Solved

Active Directory: How to recover a deleted file ?

Posted on 2006-07-16
5
169 Views
Last Modified: 2010-04-13
Hi,

1. I have a testing machine.
2. I load a windows 2000 server, and make it as a Domain Controller (Only one machine),
3. I backed up the system state, say it the backup file's name is authoritative.bkf
4. Then, I created a user , say it user x, (So the user x has been created after i did the backup)
5. For some other reason, User x has been deleted,
6. I tried to recover the user x by doing: i) firstly, i did "Non uthoritative restore" using the authoritative.bkf at the directory service restore mode, ii) then, i did the authoritative restore: go to command prompt, and type the ntdsutil, then type authoritative restore, then type restore database verinc 2
7. The result: I still can recover the user x,
8. Any solution ?

Tjie

Tjie
0
Comment
Question by:tjie
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 17119873
wait are you saying the problem is you CAN restore the user even if he was created after the backup?
0
 

Author Comment

by:tjie
ID: 17120339
1. Sorry, I forgot one word,
2. The problem is " I can NOT recover user x

tjie
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 17120497
of course you can't you have created him after your last backup!
0
 

Author Comment

by:tjie
ID: 17136104
1.You mean that we can NOT recover the object created after the backup ?
2. So what is the use of AUTHORITATIVE RESTORE ?

tjie
0
 
LVL 48

Accepted Solution

by:
Jay_Jay70 earned 500 total points
ID: 17136109
authorative restore still needs a backup to pull from....if you have no backup of the user, where would it be getting your user from? :-)
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
For anyone that has accidentally used newSID with Server 2008 R2 (like I did) and hasn't been able to get the server running again because you were unlucky (as I was) and had no backups - I was able to get things working by doing a Registry Hive rec…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question