Remove group membership of disabled accounts
Majority of the system administrators I’ve met forget this very important rule. When an account is not needed remove its membership from the security/ distribution groups, otherwise you get disabled account showing up in groups, and that looks ugly.
You will need Quest ActiveRoles for Powershell installed to get this working.
Depending on the size of your organization you may need to increase the limit of results to 3000 or more. Default is 1000
Set-QADPSSnapinSettings -DefaultSizeLimit 3000
Next, create a list of accounts that you will be modifying so we know what we will be removing.
Get-QADUser -disabled | Out-File C:\_Scripts\disabled_user_stripped_groups.txt
Once you have the list saved. Execute the following:
$dUsers = Get-QADUser -disabled;
foreach ($user in $dUsers )
{
foreach( $grp in (Get-QADMemberOf $user ))
{
Remove-QADGroupMember $grp $user;
}
}
Membership is stripped from groups, where the user account is disabled.
Author
Related Posts
Get all the domains controllers in the AD forest along with their current FSMO roles
In a large enterprise an admin would need to keep track of all the domains in a AD forest, the domain names,...
Read out all
Force synchronization for DFSR-replicated SYSVOL
One of my clients had a problem with processing GPO on client computers. Different computers applied different settings from the same GPO...
Get Inactive Users Report for the past 60 days in a multi domain environment
I had a request recently to provide an inactive user report for the past 60 days. Basically, find out which accounts have...
Get Primary, Secondary, Tertiary DNS values and more from Multiple Servers
Came across a unique request to get primary, secondary, and tertiary DNS values for multiple computers/servers across the domain. I started writing...
Fix Active Directory broken security inheritance problem
Ran into a situation at a client location where in Active Directory, the security permissions applied to an OU were not getting...
How to Fix: Attribute userAccountControl of DC is: 0x82020
When running a DCDiag at a customer site today I had the following error occur: [su_box title=”” box_color=”#f3f1cb” title_color=”#000000″ radius=”6″]Warning: Attribute userAccountControl...