AD Maintenance via PowerShell Developed By: Mario Eirea Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida International.

Slides:



Advertisements
Similar presentations
ADManager Plus Simplify Your Active Directory Management.
Advertisements

Whether you like it or not! Importance increases significantly with SharePoint 2013 Pretty much every investment area relies on Profiles for core.
System Optimization Agent Procedures using Kaseya Developed By: Jason Aparcana Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences.
Physical Topology Logical Topology Authentication Licensing.
Managing User Settings with Group Policy
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
ASU Windows 2000 AD Environment OU Presentation. Agenda OU structure Domain Admin Support OU Administrator Control/Access Migration from NT to W2K OU.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Managing Active Directory with PowerShell JOSEPH MOODY.
11 MANAGING USERS AND GROUPS Chapter 13. Chapter 13: MANAGING USERS AND GROUPS2 OVERVIEW  Configure and manage user accounts  Manage user account properties.
Compliance Archiving. ExchangeDefender Compliance Archive provides secure, long term storage, recovery and eDiscovery system that assures compliance with.
11 WORKING WITH COMPUTER ACCOUNTS Chapter 8. Chapter 8: WORKING WITH COMPUTER ACCOUNTS2 CHAPTER OVERVIEW  Describe the process of adding a computer to.
11 WORKING WITH COMPUTER ACCOUNTS Chapter 8. Chapter 8: WORKING WITH COMPUTER ACCOUNTS2 CHAPTER OVERVIEW Describe the process of adding a computer to.
Guide to MCSE , Enhanced 1 Activity 9-1: Creating a Group Policy Object Using the MMC Objective: To create a GPO using the Group Policy Object Editor.
How To Scan & Attach Documents to a Customer’s Vault Account.
Recovering Stolen Computers and Laptops Omari Grant Danlil Perelshteyn Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida.
A Feature-Based of IT Automation using kaseya’s agent procedure called the wiping of unallocated disk space using cipher.exe Developed By: Estuardo Fernandez.
Microsoft ® Official Course Module 4 Automating Active Directory Domain Services Administration.
Setting IE Home Page and Starting IE after User Logins Using Kaseya Developed By: Paola Nunez Advisor : Dr. S. Masoud Sadjadi School of Computing and Information.
03/07/08 © 2008 DSR and LDAP Authentication Avocent Technical Support.
Chapter 11: Directory Services. Directory Services A directory service is a database that contains information about all objects on the network. Directory.
Module 2 Creating Active Directory ® Domain Services User and Computer Objects.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
Corso referenti S.I.R.A. – Modulo 2 07 – Group Policy 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Using Group Policy to Manage User Environments. Overview Introduction to Managing User Environments Introduction to Administrative Templates Assigning.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Checking Network/Port Connectivity using Kaseya Agent Procedures Developed By: Emmanuel Giboyeaux Advisor : Dr. S. Masoud Sadjadi School of Computing and.
Section 8: Configuring the Desktop Environment with Group Policy Exploring Script Types and Controlling Script Execution Defining the Desktop, Start Menu,
Designing an Inventory Database System CS489 Research Project in Computer Science John Ahigian Advisor: Dr. Wang CS489 Research Project in Computer Science.
Appendix A Starting Out with Windows PowerShell™ 2.0.
Active Directory Administration (cmdlets) Microsoft Confidential1.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 UNDERSTANDING USER ACCOUNTS  Local user accounts  stored in the Security.
SERVER I SLIDE: 6. SERVER I Topics: Objective 4.3: Deploy and configure the DNS service Objective 5.1: Install domain controllers.
Antivirus Decommission and Deployment using Kaseya Developed By: Celia McFadden Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences.
Access Control Via Face Recognition Progress Review.
Module 6: Implementing Group Policy. Overview Implementing Group Policy Objects Implementing GPOs in a Domain Managing the Deployment of Group Policy.
A Feature-Based of IT Automation using Kaseya Developed By: Gregory Hayes Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences.
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
Implementing Group Policy. Overview What is Group Policy Introduction to Group Policy Group Policy Structure How Group Policy Settings Are Applied in.
A Feature-Based of IT Automation using Kaseya andAuslogics Registry Cleaner Developed By: Krystle Crawford Advisor : Dr. S. Masoud Sadjadi School of Computing.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Module 2 Creating Active Directory ® Domain Services User and Computer Objects.
Section 4: Understanding the Architecture of Group Policy Processing Group Policy Components in AD DS Understanding the Group Policy Processing Sequence.
6 th Annual Focus Users’ Conference 6 th Annual Focus Users’ Conference Import Testing Data Presented by: Adrian Ruiz Presented by: Adrian Ruiz.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Kill and Uninstall Multiple Running Anti-Virus Programs using Kaseya Developed By: Jasmine English Advisor : Dr. S. Masoud Sadjadi School of Computing.
Introduction to Active Directory in Windows 2000/2003.
A Feature-Based of IT Automation using Remote Control on Safe Mode Developed By: Fernando Perez Advisor : Dr. S. Masoud Sadjadi School of Computing and.
11 SECURITY PLANNING AND ADMINISTRATIVE DELEGATION Chapter 6.
A Feature-Based of IT Automation using Developed By: & Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida International.
Unit 7 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/3/2016 Instructor: Williams Obinkyereh.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
How To Build a Production-Ready SP 2013 Farm Martin Cox SharePoint / O365 Architect SharePoint 2013 BI Farm Setup Best Practices.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
How To Uninstall AVG Antivirus?. Restart Your Computer And Log Into Windows As A User With Administrative Account Please restart your computer to make.
Adxstudio Portals Training
Troubleshooting Windows 10 Deployment: Top 10 Tips and Tricks
Authentic Microsoft Exam Study Material Briandumps Dumps4Download
Unit 7 NT1330 Client-Server Networking II Date: 7/26/2016
Unit4 Partner Portal for Case Creator
Disable/Enable CD-ROM devices using Kaseya-Agent Procedures
Coding Shaw STEM Lab-2016.
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
3rd Party Widgets & Custom Code
Developing with uConnect
Presentation transcript:

AD Maintenance via PowerShell Developed By: Mario Eirea Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida International University

Agenda Problem and Motivation Solution Behind the Scene Customizing the Solution Disclaimer Progress Report

Problem and Motivation: A common problem faced in corporate IT environments that house Active Directory (AD) domains is that many computers are added and removed to the domain. Over time, this can lead to a bloated AD that contains hundreds or thousands of unorganized/expired accounts.

Solution Using a PowerShell script, one can crawl through the AD and check parameters such as last logon time and computer name to sort and move computers. The computers can be organized or removed according to corporate policies.

Behind the Scene The PowerShell script will search though the AD using commandlets: Get-ADOrganizationalUnit Get-AdComputer Then move computers into the appropriate OUs with Move-ADObject. Primary logic will revolve around the properties “Name” and “lastLogonTimestamp”. The first 4 characters of the computers name will match to an OU code. When the match is detected it will move the computer to the “Computers” OU inside the matching parent OU. “lastLogonTimestamp” will be used as a basis for computer activity. When this value exceedes 246 days, it will be moved to an OU named “Offline” and the account deactivated. Once the computer is offline for more than 365 it will be removed from the domain.

Customizing the Solution The source for this script will be freely available, this allows customization over all aspects of operation. Changing the variables that control computer name matching or logon time, the script can be changed for varying corporate requirements.

Disclaimer This PS script is very dependent on ridged AD design specifications. Using any script the manipulates mass quantities of data can be dangerous and destructive, please make sure the script is tested thoroughly on non production environments before deploying into production.

Progress Report Initial script is completed. Testing functionality. Need to complete training video and documentation