Given an incident response workstation with PowerShell configured, Domain Administrator-level credentials, and a target Domain.
Operator Note: Authorization from the network owner is required before accessing and scanning AD structures.
Operator Note: Captured data should be stored securely and compared to baselines to identify unauthorized changes.
AD configuration information for the target domain is output to a text or XML file for later comparison.
Operator Note: Reports should be retained for post-incident analysis and forensic review.
Using a team laptop that is NOT a member of the domain:
2.15_AD_Enumeration_FromExternal.ps1
PowerShell script.Domain credentials: DOMAIN\username (i.e. team02\Administrator)
Domain Controller name: (i.e. team02-dc01)
Domain name: (i.e. team02.tgt)
C:\Temp\export.txt
Operator Note: Comparing AD structure over time helps detect persistence mechanisms such as rogue service accounts or group modifications.
.\2.15_AD_Enumeration_FromExternal.ps1
Follow on-screen prompts to input domain and credential information.
Output file is saved to:
C:\Temp\export.txt
Import-Module ActiveDirectory
Import-Module PowerView
Get-NetDomain
Get-NetOU
Get-NetUser
Operator Note: PowerView is an advanced operator tool useful for deeper relationship enumeration (offensive/defensive). Use cautiously.
Microsoft PowerShell Overview
RSAT: Active Directory Module
PowerView GitHub
Platform | Tool | Purpose |
---|---|---|
Windows | PowerShell + AD Module | Primary method for AD enumeration |
Windows | ADManager Plus, ADAudit Plus | GUI-based enterprise tools |
Windows/Linux | PowerView (optional, advanced use) | Advanced AD enumeration for operators |
Get-ADDomainController -Filter *
Get-ADUser -Filter * -Properties *
net group "Domain Admins" /domain
Date | Version | Description | Author |
---|---|---|---|
2025-05-02 | 1.8 | Full original + enriched PowerShell AD configuration scan procedures and tooling | Leo |