Have you ever needed to copy data between attributes in Active Directory? Maybe you need to copy an ExtensionAttribute value into a different ExtensionAttribute. Maybe you need to copy email, UPN, or SIP addresses. You may even want to move the EmployeeNumber value into the EmployeeID attribute instead. What if you needed to create a new Description based on a combination from other attributes?
Today I am releasing updated functionality in the PowerShell Active Directory SID History module. New features include: inventory SID history in share permissions, new Access database reporting template, bug fixes, and more!
Today I posted over on the Hey Scripting Guy blog with a quick tip to unlock Active Directory user accounts. Check it out:
Active Directory Account Unlock Shortcut for Help Desk
Now most people don't plan to spend their entire career on the help desk. It is a starting point for bigger things in IT. PowerShell can be your career LAUNCH PAD. Seriously. PowerShell skills will differentiate you from your peers and slingshot you to the front of the pack.
What if you could get all of the data you needed to close a ticket in seconds?
In honor of all things St. Patrick's Day what could be more appropriate than a PowerShell limerick? I've drafted four for you to enjoy and share.
This is huge. Today's post includes demos scripts for all five free ways to script Active Directory in PowerShell. I presented these last weekend at the first ever PowerShell Saturday event in Columbus, Ohio. You will also find attached a one hour audio recording of the presentation for those who couldn't attend in person. Now you have a free AD scripting recipe book with a guided tour from GoateePFE.
This post is the first in a series highlighting out-of-the-box PowerShell support for Active Directory. If you're just now learning how to use PowerShell with Active Directory, then start here. If you already have some experience in this category, then I'm going to show you some handy tips that will take your skills to the next level.
My last post on getting started with Active Directory was so popular that I thought I would do one for getting started with Group Policy. Once again this link list will satisfy everyone from beginner to advanced. I know there are many other third party resources and books, but I want to surface some Microsoft white papers and articles that may not always be obvious. Enjoy!
This article is for all of the IT Pros who have inherited an Active Directory environment which they did not build. Today's post offers some simple scripts to document the history of schema updates. This is particularly handy when it comes time to extend the schema for a domain upgrade or Exchange implementation. Now you can get a report of every attribute's create and modified date. You can also find out if and when third party extensions have been applied.
As a Microsoft Premier Field Engineer I frequently get asked for more information on Active Directory topics. Most of the time I end up passing along one or more of the links in today's post. This list will be extremely valuable for anyone who wants to get started with Active Directory or even for a seasoned AD admin who wants to go deeper.
This post is the fifth in the "SID Walker, Texas Ranger" series on SID history remediation with PowerShell. Today we're wrapping up with a handy summary of each post in the series. We will also take the function library we've been using and upgrade it to a PowerShell module. Then we'll walk through the entire SID history remediation process using the provided cmdlets in this module.
This post is part four in the "PowerShell: SID Walker, Texas Ranger" series on documenting and remediating SID history in your AD forest. In today's post we will look at the final step of remediating SID history: removing the SID history data from our migrated AD objects using PowerShell. Cleaning up this stale data will greatly reduce the chance of token size issues for your users.
Many of us have inherited SID history in our forest from previous mergers and acquisitions. In today's blog entry on SID history remediation we will unearth a Rosetta Stone, the key to decyphering the identity of civilizations past. This script will export a list of domain names and domain SIDs across your forest and all of its trusts. This domain SID list is the key to understanding from where the SID history of our users originated.
This is part two in a series on translating SIDs in ACLs. Today we're going to unleash a Chuck Norris round house kick on old SIDs stinking up the ACLs on our file servers. It's time to take out the trash... PowerShell style.
Join us on September 29th as we welcome Matt Hester, Microsoft Senior IT Pro Evangelist for the Heartland District.
Thursday, September 29, 2011, 18:30 - 20:00
Platform Lab, 1275 Kinnear Road, Columbus, OH 43212, United States
See the official COPUG site.
Do you remember SIDWALK? This resource kit utility was written back in the NT 4.0 days to assist with domain migrations. It used a mapping file to rewrite old SIDs with new SIDs across ACLs. That utility is a teenager now. It's time we rewrite it... in PowerShell. In part one of this series we will learn how to parse SIDs out of SDDL that we receive from Get-ACL.
Recently Microsoft's legal department asked me to remind you that, yes, I do work for Microsoft. As such we have many disclaimers that you should be aware of when referencing content from this blog or using scripts posted on this blog.
Do you have any bandaids in your AD replication? You know… those manual server connection objects. That's where admins try to outsmart the KCC and build their own connections instead. The problem is that when DCs get refreshed we usually forget about these manual connections and they pile up like Beanie Babies on an episode of Hoarders. Today's post is a quick one-liner to rip off those bandaids… but in a painless PowerShell kind of way.
Many companies have upgraded bandwidth without updating AD replication topology. Today's post features PowerShell one-liners to report on your AD site links and then tweak them for high performance.