Thursday, July 19, 2018

Enable IP Address Conflict Detection in DHCP on Windows Server

You may use DHCP server option what detects conflicts by pinging an IP address before offering that address to clients.

DHCP Conflict Detection is useful, if some client use a static ip-address from DHCP pool.

On Windows Server by default DHCP Conflict Detection is disabled.

To enabled DHCP conflict detection

Open DHCP console


Wednesday, July 18, 2018

Налаштування Windows DHCP сервера для виявлення конфліктів IP-адрес

DHCP сервер може виявляти конфлікти IP-адрес, перш ніж пропонувати адреси клієнтам.

Виявлення конфліктів IP-адрес є корисним, якщо якийсь клієнт у мережі використовує статичну IP-адресу з пулу DHCP.

Щоб увімкнути виявлення конфліктів IP-адрес

Відкрийте консоль DHCP

Wednesday, July 11, 2018

PowerShell Script: Remove AD Groups for Users in specific OU

This small script remove all Active Directory (AD) groups for users in specific Organizational Unit (OU).
Except group "Domain Users"
 
Example of usage:
[PS].\Remove-ADGroups-for-Users-in-OU.ps1 -OU "OU=Users,OU=Disabled Accounts,DC=myDomain,DC=local" -Confirm:$False
 
Script can be useful for OU with disabled users accounts.
 

PowerShell Script: Get LAPS Password Information from Active Directory

A small script for export Computers LAPS Password information from Active Directory to csv file.
Script generates a CSV file with computer names and LAPS Passwords.
    ComputerName;OperatingSystem;Password;PasswordExpTime;DistinguishedName
Requirement of the script:
   - Active Directory PowerShell Module
   - Needed rights to view AD LAPS Attributes: ms-Mcs-AdmPwd, ms-Mcs-AdmPwdExpirationTime
  
Example of usage:
[PS].\Get-ADComputers-LAPS-Password.ps1
[PS].\Get-ADComputers-LAPS-Password.ps1 -OU "OU=Computers,OU=IT Department,DC=myDomain,DC=com"

Links for download
PowerShell Gallery | Get-ADComputers-LAPS-Password
GitHub | Get-ADComputers-LAPS-Password.ps1
Get-ADComputers-LAPS-Password.zip

PowerShell Script: Get BitLocker Recovery Information from Active Directory

A small script for export Computers BitLocker Recovery Information from Active Directory to csv file.
This script generates a CSV file with computer names and BitLocker Recovery Keys:
    ComputerName;OperatingSystem;Date;Time;GMT;PasswordID;RecoveryPassword;DistinguishedName
Requirement of the script:
    - Active Directory PowerShell Module
    - Needed rights to view AD BitLocker Recovery Info

Example of usage:

[PS].\Get-ADComputers-BitLockerInfo.ps1
[PS].\Get-ADComputers-BitLockerInfo.ps1 -OU "OU=Computers,OU=IT Department,DC=myDomain,DC=com"