Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 30 September, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Why wait to deal with inactive Active Directory users and computer accounts before it’s too late?

by The Gurus
November 19, 2014
in Opinions & Analysis
Share on FacebookShare on Twitter

A large organisation usually comprises thousands of user accounts and computers. There can be users who don’t logon to the Active Directory directly instead, they logon indirectly through Exchange, Outlook Web Access, Remote Access, VoIP or another service-based account.
 
In addition, there can be a vast range of users with temporary accounts that would be expired after a specific period. Similarly, an organisation will also have temporary computers that were used for only few minutes or hours in the past. Such unused user and/or computer accounts still exist in the Active Directory even when they are not in use presently and will not be used in the future as well. These obsolete user/computer accounts can be a great threat to an organisation.
 
The regulatory compliances have made it a mandate to keep an eye on the inactive user and computer accounts and to manage them in order to avoid security hazards. No well-timed action on the user accounts, which are inactive for more than 90 days, will definitely result in security loss and disobedience of the mandatory compliances, which in turn will attract fine.
Let us have a look at the commands to list the inactive user and computer accounts, which are not being used for the last specific days.
Listing Inactive Users
Run the following command at Windows PowerShell. This would list the inactive users with enabled accounts after a specific duration. Here, the time duration is specified using TimeSpan attribute that contains values in the format D.H:M:S:F i.e.
Day.Hours:Month:Seconds:Fractions of Second
Search-ADAccount -AccountInactive -TimeSpan 90.00:00:00 | ?{$_.enabled -eq $true} | %{Get-ADUser $_.ObjectGuid} | select name, givenname, surname
 
You can redirect this list to create a CSV file by suffixing the export-csv CMDlet or its epcsv alias.
Search-ADAccount -AccountInactive -TimeSpan 1.00:00:00 | ?{$_.enabled -eq $true} | %{Get-ADUser $_.ObjectGuid} | select name, givenname, surname | epcsv C:\unusedenableduseraccounts.csv
Listing the Inactive Computer Accounts
Run the following command to list the inactive computers.
dsquery computer -inactive <number of days> -limit 0
 
What should be done with inactive accounts?
From the security and compliance point of view, the inactive user and computer accounts should be disabled or removed from the Active Directory. The administrator can also move such unused accounts to an Organisational Unit. This not only will secure an organisation from the unidentified security threats, but also saves it from attracting a fine by ignoring the abidance to the compliance.
It’s very complicated first to list down the number of inactive user and computer after a specific duration and then to disable/remove them using native tools. This complexity level reaches top when it comes to automate the identification and management of unused user accounts in different domains.
Ranging from security experts to the compliance, everyone suggests to find out the inactive user and computer accounts which act as the loopholes in the security of an organisation. These loopholes should be covered means the inactive account should be deleted or disabled before it’s too late.
 
 
Satyendra Kumar is marketing, PR and software quality assurance manager at Lepide Software

FacebookTweetLinkedIn
ShareTweet
Previous Post

ForeScout enables Sutton and East Surrey Water with CounterACT

Next Post

Information Security FS 2014: "Run your security department like a consultancy"

Recent News

Guide to ransomware and how to detect it

Guide to ransomware and how to detect it

September 28, 2023
software security

Research reveals 80% of applications developed in EMEA contain security flaws

September 27, 2023
Cyber insurance

Half of organisations with cyber insurance implemented additional security measures to qualify for the policy or reduce its cost

September 27, 2023
Fraud and online banking

Akamai Research Finds the Number of Cyberattacks on European Financial Services More Than Doubled in 2023

September 27, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information