├── ad-reports
├── ad-lastlogon
│ ├── ad-lastlogon.csv
│ ├── ad-lastlogon-2018-7-9.csv
│ ├── ad-lastlogon.html
│ └── ad-lastlogon-2018-7-9.html
├── ad-neverexpires
│ ├── ad-neverexpires.csv
│ ├── ad-neverexpires-2018-7-9.csv
│ ├── ad-neverexpires.html
│ └── ad-neverexpires-2018-7-9.html
├── ad-disabled
│ ├── ad-disabled.csv
│ ├── ad-disabled-2018-7-9.csv
│ ├── ad-disabled.html
│ └── ad-disabled-2018-7-9.html
├── ad-gpos
│ ├── gpos-html.zip
│ ├── gpos-html-2018-7-9.zip
│ ├── gpos-html
│ │ ├── Default Domain Policy.htm
│ │ └── Default Domain Controllers Policy.htm
│ ├── gpos-html-2018-7-9
│ │ ├── Default Domain Policy.htm
│ │ └── Default Domain Controllers Policy.htm
│ ├── ad-gpos.csv
│ ├── ad-gpos-2018-7-9.csv
│ ├── ad-gpos.html
│ └── ad-gpos-2018-7-9.html
├── ad-enterprise-admins
│ ├── ad-enterprise-admins.csv
│ └── ad-enterprise-admins.html
├── ad-admins
│ ├── ad-admins.csv
│ ├── ad-admins-2018-7-9.csv
│ ├── ad-admins.html
│ └── ad-admins-2018-7-9.html
├── ad-all
│ └── ad-2018-7-9
│ │ ├── gpos-html-2018-7-9.zip
│ │ ├── ad-lastlogon-2018-7-9.html
│ │ ├── ad-admins-2018-7-9.html
│ │ ├── ad-disabled-2018-7-9.html
│ │ ├── ad-neverexpires-2018-7-9.html
│ │ ├── ad-computers-2018-7-9.html
│ │ ├── ad-dcs-2018-7-9.html
│ │ ├── ad-servers-2018-7-9.html
│ │ ├── ad-gpos-2018-7-9.html
│ │ ├── ad-ous-2018-7-9.html
│ │ ├── ad-inventory-2018-7-9.html
│ │ ├── ad-users-2018-7-9.html
│ │ └── ad-membergroups-2018-7-9.html
├── ad-computers
│ ├── ad-computers.csv
│ ├── ad-computers-2018-7-9.csv
│ ├── ad-computers-2018-7-9.html
│ └── ad-computers.html
├── ad-ous
│ ├── ad-ous.csv
│ ├── ad-ous-2018-7-9.csv
│ ├── ad-ous.html
│ └── ad-ous-2018-7-9.html
├── ad-dcs
│ ├── ad-dcs.csv
│ ├── ad-dcs-2018-7-9.csv
│ ├── ad-dcs.html
│ └── ad-dcs-2018-7-9.html
├── ad-servers
│ ├── ad-servers.csv
│ ├── ad-servers-2018-7-9.csv
│ ├── ad-servers.html
│ └── ad-servers-2018-7-9.html
├── ad-users
│ ├── ad-users.csv
│ ├── ad-users-2018-7-9.csv
│ ├── ad-users.html
│ └── ad-users-2018-7-9.html
├── ad-inventory
│ ├── ad-inventory.csv
│ ├── ad-inventory-2018-7-9.csv
│ ├── ad-inventory.html
│ └── ad-inventory-2018-7-9.html
├── ad-membergroups
│ ├── ad-membergroups.csv
│ ├── ad-membergroups-2018-7-9.csv
│ ├── ad-membergroups.html
│ └── ad-membergroups-2018-7-9.html
└── ad-groups
│ ├── ad-groups.csv
│ ├── ad-groups-2018-7-9.csv
│ ├── ad-groups.html
│ └── ad-groups-2018-7-9.html
├── web
├── img
│ ├── github.png
│ ├── all_gpos.png
│ ├── all_ous.png
│ ├── facebook.png
│ ├── linkedin.png
│ ├── twitter.png
│ ├── youtube.png
│ ├── 100security.png
│ ├── all_groups.png
│ ├── all_servers.png
│ ├── all_users.png
│ ├── inventory.png
│ ├── last_logon.png
│ ├── all_computers.png
│ ├── domain_admins.png
│ ├── disabled_users.png
│ ├── marcoshenrique.jpg
│ ├── domain_controllers.png
│ └── password_never_expires.png
└── js
│ └── 100security.js
├── README.md
├── config
└── config.txt
├── ad-admins.ps1
├── ad-groups.ps1
├── ad-disabled.ps1
├── ad-ous.ps1
├── ad-enterprise-admins.ps1
├── ad-servers.ps1
├── ad-inventory.ps1
├── ad-dcs.ps1
├── ad-computers.ps1
├── ad-membergroups.ps1
├── adrt.ps1
├── ad-neverexpires.ps1
├── ad-lastlogon.ps1
├── ad-gpos.ps1
├── ad-users.ps1
└── index.html
/ad-reports/ad-lastlogon/ad-lastlogon.csv:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/ad-reports/ad-lastlogon/ad-lastlogon-2018-7-9.csv:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/web/img/github.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/web/img/github.png
--------------------------------------------------------------------------------
/web/img/all_gpos.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/web/img/all_gpos.png
--------------------------------------------------------------------------------
/web/img/all_ous.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/web/img/all_ous.png
--------------------------------------------------------------------------------
/web/img/facebook.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/web/img/facebook.png
--------------------------------------------------------------------------------
/web/img/linkedin.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/web/img/linkedin.png
--------------------------------------------------------------------------------
/web/img/twitter.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/web/img/twitter.png
--------------------------------------------------------------------------------
/web/img/youtube.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/web/img/youtube.png
--------------------------------------------------------------------------------
/web/img/100security.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/web/img/100security.png
--------------------------------------------------------------------------------
/web/img/all_groups.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/web/img/all_groups.png
--------------------------------------------------------------------------------
/web/img/all_servers.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/web/img/all_servers.png
--------------------------------------------------------------------------------
/web/img/all_users.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/web/img/all_users.png
--------------------------------------------------------------------------------
/web/img/inventory.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/web/img/inventory.png
--------------------------------------------------------------------------------
/web/img/last_logon.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/web/img/last_logon.png
--------------------------------------------------------------------------------
/web/img/all_computers.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/web/img/all_computers.png
--------------------------------------------------------------------------------
/web/img/domain_admins.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/web/img/domain_admins.png
--------------------------------------------------------------------------------
/ad-reports/ad-neverexpires/ad-neverexpires.csv:
--------------------------------------------------------------------------------
1 | "Name","SamAccountName"
2 | "Marcos Henrique","marcos"
3 |
--------------------------------------------------------------------------------
/web/img/disabled_users.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/web/img/disabled_users.png
--------------------------------------------------------------------------------
/web/img/marcoshenrique.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/web/img/marcoshenrique.jpg
--------------------------------------------------------------------------------
/ad-reports/ad-disabled/ad-disabled.csv:
--------------------------------------------------------------------------------
1 | "SamAccountName","Name"
2 | "krbtgt","krbtgt"
3 | "Guest","Guest"
4 |
--------------------------------------------------------------------------------
/web/img/domain_controllers.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/web/img/domain_controllers.png
--------------------------------------------------------------------------------
/ad-reports/ad-gpos/gpos-html.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/ad-reports/ad-gpos/gpos-html.zip
--------------------------------------------------------------------------------
/ad-reports/ad-enterprise-admins/ad-enterprise-admins.csv:
--------------------------------------------------------------------------------
1 | "Name","SamAccountName"
2 | "Administrator","Administrator"
3 |
--------------------------------------------------------------------------------
/web/img/password_never_expires.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/web/img/password_never_expires.png
--------------------------------------------------------------------------------
/ad-reports/ad-admins/ad-admins.csv:
--------------------------------------------------------------------------------
1 | "Name","SamAccountName"
2 | "Marcos Henrique","marcos"
3 | "Administrator","Administrator"
4 |
--------------------------------------------------------------------------------
/ad-reports/ad-gpos/gpos-html-2018-7-9.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/ad-reports/ad-gpos/gpos-html-2018-7-9.zip
--------------------------------------------------------------------------------
/ad-reports/ad-admins/ad-admins-2018-7-9.csv:
--------------------------------------------------------------------------------
1 | "Name","SamAccountName"
2 | "Marcos Henrique","marcos.henrique"
3 | "Administrator","Administrator"
4 |
--------------------------------------------------------------------------------
/ad-reports/ad-disabled/ad-disabled-2018-7-9.csv:
--------------------------------------------------------------------------------
1 | "SamAccountName","Name"
2 | "steve.jobs","Steve Jobs"
3 | "krbtgt","krbtgt"
4 | "Guest","Guest"
5 |
--------------------------------------------------------------------------------
/ad-reports/ad-all/ad-2018-7-9/gpos-html-2018-7-9.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/ad-reports/ad-all/ad-2018-7-9/gpos-html-2018-7-9.zip
--------------------------------------------------------------------------------
/ad-reports/ad-gpos/gpos-html/Default Domain Policy.htm:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/ad-reports/ad-gpos/gpos-html/Default Domain Policy.htm
--------------------------------------------------------------------------------
/ad-reports/ad-gpos/gpos-html-2018-7-9/Default Domain Policy.htm:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/ad-reports/ad-gpos/gpos-html-2018-7-9/Default Domain Policy.htm
--------------------------------------------------------------------------------
/ad-reports/ad-computers/ad-computers.csv:
--------------------------------------------------------------------------------
1 | "Name","OperatingSystem","Description"
2 | "WIN-XP","Windows XP Professional",
3 | "WIN-10","Windows 10 Pro",
4 | "XPS","Windows 10 Pro",
5 |
--------------------------------------------------------------------------------
/ad-reports/ad-gpos/gpos-html/Default Domain Controllers Policy.htm:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/ad-reports/ad-gpos/gpos-html/Default Domain Controllers Policy.htm
--------------------------------------------------------------------------------
/ad-reports/ad-neverexpires/ad-neverexpires-2018-7-9.csv:
--------------------------------------------------------------------------------
1 | "Name","SamAccountName"
2 | "Marcos Henrique","marcos.henrique"
3 | "Bill Gates","bill.gates"
4 | "Administrator","Administrator"
5 |
--------------------------------------------------------------------------------
/ad-reports/ad-ous/ad-ous.csv:
--------------------------------------------------------------------------------
1 | "Name","Description","DistinguishedName"
2 | "Domain Controllers","Default container for domain controllers","OU=Domain Controllers,DC=100security,DC=local"
3 |
--------------------------------------------------------------------------------
/ad-reports/ad-dcs/ad-dcs.csv:
--------------------------------------------------------------------------------
1 | "Site","Name","IPv4Address","OperatingSystem","OperatingSystemServicePack"
2 | "Default-First-Site-Name","DC-2012","192.168.0.10","Windows Server 2012 Standard",
3 |
--------------------------------------------------------------------------------
/ad-reports/ad-computers/ad-computers-2018-7-9.csv:
--------------------------------------------------------------------------------
1 | "Name","OperatingSystem","Description"
2 | "DSK-WIN-01","Windows 7 Professional","bill.gates"
3 | "NTB-WIN-01","Windows 10 Pro","marcos.henrique"
4 |
--------------------------------------------------------------------------------
/ad-reports/ad-gpos/gpos-html-2018-7-9/Default Domain Controllers Policy.htm:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/100security/adrt/HEAD/ad-reports/ad-gpos/gpos-html-2018-7-9/Default Domain Controllers Policy.htm
--------------------------------------------------------------------------------
/ad-reports/ad-servers/ad-servers.csv:
--------------------------------------------------------------------------------
1 | "Name","OperatingSystem","Description"
2 | "DC-2012","Windows Server 2012 Standard",
3 | "WIN-2008","Windows Server 2008 R2 Standard",
4 | "SQL-2008","Windows Server 2008 R2 Standard",
5 |
--------------------------------------------------------------------------------
/ad-reports/ad-dcs/ad-dcs-2018-7-9.csv:
--------------------------------------------------------------------------------
1 | "Site","Name","IPv4Address","OperatingSystem","OperatingSystemServicePack"
2 | "Default-First-Site-Name","SRV-DMC-02","192.168.1.221","Windows Server 2008 R2 Standard",
3 | "Default-First-Site-Name","SRV-DMC-01","192.168.1.220","Windows Server 2012 Standard",
4 |
--------------------------------------------------------------------------------
/ad-reports/ad-gpos/ad-gpos.csv:
--------------------------------------------------------------------------------
1 | "DisplayName","Owner","CreationTime","ModificationTime"
2 | "Default Domain Policy","100SECURITY\Domain Admins","18/06/2019 22:21:28","18/06/2019 22:27:04"
3 | "Default Domain Controllers Policy","100SECURITY\Domain Admins","18/06/2019 22:21:28","18/06/2019 22:21:28"
4 |
--------------------------------------------------------------------------------
/ad-reports/ad-gpos/ad-gpos-2018-7-9.csv:
--------------------------------------------------------------------------------
1 | "DisplayName","Owner","CreationTime","ModificationTime"
2 | "Default Domain Policy","100SECURITY\Domain Admins","11/02/2018 23:14:53","11/02/2018 22:18:08"
3 | "Default Domain Controllers Policy","100SECURITY\Domain Admins","11/02/2018 23:14:53","11/02/2018 22:14:52"
4 |
--------------------------------------------------------------------------------
/ad-reports/ad-servers/ad-servers-2018-7-9.csv:
--------------------------------------------------------------------------------
1 | "Name","OperatingSystem","Description"
2 | "SRV-FLS-01","Windows Server 2008 R2 Standard","File Server"
3 | "SRV-SQL-01","Windows Server 2008 R2 Standard","SQL Server"
4 | "SRV-DMC-01","Windows Server 2012 Standard","Active Directory Primary"
5 | "SRV-DMC-02","Windows Server 2008 R2 Standard","Active Directory Secondary"
6 |
--------------------------------------------------------------------------------
/ad-reports/ad-users/ad-users.csv:
--------------------------------------------------------------------------------
1 | "Company","St","SamAccountName","Name","Mail","Department","Title","PasswordNeverExpires","Enabled","Created","Modified","Info"
2 | ,,"Administrator","Administrator",,,,"False","True","18/06/2019 22:21:29","06/07/2019 09:30:43",
3 | ,,"Guest","Guest",,,,"True","False","18/06/2019 22:21:29","18/06/2019 22:21:29",
4 | ,,"krbtgt","krbtgt",,,,"False","False","18/06/2019 22:22:12","20/06/2019 08:57:43",
5 | ,,"marcos","Marcos Henrique",,,,"True","True","18/06/2019 22:28:35","06/07/2019 09:31:01",
6 |
--------------------------------------------------------------------------------
/ad-reports/ad-inventory/ad-inventory.csv:
--------------------------------------------------------------------------------
1 | "Name","IPv4Address","LastlogonDate","OperatingSystem","Description"
2 | "WIN-2008","192.168.0.20","18/06/2019 22:29:58","Windows Server 2008 R2 Standard",
3 | "DC-2012","192.168.0.10","06/07/2019 09:10:47","Windows Server 2012 Standard",
4 | "WIN-XP","192.168.0.50","20/06/2019 09:48:17","Windows XP Professional",
5 | "WIN-10","192.168.0.40","20/06/2019 09:46:26","Windows 10 Pro",
6 | "XPS","169.254.165.161","06/07/2019 09:31:01","Windows 10 Pro",
7 | "SQL-2008","192.168.0.30","20/06/2019 09:44:36","Windows Server 2008 R2 Standard",
8 |
--------------------------------------------------------------------------------
/ad-reports/ad-ous/ad-ous-2018-7-9.csv:
--------------------------------------------------------------------------------
1 | "Name","Description","DistinguishedName"
2 | "Facebook","www.facebook.com","OU=Facebook,OU=Empresas,DC=100security,DC=local"
3 | "McAfee","www.mcafee.com","OU=McAfee,OU=Empresas,DC=100security,DC=local"
4 | "Microsoft","www.microsoft.com","OU=Microsoft,OU=Empresas,DC=100security,DC=local"
5 | "Empresas","Lista de Empresas","OU=Empresas,DC=100security,DC=local"
6 | "100Security","www.100security.com.br","OU=100Security,OU=Empresas,DC=100security,DC=local"
7 | "Apple","www.apple.com","OU=Apple,OU=Empresas,DC=100security,DC=local"
8 | "Domain Controllers","Default container for domain controllers","OU=Domain Controllers,DC=100security,DC=local"
9 |
--------------------------------------------------------------------------------
/ad-reports/ad-inventory/ad-inventory-2018-7-9.csv:
--------------------------------------------------------------------------------
1 | "Name","IPv4Address","LastlogonDate","OperatingSystem","Description"
2 | "SRV-FLS-01","192.168.1.60","01/07/2018 12:36:16","Windows Server 2008 R2 Standard","File Server"
3 | "SRV-DMC-02","192.168.1.221","01/07/2018 11:12:07","Windows Server 2008 R2 Standard","Active Directory Secondary"
4 | "SRV-DMC-01","192.168.1.220","09/07/2018 03:25:35","Windows Server 2012 Standard","Active Directory Primary"
5 | "NTB-WIN-01","192.168.1.164","01/07/2018 11:21:58","Windows 10 Pro","marcos.henrique"
6 | "DSK-WIN-01","192.168.1.20","11/02/2018 23:27:08","Windows 7 Professional","bill.gates"
7 | "SRV-SQL-01","192.168.1.230","01/07/2018 11:11:31","Windows Server 2008 R2 Standard","SQL Server"
8 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # ADRT
2 | Active Directory Report Tool
3 |
4 | # Descrição
5 | Como objetivo de colaborar com o dia-a-dia das tarefas diárias dos Administradores de Redes e Analista de Segurança da Informação eu optei em compartilhar esta ferramenta que desenvolvi utilizando PowerShell, HTML, JavaScript. O objetivo do ADRT é extrair informações úteis do Active Directory e exibir-las de forma amigável a fim de auxiliar na geração de indicadores e na realização de auditorias.
6 |
7 | # adrt.ps1 - Menu via PowerShell
8 | 
9 |
10 | # index.html - Página Inicial de Relatórios
11 | 
12 |
13 | # Artigo
14 | www.100security.com.br/adrt
15 |
16 | # Video
17 | www.youtube.com/watch?v=KuEjGZSLPJE&t
18 |
--------------------------------------------------------------------------------
/config/config.txt:
--------------------------------------------------------------------------------
1 | [0] Start Array
2 | # - - - - - - - - - - - - - - - - - - - - - #
3 | # Warning: #
4 | # Do not remove any lines from this file. #
5 | # Change only lines: 8, 10, 12, 14, 16, 18 #
6 | # #
7 | # Company Name #
8 | 100SECURITY
9 | # Owner/Analyst #
10 | Marcos Henrique
11 | # Mail Server #
12 | email.100security.com.br
13 | # Port #
14 | 25
15 | # From #
16 | report@100security.com.br
17 | # To (mail1@domain.com,mail2@domain.com) #
18 | marcos@100security.com.br
19 | # #
20 | # - - - - - - - - - - - - - - - - - - - - - #
21 |
--------------------------------------------------------------------------------
/ad-reports/ad-lastlogon/ad-lastlogon.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - Last Logon
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2019-07-06 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total Last Logon: 0
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-lastlogon/ad-lastlogon-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - Last Logon
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total Last Logon: 0
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-all/ad-2018-7-9/ad-lastlogon-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - Last Logon
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total Last Logon: 0
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-neverexpires/ad-neverexpires.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - Password Never Expires
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2019-07-06 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Password Never Expires: Name SamAccountName Marcos Henrique marcos
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-disabled/ad-disabled.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - Disabled Users
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2019-07-06 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Disabled Users: 2 SamAccountName Name Guest Guest krbtgt krbtgt
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-enterprise-admins/ad-enterprise-admins.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - Enterprise Admins
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2019-07-06 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Enterprise Admins: Name SamAccountName Administrator Administrator
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-admins/ad-admins.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - Domain Admins
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2019-07-06 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Domain Admins: 2 Name SamAccountName Administrator Administrator Marcos Henrique marcos
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-admins/ad-admins-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - Domain Admins
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Domain Admins: 2 Name SamAccountName Administrator Administrator Marcos Henrique marcos.henrique
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-all/ad-2018-7-9/ad-admins-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - Domain Admins
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Domain Admins: 2 Name SamAccountName Administrator Administrator Marcos Henrique marcos.henrique
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-disabled/ad-disabled-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - Disabled Users
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Disabled Users: 3 SamAccountName Name Guest Guest krbtgt krbtgt steve.jobs Steve Jobs
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-all/ad-2018-7-9/ad-disabled-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - Disabled Users
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Disabled Users: 3 SamAccountName Name Guest Guest krbtgt krbtgt steve.jobs Steve Jobs
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-ous/ad-ous.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - All OUs
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2019-07-06 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total OUs: Name Description DistinguishedName Domain Controllers Default container for domain controllers OU=Domain Controllers,DC=100security,DC=local
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-users/ad-users-2018-7-9.csv:
--------------------------------------------------------------------------------
1 | "Company","St","SamAccountName","Name","Mail","Department","Title","PasswordNeverExpires","Enabled","Created","Modified","Info"
2 | "100SECUIRTY","SP","krbtgt","krbtgt","kerberos@100security.com.br","Segurança da Informação","Active Directory","False","False","11/02/2018 23:15:56","07/07/2018 18:26:02","SERVIÇO"
3 | "100SECURITY","SP","Administrator","Administrator","administrator@100security.com.br","Segurança da Informação","Domain Admin","True","True","11/02/2018 23:14:53","07/07/2018 18:19:56","SERVIÇO"
4 | "100SECURITY","SP","Guest","Guest","guest@100security.com.br","Segurança da Informação","Guest","True","False","11/02/2018 23:14:53","07/07/2018 18:24:20","SERVIÇO"
5 | "100SECURITY","SP","marcos.henrique","Marcos Henrique","marcos@100security.com.br","Segurança da Informação","Consultor","True","True","12/02/2018 08:04:49","07/07/2018 10:15:05","FUNCIONÁRIO"
6 | "Apple","SP","steve.jobs","Steve Jobs","steve.jobs@apple.com","Tecnologia da Informação","CEO","False","False","12/02/2018 09:00:34","01/07/2018 12:53:34","FUNCIONÁRIO"
7 | "Facebook","SP","mark.zuckerberg","Mark Zuckerberg","mark.zuckerberg@facebook.com","Redes Sociais","CEO","False","True","12/02/2018 09:09:06","01/07/2018 12:52:58","FUNCIONÁRIO"
8 | "McAfee","SP","john.mcafee","John McAfee","john.mcafee@mcafee.com","Segurança da Informação","CEO","False","True","12/02/2018 09:06:10","12/02/2018 23:45:35","FUNCIONÁRIO"
9 | "Microsoft","SP","bill.gates","Bill Gates","bill.gates@microsoft.com","Tecnologia da Informação","CEO","True","True","12/02/2018 08:54:17","12/02/2018 23:45:35","FUNCIONÁRIO"
10 |
--------------------------------------------------------------------------------
/ad-reports/ad-computers/ad-computers-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - All Computers
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total Computers: 2 Name OperatingSystem Description NTB-WIN-01 Windows 10 Pro marcos.henrique DSK-WIN-01 Windows 7 Professional bill.gates
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-neverexpires/ad-neverexpires-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - Password Never Expires
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Password Never Expires: 3 Name SamAccountName Administrator Administrator Bill Gates bill.gates Marcos Henrique marcos.henrique
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-all/ad-2018-7-9/ad-neverexpires-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - Password Never Expires
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Password Never Expires: 3 Name SamAccountName Administrator Administrator Bill Gates bill.gates Marcos Henrique marcos.henrique
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-all/ad-2018-7-9/ad-computers-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - All Computers
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total Computers: 2 Name OperatingSystem Description NTB-WIN-01 Windows 10 Pro marcos.henrique DSK-WIN-01 Windows 7 Professional bill.gates
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-computers/ad-computers.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - All Computers
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2019-07-06 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total Computers: 3 Name OperatingSystem Description XPS Windows 10 Pro WIN-10 Windows 10 Pro WIN-XP Windows XP Professional
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-dcs/ad-dcs.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - Domain Controllers
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2019-07-06 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Domain Controllers: Site Name IPv4Address OperatingSystem OperatingSystemServicePack Default-First-Site-Name DC-2012 192.168.0.10 Windows Server 2012 Standard
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-servers/ad-servers.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - All Servers
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2019-07-06 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total Servers: 3 Name OperatingSystem Description SQL-2008 Windows Server 2008 R2 Standard WIN-2008 Windows Server 2008 R2 Standard DC-2012 Windows Server 2012 Standard
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-dcs/ad-dcs-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - Domain Controllers
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Domain Controllers: 2 Site Name IPv4Address OperatingSystem OperatingSystemServicePack Default-First-Site-Name SRV-DMC-01 192.168.1.220 Windows Server 2012 Standard Default-First-Site-Name SRV-DMC-02 192.168.1.221 Windows Server 2008 R2 Standard
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-all/ad-2018-7-9/ad-dcs-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - Domain Controllers
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Domain Controllers: 2 Site Name IPv4Address OperatingSystem OperatingSystemServicePack Default-First-Site-Name SRV-DMC-01 192.168.1.220 Windows Server 2012 Standard Default-First-Site-Name SRV-DMC-02 192.168.1.221 Windows Server 2008 R2 Standard
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-gpos/ad-gpos.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - All GPOs
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2019-07-06 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total GPOs: 2 DisplayName Owner CreationTime ModificationTime Default Domain Controllers Policy 100SECURITY\Domain Admins 18/06/2019 22:21:28 18/06/2019 22:21:28 Default Domain Policy 100SECURITY\Domain Admins 18/06/2019 22:21:28 18/06/2019 22:27:04
24 |
25 | View GPOs
26 |
27 |
28 |
29 |
30 | ADRT - Active Directory Report Tool
31 |
32 |
33 |
34 |
35 |
--------------------------------------------------------------------------------
/ad-reports/ad-servers/ad-servers-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - All Servers
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total Servers: 4 Name OperatingSystem Description SRV-DMC-01 Windows Server 2012 Standard Active Directory Primary SRV-DMC-02 Windows Server 2008 R2 Standard Active Directory Secondary SRV-FLS-01 Windows Server 2008 R2 Standard File Server SRV-SQL-01 Windows Server 2008 R2 Standard SQL Server
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-all/ad-2018-7-9/ad-servers-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - All Servers
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total Servers: 4 Name OperatingSystem Description SRV-DMC-01 Windows Server 2012 Standard Active Directory Primary SRV-DMC-02 Windows Server 2008 R2 Standard Active Directory Secondary SRV-FLS-01 Windows Server 2008 R2 Standard File Server SRV-SQL-01 Windows Server 2008 R2 Standard SQL Server
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-gpos/ad-gpos-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - All GPOs
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total GPOs: 2 DisplayName Owner CreationTime ModificationTime Default Domain Controllers Policy 100SECURITY\Domain Admins 11/02/2018 23:14:53 11/02/2018 22:14:52 Default Domain Policy 100SECURITY\Domain Admins 11/02/2018 23:14:53 11/02/2018 22:18:08
24 |
25 | View GPOs
26 |
27 |
28 |
29 |
30 | ADRT - Active Directory Report Tool
31 |
32 |
33 |
34 |
35 |
--------------------------------------------------------------------------------
/ad-reports/ad-all/ad-2018-7-9/ad-gpos-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - All GPOs
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total GPOs: 2 DisplayName Owner CreationTime ModificationTime Default Domain Controllers Policy 100SECURITY\Domain Admins 11/02/2018 23:14:53 11/02/2018 22:14:52 Default Domain Policy 100SECURITY\Domain Admins 11/02/2018 23:14:53 11/02/2018 22:18:08
24 |
25 | View GPOs
26 |
27 |
28 |
29 |
30 | ADRT - Active Directory Report Tool
31 |
32 |
33 |
34 |
35 |
--------------------------------------------------------------------------------
/ad-reports/ad-inventory/ad-inventory.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - Inventory
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2019-07-06 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Computers and Servers: 6 Name IPv4Address LastlogonDate OperatingSystem Description WIN-10 192.168.0.40 20/06/2019 09:46:26 Windows 10 Pro XPS 169.254.165.161 06/07/2019 09:31:01 Windows 10 Pro SQL-2008 192.168.0.30 20/06/2019 09:44:36 Windows Server 2008 R2 Standard WIN-2008 192.168.0.20 18/06/2019 22:29:58 Windows Server 2008 R2 Standard DC-2012 192.168.0.10 06/07/2019 09:10:47 Windows Server 2012 Standard WIN-XP 192.168.0.50 20/06/2019 09:48:17 Windows XP Professional
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-ous/ad-ous-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - All OUs
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total OUs: 7 Name Description DistinguishedName 100Security www.100security.com.br OU=100Security,OU=Empresas,DC=100security,DC=local Apple www.apple.com OU=Apple,OU=Empresas,DC=100security,DC=local Domain Controllers Default container for domain controllers OU=Domain Controllers,DC=100security,DC=local Empresas Lista de Empresas OU=Empresas,DC=100security,DC=local Facebook www.facebook.com OU=Facebook,OU=Empresas,DC=100security,DC=local McAfee www.mcafee.com OU=McAfee,OU=Empresas,DC=100security,DC=local Microsoft www.microsoft.com OU=Microsoft,OU=Empresas,DC=100security,DC=local
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-all/ad-2018-7-9/ad-ous-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - All OUs
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total OUs: 7 Name Description DistinguishedName 100Security www.100security.com.br OU=100Security,OU=Empresas,DC=100security,DC=local Apple www.apple.com OU=Apple,OU=Empresas,DC=100security,DC=local Domain Controllers Default container for domain controllers OU=Domain Controllers,DC=100security,DC=local Empresas Lista de Empresas OU=Empresas,DC=100security,DC=local Facebook www.facebook.com OU=Facebook,OU=Empresas,DC=100security,DC=local McAfee www.mcafee.com OU=McAfee,OU=Empresas,DC=100security,DC=local Microsoft www.microsoft.com OU=Microsoft,OU=Empresas,DC=100security,DC=local
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-inventory/ad-inventory-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - Inventory
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Computers and Servers: 6 Name IPv4Address LastlogonDate OperatingSystem Description NTB-WIN-01 192.168.1.164 01/07/2018 11:21:58 Windows 10 Pro marcos.henrique DSK-WIN-01 192.168.1.20 11/02/2018 23:27:08 Windows 7 Professional bill.gates SRV-SQL-01 192.168.1.230 01/07/2018 11:11:31 Windows Server 2008 R2 Standard SQL Server SRV-FLS-01 192.168.1.60 01/07/2018 12:36:16 Windows Server 2008 R2 Standard File Server SRV-DMC-02 192.168.1.221 01/07/2018 11:12:07 Windows Server 2008 R2 Standard Active Directory Secondary SRV-DMC-01 192.168.1.220 09/07/2018 03:25:35 Windows Server 2012 Standard Active Directory Primary
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-all/ad-2018-7-9/ad-inventory-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - Inventory
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Computers and Servers: 6 Name IPv4Address LastlogonDate OperatingSystem Description NTB-WIN-01 192.168.1.164 01/07/2018 11:21:58 Windows 10 Pro marcos.henrique DSK-WIN-01 192.168.1.20 11/02/2018 23:27:08 Windows 7 Professional bill.gates SRV-SQL-01 192.168.1.230 01/07/2018 11:11:31 Windows Server 2008 R2 Standard SQL Server SRV-FLS-01 192.168.1.60 01/07/2018 12:36:16 Windows Server 2008 R2 Standard File Server SRV-DMC-02 192.168.1.221 01/07/2018 11:12:07 Windows Server 2008 R2 Standard Active Directory Secondary SRV-DMC-01 192.168.1.220 09/07/2018 03:25:35 Windows Server 2012 Standard Active Directory Primary
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-users/ad-users.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - All Users
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2019-07-06 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total Users: 4 - PasswordNeverExpires: - Disabled Users: 2 Company St SamAccountName Name Mail Department Title PasswordNeverExpires Enabled Created Modified Info krbtgt krbtgt False False 18/06/2019 22:22:12 20/06/2019 08:57:43 marcos Marcos Henrique True True 18/06/2019 22:28:35 06/07/2019 09:31:01 Administrator Administrator False True 18/06/2019 22:21:29 06/07/2019 09:30:43 Guest Guest True False 18/06/2019 22:21:29 18/06/2019 22:21:29
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-membergroups/ad-membergroups.csv:
--------------------------------------------------------------------------------
1 | "Name","MemberOf","Members"
2 | "Print Operators","",""
3 | "Pre-Windows 2000 Compatible Access","","CN=S-1-5-11,CN=ForeignSecurityPrincipals,DC=100security,DC=local
4 | "
5 | "RAS and IAS Servers","",""
6 | "RDS Management Servers","",""
7 | "RDS Endpoint Servers","",""
8 | "Performance Monitor Users","",""
9 | "IIS_IUSRS","","CN=S-1-5-17,CN=ForeignSecurityPrincipals,DC=100security,DC=local
10 | "
11 | "Hyper-V Administrators","",""
12 | "Incoming Forest Trust Builders","",""
13 | "Performance Log Users","",""
14 | "Network Configuration Operators","",""
15 | "Terminal Server License Servers","",""
16 | "Server Operators","",""
17 | "Users","","CN=Domain Users,CN=Users,DC=100security,DC=local
18 | CN=S-1-5-11,CN=ForeignSecurityPrincipals,DC=100security,DC=local
19 | CN=S-1-5-4,CN=ForeignSecurityPrincipals,DC=100security,DC=local
20 | CN=Administrator,CN=Users,DC=100security,DC=local
21 | "
22 | "WinRMRemoteWMIUsers__","",""
23 | "Windows Authorization Access Group","","CN=S-1-5-9,CN=ForeignSecurityPrincipals,DC=100security,DC=local
24 | "
25 | "Schema Admins","CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
26 | ","CN=Administrator,CN=Users,DC=100security,DC=local
27 | "
28 | "Read-only Domain Controllers","CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
29 | ",""
30 | "RDS Remote Access Servers","",""
31 | "Remote Desktop Users","",""
32 | "Replicator","",""
33 | "Remote Management Users","",""
34 | "Guests","","CN=Domain Guests,CN=Users,DC=100security,DC=local
35 | CN=Guest,CN=Users,DC=100security,DC=local
36 | "
37 | "Cloneable Domain Controllers","",""
38 | "Certificate Service DCOM Access","",""
39 | "Cryptographic Operators","",""
40 | "Distributed COM Users","",""
41 | "Denied RODC Password Replication Group","","CN=Read-only Domain Controllers,CN=Users,DC=100security,DC=local
42 | CN=Group Policy Creator Owners,CN=Users,DC=100security,DC=local
43 | CN=Domain Admins,CN=Users,DC=100security,DC=local
44 | CN=Cert Publishers,CN=Users,DC=100security,DC=local
45 | CN=Enterprise Admins,CN=Users,DC=100security,DC=local
46 | CN=Schema Admins,CN=Users,DC=100security,DC=local
47 | CN=Domain Controllers,CN=Users,DC=100security,DC=local
48 | CN=krbtgt,CN=Users,DC=100security,DC=local
49 | "
50 | "Cert Publishers","CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
51 | ",""
52 | "Account Operators","",""
53 | "Access Control Assistance Operators","",""
54 | "Administrators","","CN=Domain Admins,CN=Users,DC=100security,DC=local
55 | CN=Enterprise Admins,CN=Users,DC=100security,DC=local
56 | CN=Administrator,CN=Users,DC=100security,DC=local
57 | "
58 | "Backup Operators","",""
59 | "Allowed RODC Password Replication Group","",""
60 | "Enterprise Admins","CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
61 | CN=Administrators,CN=Builtin,DC=100security,DC=local
62 | ","CN=Administrator,CN=Users,DC=100security,DC=local
63 | "
64 | "Domain Users","CN=Users,CN=Builtin,DC=100security,DC=local
65 | ",""
66 | "Enterprise Read-only Domain Controllers","",""
67 | "Group Policy Creator Owners","CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
68 | ","CN=Administrator,CN=Users,DC=100security,DC=local
69 | "
70 | "Event Log Readers","",""
71 | "Domain Guests","CN=Guests,CN=Builtin,DC=100security,DC=local
72 | ",""
73 | "DnsUpdateProxy","",""
74 | "DnsAdmins","",""
75 | "Domain Admins","CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
76 | CN=Administrators,CN=Builtin,DC=100security,DC=local
77 | ","CN=Marcos Henrique,CN=Users,DC=100security,DC=local
78 | CN=Administrator,CN=Users,DC=100security,DC=local
79 | "
80 | "Domain Controllers","CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
81 | ",""
82 | "Domain Computers","",""
83 |
--------------------------------------------------------------------------------
/ad-reports/ad-users/ad-users-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total Users: 8 - PasswordNeverExpires: 3 - Disabled Users: 3 Company St SamAccountName Name Mail Department Title PasswordNeverExpires Enabled Created Modified Info 100SECUIRTY SP krbtgt krbtgt kerberos@100security.com.br Segurança da Informação Active Directory False False 11/02/2018 23:15:56 07/07/2018 18:26:02 SERVIÇO 100SECURITY SP marcos.henrique Marcos Henrique marcos@100security.com.br Segurança da Informação Consultor True True 12/02/2018 08:04:49 07/07/2018 10:15:05 FUNCIONÁRIO 100SECURITY SP Guest Guest guest@100security.com.br Segurança da Informação Guest True False 11/02/2018 23:14:53 07/07/2018 18:24:20 SERVIÇO 100SECURITY SP Administrator Administrator administrator@100security.com.br Segurança da Informação Domain Admin True True 11/02/2018 23:14:53 07/07/2018 18:19:56 SERVIÇO Apple SP steve.jobs Steve Jobs steve.jobs@apple.com Tecnologia da Informação CEO False False 12/02/2018 09:00:34 01/07/2018 12:53:34 FUNCIONÁRIO Facebook SP mark.zuckerberg Mark Zuckerberg mark.zuckerberg@facebook.com Redes Sociais CEO False True 12/02/2018 09:09:06 01/07/2018 12:52:58 FUNCIONÁRIO McAfee SP john.mcafee John McAfee john.mcafee@mcafee.com Segurança da Informação CEO False True 12/02/2018 09:06:10 12/02/2018 23:45:35 FUNCIONÁRIO Microsoft SP bill.gates Bill Gates bill.gates@microsoft.com Tecnologia da Informação CEO True True 12/02/2018 08:54:17 12/02/2018 23:45:35 FUNCIONÁRIO
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-all/ad-2018-7-9/ad-users-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total Users: 8 - PasswordNeverExpires: 3 - Disabled Users: 3 Company St SamAccountName Name Mail Department Title PasswordNeverExpires Enabled Created Modified Info 100SECUIRTY SP krbtgt krbtgt kerberos@100security.com.br Segurança da Informação Active Directory False False 11/02/2018 23:15:56 07/07/2018 18:26:02 SERVIÇO 100SECURITY SP marcos.henrique Marcos Henrique marcos@100security.com.br Segurança da Informação Consultor True True 12/02/2018 08:04:49 07/07/2018 10:15:05 FUNCIONÁRIO 100SECURITY SP Guest Guest guest@100security.com.br Segurança da Informação Guest True False 11/02/2018 23:14:53 07/07/2018 18:24:20 SERVIÇO 100SECURITY SP Administrator Administrator administrator@100security.com.br Segurança da Informação Domain Admin True True 11/02/2018 23:14:53 07/07/2018 18:19:56 SERVIÇO Apple SP steve.jobs Steve Jobs steve.jobs@apple.com Tecnologia da Informação CEO False False 12/02/2018 09:00:34 01/07/2018 12:53:34 FUNCIONÁRIO Facebook SP mark.zuckerberg Mark Zuckerberg mark.zuckerberg@facebook.com Redes Sociais CEO False True 12/02/2018 09:09:06 01/07/2018 12:52:58 FUNCIONÁRIO McAfee SP john.mcafee John McAfee john.mcafee@mcafee.com Segurança da Informação CEO False True 12/02/2018 09:06:10 12/02/2018 23:45:35 FUNCIONÁRIO Microsoft SP bill.gates Bill Gates bill.gates@microsoft.com Tecnologia da Informação CEO True True 12/02/2018 08:54:17 12/02/2018 23:45:35 FUNCIONÁRIO
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-membergroups/ad-membergroups-2018-7-9.csv:
--------------------------------------------------------------------------------
1 | "Name","MemberOf","Members"
2 | "Performance Monitor Users","",""
3 | "Performance Log Users","",""
4 | "Network Configuration Operators","",""
5 | "RAS and IAS Servers","",""
6 | "Print Operators","",""
7 | "Pre-Windows 2000 Compatible Access","","CN=S-1-5-11,CN=ForeignSecurityPrincipals,DC=100security,DC=local
8 | "
9 | "IIS_IUSRS","","CN=S-1-5-17,CN=ForeignSecurityPrincipals,DC=100security,DC=local
10 | "
11 | "Hyper-V Administrators","",""
12 | "Guests","","CN=Domain Guests,CN=Users,DC=100security,DC=local
13 | CN=Guest,CN=Users,DC=100security,DC=local
14 | "
15 | "Microsoft","","CN=Bill Gates,OU=Microsoft,OU=Empresas,DC=100security,DC=local
16 | "
17 | "McAfee","","CN=John McAfee,OU=McAfee,OU=Empresas,DC=100security,DC=local
18 | "
19 | "Incoming Forest Trust Builders","",""
20 | "RDS Endpoint Servers","",""
21 | "Terminal Server License Servers","",""
22 | "Server Operators","",""
23 | "Schema Admins","CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
24 | ","CN=Administrator,CN=Users,DC=100security,DC=local
25 | "
26 | "WinRMRemoteWMIUsers__","",""
27 | "Windows Authorization Access Group","","CN=S-1-5-9,CN=ForeignSecurityPrincipals,DC=100security,DC=local
28 | "
29 | "Users","","CN=S-1-5-4,CN=ForeignSecurityPrincipals,DC=100security,DC=local
30 | CN=S-1-5-11,CN=ForeignSecurityPrincipals,DC=100security,DC=local
31 | CN=Domain Users,CN=Users,DC=100security,DC=local
32 | "
33 | "Read-only Domain Controllers","CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
34 | ",""
35 | "RDS Remote Access Servers","",""
36 | "RDS Management Servers","",""
37 | "Replicator","",""
38 | "Remote Management Users","",""
39 | "Remote Desktop Users","",""
40 | "Certificate Service DCOM Access","",""
41 | "Cert Publishers","CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
42 | ",""
43 | "Backup Operators","",""
44 | "Denied RODC Password Replication Group","","CN=Read-only Domain Controllers,CN=Users,DC=100security,DC=local
45 | CN=Domain Controllers,CN=Users,DC=100security,DC=local
46 | CN=krbtgt,CN=Users,DC=100security,DC=local
47 | CN=Group Policy Creator Owners,CN=Users,DC=100security,DC=local
48 | CN=Enterprise Admins,CN=Users,DC=100security,DC=local
49 | CN=Schema Admins,CN=Users,DC=100security,DC=local
50 | CN=Domain Admins,CN=Users,DC=100security,DC=local
51 | CN=Cert Publishers,CN=Users,DC=100security,DC=local
52 | "
53 | "Cryptographic Operators","",""
54 | "Cloneable Domain Controllers","",""
55 | "Account Operators","",""
56 | "Access Control Assistance Operators","",""
57 | "100Security","","CN=Marcos Henrique,OU=100Security,OU=Empresas,DC=100security,DC=local
58 | "
59 | "Apple","","CN=Steve Jobs,OU=Apple,OU=Empresas,DC=100security,DC=local
60 | "
61 | "Allowed RODC Password Replication Group","",""
62 | "Administrators","","CN=Administrator,CN=Users,DC=100security,DC=local
63 | CN=Enterprise Admins,CN=Users,DC=100security,DC=local
64 | CN=Domain Admins,CN=Users,DC=100security,DC=local
65 | "
66 | "Distributed COM Users","",""
67 | "Enterprise Read-only Domain Controllers","",""
68 | "Enterprise Admins","CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
69 | CN=Administrators,CN=Builtin,DC=100security,DC=local
70 | ","CN=Administrator,CN=Users,DC=100security,DC=local
71 | "
72 | "Domain Users","CN=Users,CN=Builtin,DC=100security,DC=local
73 | ",""
74 | "Group Policy Creator Owners","CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
75 | ","CN=Administrator,CN=Users,DC=100security,DC=local
76 | "
77 | "Facebook","","CN=Mark Zuckerberg,OU=Facebook,OU=Empresas,DC=100security,DC=local
78 | "
79 | "Event Log Readers","",""
80 | "Domain Admins","CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
81 | CN=Administrators,CN=Builtin,DC=100security,DC=local
82 | ","CN=Administrator,CN=Users,DC=100security,DC=local
83 | "
84 | "DnsUpdateProxy","",""
85 | "DnsAdmins","",""
86 | "Domain Guests","CN=Guests,CN=Builtin,DC=100security,DC=local
87 | ",""
88 | "Domain Controllers","CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
89 | ",""
90 | "Domain Computers","",""
91 |
--------------------------------------------------------------------------------
/ad-admins.ps1:
--------------------------------------------------------------------------------
1 | <#
2 | .NAME
3 | ADRT - Active Directory Report Tool
4 | .DESCRIPTION
5 | Extract the complete list of all Domain Admins.
6 | .EXAMPLE
7 | PS C:\adrt> .\ad-admins.ps1
8 | .NOTES
9 | Name: Marcos Henrique
10 | E-mail: marcos@100security.com.br
11 | .LINK
12 | WebSite: http://www.100security.com.br
13 | Facebook: https://www.facebook.com/seguranca.da.informacao
14 | Twitter: https://twitter.com/100Security
15 | GitHub: https://www.github.com/100security
16 | Youtube: https://www.youtube.com/user/videos100security
17 | #>
18 |
19 | $report = $null
20 | $table = $null
21 | $date = Get-Date -format "yyyy-MM-dd"
22 | $mounth = Get-Date -format "MMM"
23 | $directorypath = (Get-Item -Path ".\").FullName
24 | $path = "ad-reports\ad-admins"
25 | #$html = "$path\ad-admins-$date.html"
26 | #$csv = "$path\ad-admins-$date.csv"
27 | $html = "$path\ad-admins.html"
28 | $csv = "$path\ad-admins.csv"
29 |
30 | #-- Domain Admins
31 | $t_da = (Get-ADGroupMember -Identity "Domain Admins").count
32 | $domain = (Get-ADDomain).Forest
33 |
34 | # Config
35 | $config = Get-Content (JOIN-PATH $directorypath "config\config.txt")
36 | $company = $config[7]
37 | $owner = $config[9]
38 |
39 | #-- Import Module
40 | Import-Module ActiveDirectory
41 |
42 | #-- Show Total
43 | $table += "Domain Admins: $t_da "
44 |
45 | #-- Filter
46 | $admins = @(Get-ADGroupMember -Identity "Domain Admins")
47 |
48 | $result = @($admins | Select-Object Name, SamAccountName)
49 |
50 | #-- Order by (A-Z)
51 | $result = $result | Sort "Name"
52 |
53 | #-- Display result on screen
54 | #$result | ft -auto
55 |
56 | $table += $result | ConvertTo-Html -Fragment
57 |
58 | $format=
59 | "
60 |
61 |
62 | $company
63 |
70 | "
71 | $title=
72 | "
73 |
74 |
75 |
76 | Active Directory - Domain Admins
77 | Company: $company - Domain: $domain - Date: $date - Owner: $owner
78 |
79 |
80 |
81 |
82 |
83 | "
84 | $footer=
85 | "
86 |
87 |
88 |
89 |
90 | ADRT - Active Directory Report Tool
91 |
92 |
93 |
94 | "
95 | $message = ""
101 | $message = $message + ""
102 | $message = $message + "Active Directory "
103 | $message = $message + "Description Total "
104 | $message = $message + "Domain Admins $t_da "
105 | $message = $message + "Information Security "
106 | $message = $message + "
"
107 |
108 | $report = $format + $title + $table + $footer
109 |
110 | #-- Generate HTML file
111 | $report | Out-File $html -Encoding Utf8
112 |
113 | #-- Export to CSV
114 | $result | Sort Company | Export-Csv $csv -NoTypeInformation -Encoding Utf8
115 |
116 | #-- Send report by email
117 | #$Subject = "[ Report-$mounth ] Active Directory - Domain Admins"
118 | #$SmtpServer = $config[11]
119 | #$Port = $config[13]
120 | #$From = $config[15]
121 | #$To = $config[17]
122 |
123 | #Send-MailMessage -From $From -To $To -Subject $Subject -Attachments $html,$csv -bodyashtml -Body $message -SmtpServer $SmtpServer -Port $Port
124 |
125 | cls
--------------------------------------------------------------------------------
/ad-groups.ps1:
--------------------------------------------------------------------------------
1 | <#
2 | .NAME
3 | ADRT - Active Directory Report Tool
4 | .DESCRIPTION
5 | Extract the complete list of All Groups.
6 | .EXAMPLE
7 | PS C:\adrt> .\ad-groups.ps1
8 | .NOTES
9 | Name: Marcos Henrique
10 | E-mail: marcos@100security.com.br
11 | .LINK
12 | WebSite: http://www.100security.com.br
13 | Facebook: https://www.facebook.com/seguranca.da.informacao
14 | Twitter: https://twitter.com/100Security
15 | GitHub: https://www.github.com/100security
16 | Youtube: https://www.youtube.com/user/videos100security
17 | #>
18 |
19 | $report = $null
20 | $table = $null
21 | $date = Get-Date -format "yyyy-MM-dd"
22 | $mounth = Get-Date -format "MMM"
23 | $directorypath = (Get-Item -Path ".\").FullName
24 | $path = "ad-reports\ad-groups"
25 | #$html = "$path\ad-groups-$date.html"
26 | #$csv = "$path\ad-groups-$date.csv"
27 | $html = "$path\ad-groups.html"
28 | $csv = "$path\ad-groups.csv"
29 |
30 | #-- All Groups
31 | $t_g = (Get-ADGroup -Filter {name -like "*"}).count
32 | $domain = (Get-ADDomain).Forest
33 |
34 | # Config
35 | $config = Get-Content (JOIN-PATH $directorypath "config\config.txt")
36 | $company = $config[7]
37 | $owner = $config[9]
38 |
39 | #-- Import Module
40 | Import-Module ActiveDirectory
41 |
42 | #-- Show Total
43 | $table += "Total Groups: $t_g "
44 |
45 | #-- Filter
46 | $groups = @(Get-ADGroup -Filter {name -like "*"} -Properties Description | Select Name, Description)
47 |
48 | $result = @($groups | Select-Object Name, Description)
49 |
50 | #-- Order by (A-Z)
51 | $result = $result | Sort "Name"
52 |
53 | #-- Display result on screen
54 | #$result | ft -auto
55 |
56 | $table += $result | ConvertTo-Html -Fragment
57 |
58 | $format=
59 | "
60 |
61 |
62 | $company
63 |
70 | "
71 | $title=
72 | "
73 |
74 |
75 |
76 | Active Directory - All Groups
77 | Company: $company - Domain: $domain - Date: $date - Owner: $owner
78 |
79 |
80 |
81 |
82 |
83 | "
84 | $footer=
85 | "
86 |
87 |
88 |
89 |
90 | ADRT - Active Directory Report Tool
91 |
92 |
93 |
94 | "
95 | $message = ""
101 | $message = $message + ""
102 | $message = $message + "Active Directory "
103 | $message = $message + "Description Total "
104 | $message = $message + "Total Groups $t_g "
105 | $message = $message + "Information Security "
106 | $message = $message + "
"
107 |
108 | $report = $format + $title + $table + $footer
109 |
110 | #-- Generate HTML file
111 | $report | Out-File $html -Encoding Utf8
112 |
113 | #-- Export to CSV
114 | $result | Sort Company | Export-Csv $csv -NoTypeInformation -Encoding Utf8
115 |
116 | #-- Send report by email
117 | #$Subject = "[ Report-$mounth ] Active Directory - All Groups"
118 | #$SmtpServer = $config[11]
119 | #$Port = $config[13]
120 | #$From = $config[15]
121 | #$To = $config[17]
122 |
123 | #Send-MailMessage -From $From -To $To -Subject $Subject -Attachments $html,$csv -bodyashtml -Body $message -SmtpServer $SmtpServer -Port $Port
124 |
125 | cls
--------------------------------------------------------------------------------
/ad-disabled.ps1:
--------------------------------------------------------------------------------
1 | <#
2 | .NAME
3 | ADRT - Active Directory Report Tool
4 | .DESCRIPTION
5 | Extract the complete list of all Disabled Users.
6 | .EXAMPLE
7 | PS C:\adrt> .\ad-disabled.ps1
8 | .NOTES
9 | Name: Marcos Henrique
10 | E-mail: marcos@100security.com.br
11 | .LINK
12 | WebSite: http://www.100security.com.br
13 | Facebook: https://www.facebook.com/seguranca.da.informacao
14 | Twitter: https://twitter.com/100Security
15 | GitHub: https://www.github.com/100security
16 | Youtube: https://www.youtube.com/user/videos100security
17 | #>
18 |
19 | $report = $null
20 | $table = $null
21 | $date = Get-Date -format "yyyy-MM-dd"
22 | $mounth = Get-Date -format "MMM"
23 | $directorypath = (Get-Item -Path ".\").FullName
24 | $path = "ad-reports\ad-disabled"
25 | #$html = "$path\ad-disabled-$date.html"
26 | #$csv = "$path\ad-disabled-$date.csv"
27 | $html = "$path\ad-disabled.html"
28 | $csv = "$path\ad-disabled.csv"
29 |
30 | #-- Disabled Users
31 | $t_du = (Search-ADAccount -AccountDisabled -UsersOnly).count
32 | $domain = (Get-ADDomain).Forest
33 |
34 | # Config
35 | $config = Get-Content (JOIN-PATH $directorypath "config\config.txt")
36 | $company = $config[7]
37 | $owner = $config[9]
38 |
39 | #-- Import Module
40 | Import-Module ActiveDirectory
41 |
42 | #-- Show Total
43 | $table += "Disabled Users: $t_du "
44 |
45 | #-- Filter
46 | $disabled = @(Search-ADAccount -AccountDisabled -UsersOnly)
47 |
48 | $result = @($disabled | Select -Property SamAccountName, Name)
49 |
50 | #-- Order by (A-Z)
51 | $result = $result | Sort "Name"
52 |
53 | #-- Display result on screen
54 | #$result | ft -auto
55 |
56 | $table += $result | ConvertTo-Html -Fragment
57 |
58 | $format=
59 | "
60 |
61 |
62 | $company
63 |
70 | "
71 | $title=
72 | "
73 |
74 |
75 |
76 | Active Directory - Disabled Users
77 | Company: $company - Domain: $domain - Date: $date - Owner: $owner
78 |
79 |
80 |
81 |
82 |
83 | "
84 | $footer=
85 | "
86 |
87 |
88 |
89 |
90 | ADRT - Active Directory Report Tool
91 |
92 |
93 |
94 | "
95 | $message = ""
101 | $message = $message + ""
102 | $message = $message + "Active Directory "
103 | $message = $message + "Description Total "
104 | $message = $message + "Disabled Users $t_du "
105 | $message = $message + "Information Security "
106 | $message = $message + "
"
107 |
108 | $report = $format + $title + $table + $footer
109 |
110 | #-- Generate HTML file
111 | $report | Out-File $html -Encoding Utf8
112 |
113 | #-- Export to CSV
114 | $result | Sort Company | Export-Csv $csv -NoTypeInformation -Encoding Utf8
115 |
116 | #-- Send report by email
117 | #$Subject = "[ Report-$mounth ] Active Directory - Disabled Users"
118 | #$SmtpServer = $config[11]
119 | #$Port = $config[13]
120 | #$From = $config[15]
121 | #$To = $config[17]
122 |
123 | #Send-MailMessage -From $From -To $To -Subject $Subject -Attachments $html,$csv -bodyashtml -Body $message -SmtpServer $SmtpServer -Port $Port
124 |
125 | cls
--------------------------------------------------------------------------------
/ad-ous.ps1:
--------------------------------------------------------------------------------
1 | <#
2 | .NAME
3 | ADRT - Active Directory Report Tool
4 | .DESCRIPTION
5 | Extract the complete list of All OUs.
6 | .EXAMPLE
7 | PS C:\adrt> .\ad-ous.ps1
8 | .NOTES
9 | Name: Marcos Henrique
10 | E-mail: marcos@100security.com.br
11 | .LINK
12 | WebSite: http://www.100security.com.br
13 | Facebook: https://www.facebook.com/seguranca.da.informacao
14 | Twitter: https://twitter.com/100Security
15 | GitHub: https://www.github.com/100security
16 | Youtube: https://www.youtube.com/user/videos100security
17 | #>
18 |
19 | $report = $null
20 | $table = $null
21 | $date = Get-Date -format "yyyy-MM-dd"
22 | $mounth = Get-Date -format "MMM"
23 | $directorypath = (Get-Item -Path ".\").FullName
24 | $path = "ad-reports\ad-ous"
25 | #$html = "$path\ad-ous-$date.html"
26 | #$csv = "$path\ad-ous-$date.csv"
27 | $html = "$path\ad-ous.html"
28 | $csv = "$path\ad-ous.csv"
29 |
30 | #-- All OUs
31 | $t_ous = (Get-ADOrganizationalUnit -Filter {name -like "*"}).count
32 | $domain = (Get-ADDomain).Forest
33 |
34 | # Config
35 | $config = Get-Content (JOIN-PATH $directorypath "config\config.txt")
36 | $company = $config[7]
37 | $owner = $config[9]
38 |
39 | #-- Import Module
40 | Import-Module ActiveDirectory
41 |
42 | #-- Show Total
43 | $table += "Total OUs: $t_ous "
44 |
45 | #-- Filter
46 | $ous = @(Get-ADOrganizationalUnit -Filter {name -like "*"} -Properties Description | Select Name, Description, DistinguishedName)
47 |
48 | $result = @($ous | Select-Object Name, Description, DistinguishedName)
49 |
50 | #-- Order by (A-Z)
51 | $result = $result | Sort "Name"
52 |
53 | #-- Display result on screen
54 | #$result | ft -auto
55 |
56 | $table += $result | ConvertTo-Html -Fragment
57 |
58 | $format=
59 | "
60 |
61 |
62 | $company
63 |
70 | "
71 | $title=
72 | "
73 |
74 |
75 |
76 | Active Directory - All OUs
77 | Company: $company - Domain: $domain - Date: $date - Owner: $owner
78 |
79 |
80 |
81 |
82 |
83 | "
84 | $footer=
85 | "
86 |
87 |
88 |
89 |
90 | ADRT - Active Directory Report Tool
91 |
92 |
93 |
94 | "
95 | $message = ""
101 | $message = $message + ""
102 | $message = $message + "Active Directory "
103 | $message = $message + "Description Total "
104 | $message = $message + "Total OUs $t_ous "
105 | $message = $message + "Information Security "
106 | $message = $message + "
"
107 |
108 | $report = $format + $title + $table + $footer
109 |
110 | #-- Generate HTML file
111 | $report | Out-File $html -Encoding Utf8
112 |
113 | #-- Export to CSV
114 | $result | Sort Company | Export-Csv $csv -NoTypeInformation -Encoding Utf8
115 |
116 | #-- Send report by email
117 | #$Subject = "[ Report-$mounth ] Active Directory - All OUs"
118 | #$SmtpServer = $config[11]
119 | #$Port = $config[13]
120 | #$From = $config[15]
121 | #$To = $config[17]
122 |
123 | #Send-MailMessage -From $From -To $To -Subject $Subject -Attachments $html,$csv -bodyashtml -Body $message -SmtpServer $SmtpServer -Port $Port
124 |
125 | cls
--------------------------------------------------------------------------------
/ad-enterprise-admins.ps1:
--------------------------------------------------------------------------------
1 | <#
2 | .NAME
3 | ADRT - Active Directory Report Tool
4 | .DESCRIPTION
5 | Extract the complete list of all Domain Admins.
6 | .EXAMPLE
7 | PS C:\adrt> .\ad-admins.ps1
8 | .NOTES
9 | Name: Marcos Henrique
10 | E-mail: marcos@100security.com.br
11 | .LINK
12 | WebSite: http://www.100security.com.br
13 | Facebook: https://www.facebook.com/seguranca.da.informacao
14 | Twitter: https://twitter.com/100Security
15 | GitHub: https://www.github.com/100security
16 | Youtube: https://www.youtube.com/user/videos100security
17 | #>
18 |
19 | $report = $null
20 | $table = $null
21 | $date = Get-Date -format "yyyy-MM-dd"
22 | $mounth = Get-Date -format "MMM"
23 | $directorypath = (Get-Item -Path ".\").FullName
24 | $path = "ad-reports\ad-enterprise-admins"
25 | #$html = "$path\ad-enterprise-admins-$date.html"
26 | #$csv = "$path\ad-enterprise-admins-$date.csv"
27 | $html = "$path\ad-enterprise-admins.html"
28 | $csv = "$path\ad-enterprise-admins.csv"
29 |
30 | #-- Enterprise Admins
31 | $t_da = (Get-ADGroupMember -Identity "Enterprise Admins").count
32 | $domain = (Get-ADDomain).Forest
33 |
34 | # Config
35 | $config = Get-Content (JOIN-PATH $directorypath "config\config.txt")
36 | $company = $config[7]
37 | $owner = $config[9]
38 |
39 | #-- Import Module
40 | Import-Module ActiveDirectory
41 |
42 | #-- Show Total
43 | $table += "Enterprise Admins: $t_da "
44 |
45 | #-- Filter
46 | $admins = @(Get-ADGroupMember -Identity "Enterprise Admins")
47 |
48 | $result = @($admins | Select-Object Name, SamAccountName)
49 |
50 | #-- Order by (A-Z)
51 | $result = $result | Sort "Name"
52 |
53 | #-- Display result on screen
54 | #$result | ft -auto
55 |
56 | $table += $result | ConvertTo-Html -Fragment
57 |
58 | $format=
59 | "
60 |
61 |
62 | $company
63 |
70 | "
71 | $title=
72 | "
73 |
74 |
75 |
76 | Active Directory - Enterprise Admins
77 | Company: $company - Domain: $domain - Date: $date - Owner: $owner
78 |
79 |
80 |
81 |
82 |
83 | "
84 | $footer=
85 | "
86 |
87 |
88 |
89 |
90 | ADRT - Active Directory Report Tool
91 |
92 |
93 |
94 | "
95 | $message = ""
101 | $message = $message + ""
102 | $message = $message + "Active Directory "
103 | $message = $message + "Description Total "
104 | $message = $message + "Enterprise Admins $t_da "
105 | $message = $message + "Information Security "
106 | $message = $message + "
"
107 |
108 | $report = $format + $title + $table + $footer
109 |
110 | #-- Generate HTML file
111 | $report | Out-File $html -Encoding Utf8
112 |
113 | #-- Export to CSV
114 | $result | Sort Company | Export-Csv $csv -NoTypeInformation -Encoding Utf8
115 |
116 | #-- Send report by email
117 | #$Subject = "[ Report-$mounth ] Active Directory - Enterprise Admins"
118 | #$SmtpServer = $config[11]
119 | #$Port = $config[13]
120 | #$From = $config[15]
121 | #$To = $config[17]
122 |
123 | #Send-MailMessage -From $From -To $To -Subject $Subject -Attachments $html,$csv -bodyashtml -Body $message -SmtpServer $SmtpServer -Port $Port
124 |
125 | cls
--------------------------------------------------------------------------------
/ad-servers.ps1:
--------------------------------------------------------------------------------
1 | <#
2 | .NAME
3 | ADRT - Active Directory Report Tool
4 | .DESCRIPTION
5 | Extract the complete list of All Servers.
6 | .EXAMPLE
7 | PS C:\adrt> .\ad-servers.ps1
8 | .NOTES
9 | Name: Marcos Henrique
10 | E-mail: marcos@100security.com.br
11 | .LINK
12 | WebSite: http://www.100security.com.br
13 | Facebook: https://www.facebook.com/seguranca.da.informacao
14 | Twitter: https://twitter.com/100Security
15 | GitHub: https://www.github.com/100security
16 | Youtube: https://www.youtube.com/user/videos100security
17 | #>
18 |
19 | $report = $null
20 | $table = $null
21 | $date = Get-Date -format "yyyy-MM-dd"
22 | $mounth = Get-Date -format "MMM"
23 | $directorypath = (Get-Item -Path ".\").FullName
24 | $path = "ad-reports\ad-servers"
25 | #$html = "$path\ad-servers-$date.html"
26 | #$csv = "$path\ad-servers-$date.csv"
27 | $html = "$path\ad-servers.html"
28 | $csv = "$path\ad-servers.csv"
29 |
30 | #-- All Servers
31 | $t_s = (Get-ADComputer -Filter { OperatingSystem -Like '*Windows Server*' }).count
32 | $domain = (Get-ADDomain).Forest
33 |
34 | # Config
35 | $config = Get-Content (JOIN-PATH $directorypath "config\config.txt")
36 | $company = $config[7]
37 | $owner = $config[9]
38 |
39 | #-- Import Module
40 | Import-Module ActiveDirectory
41 |
42 | #-- Show Total
43 | $table += "Total Servers: $t_s "
44 |
45 | #-- Filter
46 | $servers = @(Get-ADComputer -Filter { OperatingSystem -Like '*Windows Server*' } -Properties OperatingSystem, Description)
47 |
48 | $result = @($servers | Select-Object Name, OperatingSystem, Description)
49 |
50 | #-- Order by (A-Z)
51 | $result = $result | Sort "Description"
52 |
53 | #-- Display result on screen
54 | #$result | ft -auto
55 |
56 | $table += $result | ConvertTo-Html -Fragment
57 |
58 | $format=
59 | "
60 |
61 |
62 | $company
63 |
70 | "
71 | $title=
72 | "
73 |
74 |
75 |
76 | Active Directory - All Servers
77 | Company: $company - Domain: $domain - Date: $date - Owner: $owner
78 |
79 |
80 |
81 |
82 |
83 | "
84 | $footer=
85 | "
86 |
87 |
88 |
89 |
90 | ADRT - Active Directory Report Tool
91 |
92 |
93 |
94 | "
95 | $message = ""
101 | $message = $message + ""
102 | $message = $message + "Active Directory "
103 | $message = $message + "Description Total "
104 | $message = $message + "Windows Servers $t_s "
105 | $message = $message + "Information Security "
106 | $message = $message + "
"
107 |
108 | $report = $format + $title + $table + $footer
109 |
110 | #-- Generate HTML file
111 | $report | Out-File $html -Encoding Utf8
112 |
113 | #-- Export to CSV
114 | $result | Sort Company | Export-Csv $csv -NoTypeInformation -Encoding Utf8
115 |
116 | #-- Send report by email
117 | #$Subject = "[ Report-$mounth ] Active Directory - All Servers"
118 | #$SmtpServer = $config[11]
119 | #$Port = $config[13]
120 | #$From = $config[15]
121 | #$To = $config[17]
122 |
123 | #Send-MailMessage -From $From -To $To -Subject $Subject -Attachments $html,$csv -bodyashtml -Body $message -SmtpServer $SmtpServer -Port $Port
124 |
125 | cls
--------------------------------------------------------------------------------
/ad-inventory.ps1:
--------------------------------------------------------------------------------
1 | <#
2 | .NAME
3 | ADRT - Active Directory Report Tool
4 | .DESCRIPTION
5 | Extract the complete list of All Computers and Servers.
6 | .EXAMPLE
7 | PS C:\adrt> .\ad-inventory.ps1
8 | .NOTES
9 | Name: Marcos Henrique
10 | E-mail: marcos@100security.com.br
11 | .LINK
12 | WebSite: http://www.100security.com.br
13 | Facebook: https://www.facebook.com/seguranca.da.informacao
14 | Twitter: https://twitter.com/100Security
15 | GitHub: https://www.github.com/100security
16 | Youtube: https://www.youtube.com/user/videos100security
17 | #>
18 |
19 | $report = $null
20 | $table = $null
21 | $date = Get-Date -format "yyyy-MM-dd"
22 | $mounth = Get-Date -format "MMM"
23 | $directorypath = (Get-Item -Path ".\").FullName
24 | $path = "ad-reports\ad-inventory"
25 | #$html = "$path\ad-inventory-$date.html"
26 | #$csv = "$path\ad-inventory-$date.csv"
27 | $html = "$path\ad-inventory.html"
28 | $csv = "$path\ad-inventory.csv"
29 |
30 | #-- All Computers and Servers
31 | $t_cs = (Get-ADComputer -Filter 'Name -like "*"' -Properties *).count
32 | $domain = (Get-ADDomain).Forest
33 |
34 | # Config
35 | $config = Get-Content (JOIN-PATH $directorypath "config\config.txt")
36 | $company = $config[7]
37 | $owner = $config[9]
38 |
39 | #-- Import Module
40 | Import-Module ActiveDirectory
41 |
42 | #-- Show Total
43 | $table += "Computers and Servers: $t_cs "
44 |
45 | #-- Filter
46 | $cs = @(Get-ADComputer -Filter 'Name -like "*"' -Properties *)
47 |
48 | $result = @($cs | Select-Object Name, IPv4Address, LastlogonDate, OperatingSystem, Description)
49 |
50 | #-- Order by (A-Z)
51 | $result = $result | Sort "OperatingSystem"
52 |
53 | #-- Display result on screen
54 | #$result | ft -auto
55 |
56 | $table += $result | ConvertTo-Html -Fragment
57 |
58 | $format=
59 | "
60 |
61 |
62 | $company
63 |
70 | "
71 | $title=
72 | "
73 |
74 |
75 |
76 | Active Directory - Inventory
77 | Company: $company - Domain: $domain - Date: $date - Owner: $owner
78 |
79 |
80 |
81 |
82 |
83 | "
84 | $footer=
85 | "
86 |
87 |
88 |
89 |
90 | ADRT - Active Directory Report Tool
91 |
92 |
93 |
94 | "
95 | $message = ""
101 | $message = $message + ""
102 | $message = $message + "Active Directory "
103 | $message = $message + "Description Total "
104 | $message = $message + "Computers + Servers $t_cs "
105 | $message = $message + "Information Security "
106 | $message = $message + "
"
107 |
108 | $report = $format + $title + $table + $footer
109 |
110 | #-- Generate HTML file
111 | $report | Out-File $html -Encoding Utf8
112 |
113 | #-- Export to CSV
114 | $result | Sort Company | Export-Csv $csv -NoTypeInformation -Encoding Utf8
115 |
116 | #-- Send report by email
117 | #$Subject = "[ Report-$mounth ] Active Directory - Inventory"
118 | #$SmtpServer = $config[11]
119 | #$Port = $config[13]
120 | #$From = $config[15]
121 | #$To = $config[17]
122 |
123 | #Send-MailMessage -From $From -To $To -Subject $Subject -Attachments $html,$csv -bodyashtml -Body $message -SmtpServer $SmtpServer -Port $Port
124 |
125 | cls
--------------------------------------------------------------------------------
/ad-dcs.ps1:
--------------------------------------------------------------------------------
1 | <#
2 | .NAME
3 | ADRT - Active Directory Report Tool
4 | .DESCRIPTION
5 | Extract the complete list of all Domain Controllers.
6 | .EXAMPLE
7 | PS C:\adrt> .\ad-dcs.ps1
8 | .NOTES
9 | Name: Marcos Henrique
10 | E-mail: marcos@100security.com.br
11 | .LINK
12 | WebSite: http://www.100security.com.br
13 | Facebook: https://www.facebook.com/seguranca.da.informacao
14 | Twitter: https://twitter.com/100Security
15 | GitHub: https://www.github.com/100security
16 | Youtube: https://www.youtube.com/user/videos100security
17 | #>
18 |
19 | $report = $null
20 | $table = $null
21 | $date = Get-Date -format "yyyy-MM-dd"
22 | $mounth = Get-Date -format "MMM"
23 | $directorypath = (Get-Item -Path ".\").FullName
24 | $path = "ad-reports\ad-dcs"
25 | #$html = "$path\ad-dcs-$date.html"
26 | #$csv = "$path\ad-dcs-$date.csv"
27 | $html = "$path\ad-dcs.html"
28 | $csv = "$path\ad-dcs.csv"
29 |
30 | #-- Domain Controllers
31 | $t_dcs = (Get-ADDomainController -Filter *).count
32 | $domain = (Get-ADDomain).Forest
33 |
34 | # Config
35 | $config = Get-Content (JOIN-PATH $directorypath "config\config.txt")
36 | $company = $config[7]
37 | $owner = $config[9]
38 |
39 | #-- Import Module
40 | Import-Module ActiveDirectory
41 |
42 | #-- Show Total
43 | $table += "Domain Controllers: $t_dcs "
44 |
45 | #-- Filter
46 | $dcs = @(Get-ADDomainController -Filter * | Select-Object Site, Name, IPv4Address, OperatingSystem, OperatingSystemServicePack)
47 |
48 | $result = @($dcs | Select-Object Site, Name, IPv4Address, OperatingSystem, OperatingSystemServicePack)
49 |
50 | #-- Order by (A-Z)
51 | $result = $result | Sort "Site"
52 |
53 | #-- Display result on screen
54 | #$result | ft -auto
55 |
56 | $table += $result | ConvertTo-Html -Fragment
57 |
58 | $format=
59 | "
60 |
61 |
62 | $company
63 |
70 | "
71 | $title=
72 | "
73 |
74 |
75 |
76 | Active Directory - Domain Controllers
77 | Company: $company - Domain: $domain - Date: $date - Owner: $owner
78 |
79 |
80 |
81 |
82 |
83 | "
84 | $footer=
85 | "
86 |
87 |
88 |
89 |
90 | ADRT - Active Directory Report Tool
91 |
92 |
93 |
94 | "
95 | $message = ""
101 | $message = $message + ""
102 | $message = $message + "Active Directory "
103 | $message = $message + "Description Total "
104 | $message = $message + "Domain Controllers $t_dcs "
105 | $message = $message + "Information Security "
106 | $message = $message + "
"
107 |
108 | $report = $format + $title + $table + $footer
109 |
110 | #-- Generate HTML file
111 | $report | Out-File $html -Encoding Utf8
112 |
113 | #-- Export to CSV
114 | $result | Sort Company | Export-Csv $csv -NoTypeInformation -Encoding Utf8
115 |
116 | #-- Send report by email
117 | #$Subject = "[ Report-$mounth ] Active Directory - Domain Controllers"
118 | #$SmtpServer = $config[11]
119 | #$Port = $config[13]
120 | #$From = $config[15]
121 | #$To = $config[17]
122 |
123 | #Send-MailMessage -From $From -To $To -Subject $Subject -Attachments $html,$csv -bodyashtml -Body $message -SmtpServer $SmtpServer -Port $Port
124 |
125 | cls
--------------------------------------------------------------------------------
/ad-computers.ps1:
--------------------------------------------------------------------------------
1 | <#
2 | .NAME
3 | ADRT - Active Directory Report Tool
4 | .DESCRIPTION
5 | Extract the complete list of All Computers.
6 | .EXAMPLE
7 | PS C:\adrt> .\ad-computers.ps1
8 | .NOTES
9 | Name: Marcos Henrique
10 | E-mail: marcos@100security.com.br
11 | .LINK
12 | WebSite: http://www.100security.com.br
13 | Facebook: https://www.facebook.com/seguranca.da.informacao
14 | Twitter: https://twitter.com/100Security
15 | GitHub: https://www.github.com/100security
16 | Youtube: https://www.youtube.com/user/videos100security
17 | #>
18 |
19 | $report = $null
20 | $table = $null
21 | $date = Get-Date -format "yyyy-MM-dd"
22 | $mounth = Get-Date -format "MMM"
23 | $directorypath = (Get-Item -Path ".\").FullName
24 | $path = "ad-reports\ad-computers"
25 | #$html = "$path\ad-computers-$date.html"
26 | #$csv = "$path\ad-computers-$date.csv"
27 | $html = "$path\ad-computers.html"
28 | $csv = "$path\ad-computers.csv"
29 |
30 | #-- All Computers
31 | $t_c = (Get-ADComputer -Filter { OperatingSystem -NotLike '*Windows Server*' }).count
32 | $domain = (Get-ADDomain).Forest
33 |
34 | # Config
35 | $config = Get-Content (JOIN-PATH $directorypath "config\config.txt")
36 | $company = $config[7]
37 | $owner = $config[9]
38 |
39 | #-- Import Module
40 | Import-Module ActiveDirectory
41 |
42 | #-- Show Total
43 | $table += "Total Computers: $t_c "
44 |
45 | #-- Filter
46 | $computers = @(Get-ADComputer -Filter { OperatingSystem -NotLike '*Windows Server*' } -Properties OperatingSystem, Description)
47 |
48 | $result = @($computers | Select-Object Name, OperatingSystem, Description)
49 |
50 | #-- Order by (A-Z)
51 | $result = $result | Sort "OperatingSystem"
52 |
53 | #-- Display result on screen
54 | #$result | ft -auto
55 |
56 | $table += $result | ConvertTo-Html -Fragment
57 |
58 | $format=
59 | "
60 |
61 |
62 | $company
63 |
70 | "
71 | $title=
72 | "
73 |
74 |
75 |
76 | Active Directory - All Computers
77 | Company: $company - Domain: $domain - Date: $date - Owner: $owner
78 |
79 |
80 |
81 |
82 |
83 | "
84 | $footer=
85 | "
86 |
87 |
88 |
89 |
90 | ADRT - Active Directory Report Tool
91 |
92 |
93 |
94 | "
95 | $message = ""
101 | $message = $message + ""
102 | $message = $message + "Active Directory "
103 | $message = $message + "Description Total "
104 | $message = $message + "Computers $t_c "
105 | $message = $message + "Information Security "
106 | $message = $message + "
"
107 |
108 | $report = $format + $title + $table + $footer
109 |
110 | #-- Generate HTML file
111 | $report | Out-File $html -Encoding Utf8
112 |
113 | #-- Export to CSV
114 | $result | Sort Company | Export-Csv $csv -NoTypeInformation -Encoding Utf8
115 |
116 | #-- Send report by email
117 | #$Subject = "[ Report-$mounth ] Active Directory - All Computers"
118 | #$SmtpServer = $config[11]
119 | #$Port = $config[13]
120 | #$From = $config[15]
121 | #$To = $config[17]
122 |
123 | #Send-MailMessage -From $From -To $To -Subject $Subject -Attachments $html,$csv -bodyashtml -Body $message -SmtpServer $SmtpServer -Port $Port
124 |
125 | cls
--------------------------------------------------------------------------------
/ad-membergroups.ps1:
--------------------------------------------------------------------------------
1 | <#
2 | .NAME
3 | ADRT - Active Directory Report Tool
4 | .DESCRIPTION
5 | Extract the complete list of all Member Groups.
6 | .EXAMPLE
7 | PS C:\adrt> .\ad-membergroups.ps1
8 | .NOTES
9 | Name: Marcos Henrique
10 | E-mail: marcos@100security.com.br
11 | .LINK
12 | WebSite: http://www.100security.com.br
13 | Facebook: https://www.facebook.com/seguranca.da.informacao
14 | Twitter: https://twitter.com/100Security
15 | GitHub: https://www.github.com/100security
16 | Youtube: https://www.youtube.com/user/videos100security
17 | #>
18 |
19 | $report = $null
20 | $table = $null
21 | $date = Get-Date -format "yyyy-MM-dd"
22 | $mounth = Get-Date -format "MMM"
23 | $directorypath = (Get-Item -Path ".\").FullName
24 | $path = "ad-reports\ad-membergroups"
25 | #$html = "$path\ad-membergroups-$date.html"
26 | #$csv = "$path\ad-membergroups-$date.csv"
27 | $html = "$path\ad-membergroups.html"
28 | $csv = "$path\ad-membergroups.csv"
29 |
30 | #-- Member Groups
31 | $t_mg = (Get-ADGroup -Filter {Name -like "*"} -Properties *).count
32 | $domain = (Get-ADDomain).Forest
33 |
34 | # Config
35 | $config = Get-Content (JOIN-PATH $directorypath "config\config.txt")
36 | $company = $config[7]
37 | $owner = $config[9]
38 |
39 | #-- Import Module
40 | Import-Module ActiveDirectory
41 |
42 | #-- Show Total
43 | $table += "Total Groups: $t_mg "
44 |
45 | #-- Filter
46 | $membergroups = @(Get-ADGroup -Filter {Name -like "*"} -Properties *)
47 |
48 | $result = @($membergroups | Select-Object Name, @{n='MemberOf'; e= { $_.memberof | Out-String}}, @{n='Members'; e= { $_.members | Out-String}})
49 |
50 | #-- Order by (A-Z)
51 | $result = $result | Sort "Name"
52 |
53 | #-- Display result on screen
54 | #$result | ft -auto
55 |
56 | $table += $result | ConvertTo-Html -Fragment
57 |
58 | $format=
59 | "
60 |
61 |
62 | $company
63 |
70 | "
71 | $title=
72 | "
73 |
74 |
75 |
76 | Active Directory - All Member Groups
77 | Company: $company - Domain: $domain - Date: $date - Owner: $owner
78 |
79 |
80 |
81 |
82 |
83 | "
84 | $footer=
85 | "
86 |
87 |
88 |
89 |
90 | ADRT - Active Directory Report Tool
91 |
92 |
93 |
94 | "
95 | $message = ""
101 | $message = $message + ""
102 | $message = $message + "Active Directory "
103 | $message = $message + "Description Total "
104 | $message = $message + "Member Groups $t_mg "
105 | $message = $message + "Information Security "
106 | $message = $message + "
"
107 |
108 | $report = $format + $title + $table + $footer
109 |
110 | #-- Generate HTML file
111 | $report | Out-File $html -Encoding Utf8
112 |
113 | #-- Export to CSV
114 | $result | Sort Company | Export-Csv $csv -NoTypeInformation -Encoding Utf8
115 |
116 | #-- Send report by email
117 | #$Subject = "[ Report-$mounth ] Active Directory - Member Groups"
118 | #$SmtpServer = $config[11]
119 | #$Port = $config[13]
120 | #$From = $config[15]
121 | #$To = $config[17]
122 |
123 | #Send-MailMessage -From $From -To $To -Subject $Subject -Attachments $html,$csv -bodyashtml -Body $message -SmtpServer $SmtpServer -Port $Port
124 |
125 | cls
--------------------------------------------------------------------------------
/adrt.ps1:
--------------------------------------------------------------------------------
1 | <#
2 | .NAME
3 | ADRT - Active Directory Report Tool
4 | .DESCRIPTION
5 | List all Report Options
6 | .EXAMPLE
7 | PS C:\adrt> .\adrt.ps1
8 | .NOTES
9 | Name: Marcos Henrique
10 | E-mail: marcos@100security.com.br
11 | .LINK
12 | WebSite: http://www.100security.com.br
13 | Facebook: https://www.facebook.com/seguranca.da.informacao
14 | Twitter: https://twitter.com/100Security
15 | GitHub: https://www.github.com/100security
16 | Youtube: https://www.youtube.com/user/videos100security
17 | #>
18 |
19 | $directorypath = (Get-Item -Path ".\").FullName
20 | $config = "config\config.txt"
21 | $delete = "$directorypath\ad-reports"
22 |
23 | function Show-Menu
24 | {
25 | param (
26 | [string]$Title = 'ADRT'
27 | )
28 | cls
29 | Write-Host ""
30 | Write-Host " + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +"
31 | Write-Host " "
32 | Write-Host " ADRT - Active Directory Report Tool "
33 | Write-Host " "
34 | Write-Host " + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +"
35 | Write-Host " "
36 | Write-Host " [ 00 ] - Config Tool"
37 | Write-Host " [ 01 ] - All Users"
38 | Write-Host " [ 02 ] - Domain Admins"
39 | Write-Host " [ 03 ] - Enterprise Admins"
40 | Write-Host " [ 04 ] - Disabled Users"
41 | Write-Host " [ 05 ] - Last Logon"
42 | Write-Host " [ 06 ] - Password Never Expires"
43 | Write-Host " [ 07 ] - All Groups"
44 | Write-Host " [ 08 ] - All Member Groups"
45 | Write-Host " [ 09 ] - All OUs"
46 | Write-Host " [ 10 ] - All Computers"
47 | Write-Host " [ 11 ] - All Servers"
48 | Write-Host " [ 12 ] - Domain Controllers"
49 | Write-Host " [ 13 ] - All GPOs"
50 | Write-Host " [ 14 ] - Inventory"
51 | Write-Host " [ 15 ] - All Reports"
52 | Write-Host " [ 16 ] - Delete old Reports"
53 | Write-Host " [ 99 ] - Exit"
54 | Write-Host ""
55 | Write-Host " + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +"
56 | Write-Host ""
57 | }
58 | do
59 | {
60 | Show-Menu
61 | $input = Read-Host "Enter a number"
62 | switch ($input)
63 | { '00' {
64 | cls
65 | Invoke-Item $directorypath\$config
66 | } '01' {
67 | cls
68 | .\ad-users.ps1
69 | } '02' {
70 | cls
71 | .\ad-admins.ps1
72 | } '03' {
73 | cls
74 | .\ad-enterprise-admins.ps1
75 | } '04' {
76 | cls
77 | .\ad-disabled.ps1
78 | } '05' {
79 | cls
80 | .\ad-lastlogon.ps1
81 | } '06' {
82 | cls
83 | .\ad-neverexpires.ps1
84 | } '07' {
85 | cls
86 | .\ad-groups.ps1
87 | } '08' {
88 | cls
89 | .\ad-membergroups.ps1
90 | } '09' {
91 | cls
92 | .\ad-ous.ps1
93 | } '10' {
94 | cls
95 | .\ad-computers.ps1
96 | } '11' {
97 | cls
98 | .\ad-servers.ps1
99 | } '12' {
100 | cls
101 | .\ad-dcs.ps1
102 | } '13' {
103 | cls
104 | .\ad-gpos.ps1
105 | } '14' {
106 | cls
107 | .\ad-inventory.ps1
108 | } '15' {
109 | cls
110 | .\ad-all.ps1
111 | } '16' {
112 | cls
113 | Remove-Item $delete\ad-users\* -Recurse -Force
114 | Remove-Item $delete\ad-admins\* -Recurse -Force
115 | Remove-Item $delete\ad-enterprise-admins\* -Recurse -Force
116 | Remove-Item $delete\ad-disabled\* -Recurse -Force
117 | Remove-Item $delete\ad-lastlogon\* -Recurse -Force
118 | Remove-Item $delete\ad-neverexpires\* -Recurse -Force
119 | Remove-Item $delete\ad-groups\* -Recurse -Force
120 | Remove-Item $delete\ad-membergroups\* -Recurse -Force
121 | Remove-Item $delete\ad-ous\* -Recurse -Force
122 | Remove-Item $delete\ad-computers\* -Recurse -Force
123 | Remove-Item $delete\ad-servers\* -Recurse -Force
124 | Remove-Item $delete\ad-dcs\* -Recurse -Force
125 | Remove-Item $delete\ad-gpos\* -Recurse -Force
126 | Remove-Item $delete\ad-inventory\* -Recurse -Force
127 | Remove-Item $delete\ad-all\* -Recurse -Force
128 | } '99' {
129 | return
130 | }
131 | }
132 | Write-Host ""
133 | Write-Host " + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +"
134 | Write-Host " "
135 | Write-Host " Successfully executed!"
136 | Write-Host " "
137 | Write-Host " + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +"
138 | Write-Host " "
139 | pause
140 | }
141 | until ($input -eq '99')
--------------------------------------------------------------------------------
/ad-neverexpires.ps1:
--------------------------------------------------------------------------------
1 | <#
2 | .NAME
3 | ADRT - Active Directory Report Tool
4 | .DESCRIPTION
5 | Extract the complete list of all users that the Password Never Expires.
6 | .EXAMPLE
7 | PS C:\adrt> .\ad-neverexpires.ps1
8 | .NOTES
9 | Name: Marcos Henrique
10 | E-mail: marcos@100security.com.br
11 | .LINK
12 | WebSite: http://www.100security.com.br
13 | Facebook: https://www.facebook.com/seguranca.da.informacao
14 | Twitter: https://twitter.com/100Security
15 | GitHub: https://www.github.com/100security
16 | Youtube: https://www.youtube.com/user/videos100security
17 | #>
18 |
19 | $report = $null
20 | $table = $null
21 | $date = Get-Date -format "yyyy-MM-dd"
22 | $mounth = Get-Date -format "MMM"
23 | $directorypath = (Get-Item -Path ".\").FullName
24 | $path = "ad-reports\ad-neverexpires"
25 | #$html = "$path\ad-neverexpires-$date.html"
26 | #$csv = "$path\ad-neverexpires-$date.csv"
27 | $html = "$path\ad-neverexpires.html"
28 | $csv = "$path\ad-neverexpires.csv"
29 |
30 | #-- Password Never Expires
31 | $t_pne = (Get-ADUser -filter * -properties PasswordNeverExpires | where { $_.PasswordNeverExpires -eq "true" } | where {$_.enabled -eq "true"} ).count
32 | $domain = (Get-ADDomain).Forest
33 |
34 | # Config
35 | $config = Get-Content (JOIN-PATH $directorypath "config\config.txt")
36 | $company = $config[7]
37 | $owner = $config[9]
38 |
39 | #-- Import Module
40 | Import-Module ActiveDirectory
41 |
42 | #-- Show Total
43 | $table += "Password Never Expires: $t_pne "
44 |
45 | #-- Filter
46 | $neverexpires = @(Get-ADUser -filter * -properties PasswordNeverExpires | where { $_.PasswordNeverExpires -eq "true" } | where {$_.enabled -eq "true"} )
47 |
48 | $result = @($neverexpires | Select-Object Name, SamAccountName)
49 |
50 | #-- Order by (A-Z)
51 | $result = $result | Sort "Name"
52 |
53 | #-- Display result on screen
54 | #$result | ft -auto
55 |
56 | $table += $result | ConvertTo-Html -Fragment
57 |
58 | $format=
59 | "
60 |
61 |
62 | $company
63 |
70 | "
71 | $title=
72 | "
73 |
74 |
75 |
76 | Active Directory - Password Never Expires
77 | Company: $company - Domain: $domain - Date: $date - Owner: $owner
78 |
79 |
80 |
81 |
82 |
83 | "
84 | $footer=
85 | "
86 |
87 |
88 |
89 |
90 | ADRT - Active Directory Report Tool
91 |
92 |
93 |
94 | "
95 | $message = ""
101 | $message = $message + ""
102 | $message = $message + "Active Directory "
103 | $message = $message + "Description Total "
104 | $message = $message + "Password Users Never Expires $t_pne "
105 | $message = $message + "Information Security "
106 | $message = $message + "
"
107 |
108 | $report = $format + $title + $table + $footer
109 |
110 | #-- Generate HTML file
111 | $report | Out-File $html -Encoding Utf8
112 |
113 | #-- Export to CSV
114 | $result | Sort Company | Export-Csv $csv -NoTypeInformation -Encoding Utf8
115 |
116 | #-- Send report by email
117 | #$Subject = "[ Report-$mounth ] Active Directory - Password Never Expires"
118 | #$SmtpServer = $config[11]
119 | #$Port = $config[13]
120 | #$From = $config[15]
121 | #$To = $config[17]
122 |
123 | #Send-MailMessage -From $From -To $To -Subject $Subject -Attachments $html,$csv -bodyashtml -Body $message -SmtpServer $SmtpServer -Port $Port
124 |
125 | cls
--------------------------------------------------------------------------------
/ad-lastlogon.ps1:
--------------------------------------------------------------------------------
1 | <#
2 | .NAME
3 | ADRT - Active Directory Report Tool
4 | .DESCRIPTION
5 | Extract the complete list of Last Logon.
6 | .EXAMPLE
7 | PS C:\adrt> .\ad-lastlogon.ps1
8 | .NOTES
9 | Name: Marcos Henrique
10 | E-mail: marcos@100security.com.br
11 | .LINK
12 | WebSite: http://www.100security.com.br
13 | Facebook: https://www.facebook.com/seguranca.da.informacao
14 | Twitter: https://twitter.com/100Security
15 | GitHub: https://www.github.com/100security
16 | Youtube: https://www.youtube.com/user/videos100security
17 | #>
18 |
19 | $report = $null
20 | $table = $null
21 | $date = Get-Date -format "yyyy-MM-dd"
22 | $mounth = Get-Date -format "MMM"
23 | $directorypath = (Get-Item -Path ".\").FullName
24 | $path = "ad-reports\ad-lastlogon"
25 | #$html = "$path\ad-lastlogon-$date.html"
26 | #$csv = "$path\ad-lastlogon-$date.csv"
27 | $html = "$path\ad-lastlogon.html"
28 | $csv = "$path\ad-lastlogon.csv"
29 |
30 | #-- Last Logon
31 | $days = 90
32 | $timestamp = (Get-Date).Adddays(-($days))
33 | $t_ll = (Get-ADUser -Filter {LastLogonTimeStamp -lt $timestamp -and enabled -eq $true} -Properties LastLogonTimeStamp).count
34 | $domain = (Get-ADDomain).Forest
35 |
36 | # Config
37 | $config = Get-Content (JOIN-PATH $directorypath "config\config.txt")
38 | $company = $config[7]
39 | $owner = $config[9]
40 |
41 | #-- Import Module
42 | Import-Module ActiveDirectory
43 |
44 | #-- Show Total
45 | $table += "Total Last Logon: $t_ll "
46 |
47 | #-- Filter
48 | $lastlogon = @(Get-ADUser -Filter {LastLogonTimeStamp -lt $timestamp -and enabled -eq $true} -Properties *)
49 |
50 | $result = @($lastlogon | select-object Name, SamAccountName, @{Label="LastLogon"; Expression={[DateTime]::FromFileTime($_.lastLogonTimestamp).ToString('yyyy/MM/dd hh:mm:ss')}}, Info)
51 |
52 | #-- Order by (A-Z)
53 | $result = $result | Sort "LastLogon"
54 |
55 | #-- Display result on screen
56 | #$result | ft -auto
57 |
58 | $table += $result | ConvertTo-Html -Fragment
59 |
60 | $format=
61 | "
62 |
63 |
64 | $company
65 |
72 | "
73 | $title=
74 | "
75 |
76 |
77 |
78 | Active Directory - Last Logon
79 | Company: $company - Domain: $domain - Date: $date - Owner: $owner
80 |
81 |
82 |
83 |
84 |
85 | "
86 | $footer=
87 | "
88 |
89 |
90 |
91 |
92 | ADRT - Active Directory Report Tool
93 |
94 |
95 |
96 | "
97 | $message = ""
103 | $message = $message + ""
104 | $message = $message + "Active Directory "
105 | $message = $message + "Description Total "
106 | $message = $message + "Last Logon $days days $t_ll "
107 | $message = $message + "Information Security "
108 | $message = $message + "
"
109 |
110 | $report = $format + $title + $table + $footer
111 |
112 | #-- Generate HTML file
113 | $report | Out-File $html -Encoding Utf8
114 |
115 | #-- Export to CSV
116 | $result | Sort Company | Export-Csv $csv -NoTypeInformation -Encoding Utf8
117 |
118 | #-- Send report by email
119 | #$Subject = "[ Report-$mounth ] Active Directory - Last Logon $days days"
120 | #$SmtpServer = $config[11]
121 | #$Port = $config[13]
122 | #$From = $config[15]
123 | #$To = $config[17]
124 |
125 | #Send-MailMessage -From $From -To $To -Subject $Subject -Attachments $html,$csv -bodyashtml -Body $message -SmtpServer $SmtpServer -Port $Port
126 |
127 | cls
--------------------------------------------------------------------------------
/ad-gpos.ps1:
--------------------------------------------------------------------------------
1 | <#
2 | .NAME
3 | ADRT - Active Directory Report Tool
4 | .DESCRIPTION
5 | Extract the complete list of All GPOs.
6 | .EXAMPLE
7 | PS C:\adrt> .\ad-gpos.ps1
8 | .NOTES
9 | Name: Marcos Henrique
10 | E-mail: marcos@100security.com.br
11 | .LINK
12 | WebSite: http://www.100security.com.br
13 | Facebook: https://www.facebook.com/seguranca.da.informacao
14 | Twitter: https://twitter.com/100Security
15 | GitHub: https://www.github.com/100security
16 | Youtube: https://www.youtube.com/user/videos100security
17 | #>
18 |
19 | $report = $null
20 | $table = $null
21 | $date = Get-Date -format "yyyy-MM-dd"
22 | $mounth = Get-Date -format "MMM"
23 | $directorypath = (Get-Item -Path ".\").FullName
24 | $path = "ad-reports\ad-gpos"
25 | #$html = "$path\ad-gpos-$date.html"
26 | #$csv = "ad-reports\ad-gpos\ad-gpos-$date.csv"
27 | #$zip = "$path\gpos-html-$date.zip"
28 | #new-item -type directory -path "$path\gpos-html-$date" -Force
29 | #$gpos_html = "$path\gpos-html-$date\"
30 | $html = "$path\ad-gpos.html"
31 | $csv = "ad-reports\ad-gpos\ad-gpos.csv"
32 | $zip = "$path\gpos-html.zip"
33 | new-item -type directory -path "$path\gpos-html" -Force
34 | $gpos_html = "$path\gpos-html\"
35 |
36 | #-- All GPOs
37 | $t_gpos = (Get-GPO -All).count
38 | $domain = (Get-ADDomain).Forest
39 |
40 | # Config
41 | $config = Get-Content (JOIN-PATH $directorypath "config\config.txt")
42 | $company = $config[7]
43 | $owner = $config[9]
44 |
45 | #-- Import Module
46 | Import-Module ActiveDirectory
47 |
48 | #-- Show Total
49 | $table += "Total GPOs: $t_gpos "
50 |
51 | #-- Filter
52 | $gpos = @(Get-GPO -All | Select DisplayName, Owner, CreationTime, ModificationTime)
53 |
54 | #Get-GPO -All | Select DisplayName, Owner, CreationTime, ModificationTime | % {$_.GenerateReport('html') | Out-File html\"$($_.DisplayName).htm"}
55 | Get-GPO -All | % {$_.GenerateReport('html') | Out-File $gpos_html\"$($_.DisplayName).htm"}
56 |
57 |
58 | $result = @($gpos | Select-Object DisplayName, Owner, CreationTime, ModificationTime)
59 |
60 | #-- Order by (A-Z)
61 | $result = $result | Sort "DisplayName"
62 |
63 | #-- Display result on screen
64 | #$result | ft -auto
65 |
66 | $table += $result | ConvertTo-Html -Fragment
67 |
68 | $format=
69 | "
70 |
71 |
72 | $company
73 |
80 | "
81 | $title=
82 | "
83 |
84 |
85 |
86 | Active Directory - All GPOs
87 | Company: $company - Domain: $domain - Date: $date - Owner: $owner
88 |
89 |
90 |
91 |
92 |
93 | "
94 | $footer=
95 | "
96 |
97 | View GPOs
98 |
99 |
100 |
101 |
102 | ADRT - Active Directory Report Tool
103 |
104 |
105 |
106 | "
107 | $message = ""
113 | $message = $message + ""
114 | $message = $message + "Active Directory "
115 | $message = $message + "Description Total "
116 | $message = $message + "Total GPOs $t_gpos "
117 | $message = $message + "Information Security "
118 | $message = $message + "
"
119 |
120 | $report = $format + $title + $table + $footer
121 |
122 | #-- Generate HTML file
123 | $report | Out-File $html -Encoding Utf8
124 |
125 | #-- Compact GOPs (ad-gpos-$date.zip)
126 | Compress-Archive -Path $gpos_html -DestinationPath $path\gpos-html.zip -Force
127 |
128 | #-- Export to CSV
129 | $result | Sort Company | Export-Csv $csv -NoTypeInformation -Encoding Utf8
130 |
131 | #-- Send report by email
132 | #$Subject = "[ Report-$mounth ] Active Directory - All GPOs"
133 | #$SmtpServer = $config[11]
134 | #$Port = $config[13]
135 | #$From = $config[15]
136 | #$To = $config[17]
137 |
138 | #Send-MailMessage -From $From -To $To -Subject $Subject -Attachments $html,$csv,$zip -bodyashtml -Body $message -SmtpServer $SmtpServer -Port $Port
139 |
140 | cls
--------------------------------------------------------------------------------
/ad-reports/ad-groups/ad-groups.csv:
--------------------------------------------------------------------------------
1 | "Name","Description"
2 | "Print Operators","Members can administer domain printers"
3 | "Pre-Windows 2000 Compatible Access","A backward compatibility group which allows read access on all users and groups in the domain"
4 | "RAS and IAS Servers","Servers in this group can access remote access properties of users"
5 | "RDS Management Servers","Servers in this group can perform routine administrative actions on servers running Remote Desktop Services. This group needs to be populated on all servers in a Remote Desktop Services deployment. The servers running the RDS Central Management service must be included in this group."
6 | "RDS Endpoint Servers","Servers in this group run virtual machines and host sessions where users RemoteApp programs and personal virtual desktops run. This group needs to be populated on servers running RD Connection Broker. RD Session Host servers and RD Virtualization Host servers used in the deployment need to be in this group."
7 | "Performance Monitor Users","Members of this group can access performance counter data locally and remotely"
8 | "IIS_IUSRS","Built-in group used by Internet Information Services."
9 | "Hyper-V Administrators","Members of this group have complete and unrestricted access to all features of Hyper-V."
10 | "Incoming Forest Trust Builders","Members of this group can create incoming, one-way trusts to this forest"
11 | "Performance Log Users","Members of this group may schedule logging of performance counters, enable trace providers, and collect event traces both locally and via remote access to this computer"
12 | "Network Configuration Operators","Members in this group can have some administrative privileges to manage configuration of networking features"
13 | "Terminal Server License Servers","Members of this group can update user accounts in Active Directory with information about license issuance, for the purpose of tracking and reporting TS Per User CAL usage"
14 | "Server Operators","Members can administer domain servers"
15 | "Users","Users are prevented from making accidental or intentional system-wide changes and can run most applications"
16 | "WinRMRemoteWMIUsers__","Members of this group can access WMI resources over management protocols (such as WS-Management via the Windows Remote Management service). This applies only to WMI namespaces that grant access to the user."
17 | "Windows Authorization Access Group","Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects"
18 | "Schema Admins","Designated administrators of the schema"
19 | "Read-only Domain Controllers","Members of this group are Read-Only Domain Controllers in the domain"
20 | "RDS Remote Access Servers","Servers in this group enable users of RemoteApp programs and personal virtual desktops access to these resources. In Internet-facing deployments, these servers are typically deployed in an edge network. This group needs to be populated on servers running RD Connection Broker. RD Gateway servers and RD Web Access servers used in the deployment need to be in this group."
21 | "Remote Desktop Users","Members in this group are granted the right to logon remotely"
22 | "Replicator","Supports file replication in a domain"
23 | "Remote Management Users","Members of this group can access WMI resources over management protocols (such as WS-Management via the Windows Remote Management service). This applies only to WMI namespaces that grant access to the user."
24 | "Guests","Guests have the same access as members of the Users group by default, except for the Guest account which is further restricted"
25 | "Cloneable Domain Controllers","Members of this group that are domain controllers may be cloned."
26 | "Certificate Service DCOM Access","Members of this group are allowed to connect to Certification Authorities in the enterprise"
27 | "Cryptographic Operators","Members are authorized to perform cryptographic operations."
28 | "Distributed COM Users","Members are allowed to launch, activate and use Distributed COM objects on this machine."
29 | "Denied RODC Password Replication Group","Members in this group cannot have their passwords replicated to any read-only domain controllers in the domain"
30 | "Cert Publishers","Members of this group are permitted to publish certificates to the directory"
31 | "Account Operators","Members can administer domain user and group accounts"
32 | "Access Control Assistance Operators","Members of this group can remotely query authorization attributes and permissions for resources on this computer."
33 | "Administrators","Administrators have complete and unrestricted access to the computer/domain"
34 | "Backup Operators","Backup Operators can override security restrictions for the sole purpose of backing up or restoring files"
35 | "Allowed RODC Password Replication Group","Members in this group can have their passwords replicated to all read-only domain controllers in the domain"
36 | "Enterprise Admins","Designated administrators of the enterprise"
37 | "Domain Users","All domain users"
38 | "Enterprise Read-only Domain Controllers","Members of this group are Read-Only Domain Controllers in the enterprise"
39 | "Group Policy Creator Owners","Members in this group can modify group policy for the domain"
40 | "Event Log Readers","Members of this group can read event logs from local machine"
41 | "Domain Guests","All domain guests"
42 | "DnsUpdateProxy","DNS clients who are permitted to perform dynamic updates on behalf of some other clients (such as DHCP servers)."
43 | "DnsAdmins","DNS Administrators Group"
44 | "Domain Admins","Designated administrators of the domain"
45 | "Domain Controllers","All domain controllers in the domain"
46 | "Domain Computers","All workstations and servers joined to the domain"
47 |
--------------------------------------------------------------------------------
/ad-users.ps1:
--------------------------------------------------------------------------------
1 | <#
2 | .NAME
3 | ADRT - Active Directory Report Tool
4 | .DESCRIPTION
5 | Extract the complete list of All Users.
6 | .EXAMPLE
7 | PS C:\adrt> .\ad-users.ps1
8 | .NOTES
9 | Name: Marcos Henrique
10 | E-mail: marcos@100security.com.br
11 | .LINK
12 | WebSite: http://www.100security.com.br
13 | Facebook: https://www.facebook.com/seguranca.da.informacao
14 | Twitter: https://twitter.com/100Security
15 | GitHub: https://www.github.com/100security
16 | Youtube: https://www.youtube.com/user/videos100security
17 | #>
18 |
19 | $report = $null
20 | $table = $null
21 | $date = Get-Date -format "yyyy-MM-dd"
22 | $mounth = Get-Date -format "MMM"
23 | $directorypath = (Get-Item -Path ".\").FullName
24 | $path = "ad-reports\ad-users"
25 | #$html = "$path\ad-users-$date.html"
26 | #$csv = "$path\ad-users-$date.csv"
27 | $html = "$path\ad-users.html"
28 | $csv = "$path\ad-users.csv"
29 |
30 | #-- All Users
31 | $t_u = (Get-ADUser -filter *).count
32 | #-- PasswordNeverExpires
33 | $t_pne = (Get-ADUser -filter * -properties PasswordNeverExpires | where { $_.PasswordNeverExpires -eq "true" } | where {$_.enabled -eq "true"} ).count
34 | #-- Disabled Users
35 | $t_du = (Search-ADAccount -AccountDisabled).count
36 | $domain = (Get-ADDomain).Forest
37 |
38 | # Config
39 | $config = Get-Content (JOIN-PATH $directorypath "config\config.txt")
40 | $company = $config[7]
41 | $owner = $config[9]
42 |
43 | #-- Import Module
44 | Import-Module ActiveDirectory
45 |
46 | #-- Show Total
47 | $table += "Total Users: $t_u - PasswordNeverExpires: $t_pne - Disabled Users: $t_du "
48 |
49 | #-- Filter
50 | $users = @(Get-ADUser -filter * -Properties Company, St, SamAccountName, Name, Mail, Department, Title, PasswordNeverExpires, Enabled, Created, Modified, Info)
51 |
52 | $result = @($users | Select-Object Company, St, SamAccountName, Name, Mail, Department, Title, PasswordNeverExpires, Enabled, Created, Modified, Info)
53 |
54 | #-- Order by (A-Z)
55 | $a = 'Company'
56 | $b = 'St'
57 | $c = 'Department'
58 | $d = 'Info'
59 | $order = ($a | Sort-Object), ($b | Sort-Object), ($c | Sort-Object), ($d | Sort-Object)
60 | $result = $result | Sort $order
61 |
62 | #-- Display result on screen
63 | #$result | ft -auto
64 |
65 | $table += $result | ConvertTo-Html -Fragment
66 |
67 | $format=
68 | "
69 |
70 |
71 | $company
72 |
79 | "
80 | $title=
81 | "
82 |
83 |
84 |
85 | Active Directory - All Users
86 | Company: $company - Domain: $domain - Date: $date - Owner: $owner
87 |
88 |
89 |
90 |
91 |
92 | "
93 | $footer=
94 | "
95 |
96 |
97 |
98 |
99 | ADRT - Active Directory Report Tool
100 |
101 |
102 |
103 | "
104 | $message = ""
110 | $message = $message + ""
111 | $message = $message + "Active Directory "
112 | $message = $message + "Description Total "
113 | $message = $message + "Total Users $t_u "
114 | $message = $message + "Password Users Never Expires $t_pne "
115 | $message = $message + "Disabled Users $t_du "
116 | $message = $message + "Information Security "
117 | $message = $message + "
"
118 |
119 | $report = $format + $title + $table + $footer
120 |
121 | #-- Generate HTML file
122 | $report | Out-File $html -Encoding Utf8
123 |
124 | #-- Export to CSV
125 | $result | Sort Company | Export-Csv $csv -NoTypeInformation -Encoding Utf8
126 |
127 | #-- Send report by email
128 | #$Subject = "[ Report-$mounth ] Active Directory - All Users"
129 | #$SmtpServer = $config[11]
130 | #$Port = $config[13]
131 | #$From = $config[15]
132 | #$To = $config[17]
133 |
134 | #Send-MailMessage -From $From -To $To -Subject $Subject -Attachments $html,$csv -bodyashtml -Body $message -SmtpServer $SmtpServer -Port $Port
135 |
136 | cls
--------------------------------------------------------------------------------
/ad-reports/ad-groups/ad-groups-2018-7-9.csv:
--------------------------------------------------------------------------------
1 | "Name","Description"
2 | "Performance Monitor Users","Members of this group can access performance counter data locally and remotely"
3 | "Performance Log Users","Members of this group may schedule logging of performance counters, enable trace providers, and collect event traces both locally and via remote access to this computer"
4 | "Network Configuration Operators","Members in this group can have some administrative privileges to manage configuration of networking features"
5 | "RAS and IAS Servers","Servers in this group can access remote access properties of users"
6 | "Print Operators","Members can administer domain printers"
7 | "Pre-Windows 2000 Compatible Access","A backward compatibility group which allows read access on all users and groups in the domain"
8 | "IIS_IUSRS","Built-in group used by Internet Information Services."
9 | "Hyper-V Administrators","Members of this group have complete and unrestricted access to all features of Hyper-V."
10 | "Guests","Guests have the same access as members of the Users group by default, except for the Guest account which is further restricted"
11 | "Microsoft","Microsoft Group"
12 | "McAfee","McAfee Group"
13 | "Incoming Forest Trust Builders","Members of this group can create incoming, one-way trusts to this forest"
14 | "RDS Endpoint Servers","Servers in this group run virtual machines and host sessions where users RemoteApp programs and personal virtual desktops run. This group needs to be populated on servers running RD Connection Broker. RD Session Host servers and RD Virtualization Host servers used in the deployment need to be in this group."
15 | "Terminal Server License Servers","Members of this group can update user accounts in Active Directory with information about license issuance, for the purpose of tracking and reporting TS Per User CAL usage"
16 | "Server Operators","Members can administer domain servers"
17 | "Schema Admins","Designated administrators of the schema"
18 | "WinRMRemoteWMIUsers__","Members of this group can access WMI resources over management protocols (such as WS-Management via the Windows Remote Management service). This applies only to WMI namespaces that grant access to the user."
19 | "Windows Authorization Access Group","Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects"
20 | "Users","Users are prevented from making accidental or intentional system-wide changes and can run most applications"
21 | "Read-only Domain Controllers","Members of this group are Read-Only Domain Controllers in the domain"
22 | "RDS Remote Access Servers","Servers in this group enable users of RemoteApp programs and personal virtual desktops access to these resources. In Internet-facing deployments, these servers are typically deployed in an edge network. This group needs to be populated on servers running RD Connection Broker. RD Gateway servers and RD Web Access servers used in the deployment need to be in this group."
23 | "RDS Management Servers","Servers in this group can perform routine administrative actions on servers running Remote Desktop Services. This group needs to be populated on all servers in a Remote Desktop Services deployment. The servers running the RDS Central Management service must be included in this group."
24 | "Replicator","Supports file replication in a domain"
25 | "Remote Management Users","Members of this group can access WMI resources over management protocols (such as WS-Management via the Windows Remote Management service). This applies only to WMI namespaces that grant access to the user."
26 | "Remote Desktop Users","Members in this group are granted the right to logon remotely"
27 | "Certificate Service DCOM Access","Members of this group are allowed to connect to Certification Authorities in the enterprise"
28 | "Cert Publishers","Members of this group are permitted to publish certificates to the directory"
29 | "Backup Operators","Backup Operators can override security restrictions for the sole purpose of backing up or restoring files"
30 | "Denied RODC Password Replication Group","Members in this group cannot have their passwords replicated to any read-only domain controllers in the domain"
31 | "Cryptographic Operators","Members are authorized to perform cryptographic operations."
32 | "Cloneable Domain Controllers","Members of this group that are domain controllers may be cloned."
33 | "Account Operators","Members can administer domain user and group accounts"
34 | "Access Control Assistance Operators","Members of this group can remotely query authorization attributes and permissions for resources on this computer."
35 | "100Security","100security Group"
36 | "Apple","Apple Group"
37 | "Allowed RODC Password Replication Group","Members in this group can have their passwords replicated to all read-only domain controllers in the domain"
38 | "Administrators","Administrators have complete and unrestricted access to the computer/domain"
39 | "Distributed COM Users","Members are allowed to launch, activate and use Distributed COM objects on this machine."
40 | "Enterprise Read-only Domain Controllers","Members of this group are Read-Only Domain Controllers in the enterprise"
41 | "Enterprise Admins","Designated administrators of the enterprise"
42 | "Domain Users","All domain users"
43 | "Group Policy Creator Owners","Members in this group can modify group policy for the domain"
44 | "Facebook","Facebook Group"
45 | "Event Log Readers","Members of this group can read event logs from local machine"
46 | "Domain Admins","Designated administrators of the domain"
47 | "DnsUpdateProxy","DNS clients who are permitted to perform dynamic updates on behalf of some other clients (such as DHCP servers)."
48 | "DnsAdmins","DNS Administrators Group"
49 | "Domain Guests","All domain guests"
50 | "Domain Controllers","All domain controllers in the domain"
51 | "Domain Computers","All workstations and servers joined to the domain"
52 |
--------------------------------------------------------------------------------
/ad-reports/ad-membergroups/ad-membergroups.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - All Member Groups
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2019-07-06 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total Groups: 45 Name MemberOf Members Access Control Assistance Operators Account Operators Administrators CN=Domain Admins,CN=Users,DC=100security,DC=local
24 | CN=Enterprise Admins,CN=Users,DC=100security,DC=local
25 | CN=Administrator,CN=Users,DC=100security,DC=local
26 | Allowed RODC Password Replication Group Backup Operators Cert Publishers CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
27 | Certificate Service DCOM Access Cloneable Domain Controllers Cryptographic Operators Denied RODC Password Replication Group CN=Read-only Domain Controllers,CN=Users,DC=100security,DC=local
28 | CN=Group Policy Creator Owners,CN=Users,DC=100security,DC=local
29 | CN=Domain Admins,CN=Users,DC=100security,DC=local
30 | CN=Cert Publishers,CN=Users,DC=100security,DC=local
31 | CN=Enterprise Admins,CN=Users,DC=100security,DC=local
32 | CN=Schema Admins,CN=Users,DC=100security,DC=local
33 | CN=Domain Controllers,CN=Users,DC=100security,DC=local
34 | CN=krbtgt,CN=Users,DC=100security,DC=local
35 | Distributed COM Users DnsAdmins DnsUpdateProxy Domain Admins CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
36 | CN=Administrators,CN=Builtin,DC=100security,DC=local
37 | CN=Marcos Henrique,CN=Users,DC=100security,DC=local
38 | CN=Administrator,CN=Users,DC=100security,DC=local
39 | Domain Computers Domain Controllers CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
40 | Domain Guests CN=Guests,CN=Builtin,DC=100security,DC=local
41 | Domain Users CN=Users,CN=Builtin,DC=100security,DC=local
42 | Enterprise Admins CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
43 | CN=Administrators,CN=Builtin,DC=100security,DC=local
44 | CN=Administrator,CN=Users,DC=100security,DC=local
45 | Enterprise Read-only Domain Controllers Event Log Readers Group Policy Creator Owners CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
46 | CN=Administrator,CN=Users,DC=100security,DC=local
47 | Guests CN=Domain Guests,CN=Users,DC=100security,DC=local
48 | CN=Guest,CN=Users,DC=100security,DC=local
49 | Hyper-V Administrators IIS_IUSRS CN=S-1-5-17,CN=ForeignSecurityPrincipals,DC=100security,DC=local
50 | Incoming Forest Trust Builders Network Configuration Operators Performance Log Users Performance Monitor Users Pre-Windows 2000 Compatible Access CN=S-1-5-11,CN=ForeignSecurityPrincipals,DC=100security,DC=local
51 | Print Operators RAS and IAS Servers RDS Endpoint Servers RDS Management Servers RDS Remote Access Servers Read-only Domain Controllers CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
52 | Remote Desktop Users Remote Management Users Replicator Schema Admins CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
53 | CN=Administrator,CN=Users,DC=100security,DC=local
54 | Server Operators Terminal Server License Servers Users CN=Domain Users,CN=Users,DC=100security,DC=local
55 | CN=S-1-5-11,CN=ForeignSecurityPrincipals,DC=100security,DC=local
56 | CN=S-1-5-4,CN=ForeignSecurityPrincipals,DC=100security,DC=local
57 | CN=Administrator,CN=Users,DC=100security,DC=local
58 | Windows Authorization Access Group CN=S-1-5-9,CN=ForeignSecurityPrincipals,DC=100security,DC=local
59 | WinRMRemoteWMIUsers__
60 |
61 |
62 |
63 |
64 | ADRT - Active Directory Report Tool
65 |
66 |
67 |
68 |
69 |
--------------------------------------------------------------------------------
/ad-reports/ad-membergroups/ad-membergroups-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - Member Groups
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total Groups: 50 Name MemberOf Members 100Security CN=Marcos Henrique,OU=100Security,OU=Empresas,DC=100security,DC=local
24 | Access Control Assistance Operators Account Operators Administrators CN=Administrator,CN=Users,DC=100security,DC=local
25 | CN=Enterprise Admins,CN=Users,DC=100security,DC=local
26 | CN=Domain Admins,CN=Users,DC=100security,DC=local
27 | Allowed RODC Password Replication Group Apple CN=Steve Jobs,OU=Apple,OU=Empresas,DC=100security,DC=local
28 | Backup Operators Cert Publishers CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
29 | Certificate Service DCOM Access Cloneable Domain Controllers Cryptographic Operators Denied RODC Password Replication Group CN=Read-only Domain Controllers,CN=Users,DC=100security,DC=local
30 | CN=Domain Controllers,CN=Users,DC=100security,DC=local
31 | CN=krbtgt,CN=Users,DC=100security,DC=local
32 | CN=Group Policy Creator Owners,CN=Users,DC=100security,DC=local
33 | CN=Enterprise Admins,CN=Users,DC=100security,DC=local
34 | CN=Schema Admins,CN=Users,DC=100security,DC=local
35 | CN=Domain Admins,CN=Users,DC=100security,DC=local
36 | CN=Cert Publishers,CN=Users,DC=100security,DC=local
37 | Distributed COM Users DnsAdmins DnsUpdateProxy Domain Admins CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
38 | CN=Administrators,CN=Builtin,DC=100security,DC=local
39 | CN=Administrator,CN=Users,DC=100security,DC=local
40 | Domain Computers Domain Controllers CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
41 | Domain Guests CN=Guests,CN=Builtin,DC=100security,DC=local
42 | Domain Users CN=Users,CN=Builtin,DC=100security,DC=local
43 | Enterprise Admins CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
44 | CN=Administrators,CN=Builtin,DC=100security,DC=local
45 | CN=Administrator,CN=Users,DC=100security,DC=local
46 | Enterprise Read-only Domain Controllers Event Log Readers Facebook CN=Mark Zuckerberg,OU=Facebook,OU=Empresas,DC=100security,DC=local
47 | Group Policy Creator Owners CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
48 | CN=Administrator,CN=Users,DC=100security,DC=local
49 | Guests CN=Domain Guests,CN=Users,DC=100security,DC=local
50 | CN=Guest,CN=Users,DC=100security,DC=local
51 | Hyper-V Administrators IIS_IUSRS CN=S-1-5-17,CN=ForeignSecurityPrincipals,DC=100security,DC=local
52 | Incoming Forest Trust Builders McAfee CN=John McAfee,OU=McAfee,OU=Empresas,DC=100security,DC=local
53 | Microsoft CN=Bill Gates,OU=Microsoft,OU=Empresas,DC=100security,DC=local
54 | Network Configuration Operators Performance Log Users Performance Monitor Users Pre-Windows 2000 Compatible Access CN=S-1-5-11,CN=ForeignSecurityPrincipals,DC=100security,DC=local
55 | Print Operators RAS and IAS Servers RDS Endpoint Servers RDS Management Servers RDS Remote Access Servers Read-only Domain Controllers CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
56 | Remote Desktop Users Remote Management Users Replicator Schema Admins CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
57 | CN=Administrator,CN=Users,DC=100security,DC=local
58 | Server Operators Terminal Server License Servers Users CN=S-1-5-4,CN=ForeignSecurityPrincipals,DC=100security,DC=local
59 | CN=S-1-5-11,CN=ForeignSecurityPrincipals,DC=100security,DC=local
60 | CN=Domain Users,CN=Users,DC=100security,DC=local
61 | Windows Authorization Access Group CN=S-1-5-9,CN=ForeignSecurityPrincipals,DC=100security,DC=local
62 | WinRMRemoteWMIUsers__
63 |
64 |
65 |
66 |
67 | ADRT - Active Directory Report Tool
68 |
69 |
70 |
71 |
72 |
--------------------------------------------------------------------------------
/ad-reports/ad-all/ad-2018-7-9/ad-membergroups-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - Member Groups
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total Groups: 50 Name MemberOf Members 100Security CN=Marcos Henrique,OU=100Security,OU=Empresas,DC=100security,DC=local
24 | Access Control Assistance Operators Account Operators Administrators CN=Administrator,CN=Users,DC=100security,DC=local
25 | CN=Enterprise Admins,CN=Users,DC=100security,DC=local
26 | CN=Domain Admins,CN=Users,DC=100security,DC=local
27 | Allowed RODC Password Replication Group Apple CN=Steve Jobs,OU=Apple,OU=Empresas,DC=100security,DC=local
28 | Backup Operators Cert Publishers CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
29 | Certificate Service DCOM Access Cloneable Domain Controllers Cryptographic Operators Denied RODC Password Replication Group CN=Read-only Domain Controllers,CN=Users,DC=100security,DC=local
30 | CN=Domain Controllers,CN=Users,DC=100security,DC=local
31 | CN=krbtgt,CN=Users,DC=100security,DC=local
32 | CN=Group Policy Creator Owners,CN=Users,DC=100security,DC=local
33 | CN=Enterprise Admins,CN=Users,DC=100security,DC=local
34 | CN=Schema Admins,CN=Users,DC=100security,DC=local
35 | CN=Domain Admins,CN=Users,DC=100security,DC=local
36 | CN=Cert Publishers,CN=Users,DC=100security,DC=local
37 | Distributed COM Users DnsAdmins DnsUpdateProxy Domain Admins CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
38 | CN=Administrators,CN=Builtin,DC=100security,DC=local
39 | CN=Administrator,CN=Users,DC=100security,DC=local
40 | Domain Computers Domain Controllers CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
41 | Domain Guests CN=Guests,CN=Builtin,DC=100security,DC=local
42 | Domain Users CN=Users,CN=Builtin,DC=100security,DC=local
43 | Enterprise Admins CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
44 | CN=Administrators,CN=Builtin,DC=100security,DC=local
45 | CN=Administrator,CN=Users,DC=100security,DC=local
46 | Enterprise Read-only Domain Controllers Event Log Readers Facebook CN=Mark Zuckerberg,OU=Facebook,OU=Empresas,DC=100security,DC=local
47 | Group Policy Creator Owners CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
48 | CN=Administrator,CN=Users,DC=100security,DC=local
49 | Guests CN=Domain Guests,CN=Users,DC=100security,DC=local
50 | CN=Guest,CN=Users,DC=100security,DC=local
51 | Hyper-V Administrators IIS_IUSRS CN=S-1-5-17,CN=ForeignSecurityPrincipals,DC=100security,DC=local
52 | Incoming Forest Trust Builders McAfee CN=John McAfee,OU=McAfee,OU=Empresas,DC=100security,DC=local
53 | Microsoft CN=Bill Gates,OU=Microsoft,OU=Empresas,DC=100security,DC=local
54 | Network Configuration Operators Performance Log Users Performance Monitor Users Pre-Windows 2000 Compatible Access CN=S-1-5-11,CN=ForeignSecurityPrincipals,DC=100security,DC=local
55 | Print Operators RAS and IAS Servers RDS Endpoint Servers RDS Management Servers RDS Remote Access Servers Read-only Domain Controllers CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
56 | Remote Desktop Users Remote Management Users Replicator Schema Admins CN=Denied RODC Password Replication Group,CN=Users,DC=100security,DC=local
57 | CN=Administrator,CN=Users,DC=100security,DC=local
58 | Server Operators Terminal Server License Servers Users CN=S-1-5-4,CN=ForeignSecurityPrincipals,DC=100security,DC=local
59 | CN=S-1-5-11,CN=ForeignSecurityPrincipals,DC=100security,DC=local
60 | CN=Domain Users,CN=Users,DC=100security,DC=local
61 | Windows Authorization Access Group CN=S-1-5-9,CN=ForeignSecurityPrincipals,DC=100security,DC=local
62 | WinRMRemoteWMIUsers__
63 |
64 |
65 |
66 |
67 | ADRT - Active Directory Report Tool
68 |
69 |
70 |
71 |
72 |
--------------------------------------------------------------------------------
/web/js/100security.js:
--------------------------------------------------------------------------------
1 | //by: Marcos Henrique
2 | //Site: www.100security.com.br
3 |
4 | var data = new Date();
5 | var ano = data.getFullYear();
6 | var mes = (data.getMonth() +1);
7 | var dia = data.getDate();
8 |
9 | var href = document.getElementById('data').getAttribute('href');
10 | href = href.split('.');
11 | document.getElementById('data').setAttribute('href' , href[0] + ano + '-' + mes + '-' + dia + '.' + href[1] );
12 |
13 | var data2 = new Date();
14 | var ano = data2.getFullYear();
15 | var mes = (data2.getMonth() +1);
16 | var dia = data2.getDate();
17 |
18 | var href = document.getElementById('data2').getAttribute('href');
19 | href = href.split('.');
20 | document.getElementById('data2').setAttribute('href' , href[0] + ano + '-' + mes + '-' + dia + '.' + href[1] );
21 |
22 | var data3 = new Date();
23 | var ano = data3.getFullYear();
24 | var mes = (data3.getMonth() +1);
25 | var dia = data3.getDate();
26 |
27 | var href = document.getElementById('data3').getAttribute('href');
28 | href = href.split('.');
29 | document.getElementById('data3').setAttribute('href' , href[0] + ano + '-' + mes + '-' + dia + '.' + href[1] );
30 |
31 | var data4 = new Date();
32 | var ano = data4.getFullYear();
33 | var mes = (data4.getMonth() +1);
34 | var dia = data4.getDate();
35 |
36 | var href = document.getElementById('data4').getAttribute('href');
37 | href = href.split('.');
38 | document.getElementById('data4').setAttribute('href' , href[0] + ano + '-' + mes + '-' + dia + '.' + href[1] );
39 |
40 | var data5 = new Date();
41 | var ano = data5.getFullYear();
42 | var mes = (data5.getMonth() +1);
43 | var dia = data5.getDate();
44 |
45 | var href = document.getElementById('data5').getAttribute('href');
46 | href = href.split('.');
47 | document.getElementById('data5').setAttribute('href' , href[0] + ano + '-' + mes + '-' + dia + '.' + href[1] );
48 |
49 | var data6 = new Date();
50 | var ano = data6.getFullYear();
51 | var mes = (data6.getMonth() +1);
52 | var dia = data6.getDate();
53 |
54 | var href = document.getElementById('data6').getAttribute('href');
55 | href = href.split('.');
56 | document.getElementById('data6').setAttribute('href' , href[0] + ano + '-' + mes + '-' + dia + '.' + href[1] );
57 |
58 | var data7 = new Date();
59 | var ano = data7.getFullYear();
60 | var mes = (data7.getMonth() +1);
61 | var dia = data7.getDate();
62 |
63 | var href = document.getElementById('data7').getAttribute('href');
64 | href = href.split('.');
65 | document.getElementById('data7').setAttribute('href' , href[0] + ano + '-' + mes + '-' + dia + '.' + href[1] );
66 |
67 | var data8 = new Date();
68 | var ano = data8.getFullYear();
69 | var mes = (data8.getMonth() +1);
70 | var dia = data8.getDate();
71 |
72 | var href = document.getElementById('data8').getAttribute('href');
73 | href = href.split('.');
74 | document.getElementById('data8').setAttribute('href' , href[0] + ano + '-' + mes + '-' + dia + '.' + href[1] );
75 |
76 | var data9 = new Date();
77 | var ano = data9.getFullYear();
78 | var mes = (data9.getMonth() +1);
79 | var dia = data9.getDate();
80 |
81 | var href = document.getElementById('data9').getAttribute('href');
82 | href = href.split('.');
83 | document.getElementById('data9').setAttribute('href' , href[0] + ano + '-' + mes + '-' + dia + '.' + href[1] );
84 |
85 | var data10 = new Date();
86 | var ano = data10.getFullYear();
87 | var mes = (data10.getMonth() +1);
88 | var dia = data10.getDate();
89 |
90 | var href = document.getElementById('data10').getAttribute('href');
91 | href = href.split('.');
92 | document.getElementById('data10').setAttribute('href' , href[0] + ano + '-' + mes + '-' + dia + '.' + href[1] );
93 |
94 | var data11 = new Date();
95 | var ano = data11.getFullYear();
96 | var mes = (data11.getMonth() +1);
97 | var dia = data11.getDate();
98 |
99 | var href = document.getElementById('data11').getAttribute('href');
100 | href = href.split('.');
101 | document.getElementById('data11').setAttribute('href' , href[0] + ano + '-' + mes + '-' + dia + '.' + href[1] );
102 |
103 | var data12 = new Date();
104 | var ano = data12.getFullYear();
105 | var mes = (data12.getMonth() +1);
106 | var dia = data12.getDate();
107 |
108 | var href = document.getElementById('data12').getAttribute('href');
109 | href = href.split('.');
110 | document.getElementById('data12').setAttribute('href' , href[0] + ano + '-' + mes + '-' + dia + '.' + href[1] );
111 |
112 | var data13 = new Date();
113 | var ano = data13.getFullYear();
114 | var mes = (data13.getMonth() +1);
115 | var dia = data13.getDate();
116 |
117 | var href = document.getElementById('data13').getAttribute('href');
118 | href = href.split('.');
119 | document.getElementById('data13').setAttribute('href' , href[0] + ano + '-' + mes + '-' + dia );
120 |
121 | var data14 = new Date();
122 | var ano = data14.getFullYear();
123 | var mes = (data14.getMonth() +1);
124 | var dia = data14.getDate();
125 |
126 | var href = document.getElementById('data14').getAttribute('href');
127 | href = href.split('.');
128 | document.getElementById('data14').setAttribute('href' , href[0] + ano + '-' + mes + '-' + dia + '.' + href[1] );
129 |
130 | var data15 = new Date();
131 | var ano = data15.getFullYear();
132 | var mes = (data15.getMonth() +1);
133 | var dia = data15.getDate();
134 |
135 | var href = document.getElementById('data14').getAttribute('href');
136 | href = href.split('.');
137 | document.getElementById('data14').setAttribute('href' , href[0] + ano + '-' + mes + '-' + dia + '.' + href[1] );
138 |
139 | function reports() {
140 | var data = new Date();
141 | var ano = data.getFullYear();
142 | var mes = (data.getMonth() +1);
143 | var dia = data.getDate();
144 | window.open('ad-reports/ad-users/ad-users.html' ,'_blank');
145 | window.open('ad-reports/ad-admins/ad-admins.html' ,'_blank');
146 | window.open('ad-reports/ad-enterprise-admins/ad-enterprise-admins.html' ,'_blank');
147 | window.open('ad-reports/ad-disabled/ad-disabled.html' ,'_blank');
148 | window.open('ad-reports/ad-lastlogon/ad-lastlogon.html' ,'_blank');
149 | window.open('ad-reports/ad-neverexpires/ad-neverexpires.html' ,'_blank');
150 | window.open('ad-reports/ad-groups/ad-groups.html' ,'_blank');
151 | window.open('ad-reports/ad-membergroups/ad-membergroups.html' ,'_blank');
152 | window.open('ad-reports/ad-ous/ad-ous.html' ,'_blank');
153 | window.open('ad-reports/ad-computers/ad-computers.html' ,'_blank');
154 | window.open('ad-reports/ad-servers/ad-servers.html' ,'_blank');
155 | window.open('ad-reports/ad-dcs/ad-dcs.html' ,'_blank');
156 | window.open('ad-reports/ad-gpos/ad-gpos.html' ,'_blank');
157 | window.open('ad-reports/ad-inventory/ad-inventory.html' ,'_blank');
158 | }
--------------------------------------------------------------------------------
/index.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 | :: 100SECURITY ::
10 |
11 |
12 |
13 |
21 |
22 |
23 |
24 |
25 |
26 |
90 |
91 |
92 | About
93 | Open All Reports
94 | 1 0 0 S E C U R I T Y - S e c u r i t y I n f o r m a t i o n
95 |
96 |
97 |
126 |
127 |
128 |
129 |
130 |
131 |
132 |
133 |
134 |
--------------------------------------------------------------------------------
/ad-reports/ad-groups/ad-groups.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - All Groups
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2019-07-06 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total Groups: 45 Name Description Access Control Assistance Operators Members of this group can remotely query authorization attributes and permissions for resources on this computer. Account Operators Members can administer domain user and group accounts Administrators Administrators have complete and unrestricted access to the computer/domain Allowed RODC Password Replication Group Members in this group can have their passwords replicated to all read-only domain controllers in the domain Backup Operators Backup Operators can override security restrictions for the sole purpose of backing up or restoring files Cert Publishers Members of this group are permitted to publish certificates to the directory Certificate Service DCOM Access Members of this group are allowed to connect to Certification Authorities in the enterprise Cloneable Domain Controllers Members of this group that are domain controllers may be cloned. Cryptographic Operators Members are authorized to perform cryptographic operations. Denied RODC Password Replication Group Members in this group cannot have their passwords replicated to any read-only domain controllers in the domain Distributed COM Users Members are allowed to launch, activate and use Distributed COM objects on this machine. DnsAdmins DNS Administrators Group DnsUpdateProxy DNS clients who are permitted to perform dynamic updates on behalf of some other clients (such as DHCP servers). Domain Admins Designated administrators of the domain Domain Computers All workstations and servers joined to the domain Domain Controllers All domain controllers in the domain Domain Guests All domain guests Domain Users All domain users Enterprise Admins Designated administrators of the enterprise Enterprise Read-only Domain Controllers Members of this group are Read-Only Domain Controllers in the enterprise Event Log Readers Members of this group can read event logs from local machine Group Policy Creator Owners Members in this group can modify group policy for the domain Guests Guests have the same access as members of the Users group by default, except for the Guest account which is further restricted Hyper-V Administrators Members of this group have complete and unrestricted access to all features of Hyper-V. IIS_IUSRS Built-in group used by Internet Information Services. Incoming Forest Trust Builders Members of this group can create incoming, one-way trusts to this forest Network Configuration Operators Members in this group can have some administrative privileges to manage configuration of networking features Performance Log Users Members of this group may schedule logging of performance counters, enable trace providers, and collect event traces both locally and via remote access to this computer Performance Monitor Users Members of this group can access performance counter data locally and remotely Pre-Windows 2000 Compatible Access A backward compatibility group which allows read access on all users and groups in the domain Print Operators Members can administer domain printers RAS and IAS Servers Servers in this group can access remote access properties of users RDS Endpoint Servers Servers in this group run virtual machines and host sessions where users RemoteApp programs and personal virtual desktops run. This group needs to be populated on servers running RD Connection Broker. RD Session Host servers and RD Virtualization Host servers used in the deployment need to be in this group. RDS Management Servers Servers in this group can perform routine administrative actions on servers running Remote Desktop Services. This group needs to be populated on all servers in a Remote Desktop Services deployment. The servers running the RDS Central Management service must be included in this group. RDS Remote Access Servers Servers in this group enable users of RemoteApp programs and personal virtual desktops access to these resources. In Internet-facing deployments, these servers are typically deployed in an edge network. This group needs to be populated on servers running RD Connection Broker. RD Gateway servers and RD Web Access servers used in the deployment need to be in this group. Read-only Domain Controllers Members of this group are Read-Only Domain Controllers in the domain Remote Desktop Users Members in this group are granted the right to logon remotely Remote Management Users Members of this group can access WMI resources over management protocols (such as WS-Management via the Windows Remote Management service). This applies only to WMI namespaces that grant access to the user. Replicator Supports file replication in a domain Schema Admins Designated administrators of the schema Server Operators Members can administer domain servers Terminal Server License Servers Members of this group can update user accounts in Active Directory with information about license issuance, for the purpose of tracking and reporting TS Per User CAL usage Users Users are prevented from making accidental or intentional system-wide changes and can run most applications Windows Authorization Access Group Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects WinRMRemoteWMIUsers__ Members of this group can access WMI resources over management protocols (such as WS-Management via the Windows Remote Management service). This applies only to WMI namespaces that grant access to the user.
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/ad-reports/ad-groups/ad-groups-2018-7-9.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | 100SECURITY
5 |
12 |
13 |
14 |
15 |
16 | Active Directory - All Groups
17 | Company: 100SECURITY - Domain: 100security.local - Date: 2018-7-9 - Owner: Marcos Henrique
18 |
19 |
20 |
21 |
22 |
23 | Total Groups: 50 Name Description 100Security 100security Group Access Control Assistance Operators Members of this group can remotely query authorization attributes and permissions for resources on this computer. Account Operators Members can administer domain user and group accounts Administrators Administrators have complete and unrestricted access to the computer/domain Allowed RODC Password Replication Group Members in this group can have their passwords replicated to all read-only domain controllers in the domain Apple Apple Group Backup Operators Backup Operators can override security restrictions for the sole purpose of backing up or restoring files Cert Publishers Members of this group are permitted to publish certificates to the directory Certificate Service DCOM Access Members of this group are allowed to connect to Certification Authorities in the enterprise Cloneable Domain Controllers Members of this group that are domain controllers may be cloned. Cryptographic Operators Members are authorized to perform cryptographic operations. Denied RODC Password Replication Group Members in this group cannot have their passwords replicated to any read-only domain controllers in the domain Distributed COM Users Members are allowed to launch, activate and use Distributed COM objects on this machine. DnsAdmins DNS Administrators Group DnsUpdateProxy DNS clients who are permitted to perform dynamic updates on behalf of some other clients (such as DHCP servers). Domain Admins Designated administrators of the domain Domain Computers All workstations and servers joined to the domain Domain Controllers All domain controllers in the domain Domain Guests All domain guests Domain Users All domain users Enterprise Admins Designated administrators of the enterprise Enterprise Read-only Domain Controllers Members of this group are Read-Only Domain Controllers in the enterprise Event Log Readers Members of this group can read event logs from local machine Facebook Facebook Group Group Policy Creator Owners Members in this group can modify group policy for the domain Guests Guests have the same access as members of the Users group by default, except for the Guest account which is further restricted Hyper-V Administrators Members of this group have complete and unrestricted access to all features of Hyper-V. IIS_IUSRS Built-in group used by Internet Information Services. Incoming Forest Trust Builders Members of this group can create incoming, one-way trusts to this forest McAfee McAfee Group Microsoft Microsoft Group Network Configuration Operators Members in this group can have some administrative privileges to manage configuration of networking features Performance Log Users Members of this group may schedule logging of performance counters, enable trace providers, and collect event traces both locally and via remote access to this computer Performance Monitor Users Members of this group can access performance counter data locally and remotely Pre-Windows 2000 Compatible Access A backward compatibility group which allows read access on all users and groups in the domain Print Operators Members can administer domain printers RAS and IAS Servers Servers in this group can access remote access properties of users RDS Endpoint Servers Servers in this group run virtual machines and host sessions where users RemoteApp programs and personal virtual desktops run. This group needs to be populated on servers running RD Connection Broker. RD Session Host servers and RD Virtualization Host servers used in the deployment need to be in this group. RDS Management Servers Servers in this group can perform routine administrative actions on servers running Remote Desktop Services. This group needs to be populated on all servers in a Remote Desktop Services deployment. The servers running the RDS Central Management service must be included in this group. RDS Remote Access Servers Servers in this group enable users of RemoteApp programs and personal virtual desktops access to these resources. In Internet-facing deployments, these servers are typically deployed in an edge network. This group needs to be populated on servers running RD Connection Broker. RD Gateway servers and RD Web Access servers used in the deployment need to be in this group. Read-only Domain Controllers Members of this group are Read-Only Domain Controllers in the domain Remote Desktop Users Members in this group are granted the right to logon remotely Remote Management Users Members of this group can access WMI resources over management protocols (such as WS-Management via the Windows Remote Management service). This applies only to WMI namespaces that grant access to the user. Replicator Supports file replication in a domain Schema Admins Designated administrators of the schema Server Operators Members can administer domain servers Terminal Server License Servers Members of this group can update user accounts in Active Directory with information about license issuance, for the purpose of tracking and reporting TS Per User CAL usage Users Users are prevented from making accidental or intentional system-wide changes and can run most applications Windows Authorization Access Group Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects WinRMRemoteWMIUsers__ Members of this group can access WMI resources over management protocols (such as WS-Management via the Windows Remote Management service). This applies only to WMI namespaces that grant access to the user.
24 |
25 |
26 |
27 |
28 | ADRT - Active Directory Report Tool
29 |
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------