DSInternals/Documentation/PowerShell/New-ADDBRestoreFromMediaScript.Sample.ps1
2025-03-22 13:30:16 +01:00

531 lines
25 KiB
PowerShell

<#
.SYNOPSIS
Restores the LON-DC1 domain controller from its ntds.dit file.
.DESCRIPTION
This script performs a multi-phase domain controller restore from an IFM backup:
- Phase 0: Initiate the restore process and create a VSS backup.
- Phase 1: Set the local Administrator password if empty.
- Phase 2: Rename the computer and reboot if necessary.
- Phase 3: Install the required Windows features and reboot if needed.
- Phase 4: Promote the server to a domain controller.
- Phase 5: Restore the AD database, re-encrypt it, and reconfigure LSA policies.
- Phase 6: Replace the SYSVOL directory, restore ACLs if available, and reboot the server.
- Phase 7: Reconfigure the SYSVOL replication subscription.
Script exection logs can be found in the C:\Windows\Logs\DSInternals-RestoreFromMedia.txt file.
.PARAMETER Phase
Specifies the phase of the restore operation to execute. Used to orchestrate the integrated recovery workflow.
.NOTES
This script should only be executed on a freshly installed Windows Server 2012 R2 Datacenter Evaluation. Use at your own risk.
The DSInternals PowerShell module must be installed for all users on the target server.
It is recommended to change the DSRM password after DC promotion.
Author: Michael Grafnetter
Version: 2.3
#>
#Requires -Version 3 -Modules DSInternals -RunAsAdministrator
param(
[Parameter(Mandatory = $false)]
[ValidateRange(0, 7)]
[int] $Phase = 0
)
# Make sure that the required data types and cmdlets are available.
Import-Module -Name DSInternals -ErrorAction Stop
function Main {
[string] $script:LogFile = "$env:windir\Logs\DSInternals-RestoreFromMedia.txt"
[System.Console]::OutputEncoding = [System.Text.Encoding]::UTF8
$PSDefaultParameterValues = @{ 'Out-File:Encoding' = 'utf8' }
Write-Log -Message "Starting script execution in phase $Phase..."
# The script must be executed locally so that it is accessible even after a reboot.
Test-ScriptPath
switch($script:Phase)
{
0 {
Write-Log 'The LON-DC1 domain controller will now be restored from media. Up to 3 reboots will follow shortly.'
# Perform a VSS backup before doing anything else.
New-VolumeShadowCopy -Volume $env:SystemDrive
# Invoke the first phase in the background.
Register-ScheduledScript -ExecutePhase 1
}
1 {
# The local Administrator account must have a password set for dcpromo to succeed.
Reset-LocalAdministratorPassword -NewPassword 'Pa$$w0rd'
# Continue to the next phase.
Register-ScheduledScript -ExecutePhase 2
}
2 {
Write-Log -Message 'Checking the computer name...'
[bool] $computerRenameRequired = $env:COMPUTERNAME -ne 'LON-DC1'
if ($computerRenameRequired) {
# A server rename operation is required.
# Note: The host name will automatically be truncated to 15 characters.
Write-Log -Message 'Renaming the computer to LON-DC1...'
Rename-Computer -NewName 'LON-DC1' -Force -Verbose *>> $script:LogFile
} else {
Write-Log -Message 'The local system already has the correct name. Skipping the rename operation.'
}
# Perform an optional reboot and continue to the next phase.
Register-ScheduledScript -ExecutePhase 3 -RebootRequired:$computerRenameRequired
}
3 {
Write-Log -Message 'Installing the required Windows features...'
# Note: The ServerManager module is not available during Safe Boot. It is therefore not imported globally.
Import-Module -Name ServerManager -ErrorAction Stop
# Notes:
# The dcpromo.exe tool would install most of these features if absent.
# The BitLocker Recovery Password Viewer is called RSAT-Bitlocker-RecPwd on Windows Server 2008 R2 and cannot be instaleld on non-domain computers.
# The AD-Domain-Services component would try to install UNIX-related components on Windows Server 2008 R2, which cannot be installed on non-domain computers.
[string[]] $featuresToInstall = @(
'DNS',
'GPMC',
'RSAT-AD-AdminCenter',
'RSAT-ADDS-Tools',
'RSAT-AD-PowerShell',
'RSAT-DNS-Server',
'RSAT-DFS-Mgmt-Con', # dfsrdiag.exe is not installed by default
'RSAT-Feature-Tools-BitLocker-BdeAducExt' # BitLocker Recovery Password Viewer is not installed by default
)
# Notes:
# The Add-WindowsFeature alias is used instead of Install-WindowsFeature for compatibility reasons.
# The -IncludeManagementTools parameter is not used because it is not available on Windows Server 2008 R2.
[object[]] $featuresRequiringRestart = Get-WindowsFeature |
Where-Object Name -in $featuresToInstall |
Add-WindowsFeature -IncludeAllSubFeature |
Where-Object RestartNeeded -ne ([Microsoft.Windows.ServerManager.Commands.RestartState]::No) 2>> $script:LogFile
[bool] $restartNeeded = $null -ne $featuresRequiringRestart
# Perform an optional reboot and continue to the next phase.
Register-ScheduledScript -ExecutePhase 4 -RebootRequired:$restartNeeded
}
4 {
# Check if the NTDS service is present and enabled, possibly by a previous script execution.
Write-Log -Message 'Checking the state of the NTDS service...'
[System.ServiceProcess.ServiceController] $ntdsService = Get-Service -Name NTDS -ErrorAction SilentlyContinue
if ($null -eq $ntdsService -or $ntdsService.StartType -eq [System.ServiceProcess.ServiceStartMode]::Disabled) {
# A DC promotion is required.
Write-Log -Message 'Promoting the server to a domain controller...'
# Note: In order to maintain compatibility with Windows Server 2008 R2, the ADDSDeployment PS module is not used.
dcpromo.exe /unattend /ReplicaOrNewDomain:Domain /NewDomain:Forest /NewDomainDNSName:"adatum.com" /DomainNetBiosName:"ADATUM" /DomainLevel:7 /ForestLevel:7 '/SafeModeAdminPassword:"Pa$$w0rd"' /DatabasePath:"$env:SYSTEMROOT\NTDS" /LogPath:"$env:SYSTEMROOT\NTDS" /SysVolPath:"$env:SYSTEMROOT\SYSVOL" /AllowDomainReinstall:Yes /CreateDNSDelegation:No /DNSOnNetwork:No /InstallDNS:Yes /RebootOnCompletion:No *>> $script:LogFile
} else {
Write-Log -Message 'The server is already a domain controller. Skipping dcpromo execution.'
}
# Prevent the Server Manager from saying that additional configuration is required.
# Note: The Roles key does not exist on Windows Server 2008 R2.
Write-Log -Message 'Marking the AD DS role as already configured by the Server Manager...'
Set-ItemProperty -Path 'registry::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ServerManager\Roles\10' `
-Name 'ConfigurationStatus' `
-Value 2 `
-Type DWord `
-Force `
-ErrorAction SilentlyContinue `
-Verbose *>> $script:LogFile
# Avoid FSMO role holder being unavailable until it has completed replication of a writeable directory partition.
Write-Log -Message 'Disabling the initial datatabse synchronization...'
Set-ItemProperty -Path 'registry::HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters' `
-Name 'Repl Perform Initial Synchronizations' `
-Value 0 `
-Type DWord `
-Force `
-Verbose *>> $script:LogFile
# Continue with post-installation tasks.
Register-ScheduledScript -ExecutePhase 5
}
5 {
# Make sure that AD DS is not running.
Write-Log -Message 'Checking the state of the NTDS service...'
[System.ServiceProcess.ServiceController] $ntdsService = Get-Service -Name NTDS -ErrorAction SilentlyContinue
if($null -eq $ntdsService) {
Write-Log -Message 'Could not find the NTDS service. Terminating...'
break
} elseif ($ntdsService.Status -eq [System.ServiceProcess.ServiceControllerStatus]::Running) {
Write-Log -Message 'Stopping the NTDS service...'
Stop-Service -Name NTDS -Force -Verbose *>> $script:LogFile
} else {
# Note: This is the most common case, as AD DS should not be running before a reboot.
Write-Log -Message 'The NTDS service is stopped. Proceeding with database restoration...'
}
# Replace the database files using robocopy.
# Copy the database (*.dit, *.edb), checkpoint (*.chk), and flush map (*.jfm) files.
# /MIR: Mirrors the directory tree
# /NP: No progress
# /NDL: No directory list
# /NJS: No job summary
Write-Log -Message 'Replacing the AD database files...'
robocopy.exe 'C:\Backup\Active Directory' 'C:\Windows\NTDS' *.dit *.edb *.chk *.jfm /MIR /NP /NDL /NJS *>> $script:LogFile
# Replace the transaction logs using robocopy.
# Copy the transaction logs (*.log) and reserved transaction log files (*.jrs).
Write-Log -Message 'Replacing the AD database transaction log files...'
robocopy.exe 'C:\Backup\Active Directory' 'C:\Windows\NTDS' *.log *.jrs /MIR /NP /NDL /NJS *>> $script:LogFile
# Re-encrypt the DB with the new boot key. We would get into a BSOD loop if the DC is unable to decrypt the database.
Write-Log -Message 'Re-encrypting the database with the new boot key...'
Set-ADDBBootKey -DatabasePath 'C:\Backup\Active Directory\ntds.dit' `
-LogPath 'C:\Backup\Active Directory' `
-OldBootKey '610bc29e6f62ca7004e9872cd51a0116' `
-NewBootKey '6d3327d97c69f11f25ca29b10e30b688' `
-Force `
-Verbose *>> $script:LogFile
# Reconfigure LSA policies. We would get into a BSOD loop if they did not match the corresponding values in the database.
Write-Log -Message 'Reconfiguring the LSA policies...'
Set-LsaPolicyInformation -DomainName 'ADATUM' `
-DnsDomainName 'Adatum.com' `
-DnsForestName 'Adatum.com' `
-DomainGuid '279b615e-ae79-4c86-a61a-50f687b9f7b8' `
-DomainSid 'S-1-5-21-1817670852-3242289776-1304069626' `
-Verbose *>> $script:LogFile
# Set the proper Configuration NC. This step is required for non-root domains.
Write-Log -Message 'Changing the configuration naming context...'
Set-ItemProperty -Path 'registry::HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters' `
-Name 'Configuration NC' `
-Value 'CN=Configuration,DC=Adatum,DC=com' `
-Type String `
-Force `
-Verbose *>> $script:LogFile
# Set the proper root domain distinguished name. This step is required for non-root domains.
Write-Log -Message 'Changing the root domain...'
Set-ItemProperty -Path 'registry::HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters' `
-Name 'Root Domain' `
-Value 'DC=Adatum,DC=com' `
-Type String `
-Force `
-Verbose *>> $script:LogFile
# Set the distinguished name of NTDS Settings object. This step is required for non-default sites and non-root domains.
Write-Log -Message 'Changing the machine distinguished name...'
Set-ItemProperty -Path 'registry::HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters' `
-Name 'Machine DN Name' `
-Value 'CN=NTDS Settings,CN=LON-DC1,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=Adatum,DC=com' `
-Type String `
-Force `
-Verbose *>> $script:LogFile
# Tell the DC that its DB has intentionally been restored. A new InvocationID will be generated as soon as the service starts.
Write-Log -Message 'Marking the database as restored from backup...'
Set-ItemProperty -Path 'registry::HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters' `
-Name 'Database restored from backup' `
-Value 1 `
-Type DWord `
-Force `
-Verbose *>> $script:LogFile
# Remove the DSA Database Epoch value to bypass the database rollback detection.
Write-Log -Message 'Clearing the DSA Database Epoch value...'
Remove-ItemProperty -Path 'registry::HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters' `
-Name 'DSA Database Epoch' `
-Force `
-Verbose *>> $script:LogFile
# Note:
# The DC account is created/modified during the first boot after promotion.
# The machine account password thus does not need to be copied by this script.
# Continue to the next phase.
Register-ScheduledScript -ExecutePhase 6
}
6 {
# Replace the SYSVOL directory.
# /MIR: Mirrors the directory tree
# /XD: Excludes the DfsrPrivate directory from being copied.
# /XJ: Excludes junction points, several of which are present in SYSVOL.
# /COPYALL: Copies all file information, including data, attributes, timestamps, NTFS ACLs (permissions), owner information, and auditing information.
# /SECFIX: Fixes file security on all files, even skipped ones.
# /TIMFIX: Fixes file times on all files, even skipped ones.
# /NP: No progress
# /NDL: No directory list
Write-Log -Message 'Replacing the SYSVOL files...'
[string] $sourcePath = Join-Path -Path 'C:\Backup\SYSVOL' -ChildPath 'Adatum.com'
[string] $targetPath = Join-Path -Path 'C:\Windows\SYSVOL' -ChildPath 'domain'
robocopy.exe $sourcePath $targetPath /MIR /XD DfsrPrivate /XJ /COPYALL /SECFIX /TIMFIX /NP /NDL *>> $script:LogFile
# Check if an optional SYSVOL Group Policy ACL backup is present.
# This would be useful in situations where the SYSVOL is backed up to a non-NTFS file system.
[string] $sysvolAclBackupPath = Join-Path -Path 'C:\Backup\SYSVOL' -ChildPath 'PolicyPermissions.txt'
if(Test-Path -Path $sysvolAclBackupPath -PathType Leaf) {
Write-Log -Message 'Restoring the SYSVOL Group Policy ACLs...'
[string] $aclRestorePath = Join-Path -Path 'C:\Windows\SYSVOL' -ChildPath 'domain\Policies'
icacls.exe $aclRestorePath /restore $sysvolAclBackupPath *>> $script:LogFile
} else {
Write-Log -Message 'No SYSVOL ACL backup found. Skipping the ACL restoration.'
}
# A reboot is required for AD to start.
Register-ScheduledScript -ExecutePhase 7 -RebootRequired
}
7 {
# Reconfigure SYSVOL replication in case it has been restored to a different path.
# Make sure that AD Web Services are available.
[System.ServiceProcess.ServiceController] $adws = Get-Service -Name NTDS -ErrorAction SilentlyContinue
if($null -eq $adws -or $adws.Status -ne [System.ServiceProcess.ServiceControllerStatus]::Running) {
Write-Log -Message 'AD Web Services are not available. Terminating...'
break
} else {
Write-Log -Message 'The AD Web Services service is running. Proceeding with SYSVOL subscription reconfiguration...'
}
# Update DFS-R subscription if present in AD.
Update-DfsrSubscription -DomainControllerDN 'CN=LON-DC1,OU=Domain Controllers,DC=Adatum,DC=com' `
-SysvolPath 'C:\Windows\SYSVOL' `
-DomainName 'Adatum.com'
# Update FRS subscription if present in AD.
Update-FrsSubscription -DomainControllerDN 'CN=LON-DC1,OU=Domain Controllers,DC=Adatum,DC=com' `
-SysvolPath 'C:\Windows\SYSVOL'
}
}
if($Phase -ge 1) {
[string] $taskName = "DSInternals-RFM-Phase$Phase"
Write-Log -Message "Removing the scheduled task $taskName..."
schtasks.exe /Delete /TN $taskName /F *>> $script:LogFile
}
Write-Log -Message "Execution of phase $Phase has finished."
}
#region Helper Functions
<#
.SYNOPSIS
Resets the password of the local Administrator account (RID=500)
if it has not been set yet.
.NOTES
This recovery script intentionally contains plaintext passwords.
Using a SecureString in this function would not provide any additional security.
The corresponding PSScriptAnalyzer warning is therefore suppressed.
#>
function Reset-LocalAdministratorPassword {
[Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSAvoidUsingPlainTextForPassword", "")]
param(
[Parameter(Mandatory = $true)]
[string] $NewPassword
)
# Note: Due to compatibility reasons, the Get-LocalUser cmdlet is not used.
Write-Log -Message 'Fetching built-in Administrator account information through WMI...'
[wmi] $builtinAdminWMI = Get-WmiObject -Class Win32_UserAccount -Filter 'SID LIKE "%-500"' -Property Name
Write-Log -Message 'Fetching built-in Administrator account information through ADSI...'
[adsi] $builtinAdminADSI = 'WinNT://./{0},User' -f $builtinAdminWMI.Name
[bool] $hasPassword = $builtinAdminADSI.PasswordAge.Value -gt 0
if(-not $hasPassword) {
Write-Log 'Setting a password for the local Administrator account...'
$builtinAdminWMI.SetPassword($NewPassword) *>> $script:LogFile
} else {
Write-Log 'A password for the local Administrator account has already been set. No action is required.'
}
}
<#
.SYNOPSIS
Creates a new volume shadow copy of the specified volume.
#>
function New-VolumeShadowCopy {
param(
[Parameter(Mandatory = $true)]
[ValidatePattern('^[A-Z]:$')]
[string] $Volume
)
Write-Log 'Creating a snapshot of the system drive to make rollback possible...'
([wmiclass] 'Win32_ShadowCopy').Create("$Volume\", 'ClientAccessible') *>> $script:LogFile
}
function Register-ScheduledScript {
param(
[Parameter(Mandatory = $true)]
[int] $ExecutePhase,
[Parameter(Mandatory = $false)]
[switch] $RebootRequired
)
# Each phase of the script is executed by a separate scheduled task.
[string] $taskName = "DSInternals-RFM-Phase$ExecutePhase"
# Locate powershell.exe
[string] $psPath = Get-Command -Name 'powershell.exe' -CommandType Application | Select-Object -ExpandProperty Path
# Locate the current PS script
[string] $scriptPath = $script:MyInvocation.MyCommand.Source
# Generate the complete command line
[string] $commandLine = '"{0}" -ExecutionPolicy Bypass -NonInteractive -NoProfile -NoLogo -File "{1}" -Phase {2}' -f $psPath,$scriptPath,$ExecutePhase
# NOTE: The ScheduledTasks module is not used because it is not available on Windows Server 2008 R2.
Write-Log -Message 'Registering the script to be executed as a scheduled task...'
schtasks.exe /Create /TN $taskName /TR $commandLine /SC ONSTART /RU SYSTEM /RL HIGHEST /F *>> $script:LogFile
if($RebootRequired) {
# Reboot the computer and let it automatically execute the scheduled task.
Write-Log -Message 'Rebooting the computer to continue the restore process...'
shutdown.exe /r /t 5 /f *>> $script:LogFile
} else {
# Start the scheduled task immediately.
Write-Log -Message 'Starting the scheduled task...'
schtasks.exe /Run /I /TN $taskName *>> $script:LogFile
}
}
<#
.SYNOPSIS
Checks whether the script is being executed from a local file.
#>
function Test-ScriptPath {
Write-Log -Message 'Checking if the script is being executed from a local file...'
# Check if the PSScriptRoot variable is set.
[bool] $isScript = -not [string]::IsNullOrEmpty($PSScriptRoot)
if(-not $isScript) {
Write-Log -Message 'Not running as script. Terminating...'
throw 'The script must be executed from a local file.'
} else {
if(-not ([uri] $PSScriptRoot).IsUnc) {
Write-Log -Message 'The script is being executed from a local file.'
} else {
Write-Log -Message 'Running from a UNC path. Terminating...'
throw 'The script must be executed from a local file.'
}
}
}
<#
.SYNOPSIS
Updates the DFS-R subscription if present in AD.
.PARAMETER DomainControllerDN
The distinguished name of the domain controller computer account.
.PARAMETER SysvolPath
The path to the SYSVOL share on the target domain controller.
#>
function Update-DfsrSubscription {
param(
[Parameter(Mandatory = $true)]
[string] $DomainControllerDN,
[Parameter(Mandatory = $true)]
[string] $SysvolPath,
[Parameter(Mandatory = $true)]
[string] $DomainName
)
# Make sure that the required data types and cmdlets are available.
Import-Module -Name ActiveDirectory -ErrorAction Stop
Write-Log -Message 'Updating the FRS subscription object in AD...'
[string] $dfsrSubscriptionDN = "CN=SYSVOL Subscription,CN=Domain System Volume,CN=DFSR-LocalSettings,$DomainControllerDN"
[Microsoft.ActiveDirectory.Management.ADObject] $dfsrSubscription = Set-ADObject -Identity $dfsrSubscriptionDN -Server localhost -PassThru -ErrorAction SilentlyContinue -Replace @{
'msDFSR-RootPath' = Join-Path -Path $SysvolPath -ChildPath 'domain'
'msDFSR-StagingPath' = Join-Path -Path $SysvolPath -ChildPath "staging areas\$DomainName"
}
if($null -ne $dfsrSubscription) {
# Download the updated DFS-R configuration from AD.
Write-Log -Message 'Polling AD for DFS-R configuration changes...'
Invoke-WmiMethod -Class DfsrConfig -Name PollDsNow -ArgumentList localhost -Namespace ROOT\MicrosoftDfs *>> $script:LogFile
} else {
Write-Log -Message 'DFS-R subscription was not found in AD. Has the domain not yet been migrated from FRS?'
}
}
<#
.SYNOPSIS
Updates the FRS subscription if present in AD.
.PARAMETER DomainControllerDN
The distinguished name of the domain controller computer account.
.PARAMETER SysvolPath
The path to the SYSVOL share on the target domain controller.
#>
function Update-FrsSubscription {
param(
[Parameter(Mandatory = $true)]
[string] $DomainControllerDN,
[Parameter(Mandatory = $true)]
[string] $SysvolPath
)
# Make sure that the required data types and cmdlets are available.
Import-Module -Name ActiveDirectory -ErrorAction Stop
# Update FRS subscription if present in AD.
Write-Log -Message 'Updating the FRS subscription object in AD...'
[string] $frsSubscriptionDN = "CN=Domain System Volume (SYSVOL share),CN=NTFRS Subscriptions,$DomainControllerDN"
[Microsoft.ActiveDirectory.Management.ADObject] $frsSubscription = Set-ADObject -Identity $frsSubscriptionDN -Server localhost -PassThru -Verbose -ErrorAction SilentlyContinue -Replace @{
'fRSRootPath' = Join-Path -Path $SysvolPath -ChildPath 'domain'
'fRSStagingPath' = Join-Path -Path $SysvolPath -ChildPath 'staging\domain'
}
if($null -ne $frsSubscription) {
# Download the updated FRS configuration from AD.
Write-Log -Message 'Polling AD for FRS configuration changes...'
ntfrsutl.exe poll /now *>> $script:LogFile
# TODO: Check what happens if the FRS service is disabled on the new DC.
} else {
Write-Log -Message 'FRS subscription was not found in AD. This is expected.'
}
}
<#
.SYNOPSIS
Writes a message to both the console and a log file.
.PARAMETER Message
The message to be written.
#>
function Write-Log {
param(
[Parameter(Mandatory = $true)]
[string] $Message
)
[string] $logMessage = '{0:yyyy-MM-dd HH:mm:ss} {1}' -f (Get-Date), $Message
Write-Host $logMessage
Add-Content -Path $script:LogFile -Value $logMessage -Encoding UTF8
}
#endregion Helper Functions
# Execute the main function
Main