How to perform a non-authoritative and authoritative AD restore on Windows Server 2012 R2

Поделиться
HTML-код
  • Опубликовано: 9 фев 2025

Комментарии • 85

  • @veeranmatmari1340
    @veeranmatmari1340 6 лет назад +2

    One of the best videos has ever seen !!! Great Job
    If possible, please try to show through GUI as well, It would be helpful for us...

  • @alejandrokassimatis1741
    @alejandrokassimatis1741 Год назад

    Best and brief explanation i ever seen! Thanks

  • @jingrichie2610
    @jingrichie2610 7 лет назад +1

    Hey man, that's really a brief and just working video! helpful a lot. thanks for your effort.

    • @NLBSolutions
      @NLBSolutions  7 лет назад

      Hi Jing, thank you for the nice words!

  • @user-jk4hd8df4d
    @user-jk4hd8df4d 6 лет назад

    I like your video and your presentation style not to fast not too slow very clear, good format and you mix it in with some powershell, Bravo sir, I would show both though, show the powershell and the GUI method please, (for future ref)

  • @Oleole56
    @Oleole56 2 года назад

    Thanks for this really informative video!

  • @santhanamarim7975
    @santhanamarim7975 7 лет назад +3

    good video.everthing is clear now.thanks for your valuable time..

    • @NLBSolutions
      @NLBSolutions  7 лет назад +1

      No thank you for your time watching my content. Much appreciated santhanamari!

  • @jatindersandhu82
    @jatindersandhu82 7 лет назад +2

    Thanks a lot for such a nice and well explain the concept.

    • @NLBSolutions
      @NLBSolutions  7 лет назад

      Thank you for the support, Jatinder!

  • @preetamsalve6256
    @preetamsalve6256 8 лет назад

    Appreciate Your efforts. This was certainly helpful.
    Happy computing.!

  • @chaituchaitanya8796
    @chaituchaitanya8796 5 лет назад

    Good video. Got information on DSRM

  • @abhijithrajabey6531
    @abhijithrajabey6531 7 лет назад +2

    Thank you for making such a good video.... Helped me a lot...

  • @veeranmatmari1340
    @veeranmatmari1340 6 лет назад

    scenario-based video, superb !!!!

  • @saurav123saha
    @saurav123saha 3 года назад

    Really one of the best videos. Can you please explain how to boot into DSRM if the DC is running in Azure.

  • @AzureADTalk
    @AzureADTalk 9 лет назад

    Great explanation you have done in this video, i did enjoy watching this video.

    • @NLBSolutions
      @NLBSolutions  9 лет назад

      +Abhay Kumar Thank you ! I am happy that it can help you !

  • @aaweshaminsayyed1722
    @aaweshaminsayyed1722 7 лет назад +1

    very nice video.. only the voice speed is slow.. hence I set the speed of the video to 1.5x n it was fine.. thanks for such a nice videos.. very nicely done.. :)

    • @NLBSolutions
      @NLBSolutions  7 лет назад +1

      Thank you, Aawesh! I wonder how I sound in 1.5x, but very nice way to get more information in less time!

    • @aaweshaminsayyed1722
      @aaweshaminsayyed1722 7 лет назад +1

      you are welcome! actually I like it that way :)

    • @NLBSolutions
      @NLBSolutions  7 лет назад +1

      I guess you are a fast learner :)

    • @aaweshaminsayyed1722
      @aaweshaminsayyed1722 7 лет назад

      yeah.. i am :) Thanks

  • @Feed2Brain
    @Feed2Brain 6 лет назад

    nice, it's very clear with lab.

  • @weedee77
    @weedee77 4 года назад

    Great video man. Thank you

  • @SZM6262
    @SZM6262 8 лет назад

    You are doing good JOB , best video Thanks a lot.

    • @NLBSolutions
      @NLBSolutions  8 лет назад

      Thank you very much for your support !

  • @krish7618
    @krish7618 5 лет назад

    Awesome explaination.. Good .. Thank you

  • @Slayerbros8
    @Slayerbros8 6 лет назад

    you saved me with this video thank you.

  • @ITVOIP
    @ITVOIP 4 года назад +1

    Good stuff!

  • @ЛОУ-л5ь
    @ЛОУ-л5ь 5 лет назад

    Very helpfull and informative. Thanks a lot man!

  • @josephchitwood1374
    @josephchitwood1374 8 лет назад

    Great video! Thank you for the information!

    • @NLBSolutions
      @NLBSolutions  8 лет назад

      Thank you for the support, Joseph!

  • @karthickk1990
    @karthickk1990 8 лет назад

    Awesome video ! so helpful ....thanks a lot.............

    • @NLBSolutions
      @NLBSolutions  8 лет назад

      Thank you for the support, karthickk!

  • @aurimaspaulauskas5613
    @aurimaspaulauskas5613 7 лет назад

    NIce video, all clearly explained

  • @beikselect
    @beikselect 5 лет назад

    Very useful video , am so glad to see it . i have quick quistion , can use restore from Recycle bin also ? ( from AD administrative center, then right click on domain name then Recycle Bin ) ?

  • @vivekprajapati7911
    @vivekprajapati7911 6 лет назад

    Nice Job!! Sir.. thanks a lot...

  • @abhimanyusinghshekhawat6871
    @abhimanyusinghshekhawat6871 7 лет назад

    Good Video but some correction need to be done at the end. Authoritative restore will increase the Version number by (how many days old backup)*100000, it doesn't change the USN. There might be some coincidence so that you see the USN to be increased by 100000. you can test it using forward the date by some days and than perform restore.

    • @NLBSolutions
      @NLBSolutions  7 лет назад

      Hi abhimanyu, interesting point you have there. Although you are right for the Version number incremental I will have to check for the USN number and the backup days. Thank you for this information, you learn something new every day!

    • @abhimanyusinghshekhawat6871
      @abhimanyusinghshekhawat6871 7 лет назад

      The below article would be helpful, Please go through it once:
      blogs.msdn.microsoft.com/richpec/2011/10/06/the-authoritative-restore-explained/

    • @NLBSolutions
      @NLBSolutions  7 лет назад +1

      This is actually great! Thank you abhimanyu! Reading from the article - One point to note is that the version increase default is 100,000 versions per day since the last time a change was committed to the database (not since the last backup). This version increase is a default value and can be manipulated using the verinc parameter during the authoritative restore.

  • @mohammedasifkhanp5032
    @mohammedasifkhanp5032 6 лет назад

    this is the great one.

  • @sarthaks99
    @sarthaks99 4 года назад

    Awesome video...one question though..if you make the primary as authoritative but if you try to replicate from other or secondary dc will the change be reflected in the primary one?

  • @harbinger200
    @harbinger200 7 лет назад

    great job man

  • @DMarcus7114
    @DMarcus7114 8 лет назад

    Subscribed, good vid very helpful.

  • @Hari-ed5es
    @Hari-ed5es 7 лет назад +1

    Thank you brother!

    • @NLBSolutions
      @NLBSolutions  7 лет назад

      Thank you for the support, Hariharan.

  • @harshadrathod454
    @harshadrathod454 8 лет назад +1

    Great Vedio ! thanks for sharing

    • @NLBSolutions
      @NLBSolutions  8 лет назад

      Thank you for the support, Harshad!

  • @niaz.shovon
    @niaz.shovon 4 года назад +1

    This could be a good example of how to make a simple task complex! Why I need to mess with that powershell thing where I could use a Windows backup GUI? A simple check mark would make it authoritative in there.

    • @martinkrabowski2057
      @martinkrabowski2057 3 года назад

      without powershell you are lost. what does an checkmark tell you? nothing. but an return string of an powershell command tells you what realy happened. gui does not give you any proof. and everything is bases on powershell now. including server manager role install etc.

    • @niaz.shovon
      @niaz.shovon 3 года назад

      @@martinkrabowski2057 no I'm totally fine with the check marks.

  • @505bhargav
    @505bhargav 8 лет назад +1

    nice explanation

  • @1robertone
    @1robertone 5 лет назад

    Nice Work !!!

  • @trial000000000000001
    @trial000000000000001 6 лет назад

    Very Informative. Thank you.
    Just one thing is confusing me. Why did you perform non-authoritative restore in the first place?

    • @vyellajyosula
      @vyellajyosula 6 лет назад

      I believe he wants to demonstrate both Authoritative and Non-Authoritative.

  • @Boychev87
    @Boychev87 9 лет назад

    Good job !

  • @RahulChauhan-ow7mj
    @RahulChauhan-ow7mj 5 лет назад

    Nice job Sir, I need the video about item-level targeting gpo

  • @gancrzgancrz
    @gancrzgancrz 8 лет назад

    you should also run the back link file after your restore. run ldifde -i -f and your ldf file. which will restore your backlink. meaning you would have explict permission for some of groups and exchange attributes that would be restored.

  • @skutsenkow
    @skutsenkow 7 лет назад

    Nice video! Question - If you have the Active Directory Recycle Bin enabled, is there any reason to do a non-authoritative/authoritative restore anymore? Are there any use cases you can think where you would still do that?

    • @NLBSolutions
      @NLBSolutions  7 лет назад

      Hi Steven, depends on the actual environment. If you have a single Domain Controller (not really recommended) and it goes corrupt you will need to restore it using alternative methods.

  • @dkkrish09
    @dkkrish09 7 лет назад +2

    Nice Job!! Sir..And i need the video about how to fix the patches,hotfixes and drivers..monitoring the mcafee antivirus in server
    basic..can u pls share it if it is possible sir!!

    • @NLBSolutions
      @NLBSolutions  7 лет назад

      Thank you, Dinesh! Patches can be easily controlled with a WSUS server, and this is a thing I am looking to create. Hotfixes and drivers on the other hand depend on the environment that you have. In most IT nowadays servers are consolidated into virtual machines and the drivers are not really applicable, except for the underlying hypervisor. Working with Macafee or any other 3rd party anti-virus tools is a bit out of scope of this channel. But in the future, I can definitely look into securing the environment, so stay tuned.

  • @fawazsahyouni8622
    @fawazsahyouni8622 6 лет назад

    dear all i had a Power problem with the main 2012 R2 AD DC and i had to do the recovery after i fix the power supply on it >>> now i had this problem .... (This server is the owner of the following FSMO role, but does not consider it valid. For the partition which contains the FSMO, this server has not replicated successfully with any of its partners since this server has been restarted. Replication errors are preventing validation of this role) and the other one ... (The DFS Replication service stopped replication on the folder with the following local path: C:\Windows\SYSVOL\domain. This server has been disconnected from other partners for 71 days, which is longer than the time allowed by the MaxOfflineTimeInDays parameter (60). DFS Replication considers the data in this folder to be stale, and this server will not replicate the folder until this error is corrected) ... nothing work on it any idea to get it back to work as a main domain controller

  • @kumaresans4077
    @kumaresans4077 7 лет назад

    Nice job! I had a question. If it's a multi site domain . One of the OU is deleted or AD Database is corrupted in the DC. So what is the probability. All site receive the replication and become the major domain failure or else? . If yes that time which will help to recover the DC's in all site?

    • @NLBSolutions
      @NLBSolutions  7 лет назад +2

      Hi Kumaresan, few things that can be done to prevent such problems:
      1. OU deleted - make sure you have Prevent from accidental deletion tick box enabled on all OUs. If this scenario happens for some reason you have few options: 1. If you find our that the OU is deleted prior to full Inter-site replication, you can stop the replication between the sites. Use one of the Domain Controllers in the site with the present OU and make an authoritative restore on that OU. It should bring it back to the DCs with the missing OU. 2 If you have full replication, you need to restore the OU on one of the DCs and make it authoritative again. Or use AD Recycle Bin if it is enabled.
      2. AD Corruption - this should be a trouble one. In most cases you again should move fast to isolate the affected DCs from the network. Make a normal restore on them and leave them to replicate the changes from the other Domain Controllers.

  • @pg4694
    @pg4694 3 года назад

    Can this not be done simply thrigh ADAC and we can restore deleted object in same state

  • @SivaKumar-xu3dd
    @SivaKumar-xu3dd 8 лет назад

    its very good

  • @techsupportline5019
    @techsupportline5019 3 года назад

    What's the point in using the powershell commands as well as putting the system into Safe mode when the windows server itself has a built-in Restore feature? Why making things too complicated?

  • @jjhatnm
    @jjhatnm 8 лет назад

    thanks!

  • @jibbyjohn4749
    @jibbyjohn4749 3 года назад

    hi thanks need the link for exchange server by you friend Johnny

  • @jele75
    @jele75 4 года назад

    How about AD forest restoration where all entire forest gone?

  • @Nareshmanam458
    @Nareshmanam458 5 лет назад

    How to perform non authoritative restore?

  • @timsamanchi3004
    @timsamanchi3004 6 лет назад

    Useful but painfully slow. it took you 12minutes to describe what Authoritative and none Authoritative are. 5 minutes just to delete an OU. you do like the sound of your voice.

  • @tanyagonzalez9685
    @tanyagonzalez9685 5 лет назад

    Stop charging me for a service I don't need. I'm westing my time, writing you because you are not going to publicize my comment!!!

  • @c-jay8500
    @c-jay8500 4 года назад