?
Solved

Windows 2012 -- cloneable domain controller ?

Posted on 2014-09-23
3
Medium Priority
?
413 Views
Last Modified: 2014-10-09
Has anyone done
http://redmondmag.com/articles/2014/09/18/cloneable-domain-controller.aspx
to restore a domain controller that
has a hardware/etc failure ?

If not, what is the BEST recommendation you have for
QUICK "Windows 2012 domain controller" restores
when hardware/etc failure happens when you only
have ONE location and ONE domain controller ?
0
Comment
Question by:finance_teacher
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 59

Accepted Solution

by:
Cliff Galiher earned 668 total points
ID: 40340397
Cloning DCs is not meant for disaster recovery. It addresses different painpoints, most notably highly virtualized environments that may need to spin up new services (the so-called "private cloud") and wants to use the tools traditionally available but that have not been compatible with DCs until now. Cloning is great for those scenarios and for scenarios where seeding replicated data would take a long time over a slow link.

For a single DC environment, the answer is as it has always been since 2000. Backups. And restores. You need to be able to back up the DC in a way that keeps the LDAP database consistent and can restore the DC in an authoritative state. AD-aware backup software can do this. That's the correct path.
0
 
LVL 8

Assisted Solution

by:Ratnesh Mishra
Ratnesh Mishra earned 668 total points
ID: 40340441
Had not done this till moment, however will try to do the same and will provide the link what I achieved however based on the article . Yes its possible. Apart from this there are various other method as well which can be included in Back and Disaster Recovery [BDR]. All solution may use different means/technology however provide the same output either at hardware level or software level. Many a times I had used snapshot from storagecraft to create VMs. Many a times I used copy of VHD files of DC so in case if it goes in non-recoverable state I just replace the vhd and it works for me. So conventional or unconventional method purpose should be to recover.
0
 
LVL 88

Assisted Solution

by:rindi
rindi earned 664 total points
ID: 40340998
The built-in backup utility of Windows since 2008 is image based. So is most other 3rd party backup software. So restoring an image is similar to "cloning". That is the standard way you would recover any server or DC.The only issues you would run into is that the new hardware may be different, for that 3rd party backup tools include things like "restore to different hardware", which strips the drivers and where new drivers can be injected, like the paragon products. A further issue can be that your OS may have been OEM, and OEM can usually only be activated once and not moved to other hardware, unless you live in the EU or countries like Switzerland, where you can call m$ for reactivation. Further issues you'll run into are that you'll probably have to re-bind your new NIC to the different services.
0

Featured Post

Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where attendees received a comprehensive look at the ma…
Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question