{"id":2460,"date":"2009-11-05T00:21:19","date_gmt":"2009-11-04T16:21:19","guid":{"rendered":"http:\/\/www.softwareforenterprise.us\/?p=2460"},"modified":"2025-07-21T23:11:45","modified_gmt":"2025-07-21T15:11:45","slug":"how-to-generate-active-directory-security-reports-for-free","status":"publish","type":"post","link":"https:\/\/www.softwareforenterprise.us\/hub\/how-to-generate-active-directory-security-reports-for-free\/","title":{"rendered":"How to generate Active Directory security reports for free"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2465 lazyload\" title=\"Microsoft Active Directory\" data-src=\"https:\/\/www.softwareforenterprise.us\/hub\/wp-content\/uploads\/2009\/11\/Microsoft-Active-Directory.jpg\" alt=\"Microsoft Active Directory\" width=\"240\" height=\"146\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 240px; --smush-placeholder-aspect-ratio: 240\/146;\" \/>You&#8217;ve just been hired to manage and maintain your organization&#8217;s Active Directory (AD) containing more than a thousand users in it.<\/p>\n<p>Since the previous AD administrator left without providing any sort of documentation or details on how the AD was organized, you&#8217;re on your own to find out some answers.<\/p>\n<p>From all the users in AD, you wonder how many user <a title=\"\" class=\"aalmanual\" target=\"_blank\"  rel=\"nofollow\"   style=\"color:#1e73be;\"href=\"https:\/\/www.softwareforenterprise.us\/hub\/recommends\/xero\/\">accounts<\/a>:<\/p>\n<ul>\n<li>Are disabled<\/li>\n<li>Whose <a title=\"\" class=\"aalmanual\" target=\"_blank\"  rel=\"nofollow\"   style=\"color:#1e73be;\" href=\"https:\/\/keepersecurity.partnerlinks.io\/qns375ot4fmt-1yt2lb\">password<\/a> never expires<\/li>\n<li>Do not require passwords to logon<\/li>\n<li>Can logon to just about any workstations<\/li>\n<\/ul>\n<p>One key task given by your immediate supervisor is for you to find out all the user accounts which do not require passwords to login. This task is considered important to accomplish because there have been cases whereby these user accounts were being misused to gain access to company information.<\/p>\n<p>Your supervisor instructed that as a general rule of thumb, all future user accounts must be created with a password that expires every 2 months.<\/p>\n<p>But now, you need a way to easily list all those whose user accounts do not require passwords to login.<!--more--><\/p>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2462 lazyload\" title=\"GoldFinger Logo\" data-src=\"https:\/\/www.softwareforenterprise.us\/hub\/wp-content\/uploads\/2009\/11\/GoldFinger-Logo.png\" alt=\"GoldFinger Logo\" width=\"391\" height=\"55\" data-srcset=\"https:\/\/www.softwareforenterprise.us\/hub\/wp-content\/uploads\/2009\/11\/GoldFinger-Logo.png 391w, https:\/\/www.softwareforenterprise.us\/hub\/wp-content\/uploads\/2009\/11\/GoldFinger-Logo-300x42.png 300w\" data-sizes=\"(max-width: 391px) 100vw, 391px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 391px; --smush-placeholder-aspect-ratio: 391\/55;\" \/>In today&#8217;s post, I&#8217;ll be recommending a free tool called GoldFinger to help you maintain <a title=\"\" class=\"aalmanual\" target=\"_blank\"  rel=\"nofollow\"   style=\"color:#1e73be;\" href=\"https:\/\/bitdefender.f9tmep.net\/Y9nGGP\">security<\/a>, perform audits, and demonstrate compliance in within a Microsoft Active Directory Server.<\/p>\n<p>GoldFinger can be deployed within 2 minutes to gain immediate access to real-time AD analysis via its accurate reporting capabilities. Various IT personnel such as AD admins, IT auditors, IT managers, and Compliance auditors can benefit much from this tool.<\/p>\n<div class=\"lyte-wrapper\" style=\"width:640px;max-width:100%;margin:5px auto;\"><div class=\"lyMe\" id=\"WYL_7FGNtp5ThPg\"><div id=\"lyte_7FGNtp5ThPg\" data-src=\"https:\/\/www.softwareforenterprise.us\/hub\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=%2F%2Fi.ytimg.com%2Fvi%2F7FGNtp5ThPg%2Fhqdefault.jpg\" class=\"pL\"><div class=\"tC\"><div class=\"tT\"><\/div><\/div><div class=\"play\"><\/div><div class=\"ctrl\"><div class=\"Lctrl\"><\/div><div class=\"Rctrl\"><\/div><\/div><\/div><noscript><a href=\"https:\/\/youtu.be\/7FGNtp5ThPg\" rel=\"nofollow\"><img decoding=\"async\" src=\"https:\/\/www.softwareforenterprise.us\/hub\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2F7FGNtp5ThPg%2F0.jpg\" alt=\"YouTube video thumbnail\" width=\"640\" height=\"340\" \/><br \/>Watch this video on YouTube<\/a><\/noscript><\/div><\/div><div class=\"lL\" style=\"max-width:100%;width:640px;margin:5px auto;\"><\/div><\/p>\n<p>What I&#8217;m really impressed with is GoldFinger&#8217;s ability to generate up to 225 security reports. These are some of the common ones:<\/p>\n<p><strong>Account Management Reports<br \/>\n<\/strong><\/p>\n<ul>\n<li>List of all enabled domain user accounts<\/li>\n<li>List of all domain user accounts created in the last few days<\/li>\n<li>List of all domain user accounts that do not require passwords to logon<\/li>\n<\/ul>\n<p><strong>Exchange Management Reports<\/strong><\/p>\n<ul>\n<li>List of all mail-enabled accounts<\/li>\n<li>List of all mailbox-enabled accounts created in the last few days<\/li>\n<li>List of all mailbox-enabled accounts for which proxy addresses are specified<\/li>\n<\/ul>\n<p><strong>Security Group Management Reports<\/strong><\/p>\n<ul>\n<li>List of all security groups<\/li>\n<li>List of all security groups that have members<\/li>\n<li>List of all security groups for which a manager is specified<\/li>\n<\/ul>\n<p><strong>Contact Management Reports<\/strong><\/p>\n<ul>\n<li>List of all contacts changed in the last few days<\/li>\n<li>List of all contacts for which an office is specified<\/li>\n<li>List of all contacts for which direct reports have not been specified<\/li>\n<\/ul>\n<p><strong>Computer Management Reports<\/strong><\/p>\n<ul>\n<li>List of all domain controllers in a domain<\/li>\n<li>List of all domain computer accounts that are trusted for delegation<\/li>\n<li>List of all domain computer accounts for which Kerberos name mappings are specified<\/li>\n<\/ul>\n<p><strong>Group Policy (GPO) Management Reports<\/strong><\/p>\n<ul>\n<li>List of all group policy objects<\/li>\n<li>List of all disabled group policy objects<\/li>\n<li>List of all group policy objects changed in the last few days<\/li>\n<\/ul>\n<p><strong>Container Management Reports<\/strong><\/p>\n<ul>\n<li>List of all containers<\/li>\n<li>List of all containers changed in the last few days<\/li>\n<li>List of all containers for which a description is not specified<\/li>\n<\/ul>\n<p><strong>Service Connection Point Management Reports<\/strong><\/p>\n<ul>\n<li>List of all service connection points<\/li>\n<li>List of all service connection points changed in the last few days<\/li>\n<li>List of all service connection points for which DNS service names are specified<\/li>\n<\/ul>\n<p><strong>Organizational Unit Management Reports<\/strong><\/p>\n<ul>\n<li>List of all organizational units<\/li>\n<li>List of all organizational units changed in the last few days<\/li>\n<li>List of all organizational units to which GPOs are not explicitly linked<\/li>\n<\/ul>\n<p><strong>Active Directory ACL Management Reports<\/strong><\/p>\n<ul>\n<li>List of all AD objects on which a security principal has permissions<\/li>\n<li>List of all AD objects on which a security principal has list child permissions<\/li>\n<li>List of all AD objects on which a security principal has read permissions permissions<\/li>\n<\/ul>\n<p>The above are just a few reports out of the over 200 security reports which can be generated by GoldFinger.<\/p>\n<p>To find out more about how GoldFinger Free Edition can assist you in your AD management and auditing purposes, check out GoldFinger today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You&#8217;ve just been hired to manage and maintain your organization&#8217;s Active Directory (AD) containing more than a thousand users in it. Since the previous AD administrator left without providing any sort of documentation or details on how the AD was organized, you&#8217;re on your own to find out some answers. From all the users in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2465,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"slim_seo":{"title":"How to generate Active Directory security reports for free - Software for Enterprise","description":"You've just been hired to manage and maintain your organization's Active Directory (AD) containing more than a thousand users in it. Since the previous AD admin"},"footnotes":""},"categories":[24],"tags":[],"class_list":["post-2460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-management"],"_links":{"self":[{"href":"https:\/\/www.softwareforenterprise.us\/hub\/wp-json\/wp\/v2\/posts\/2460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.softwareforenterprise.us\/hub\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.softwareforenterprise.us\/hub\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.softwareforenterprise.us\/hub\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.softwareforenterprise.us\/hub\/wp-json\/wp\/v2\/comments?post=2460"}],"version-history":[{"count":0,"href":"https:\/\/www.softwareforenterprise.us\/hub\/wp-json\/wp\/v2\/posts\/2460\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.softwareforenterprise.us\/hub\/wp-json\/wp\/v2\/media\/2465"}],"wp:attachment":[{"href":"https:\/\/www.softwareforenterprise.us\/hub\/wp-json\/wp\/v2\/media?parent=2460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.softwareforenterprise.us\/hub\/wp-json\/wp\/v2\/categories?post=2460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.softwareforenterprise.us\/hub\/wp-json\/wp\/v2\/tags?post=2460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}