Restore AD after a domain controller software or hardware failure
A nonauthoritative restore of Active Directory (AD) is the default restore mode for Windows Backup and most third-party backup utilities.
This article applies to Windows Server 2016, Windows Server 2019, and Windows Server 2022
It is commonly used in cases where there has been a hardware or software failure on the server, or where Active Directory must be restored and then updated by authoritative versions of the AD database running on other domain controllers (DCs) in the forest. Any needed updates to AD on the restored DC are automatically replicated once the restore operation has completed.
Log in to the DC that you want to restore with a domain administrator account:
bcdedit /set safeboot dsrepair
shutdown -t 0 –r
Wait a few minutes for the DC to reboot. You can log on locally or remotely, but remember that you will need to supply the DSRM password you set when promoting the server to a DC. The username for DSRM is administrator. If the server is booted in safe mode, ‘safe mode’ will be displayed on the desktop.
wbadmin getversions
wbadmin start systemstaterecovery –version:12/23/2013-10:40
Wait for the recovery process to finish, it may take some time. You’ll be able to see the progress in the PowerShell console.
bcdedit /deletevalue safeboot
shutdown –t 0 –r
FAQs
A nonauthoritative restore Active Directory process allows changes made after the backup to be replicated back to the restored DC, while an authoritative restore forces other DCs to accept the restored data as authoritative, overwriting any newer changes.
It’s not recommended to perform nonauthoritative restore Active Directory on multiple DCs at once, as this could lead to replication conflicts and potential data inconsistencies. Restore one DC at a time to maintain stability.
During a nonauthoritative restore Active Directory operation, GPOs are restored to their backup state and then automatically updated through replication from other DCs to ensure consistency across the domain.
After completing a nonauthoritative restore Active Directory, it’s recommended to wait for full replication to occur and verify the DC’s health before making any significant changes, typically 24-48 hours depending on your environment’s size.
For optimal nonauthoritative restore Active Directory capabilities, implement daily system state backups and maintain at least two weeks of backup history, with additional backups before major AD changes.