How to use PowerShell and PowerShell cmdlets
PowerShell has come a long way from a command line interpreter with support of a few commands, to a fully integrated part of every modern Windows OS. Right now, not only is it a cool thing to, but it is also essential in order to achieve better results in Windows tasks’ management, including virtual machine (VM) backup.
This is a two-part article. In the first part, I’m going to talk about PowerShell in general, when you should consider using it for Hyper-V backup and how to get acquainted with PowerShell basics, PowerShell commands (cmdlets) and syntax.
Read moreData deduplication using both Windows Server 2016 and Veeam
How to recover Group Policy Objects
We introduced Veeam Explorer for Microsoft Active Directory — a very helpful utility when it comes to AD objects recovery — as a part of Veeam Backup & Replication v8. Its initial functionality was intended to solve the most frequent cases administrators have with Active Directory: Granular objects and containers recovery (ok, password recovery also was included, as well as AD data export in LDIFDE format). All of that made a lot of people happy, but, as always, they wanted more. The community gave us great feedback, asking for additional features for less frequent cases or specific scenarios.
Read moreHow to create a Hyper-V VM template
Hyper-V initial configuration
Hyper-V VM generations & versioning explained
Leveraging Active Directory Recycle Bin: Best practices for AD protection (Part 4)
This post is part four of a series where I discuss granular recovery of Active Directory objects and different scenarios and tools for such operations.
In the previous article, I described the cases where administrators worked with Domain Controllers running Active Directory off a functional level of Windows Server 2003 and Windows Server 2008. I detailed the steps they had to do in order to reanimate the tombstone objects using LDP and Veeam Explorer for Microsoft Active Directory utilities.
Today, I’m moving on to newer systems with the Active Directory recycle bin feature enabled.
Read moreReanimating Active Directory tombstone objects: Best practices for AD protection (Part 3)
This is the 3rd article from my Active Directory protection series. In the previous one, I covered the domain controller recovery process. However, I believe that is a less common operation when compared to other Active Directory requests system administrators constantly receive. Among those requests, I believe the most frequent is Active Directory objects change.
Read more