Systems Admin

Perform an Authoritative Restore of Active Directory Objects

This is the hands-on authoritative restore walkthrough — the procedure Part 5 set up conceptually. We simulate a real disaster: an OU with users is deleted from DC01, the deletion replicates to DC02, and now we have to roll it back forest-wide. The recipe: boot into DSRM, restore system state from backup, mark the OU authoritative with ntdsutil, reboot, force replication. Watch the OU come back on every DC.

This is the final post in the AD Backup & Disaster Recovery pathway. Previous posts covered the backup side (Parts 1–3), the bare-metal restore procedure (Part 4), and the non-authoritative vs authoritative concept (Part 5). Now we do the surgical authoritative restore.

Scenario

Two DCs: WS2K19-DC01 and WS2K19-DC02. We have a system state backup of DC01 from before the deletion. We need:

  • The deletion to be a real forest-wide event (not just local to DC01)
  • The backup to predate the deletion
  • DSRM password ready

In real life: someone fat-fingered a cleanup script, or a runaway PowerShell removed the wrong OU. The AD Recycle Bin isn’t enabled, or the deletion is too old. Authoritative restore is the only path back.

Step 1 — Confirm pre-disaster state

Windows Server Backup console showing the system state backup with successful timestamp before the OU deletion occurred
Pre-flight check: confirm the system state backup exists and is recent. The backup must contain the data you intend to authoritatively restore — if the deletion happened before the latest backup, you need an older backup.
Active Directory Users and Computers showing the TestOU organizational unit containing User1 and User2 accounts
Starting state: TestOU exists on DC01 with User1 and User2. This is what we’re going to destroy and then bring back.

The system state backup is current (taken before the deletion). TestOU exists on DC01 with User1 and User2 inside. This is the baseline we’re going to recover to.

Step 2 — Simulate the disaster

Active Directory Users and Computers right click context menu on TestOU with Delete option highlighted
Simulating the disaster: right-click TestOU > Delete. (Production: this happens by accident via a runaway script or fat-fingered cleanup task.)
Delete confirmation dialog asking are you sure to delete TestOU with Yes button
Confirm delete: Yes.
Subtree delete confirmation dialog with Yes delete subtree option selected and Yes button
OU contains child objects — tick Yes, delete subtree. This is what makes the deletion destructive — and what makes authoritative restore necessary, because the subtree delete propagates as a single change.
Active Directory Users and Computers after deletion confirming TestOU is no longer present on DC01
TestOU is gone from DC01. Refresh the view to confirm.

Delete the OU. Subtree delete (because OU has children). Confirm. TestOU is gone from DC01.

Why simulate? Because if you don’t practise the authoritative restore on a disposable lab, you’ll learn the procedure under pressure during a real outage — bad time to read docs.

Step 3 — Force the deletion to DC02 (make it forest-wide)

Active Directory Sites and Services console with DC01 NTDS Settings expanded showing the replication connection to DC02
Force replication to DC02 — we want the deletion mirrored so the “disaster” is forest-wide, not just on DC01. Active Directory Sites and Services > DC01 > NTDS Settings > right-click outbound connection > Replicate Now.
Active Directory Sites and Services on DC02 with NTDS Settings expanded showing replicate now context option
Same on DC02: NTDS Settings > right-click inbound connection > Replicate Now. Push the deletion both directions to model real replication.
Active Directory Sites and Services replicate now success message after forcing replication from DC02
Replication success dialog.

Sites and Services > DC01 > NTDS Settings > right-click outbound connection > Replicate Now. Same on DC02 to pull. The deletion is now mirrored on both DCs — we’ve modelled a real forest-wide accidental delete.

Active Directory Users and Computers on DC02 after refresh confirming TestOU has been deleted by replication
Verify on DC02: refresh AD Users and Computers. TestOU is gone here too. Both DCs agree the OU is deleted — the “disaster” is now forest-wide.

Verify on DC02: TestOU is gone here too. Both DCs agree.

Step 4 — Boot DC01 into DSRM

Run dialog with msconfig command typed to open System Configuration utility
Boot DC01 into DSRM: Windows + R > msconfig. The msconfig approach is more reliable than F8 (which has tight timing).
System Configuration utility with the Boot tab selected and Safe boot Active Directory repair option checked
Boot tab > tick Safe boot > choose Active Directory repair. This boots Windows in safe mode with AD services not running — we can modify NTDS.DIT offline.
System Configuration prompt asking to restart now to apply boot mode changes
Apply > OK > restart.
Server restart screen showing Windows is rebooting into Directory Services Restore Mode
Server restarts into DSRM. AD services don’t start; the domain isn’t available.

Windows + R > msconfig > Boot tab > tick Safe boot > choose Active Directory repair. Apply > OK > Restart.

Why msconfig vs F8? F8 has a tight pre-boot timing window that’s been removed in newer Windows. msconfig is reliable. Server boots into DSRM — AD services don’t start, NTDS.DIT is offline so we can modify it.

Step 5 — Log in to DSRM

Windows login screen after DSRM boot with default domain admin account showing requiring credentials
Login screen after DSRM boot. Trying domain admin first to confirm the failure mode.
Login failure dialog showing we cant sign you in with this credential because your domain isnt available
Cannot sign in with domain credentials in DSRM — expected. AD isn’t running, so AD-backed authentication has no service to validate against.

Try domain admin first — fails as expected. Error: your domain isn’t available. AD service isn’t running, so no domain auth.

Login screen with Other user option selected to log in with local DSRM administrator account
Click Other user and log in with .\Administrator + the DSRM password you set during DC promotion. That’s a local account stored in the local SAM, not in AD — works offline.

Click Other user. Log in with:

  • Username: .\Administrator (the dot prefix is important — it forces a local account lookup)
  • Password: the DSRM password you set when promoting this DC

If you don’t remember the DSRM password, you can reset it from a running DC with ntdsutil set dsrm password — but only when AD is up. See the DSRM password reset post for the full procedure. Set the DSRM password proactively, before you need it.

Step 6 — Restore system state via WSB

Server Manager Tools menu showing Windows Server Backup option after successful DSRM login
Logged into DSRM. Open Server Manager > Tools > Windows Server Backup.
Windows Server Backup console with Local Backup selected and Recover action highlighted in the Actions pane
WSB > Local Backup > Recover in the Actions pane.

Server Manager > Tools > Windows Server Backup > Local Backup > Recover.

Recovery Wizard Getting Started page with This server option selected for where the backup is stored
Recovery Wizard > This server (the server where the backup was made). If your backup is on a remote share, pick the other option.

Recovery wizard > This server (backup is local).

Recovery Wizard Select Backup Date page with the available system state backup version selected
Pick the backup version — only one available here. Confirm the timestamp matches the pre-deletion backup.

Pick the backup version. One available here; if you had multiple, pick the most recent one that’s still before the deletion.

Recovery Wizard Select Recovery Type page with System state option selected
Recovery type: System state. This restores NTDS.DIT, SYSVOL, registry, etc. We are NOT doing a file-by-file restore.

Recovery type: System state.

Recovery Wizard Select Location for System State Recovery page with Original location selected and Perform authoritative restore checkbox visible
Recovery location: Original location. Note the checkbox Perform an authoritative restore of Active Directory files. Do not tick this — it’s a whole-database authoritative restore, which is overkill for a single OU. We’ll do granular authoritative restore with ntdsutil after this restore completes.

Recovery location: Original location. Do NOT tick Perform an authoritative restore of Active Directory files — that GUI checkbox is a whole-database authoritative restore. We want granular control, which means leaving this unticked and using ntdsutil afterward.

Warning dialog explaining replicated content will resync after recovery with OK button
Warning about replication resync. OK.

Warning about replication resync. OK.

Recovery Wizard Confirmation page showing summary with Recover button to start
Confirmation summary. Click Recover. Critical: don’t tick “Automatically restart the server” — if you do, the DC reboots straight out of DSRM and the restore is purely non-authoritative. We need to mark objects authoritative before the next reboot.

Confirmation summary. Critical: don’t tick “Automatically restart the server” — if you do, the DC reboots straight out of DSRM and the restore is purely non-authoritative. We need to mark objects authoritative before the next reboot, while still in DSRM.

Click Recover.

Recovery progress page showing system state restore completed successfully with Close button
Recovery completes. Close.

Restore completes. Close. Still in DSRM — don’t reboot yet.

Step 7 — ntdsutil authoritative restore

Right click Start menu showing Windows PowerShell Admin option to open elevated PowerShell session
Open elevated PowerShell — right-click Start > Windows PowerShell (Admin).

Open elevated PowerShell. Right-click Start > Windows PowerShell (Admin).

PowerShell window with ntdsutil command running and authoritative restore subtree command being typed with the distinguished name
Run the authoritative restore sequence: ntdsutilactivate instance ntdsauthoritative restorerestore subtree "OU=TestOU,DC=MyLab,DC=Local". The DN must be exact, in quotes if it has spaces. Use help in any submenu to see available commands.

The command sequence:

ntdsutil
activate instance ntds
authoritative restore
restore subtree "OU=TestOU,DC=MyLab,DC=Local"

Note the DN syntax. OU= for OUs, DC= for each domain component. Quote the whole DN if it has spaces. Use help in any submenu to see what’s available.

Authoritative restore confirmation prompt asking are you sure you want to perform this authoritative restore with Yes
Confirmation prompt. Yes.

Confirmation prompt. y.

PowerShell showing successful authoritative restore output with USN attributes increased by 100000
Authoritative restore completed successfully — Increasing attributes’ USN number by 100,000. This is the key mechanism: every attribute on every object in the marked subtree gets its USN bumped by 100,000. When DC01 next replicates, those bumped USNs will be higher than anything on the surviving DCs, so the marked objects push out and overwrite.

The output line that matters: Increasing attributes’ USN number by 100,000. This is the mechanism. Every attribute of every object in the marked subtree gets its USN bumped by 100,000. When DC01 replicates after reboot, those bumped USNs will be higher than anything on the surviving DCs — so the marked objects push out and overwrite.

Granular: single object instead of subtree

PowerShell showing restore object command for a single user with distinguished name CN equals User1 OU equals TestOU
Granular alternative: restore object "CN=User1,OU=TestOU,DC=MyLab,DC=Local" — marks a single user as authoritative. Useful when you only need one specific object back, not a whole subtree. Successfully updated one record.

If you only need one specific user back (not a whole subtree), use restore object:

restore object "CN=User1,OU=TestOU,DC=MyLab,DC=Local"

Successfully updated one record. Useful when surgical recovery is needed without disturbing other objects in the same OU.

Exit cleanly

PowerShell with exit commands typed to leave ntdsutil and PowerShell after authoritative restore complete
Quit ntdsutil with quit twice (once to leave the authoritative restore submenu, once to leave ntdsutil itself), then exit from PowerShell.

Quit out: quit to leave the authoritative restore submenu, quit again to leave ntdsutil, exit to close PowerShell.

Step 8 — Switch boot config back to normal

Run dialog with msconfig typed again to switch boot configuration back to normal startup
Switch boot config back to normal before rebooting. Windows + R > msconfig.
System Configuration utility with Normal startup radio button selected to leave DSRM mode
General tab > Normal startup. This unchecks the Safe boot box automatically.
System Configuration Boot tab confirming Safe boot is no longer checked after normal startup applied
Boot tab: confirm Safe boot is no longer ticked. Apply > OK.
System Configuration restart prompt to reboot back into normal Windows operation
Restart prompt > Restart.

Windows + R > msconfig > General tab > Normal startup. This automatically unticks Safe boot. Apply > OK > Restart.

If you skip this step, the DC reboots back into DSRM and AD never starts up — you have to repeat the msconfig dance to fix.

Step 9 — Verify on DC01

Windows login screen after normal boot with domain administrator account credentials being entered
Normal boot. Login with the regular domain administrator account — AD services start, DSRM is gone.
Active Directory Users and Computers after authoritative restore showing TestOU restored on DC01 with User1 and User2 visible
Verify the restore worked on DC01: AD Users and Computers > MyLab.local > TestOU — back, with User1 and User2 intact. Authoritative restore succeeded locally.

Normal boot. Login as domain admin (AD is back up). AD Users and Computers > MyLab.local > TestOU is back, with User1 and User2 inside. The local DC01 authoritative restore worked.

But we’re not done — the restored objects are only on DC01 so far. We need replication to push them to DC02.

Step 10 — Force replication to DC02

Active Directory Sites and Services right click on NTDS Settings with Check Replication Topology option highlighted on DC01
Now verify replication out to DC02. Sites and Services > DC01 > right-click NTDS Settings > Check Replication Topology.
Check Replication Topology success dialog after running on DC01 confirming topology refreshed
Topology refreshed.
Active Directory Sites and Services replicate now context option selected to force outbound replication of restored objects from DC01
Right-click the outbound connection > Replicate Now. This forces DC01’s bumped USNs to push to DC02.

Sites and Services > DC01 > right-click NTDS Settings > Check Replication Topology > OK. Then right-click the outbound connection > Replicate Now.

Active Directory Sites and Services on DC02 after replication completed showing the restored objects
Same flow on DC02 — check replication topology, replicate now (this time forcing DC02 to pull from DC01). Both directions, both DCs.

Same flow on DC02: check replication topology, replicate now (pull from DC01).

Active Directory Users and Computers on DC02 confirming TestOU is back with User1 and User2 after authoritative restore replicated forest wide
Final verification on DC02: AD Users and Computers > TestOU with User1 and User2. The OU is back on every DC in the forest. Authoritative restore is complete.

Final verification on DC02: AD Users and Computers > TestOU back, with User1 and User2 inside. The OU is restored on every DC in the forest.

Verification commands

After the restore, run these to confirm replication is healthy:

repadmin /showrepl
repadmin /replsummary
dcdiag /v
Get-ADReplicationFailure -Target * -Scope Forest

Look for: zero replication failures, all DCs in sync, no critical dcdiag errors.

Things that bite people

Rebooting before running ntdsutil

If the DC reboots out of DSRM before you run the ntdsutil authoritative restore commands, the restore is purely non-authoritative. The restored data syncs from DC02’s newer USNs, and the OU you tried to bring back gets re-deleted by replication. You have to repeat the entire DSRM + restore procedure. Don’t tick “Automatically restart” on the WSB recovery wizard.

Wrong DN in ntdsutil

If the DN is off by one character — OU=TestOu instead of OU=TestOU — ntdsutil returns “Object not found.” The mark-authoritative operation fails silently in the sense that nothing got bumped. Always copy the exact DN from a working AD Users and Computers view before the deletion, or from the deletion event in the Security log.

Using the GUI checkbox for granular restore

The WSB GUI’s “Perform an authoritative restore of Active Directory files” checkbox marks the entire database authoritative. If you only need one OU back, ticking this overwrites every other recent change in AD too — passwords rotated, group memberships changed, etc., all reverted. Never use the GUI checkbox for granular restore. Always use ntdsutil.

SYSVOL not authoritatively restored

ntdsutil authoritative restore covers the AD database only. If the deleted object included a GPO (which lives in SYSVOL), you also need wbadmin start systemstaterecovery -authsysvol. Otherwise the GPO comes back in the AD pointer but the actual policy file is missing from SYSVOL. Watch for this in OUs that had linked GPOs.

DSRM password forgotten

If you don’t know the DSRM password, you can’t log in after boot to DSRM. Reset it proactively (from any working DC) with ntdsutil set dsrm password. Document the procedure in your DR runbook; store the DSRM password in a vault that’s reachable during an outage (not just on the broken DC).

FSMO role not seized

If DC01 is the FSMO role holder, the rest of the forest can’t do schema mods, password resets (PDC Emulator), etc., while DC01 is offline in DSRM. For long restores, seize the role to DC02 first, then seize back when DC01 is healthy again. Granular authoritative restore is usually quick enough this isn’t an issue.

Backup older than tombstone lifetime

If your backup is older than the tombstone lifetime (60 days default for older AD, 180 for AD Recycle Bin enabled), replication treats the restored objects as “already deleted, ignore.” The bumped USN means the local DC has them, but they don’t replicate out properly. Always verify backup age vs tombstone lifetime before relying on the backup.

Multiple authoritative restores in succession

The USN-bump-by-100,000 mechanism is fine for one or two cycles. If you authoritatively restore the same object a dozen times, you eventually exhaust the high-word USN space. In practice, you never hit this — but be aware that authoritative restore is not infinitely repeatable on the same objects.

What’s next

That’s the full AD Backup & Disaster Recovery pathway. You’ve built the backup, scheduled it, tested it bare-metal, restored it bare-metal, learned the non-authoritative vs authoritative model, and now driven a granular authoritative restore end-to-end. From here:

  • Practise this on a lab at least once a quarter. The exact ntdsutil commands are different from anything else you do in AD — muscle memory matters when it’s for real.
  • Enable AD Recycle Bin (Server 2008 R2+). Most accidental deletions can be recovered from Recycle Bin without needing this full authoritative restore procedure. Authoritative restore is the fallback when Recycle Bin can’t help.
  • Document your DR runbook with the exact DNs, DSRM passwords, FSMO roles, and IP plan for each DC. Don’t depend on memory under pressure.
  • Forest Recovery is the next-tier disaster (corrupt schema, ransomware that replicated to all DCs). That’s a different procedure — Microsoft has a dedicated guide. Don’t conflate Forest Recovery with authoritative restore.

Happy learning — and may you never actually need this in production.

Leave a Reply