Edit

Share via


Back up and restore Active Directory ___domain controllers

Backing up Active Directory, and ensuring successful restores in cases of corruption, compromise or disaster is a critical part of Active Directory maintenance.

This article outlines the proper procedures for backing up and restoring Active Directory ___domain controllers with Azure Backup, whether they're Azure virtual machines or on-premises servers. It discusses a scenario where you need to restore an entire ___domain controller to its state at the time of backup. To see which restore scenario is appropriate for you, see this article.

Note

This article does not discuss restoring items from Microsoft Entra ID. For information on restoring Microsoft Entra users, see this article.

Best practices

Before you start protection of Active Directory, check the following best practices:

  • Make sure at least one ___domain controller is backed up. If you back up more than one ___domain controller, make sure all the ones holding the FSMO (Flexible Single Master Operation) roles are backed up.

  • Back up Active Directory frequently. The backup age should never be older than the tombstone lifetime (TSL) because objects older than the TSL will be "tombstoned" and no longer considered valid.

    • The default TSL, for domains built on Windows Server 2003 SP2 and later, is 180 days.

    • You can verify the configured TSL by using the following PowerShell script:

      (Get-ADObject $('CN=Directory Service,CN=Windows NT,CN=Services,{0}' -f (Get-ADRootDSE).configurationNamingContext) -Properties tombstoneLifetime).tombstoneLifetime
      
  • Have a clear disaster recovery plan that includes instructions on how to restore your ___domain controllers. To prepare for restoring an Active Directory forest, read the Active Directory Forest Recovery Guide.

  • If you need to restore a ___domain controller, and have a remaining functioning ___domain controller in the ___domain, you can make a new server instead of restoring from backup. Add the Active Directory Domain Services server role to the new server to make it a ___domain controller in the existing ___domain. Then the Active Directory data will replicate to the new server. To remove the previous ___domain controller from Active Directory, follow the steps in this article to perform metadata cleanup.

Note

Azure Backup does not include item level restore for Active Directory. If you wish to restore deleted objects, and you can access a ___domain controller, use the Active Directory Recycle Bin. If that method is not available, you can use your ___domain controller backup to restore the deleted objects with the ntdsutil.exe tool as explained here.

For information about performing an authoritative restore of SYSVOL, see this article.

Back up Azure VM ___domain controllers

If the ___domain controller is an Azure VM, you can back up the server using Azure VM Backup.

Read about operational considerations for virtualized ___domain controllers to ensure successful backups (and future restores) of your Azure VM ___domain controllers.

Back up on-premises ___domain controllers

To back up an on-premises ___domain controller, you need to back up the server's System State data.

Note

Restoring on-premises ___domain controllers (either from system state or from VMs) to the Azure cloud is not supported. If you would like the option of failover from an on-premises Active Directory environment to Azure, consider using Azure Site Recovery.

Restore Active Directory

Active Directory data can be restored in one of two modes: authoritative or nonauthoritative. In an authoritative restore, the restored Active Directory data will override the data found on the other ___domain controllers in the forest.

However, in this scenario we're rebuilding a ___domain controller in an existing ___domain, so a nonauthoritative restore should be performed.

During the restore, the server will be started in Directory Services Restore Mode (DSRM). You'll need to provide the Administrator password for Directory Services Restore Mode.

Note

If the DSRM password is forgotten, you can reset it using these instructions.

Restore Azure VM ___domain controllers

To restore an Azure VM ___domain controller, see Restore ___domain controller VMs.

If you're restoring a single ___domain controller VM or multiple ___domain controller VMs in a single ___domain, restore them like any other VM. Directory Services Restore Mode (DSRM) is also available, so all Active Directory recovery scenarios are viable.

If you need to restore a single ___domain controller VM in a multiple ___domain configuration, restore the disks and create a VM by using PowerShell.

If you're restoring the last remaining ___domain controller in the ___domain, or restoring multiple domains in one forest, we recommend a forest recovery.

Note

Virtualized ___domain controllers, from Windows 2012 onwards use virtualization based safeguards. With these safeguards, Active directory understands if the VM restored is a ___domain controller, and performs the necessary steps to restore the Active Directory data.

Restore on-premises ___domain controllers

To restore an on-premises ___domain controller, follow the directions in for restoring system state to Windows Server, using the guidance for special considerations for system state recovery on a ___domain controller.

Next steps