Skip to content
Tech Master Tech Master

OneStopTechnical Forum

  • Books
  • AI
  • Networking
  • Windows
  • Linux
  • Cloud
  • Mac
  • Active Directory
  • Azure
  • Cloud
  • Exchange
  • M365
  • Server 2025
  • Storage
  • Vsphere
  • Website
  • Database
  • Security
  • Knowledge Base
  • VPN
Tech Master
Tech Master

OneStopTechnical Forum

Deeper troubleshooting, like authoritative restore with NTDSUTIL

blog.payperitem.com, April 3, 2025

Authoritative Restore of Deleted Groups/Users Using NTDSUTIL

If Active Directory Recycle Bin is not enabled and you don’t have a backup with a simpler restore method, an authoritative restore using ntdsutil is required. This process restores deleted users or groups from an Active Directory System State backup and marks them as authoritative so they replicate across all domain controllers.


⚠️ Pre-Restore Considerations

  1. This requires a System State Backup taken before the deletion.
  2. This will restart the Domain Controller (DC) and requires Directory Services Restore Mode (DSRM).
  3. Changes will be replicated across the domain once complete.
  4. Group memberships might be lost for restored users, requiring manual re-assignment.

Step 1: Boot into Directory Services Restore Mode (DSRM)

  1. Log in to the affected Domain Controller.
  2. Open Run, type msconfig, and press Enter.
  3. Go to the Boot tab → Check Safe boot and select Active Directory repair.
  4. Click OK → Restart the server.
  5. Log in using the DSRM Administrator account (not a domain account). If unsure, reset the password: powershellCopyEditntdsutil set dsrm password reset password on server null

Step 2: Restore System State Backup

  1. Open Windows Server Backup (wbadmin.msc).
  2. Select Recover → Choose the backup date.
  3. Select System State → Restore to Original Location.
  4. Wait for the restore to complete.

If using PowerShell:

powershell

wbadmin start systemstaterecovery -version:<backup-version> -quiet

Find available backup versions:

powershell

wbadmin get versions

Step 3: Perform an Authoritative Restore Using NTDSUTIL

  1. Open Command Prompt (cmd).
  2. Type: cmdCopyEditntdsutil
  3. Enter Directory Services Restore Mode commands: cmdCopyEditactivate instance ntds authoritative restore
  4. Restore the specific user or group: cmdCopyEditrestore object "CN=DeletedUser,CN=Users,DC=domain,DC=com" OR for a whole Organizational Unit (OU): cmdCopyEditrestore subtree "OU=DeletedOU,DC=domain,DC=com"
  5. Type quit twice and close the Command Prompt.

Step 4: Reboot and Resynchronize AD

  1. Open Run → msconfig.
  2. Uncheck Safe Boot.
  3. Restart the Domain Controller normally.

Once restarted:

powershell

repadmin /syncall /A /e /P

This forces synchronization across all domain controllers.


Step 5: Verify Restored Object and Permissions

  1. Open Active Directory Users and Computers (ADUC).
  2. Search for the restored User/Group.
  3. Check group memberships (they may need re-assignment).
  4. Verify folder permissions: powershellCopyEditGet-Acl "C:\YourFolder" | Format-List

If the folder still shows unknown SIDs, you must manually reapply the permissions:

powershell$Acl = Get-Acl "C:\YourFolder"
$User = "DOMAIN\User"
$AccessRule = New-Object System.Security.AccessControl.FileSystemAccessRule($User, "FullControl", "Allow")
$Acl.SetAccessRule($AccessRule)
Set-Acl "C:\YourFolder" $Acl

Step 6: Prevent Future Issues

  • Enable AD Recycle Bin: powershellCopyEditEnable-ADOptionalFeature -Identity "Recycle Bin Feature" -Scope ForestOrConfigurationSet -Target "domain.com"
  • Schedule regular System State Backups: powershellCopyEditwbadmin start backup -backupTarget:D: -include:systemstate -quiet
  • Use Group Policy to enforce folder permissions instead of manual ACLs.

Final Notes

  • If you restored an entire OU, you may need to manually re-add group memberships.
  • Replication issues? Force sync with: powershellCopyEditrepadmin /syncall /A /e /d
  • Check event logs for restore errors: Event Viewer → Directory Service Logs.
Active Directory Server 2025 Windows

Post navigation

Previous post
Next post

Related Posts

Active Directory

LAPS: Automatically generate admin accounts, use passphrases, enable rollback detection

March 8, 2025April 2, 2025

Since Windows 11 23H2, the Local Administrator Password Solution (LAPS) has been integrated into the OS and 24H2 brought some interesting innovations. These include the automatic management of local admin accounts, the use of passphrases and the generation of a new password when the computer is reset. LAPS is designed…

Read More

New features for Windows 11: Quick Machine Recovery, Administrator Protection, Hotpatch

March 8, 2025April 2, 2025

At Ignite, Microsoft announced a number of new features for Windows, primarily designed to improve the security of the system. These include Administrator Protection to implement least privilege, new requirements for antivirus manufacturers, the recovery of non-bootable PCs and support for Hotpatch. In response to regular security incidents, Microsoft launched…

Read More

Deep insight knowledge of lansweeper

April 4, 2025April 4, 2025

Lansweeper is a popular network management and IT asset discovery tool used by organizations to manage their IT infrastructure more effectively. It provides capabilities for network scanning, asset management, reporting, and troubleshooting. Below is a deep dive into its functionalities, features, and best practices for deploying and utilizing Lansweeper in…

Read More

Recent Posts

  • List of AD Schema Versions
  • OldNewExplorer Free Download For Windows 11, 10, 8 and 7 [Latest Version]
  • How to Get the Classic (old) Context Menu on Windows 11
  • BitLocker Recovery Keys
  • Active Directory and Server hardening

Recent Comments

No comments to show.
June 2025
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
30  
« May    
Log in
©2025 Tech Master | WordPress Theme by SuperbThemes
  • Login
  • Sign Up
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }