此篇文章主要介绍如何恢复之前备份的 RMSDatabase 到目标 SQL Server 的相关步骤,详细步骤有如下: 1. 还原 数据库 到新的 SQL Server 2. 使用 RMSConfigEditor 编辑 DRMS_ClusterPolicies 3. 修改 AD RMS Server 的注册表 4. 重启 IIS 和 AD RMS Logging S
此篇文章主要介绍如何恢复之前备份的RMSDatabase到目标SQL Server的相关步骤,详细步骤有如下:
1.还原数据库到新的SQL Server
2.使用 RMSConfigEditor 编辑DRMS_ClusterPolicies
3.修改AD RMS Server 的注册表
4.重启IIS 和 AD RMS Logging Service
Restore the Database to theNew SQL Server
1.将上一文章中备份的RMS 数据库文件夹,拷贝至目标SQLServer的本地磁盘
2.打开SQL Server 管理器
3.连接服务器并定位【数据库】,右键选择【还原】
4.在还原数据库向导界面选择还原的源,定位到第1步骤中的磁盘备份数据
5.勾选如下图所示数据库进行还原
6.根据第3至5步骤,依次还原DRMS_Config、DRMS_Logging、DRMS_DirectoryServices这三个数据库
Use RMSConfigEditor to editDRMS_ClusterPolicies
1.这一步骤主要介绍如何通过RMSToolkit工具对存储在Database中的一些关于RMS的配置信息做更改
2.若SQL Server 上未安装该工具,可以在微软官网下载并安装
3.安装了RMSToolkit之后,打开C:\Program Files(x86)\RMS SP2 Administration Toolkit\RMSConfigEditor路径,运行RMSConfigEditor.exe
4.在RMS Config Editor的界面,在Server一栏输入目标SQL Server名称、这里的目标SQL Server为newsql,完成之后点击【GO】
5.在Database栏位会自动弹出对应的三个还原的数据库列表,选择DRMS_Config之后,点击【GO】
6.在左侧列出的配置列表中,定位在DRMS_ClusterPolicies、LoggingDatabaseServer,修改PolicieData的值为RMS-SQL(这里在前面的文章中设置的新的SQL Server的别名)
7.参照以上步骤,修改该列表中的LoggingDatabaseServer、CertificationUserKeyStorageConnection、DirectoryServicesCachDatabase这三个策略中的PolicyData(主要修改的是其中的data Source对应的服务器名称)
8.至此,使用RMSToolKit修改Database中的参数步骤完成,接下来修改RMS Server的注册表值
Modify the AD RMS Server Registry
1.以域管理员账户登录RMS Server
2.开始运行regedit.exe进入注册表编辑器
3.定位到HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\AdRmsLoggingService\Params
4.修改ConnectionString的键值,主要是修改Data Source的值,此处举例修改为RMS-SQL
5.同样位置,修改LoggingDatabaseServer的值为RMS-SQL
6.定位注册表位置
7.至此,关于注册表的修改就完成了,接下来重启IIS服务和系统服务中的ADRMS Logging服务即可
Restart IIS and AD RMS Logging Service
1.以域管理员账户登录RMS Server
2.打开IIS管理器,定位到网站主页,在右侧选择重新启动
3.打开【服务】
4.定位到AD RMS Logging Service
5.重新启动服务
总结
以上步骤完成即可实现AD RMS Server的后端数据库的迁移
你不知道的事儿

MySQL'sBLOBissuitableforstoringbinarydatawithinarelationaldatabase,whileNoSQLoptionslikeMongoDB,Redis,andCassandraofferflexible,scalablesolutionsforunstructureddata.BLOBissimplerbutcanslowdownperformancewithlargedata;NoSQLprovidesbetterscalabilityand

ToaddauserinMySQL,use:CREATEUSER'username'@'host'IDENTIFIEDBY'password';Here'showtodoitsecurely:1)Choosethehostcarefullytocontrolaccess.2)SetresourcelimitswithoptionslikeMAX_QUERIES_PER_HOUR.3)Usestrong,uniquepasswords.4)EnforceSSL/TLSconnectionswith

ToavoidcommonmistakeswithstringdatatypesinMySQL,understandstringtypenuances,choosetherighttype,andmanageencodingandcollationsettingseffectively.1)UseCHARforfixed-lengthstrings,VARCHARforvariable-length,andTEXT/BLOBforlargerdata.2)Setcorrectcharacters

MySQloffersechar, Varchar, text, Anddenumforstringdata.usecharforfixed-Lengthstrings, VarcharerForvariable-Length, text forlarger text, AndenumforenforcingdataAntegritywithaetofvalues.

Optimizing MySQLBLOB requests can be done through the following strategies: 1. Reduce the frequency of BLOB query, use independent requests or delay loading; 2. Select the appropriate BLOB type (such as TINYBLOB); 3. Separate the BLOB data into separate tables; 4. Compress the BLOB data at the application layer; 5. Index the BLOB metadata. These methods can effectively improve performance by combining monitoring, caching and data sharding in actual applications.

Mastering the method of adding MySQL users is crucial for database administrators and developers because it ensures the security and access control of the database. 1) Create a new user using the CREATEUSER command, 2) Assign permissions through the GRANT command, 3) Use FLUSHPRIVILEGES to ensure permissions take effect, 4) Regularly audit and clean user accounts to maintain performance and security.

ChooseCHARforfixed-lengthdata,VARCHARforvariable-lengthdata,andTEXTforlargetextfields.1)CHARisefficientforconsistent-lengthdatalikecodes.2)VARCHARsuitsvariable-lengthdatalikenames,balancingflexibilityandperformance.3)TEXTisidealforlargetextslikeartic

Best practices for handling string data types and indexes in MySQL include: 1) Selecting the appropriate string type, such as CHAR for fixed length, VARCHAR for variable length, and TEXT for large text; 2) Be cautious in indexing, avoid over-indexing, and create indexes for common queries; 3) Use prefix indexes and full-text indexes to optimize long string searches; 4) Regularly monitor and optimize indexes to keep indexes small and efficient. Through these methods, we can balance read and write performance and improve database efficiency.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Dreamweaver Mac version
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.
