Microsoft爲Windows Server 2008 R2(以及更高版本)提供了多個Active Directory PowerShell cmdlet,這大大簡化了之前須要將涉及到的ADSI冗長代碼行放在一塊兒的任務。git
在Windows客戶端上,須要安裝遠程服務器管理工具(RSAT)並確保已安裝Active Directory PowerShell模塊。而在Windows服務器(2008 R2或更高版本)上的 PowerShell控制檯(做爲管理員)中運行以下命令:Import-Module ServerManager ; Add-WindowsFeature RSAT-AD-PowerShell。github
AD PowerShell cmdlet和如下方式執行效果同樣:數據庫
Import-module activeDirectory安全
$UserID = 「JoeUser」服務器
Get-ADUser $UserID –property *dom
須要值得注意的是使用PowerShell v3版本以及高版本,你無需運行第一行命令,由於PowerShell的將識別必要的模塊和自動加載它。一旦加載了Active Directory PowerShell模塊,就能夠像瀏覽文件系統那樣瀏覽AD。命令以下:工具
Ps> Import-module activeDirectory測試
Ps>dir ad:ui
Ps>set-location ad:spa
Ps >set-location 「dc=lab,dc=adsecurity,dc=org」
Ps>dir
1.基本的模塊和統計
發現可用的PowerShell模塊:Get-Module -ListAvailable
在PowerShell模塊中發現cmdlet:Get-Command -module ActiveDirectory
PowerShell AD模塊的Cmdlet個數:
(Get-Command -module ActiveDirectory).count
WINDOWS SERVER 2008 R2主要的cmdlets:
• Get/Set-ADForest
• Get/Set-ADDomain
• Get/Set-ADDomainController
• Get/Set-ADUser
• Get/Set-ADComputer
• Get/Set-ADGroup
• Get/Set-ADGroupMember
• Get/Set-ADObject
• Get/Set-ADOrganizationalUnit
• Enable-ADOptionalFeature
• Disable/Enable-ADAccount
• Move-ADDirectoryServerOperationMasterRole
• New-ADUser
• New-ADComputer
• New-ADGroup
• New-ADObject
• New-ADOrganizationalUnit
WINDOWS SERVER 2012含以版本一些新的cmdlets:
• *-ADResourcePropertyListMember
• *-ADAuthenticationPolicy
• *-ADAuthenticationPolicySilo
• *-ADCentralAccessPolicy
• *-ADCentralAccessRule
• *-ADResourceProperty
• *-ADResourcePropertyList
• *-ADResourcePropertyValueType
• *-ADDCCloneConfigFile
• *-ADReplicationAttributeMetadata
• *-ADReplicationConnection
• *-ADReplicationFailure
• *-ADReplicationPartnerMetadata
• *-ADReplicationQueueOperation
• *-ADReplicationSite
• *-ADReplicationSiteLink
• *-ADReplicationSiteLinkBridge
• *-ADReplicationSubnet
• *-ADReplicationUpToDatenessVectorTable
• Sync-ADObject
2.發現全局目錄 GLOBAL CATALOGS (GCS)
• Forest GCs(森林全局目錄):
import-module ActiveDirectory
$ADForest = Get-ADForest
$ADForestGlobalCatalogs = $ADForest.GlobalCatalogs
• Domain DCs that are GCs(以域DCS的全局目錄):
import-module ActiveDirectory
$DCsNotGCs = Get-ADDomainController -filter { IsGlobalCatalog -eq $True}
• Domain DCs that are not GCs(以非域DCS的全局目錄):
import-module ActiveDirectory
$DCsNotGCs = Get-ADDomainController -filter { IsGlobalCatalog -eq $False }
3.查找Active Directory靈活單主機操做(FSMO)角色
活動目錄模塊:
(GET-ADForest).SchemaMaster
(GET-ADForest).DomainNamingMaster
(GET-ADDomain).InfrastructureMaster
(GET-ADDomain).PDCEmulator
(GET-ADDomain).RIDMaster
.NET調用:
•Get the Current Domain:
[System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain().Name
[System.DirectoryServices.ActiveDirectory.Domain]::GetComputerDomain().Name
• Get the Computer’s Site:
[System.DirectoryServices.ActiveDirectory.ActiveDirectorySite]::GetComputerSite()
• List All Domain Controllers in a Domain:
[System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain().DomainControllers
• Get Active Directory Domain Mode:
[System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain().DomainMode
• List Active Directory FSMOs:
([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()).SchemaRoleOwner
([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()).NamingRoleOwner
([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).InfrastructureRoleOwner
([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).PdcRoleOwner
([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).RidRoleOwner
•Get Active Directory Forest Name:
[System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest().Name
• Get a List of Sites in the Active Directory Forest:
[array] $ADSites = [System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest().Sites
• Get Active Directory Forest Domains:
[System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest().Domains
• Get Active Directory Forest Global Catalogs:
[System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest().GlobalCatalogs
• Get Active Directory Forest Mode:
[System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest().ForestMode
• Get Active Directory Forest Root Domain:
[System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest().RootDomain
4.FSMO角色從一個DC移動到另外一個DC
get-command -module activedirectory -noun *Master*
•Moving FSMO Roles:
Move-ADDirectoryServerOperationMasterRole -Identity $DCName -OperationMasterRole RIDMaster
Move-ADDirectoryServerOperationMasterRole -Identity $DCName -
OperationMasterRole DomainNamingMaster
Move-ADDirectoryServerOperationMasterRole -Identity $DCName -OperationMasterRole PDCEmulato
•Seizing FSMO Roles:
Move-ADDirectoryServerOperationMasterRole -Identity $DCName -OperationMasterRole PDCEmulator –FORCE
1.Get-RootDSE
獲取有關LDAP服務器(域控制器)的信息並顯示其內容,結果中有一些有趣的信息,好比DC運行的操做系統信息。
2.Get-ADForest
提供有關運行該命令計算機所在的Active Directory森林信息。
3.Get-ADDomain
提供有關當前所在域的信息
4.Get-ADDomainController
提供特定於域控制器的計算機信息,經過cmdlet命令,可輕鬆查找到特定站點中的全部DC或運行OS版本信息。
5.Get-ADComputer
提供了關於AD中大多數計算機對象的信息,使用「-Prop *」參數運行的命令能夠顯示全部標準屬性信息。
6. AD計算機的統計
$Time = (Measure-Command `
{[array] $AllComputers = Get-ADComputer -filter * -properties
Name,CanonicalName,Enabled,passwordLastSet,SAMAccountName,LastLogonTimeSt
amp,DistinguishedName,OperatingSystem }).TotalMinutes
$AllComputersCount = $AllComputers.Count
Write-Output 「There were $AllComputersCount Computers discovered in
$DomainDNS in $Time minutes… `r 「
7.Get-ADUser
提供了想要了解有關AD用戶的大部份內容信息,使用「-Prop *」參數運行的命令能夠顯示全部標準屬性信息。
8. AD用戶的統計
import-Module ActiveDirectory
$DomainDNS = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain().Name
[array]$AllUsers = Get-ADUser -filter * -properties
Name,DistinguishedName,Enabled,LastLogonDate,LastLogonTimeStamp,LockedOut,msExchHom
eServerName,SAMAccountName
$AllUsersCount = $AllUsers.Count
Write-Output 「There were $AllUsersCount user objects discovered in $ADDomainDNSRoot … 「
[array] $DisabledUsers = $AllUsers | Where-Object { $_.Enabled -eq $False }
$DisabledUsersCount = $DisabledUsers.Count
[array] $EnabledUsers = $AllUsers | Where-Object { $_.Enabled -eq $True }
$EnabledUsersCount = $EnabledUsers.Count
Write-Output 「There are $EnabledUsersCount Enabled users and there are $DisabledUsersCount
Disabled users in $DomainDNS 「
9.Get-ADGroup
提供有關AD組的信息,運行以下命令可查找全部安全組:
Get-ADGroup -Filter {GroupCategory -eq ‘Security}
10.Get-ADGroupMember
枚舉並返回組成員信息,使用」-Recursive」參數可包括嵌套組的全部成員。
Get-ADGroupMember ‘Administrators’ -Recursive
11.查找非活動計算機
如下示例查找非活動(舊版本)計算機和用戶:在過去10天內未更改其密碼的賬戶。請注意,這是一個測試示例。對於實際的生產環境,將此建議更改成計算機的60到90天,用戶的180到365天的策略。
12.查找非活動用戶
13.枚舉域信任
14.獲取活動目錄的實施日期
15.獲取AD密碼策略
16.獲取AD站點信息
請注意Windows 2012模塊中包含站點的cmdlet(Get-ADReplicationSite *)。
17. 得到tombstonelifetime信息
18.AD的回收信息
Requires Forest Functional Mode = Windows Server 2008 R2
• Enable the Recycle Bin (as Enterprise Admin)
Enable-ADOptionalFeature –Identity ‘CN=Recycle Bin Feature,CN=Optional Features,CN=Directory
Service,CN=Windows NT,CN=Services,CN=Configuration,DC=DOMAIN,DC=COM’ –Scope
ForestOrConfigurationSet –Target ‘DOMAIN.COM’
• Find all Deleted Users
$DeletedUsers = Get-ADObject -SearchBase 「CN=Deleted Objects,DC=DOMAIN,DC=COM」 -Filter
{ObjectClass -eq 「user」} -IncludeDeletedObjects -Properties lastKnownParent
• Restore all Deleted Users
$DeletedUsers | Restore-ADObject
• Restore users deleted on a specific date
$ChangeDate = Get-Date (「1/1/2015″)
Get-ADObject -Filter { (whenChanged -eq $changeDate) -and (isDeleted -eq $true) -and (name -ne
「Deleted Objects」) -and (ObjectClass -eq 「user」) } -IncludeDeletedObjects -Properties * | RestoreADObject
19.DOMAIN RID STATS(域 rid 統計)
20.備份域GPO
請注意,這須要安裝組策略PowerShell模塊,該模塊與Active Directory模塊分開。
21.查找AD Kerberos服務賬戶
22. 服務帳號腳本
https://github.com/PyroTek3/PowerShell-AD-Recon/blob/master/Find-PSServiceAccounts
使用SPNS在AD中發現服務:SQl
列出SQL服務:
https://github.com/PyroTek3/PowerShell-AD-Recon/blob/master/Discover-PSMSSQLServers
23.列出域控制器
Get-ADDomainController-filter * | `select hostname,IPv4Address,IsGlobalCatalog,IsReadOnly,OperatingSystem | `format-table -auto
24.DOMAIN CONTROLLERS DISCOVERY(域控制器的發現)
• Discover PDCe in domain(發現域的PDCe)
Get-ADDomainController –Discover –ForceDiscover –Service 「PrimaryDC」 –
DomainName 「lab.adsecurity.org」
• Discover DCs in a Site(發現站點的DCs)
Get-ADDomainController –Discover –Site 「HQ」
• Find all Read-Only Domain Controllers that are GCs(查找全部做爲GCs的只讀域控制器)
Get-ADDomainController –filter `
{ (isGlobalCatalog –eq $True) –AND (isReadOnly –eq $True) }
25.AD數據庫完整性檢查
Write-Output "Checking the NTDS database for errors (semantic database
analysis) `r "
Stop-Service ntds -force
$NTDSdbChecker = ntdsutil "activate instance ntds" "semantic database
analysis" "verbose on" "Go" q q
Start-Service ntds
Write-Output "Results of Active Directory database integrity check: `r "
$NTDSdbChecker
26.Get-ADReplicationPartnerMetadata
Windows Server 2012及更高版本,此命令用於顯示目標DC複製夥伴的複製元數據
27.Get-ADReplicationPartnerFailure
提供有關DC複製失敗狀態的信息,此命令顯示AD複製錯誤的描述,CMDLETS (2012)
28.Get-ADReplicationUptodatenessVectorTable
跟蹤域控制器之間的複製狀態,CMDLETS (2012)
29.AD Web服務(ADWS)
須要在目標DC上運行AD Web服務(ADWS)(TCP 9389)
Get-ADDomainController –Discover –Service 「ADWS」
30.REPADMIN(目錄複製工具) VS. POWERSHELL
REPADMIN |
PowerShell |
2012 Cmdlets |
|
/FailCache |
Get-ADReplicationFailure |
/Queue |
Get-ADReplicationQueueOperation |
/ReplSingleObj |
Sync-ADObject |
/ShowConn |
Get-ADReplicationConnection |
/ShowObjMeta |
Get-ADReplicationAttributeMetadata |
/ShowRepl |
Get-ADReplicationPartnerMetadata |
/ShowUTDVec |
Get-ADReplicationUpToDatenessVectorTable |
/SiteOptions |
Set-ADReplicationSite |
2008 R2 Cmdlets |
|
/ShowAttr |
Get-ADObject |
/SetAttr |
Set-ADObject |
/PRP |
Get-ADDomainControllerPasswordReplicationPolicy |
Add-ADDomainControllerPasswordReplicationPolicy |
|
Remove-ADDomainControllerPasswordReplicationPolicy |
|
Get-ADAccountResultantPasswordReplicationPolicy |
|
Get-ADDomainControllerPasswordReplicationPolicyUsage |