AD Privileged Audit
Provides various Windows Server Active Directory (AD) security-focused reports.
- Designed to be fast and efficient, typically provides “immediate” (no post-processing required) results within a minute.
- Available for anyone to run for free, especially when paid tools are maybe not available.
- Non-invasive / “read-only”. Do not install any components or dependencies, or make any changes to the environment – outside of writing reports to a (new) “AD-Reports” folder on the running users’ Desktop by default, which can be redirected or disabled.
- Outside of someone downloading the script from here, does not require any Internet access, and does not collect or report any data outside of what is provided to the running user.
This script was written to assist with my professional information security consulting efforts. Please consider engaging with me or one of my co-workers through my employer for any needed assistance in running this tool, or especially in interpreting and managing the reported results.
This script is provided with the intent to allow any organization to report upon, and hopefully, continuously improve upon their AD security posture. Ideally, reports would be run weekly/periodically, with a goal of reducing most reports to or near 0 results.
Reports
Current reports include:
- Privileged AD Group Members.
- Currently reported groups include:
- Domain Admins
- Enterprise Admins
- Administrators
- Schema Admins
- Account Operators
- Server Operators
- Print Operators
- Backup Operators
- DnsAdmins
- DnsUpdateProxy
- DHCP Administrators
- Domain Controllers
- Enterprise Read-Only Domain Controllers
- Read-Only Domain Controllers
- Groups are omitted when they don’t exist.
- (Further considerations below.)
- Currently reported groups include:
- Privileged AD Groups.
- Provides the detail of each group itself included above, whereas the above report details each groups’ membership.
- Stale Users.
- Users that haven’t logged-in within 90 days.
- Stale Passwords.
- Users with passwords older than 365 days.
- Password Not Required.
- SID History.
- Stale Computers.
- Computers that haven’t logged-in within 90 days.
- Unsupported Operating Systems.
- Computers without LAPS or expired.
- Computers with current LAPS.
- Warnings.
LAPS is Microsoft’s “Local Administrator Password Solution”. If you are not yet using it, you should be.
Each report includes a significant and consistent set of columns of details that should remove most of the need for cross-referencing Active Directory Users and Computers (ADUC) or other similar tools for further details on reported objects, as well as providing some value in terms of digital forensics.
Install & Use
Copyright © 2020-2021, Mark A. Ziesemer