How to find privileged Active Directory Accounts

preview_player
Показать описание
Learn how to find privileged Active Directory account by using the adminCount attribute. In this example, I show you how to use PowerShell to return a list of user accounts that have had their adminCount attribute changed to 1. User account with an adminCount value of 1 indicate that the user account is either a member of a privileged security group, or has previously been a member of a privileged security group.

Get-ADUser -Filter "adminCount -eq 1" | ft name, samaccountname, enabled

Get-ADGroup -Filter "adminCount -eq 1" | ft name

Рекомендации по теме
Комментарии
Автор

Is there a way to filter to only get current admins? I don't care too much about previous admins as almost my whole local domain has been an admin at one point apparently lol

xx_theartfuldodger_xx
Автор

Really great video. I have a question about accounts that are no longer in elevated security groups or no longer have elevated privileges'. How can they do damage if they are no longer part of a security group but still have that admin count set to 1?

burner
Автор

Thank you Danny!
Is not enough to just clear adminCount attribute?

athwari