IncidentResponsev2

4.57 Remove Unauthorized Devices (Local, AD, Cloud Registered)

Task

Identify and remove unauthorized, stale, or suspicious devices across local systems, Active Directory (AD), and Cloud Registered environments (Azure AD, Intune, AWS, Google Workspace).


Conditions

Given access to local system inventories, Active Directory, and cloud platform management consoles.


Standards


End State

All unauthorized devices are identified, removed, and documented across local, enterprise, and cloud environments.


Notes


Manual Steps

Step 1: Identify All Active and Registered Devices

Local Network Devices (Windows)

Get-ADComputer -Filter * -Properties LastLogonDate | Select-Object Name, LastLogonDate

Look for:

Linux/MacOS Devices (via DHCP or Network Scans)

sudo nmap -sn 192.168.1.0/24

Look for:

Operator Note: Flag any unknown or unmanaged IP/MAC addresses.


Active Directory

Get-ADComputer -Filter * -Properties Enabled, LastLogonDate | Where-Object {$_.Enabled -eq $true} | Select-Object Name, LastLogonDate

Azure AD and Intune

Get-AzureADDevice -All $true | Select-Object DisplayName, DeviceId, AccountEnabled

Or via Azure Portal:

Azure Portal → Azure AD → Devices → All Devices


AWS Systems Manager (SSM) + EC2 Instances

aws ssm describe-instance-information
aws ec2 describe-instances

Look for:


Google Workspace (Endpoint Management)

Admin Console → Devices → Overview → Endpoints

Look for:

Operator Note: Stale or unknown registered devices are high risk.


Step 2: Validate Device Authorization

Operator Note: Temporary, BYOD, or contractor devices should be explicitly approved.


Step 3: Disable or Remove Unauthorized Devices

Local (Windows AD)

Disable-ADAccount -Identity "ComputerName"
Remove-ADComputer -Identity "ComputerName"

Azure AD

Remove-AzureADDevice -ObjectId <DeviceID>

Or via Portal → Azure AD → Devices → Delete device.

Intune (Microsoft Endpoint Manager)

AWS

aws ec2 terminate-instances --instance-ids <instance-id>
aws ssm deregister-managed-instance --instance-id <instance-id>

Google Workspace

Admin Console → Devices → Select Device → Remove Device

Operator Note: Where possible, disable or quarantine before deletion to prevent disruption.


Step 4: Validate Removal and Audit


Dependencies


Other Available Tools

Tool Platform Installation Usage
PowerShell AD Modules Windows Built-in/RSAT AD device management
AzureAD / MS Graph Module PowerShell Install-Module Azure AD device management
AWS CLI Cross-platform Package manager EC2 / SSM device management
Google Admin Console Web Native Google Workspace device management
Nmap Cross-platform Package manager Network scanning

Operator Recommendations and Additional Tools

Operator Checklist

Best Practices


References


Revision History

Date Version Description Author
2025-05-02 1.0 Created from scratch with deep operator-focused guidance and multi-cloud/device examples Leo