good customer experience. Dell has a set of internal tools to track various parameters like test results, defect tracking, total time spent, driver or firmware changes, etc. Dell estimates it has spent more than 1800 hours testing currently shipping and future Dell servers for compatibility with Windows Server 2008. An additional 1700+ hours were spent at Dell to help ensure OpenManage will be compatible with Windows Server 2008 on as many platforms as possible. To serve this purpose more than 30 different configurations were tested on different Dell platforms. In addition to these efforts, Dell has spent more than 750 hours testing various Windows Server 2008 features on the entire supported server line.
    [Show full text]
  • Windows Tool Reference
    AppendixChapter A1 Windows Tool Reference Windows Management Tools This appendix lists sets of Windows management, maintenance, configuration, and monitor- ing tools that you may not be familiar with. Some are not automatically installed by Windows Setup but instead are hidden away in obscure folders on your Windows Setup DVD or CD- ROM. Others must be downloaded or purchased from Microsoft. They can be a great help in using, updating, and managing Windows. We’ll discuss the following tool kits: ■ Standard Tools—Our pick of handy programs installed by Windows Setup that we think are unappreciated and not well-enough known. ■ Support Tools—A set of useful command-line and GUI programs that can be installed from your Windows Setup DVD or CD-ROM. ■ Value-Added Tools—Several more sets of utilities hidden away on the Windows Setup CD-ROM. ■ Windows Ultimate Extras and PowerToys for XP—Accessories that can be downloaded for free from microsoft.com. The PowerToys include TweakUI, a program that lets you make adjustments to more Windows settings than you knew existed. ■ Resource Kits—A set of books published by Microsoft for some versions of Windows that includes a CD-ROM containing hundreds of utility programs. What you may not have known is that in some cases you can download the Resource Kit program toolkits with- out purchasing the books. ■ Subsystem for UNIX-Based Applications (SUA)—A package of network services and command-line tools that provide a nearly complete UNIX environment. It can be installed only on Windows Vista Ultimate and Enterprise, and Windows Server 2003.
    [Show full text]
  • The Real MCTS MCITP Exam 70-648 Prep
    Chapter 5 MCTS/MCITP Exam 648 Maintaining an Active Directory Environment Exam objectives in this chapter: ■ Backup and Recovery ■ Offline Maintenance ■ Monitoring Active Directory Exam objectives review: ˛ Summary of Exam Objectives ˛ Exam Objectives Fast Track ˛ Exam Objectives Frequently Asked Questions ˛ Self Test ˛ Self Test Quick Answer Key 355 356 Chapter 5 • Maintaining an Active Directory Environment Introduction Being able to implement a Windows Server 2008 Active Directory environment is only half the battle. You must also be able to maintain the environment to provide minimum downtime and optimum performance of your enterprise. Various solutions and strategies come into play as part of maintenance. Some can be seen as larger “disaster recovery” components, whereas others may simply be “tweaking” the environment to improve user experience. In some situations, “maintenance” may fall somewhere in between—a user account is accidentally deleted, a file is accidentally deleted, or replication is under- performing or not performing at all! In this chapter, you will learn about the many maintenance and management tools offered as a part of Windows Server 2008, as well as some solutions to better improve your Windows Active Directory environment. These topics will be critical not only to your exam success, but also to your success as an IT professional. We will begin this section with a discussion of Windows Server Backup and how it has changed drastically from earlier versions of the Windows server product. Backup and Recovery Most people never think about backup and recovery until they need it. Microsoft has been shipping a simple backup solution with Windows since Windows NT 3.1 back in 1993.
    [Show full text]
  • OTRS: FAQ#100066 / How to -- Backup Exchange
    FAQ#100066 How To -- Backup Exchange Server Stores 09/27/2021 20:25:14 FAQ Article Print Category: Vault Votes: 0 State: public (all) Result: 0.00 % Language: en Last update: 12:05:29 - 11/03/2015 Keywords backup,Exchange,stores Symptom (public) Problem (public) Solution (public) Overview When using the Select service plan we support live backup of Exchange 2003, Exchange 2007, Exchange 2010 (or better) on Windows Server 2003 or 2008 (or better). For these configurations backup is done natively using the Volume Shadow Copy Service (VSS). We fully support older versions of Exchange on Windows Server 2003, but require a few seconds of downtime while a volume snapshot is taken. For older versions of Exchange Server on older versions of Windows you can either (a) backup a copy of Exchange database (recommended), or (b) use the ntbackup program that comes with Windows (or other backup software) to backup your Exchange Server Database to a file on a regular basis and use our software to backup these backup files remotely. Exchange Server 2003 or 2008 or 2010 (or better) on Windows Server 2003 or 2008: - Create a sub-account for each Exchange Server machine, as needed. - Login to each Exchange Server machine as a windows user that has rights to read the Exchange Server database files (*.edb, *.stm, *.log, *.chk). - Install and configure our software on each Exchange Server. - Use the Folders page to add the folder (directory) containing your Exchange Server database files (*.edb, *.stm, *.log, *.chk) to the backup. If your logs are stored in a separate directory (recommended) then you should also add the folder containing the transaction logs to the Folders page also.
    [Show full text]
  • Primary Backup Objective Is Fast Server Recovery
    Primary Backup Entire System Data – Files, Emails, Databases, Documents Including Windows Installation Not Important Important Critical Ultra Critical Primary Backup – Drive Imaging Primary Backup objective is fast server recovery www.BackupAssist.com Drive Imaging – Server 2008 Highlights: Fast recovery – boot from CD to start restore VSS Aware Automatic disk management Fast differential images Built into the Operating System Lowlights: Technology limitations, poor usability, management and reporting www.BackupAssist.com Drive Imaging – Server 2008 How it works – first backup www.BackupAssist.com Drive Imaging – Server 2008 How it works – second backup www.BackupAssist.com Drive Imaging – Server 2008 How it works – third backup www.BackupAssist.com Drive Imaging – Server 2008 From our testing, it handles Hardware Independent Restores (HIR) Physical to physical (P2P) Intel Xeon Dual Processor Dual Core Server AMD Phenom Single Processor Quad Core Desktop Acer Laptop AMD Sempron Desktop Physical to virtual to physical (P2V, V2P) using VMWare Server AMD Phenom Quad Core VM on AMD Sempron Single Core Intel Xeon Dual Proc Dual Core Intel Xeon Dual Proc Dual Core VM on AMD Sempron Single Core AMD Phenom Quad Core Despite our best efforts, we couldn’t actually break it! www.BackupAssist.com Drive Imaging – Server 2008 Technological limitations / gotchas of the Windows Backup Engine: Backups are not copyable You must restore to a disk of the same size or bigger You are not guaranteed any level of backup history No tape drive support www.BackupAssist.com Drive Imaging – Server 2008 Wizard Limitations Wizards are built-into Server 2008 and SBS 2008 Unfortunately there are many limitations in the wizards that limit their usefulness Enter BackupAssist Just like we added scheduling, management and reporting features for NTBackup, so too we do it for Windows Server Backup, so it’s as reliable as other imaging products that cost thousands of dollars.
    [Show full text]
  • Snapmanager for Microsoft Exchange Server Administration Guide
    SnapManager® 7.2 for Microsoft® Exchange Server Administration Guide January 2019 | 215-10626_C0 [email protected] Table of Contents | 3 Contents Product overview .......................................................................................... 8 Backing up and verifying your databases ................................................ 10 SnapManager backup overview ................................................................................ 10 SnapManager naming conventions ............................................................................ 10 Defining a backup strategy ........................................................................................ 11 Backing up your databases for the first time ............................................................. 14 Verifying the initial backup set .................................................................................. 15 Scheduling recurring backups ................................................................................... 16 Scheduling frequent recovery point backups ............................................................ 17 Backup planning for databases in DAGs ................................................................... 17 Backing up using the Backup wizard ........................................................................ 19 Creating backups using the Backup and Verify window ........................................... 20 Using the remote additional copy backup feature ....................................................
    [Show full text]
  • Online Or Offline Backup? Volume Shadow Copy
    environment and when you had installed Exchange 2003 on this system, NTBACKUP is enhanced to allow backups of your Exchange Server databases. NTBACKUP features • Local and remote backup of data • Exchange Backup ready • Scheduled Backups • Volume Shadow Copy support • Integration with Removable Storgae from Windows 2003 How do you enhance NTBACKUP with the capability to Backup Exchange 2003 without installing Exchange Server? You must install the Exchange System Manager on the Backup Server to backup Exchange Server. It is possible to backup the Exchange Server without Exchange System Manager with the following trick: Copy ESEBCLI2.DLL from the Exchange 2003 CD into the EXCHSRVR\BIN folder Add the following registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\BackupRestore\DLLPaths – REG_EXPAND_SZ - esebcli2 - c:\exchsrvr\bin\esebcli2.dll. After modifying the registry you can use NTBACKUP to backup the remote Exchange Server by clicking – Tools – Remote Store. Online or Offline Backup? It is possible to Backup Exchange Online or Offline. The recommended method is to Backup the Exchange Server Online. An online backup can backup the Exchange Server databases without the interruption of Exchange services. An offline backup is a simple copy of the Exchange database files. The Exchange Information store must be stopped before NTBACKUP can be used to Backup your Information store. Volume Shadow Copy Beginning with Exchange 2003 it is possible to do Exchange 2003 Volume Shadows Copy backups with 3rd party Backup applications, but not with the built-in Windows Server 2003 NTBACKUP utility. The Volume Shadow Copy service coordinates its communication between Requestors (backup applications), Writers (applications like Exchange Server 2003), and Providers (software or hardware components that create the shadow copies).
    [Show full text]
  • Restoring Exchange Server 2003 with Ntbackup Version 1.00
    3:20:39 PM 20/05/2005 TM Restoring Exchange Server 2003 with NTBackup Need to Know Version 1.00 Exchange server holds all the email messages for network users. NTBackup software can backup the Exchange data for recovery. There are two ways that you can recover Exchange email data. You can firstly restore the complete Information Store. This will over write any existing email information. Alternatively, you can restore a recovery mail store and then merge or copy the email data into the active Exchange information store. The procedures below out line how to complete both of these options when using NTBackup software to restore your Exchange information. To Restore the complete Exchange Information Store 1. Ensure that Exchange services are running. You can do this from Services in the Administration Tools. 2. Open the Exchange System Manager via Start | All Programs | Microsoft Exchange | System Manager. 3. In Exchange System Manager navigate to Servers | <Servername> | First Storage Group. Underneath this folder you should see Mailbox store (SERVER) and Public Folder Store (SERVER) © Computer Information Agency 2005 http://www.ciaops.com 3:20:39 PM 20/05/2005 4. Dismount both stores. Right mouse click on Mailbox store (SERVER) and select “Dismount store”. Repeat the process with the Public Folder Store (SERVER). You can tell whether the mail store is dismounted by the fact it has a small red icon over the picture for the store name. © Computer Information Agency 2005 http://www.ciaops.com 3:20:39 PM 20/05/2005 5. Right mouse click on the Mailbox store (SERVER) again and select “Properties”.
    [Show full text]
  • Backup and Restore
    CIST2414 Microsoft Server Administrator Module 8 – Disaster Recovery and Availability This module discusses how to protect the server from disaster through backup and recovery, Group Policy strategies, network load balancing, and failover clustering. Section 8.1: Backup and Restore Summary This section discusses using Windows Server Backup to perform backup and recovery. Details include: • Types of backups that can be performed using Windows Server Backup: o Automatic Backup o Manual Backup o System State Backup • Methods to perform a recovery using Windows Server Backup: o Files and folders o Volumes o Applications o Backup catalog o Operating system or full server o System state o Backup created with Ntbackup • The role of Volume Shadow Copy Service (VSS) Students will learn how to: • Install Windows Server Backup. • Create a backup schedule. • Perform a Backup Once operation. Windows Server 2008 Server Administrator • 503. Plan for backup and recovery. Video/Demo Time 8.1.1 Windows Server Backup 3:26 8.1.2 Using Windows Server Backup 7:22 8.1.3 Using Volume Shadow Copies 3:38 8.1.6 Recovery 5:16 8.1.7 Performing a Bare Metal Restore 5:42 CIST2414 Microsoft Server Administrator Total 24:24 Lab/Activity • Back Up a Server Number of Exam Questions: 7 questions Total Time: About 40 minutes Section 8.2: Active Directory Recovery Summary This section provides the following details about recovering Active Directory data: • Methods to restore lost Active Directory data: o Nonauthoritative restore o Authoritative restore o Active Directory
    [Show full text]
  • Granular Recovery of Active Directory Objects
    Granular Recovery of Active Directory Objects Andrew Zhelezko Veeam Technical Marketing Engineer Granular Recovery of Active Directory Objects Contents Introduction .......................................................................... 3 Reanimating Active Directory tombstone objects ..................................................................... 4 Active Directory recycle bin............................................................. 5 Windows Server Backup ...............................................................7 Active Directory application restore from a system state . 10 Active Directory snapshots ............................................................ 14 Veeam Explorer for Microsoft Active Directory ........................................... 16 Virtual Domain Controller . 16 Physical Domain Controller . 18 Active Directory object restore . 19 Conclusion ........................................................................... 24 Appendix A: Resources used ........................................................... 24 About the Author ..................................................................... 25 About Veeam Software ...............................................................25 © 2016 Veeam Software 2 Granular Recovery of Active Directory Objects Introduction Microsoft Active Directory is a standard in corporate environments where policy-based management and easy scalability are required . It’s almost impossible to imagine how system administrators would be able to do their jobs effectively
    [Show full text]