Active Directory | Identity Underground

Freshly posted for you on TNWiki: Active Directory PowerShell: List items with “Protect object from accidental deletion” setting

Introduction

Ever got in a situation where you as AD domain admin were blocked from deleting items?

Or did you ever receive an “Access denied” when you tried to delete items from AD, even with full admin rights?

Then you better check if AD has the “protect from accidental deletion” activated on the object, container or OU…

In case you want to check a larger collection of items for this setting, it quickly becomes complicated.

This article helps you to get an overview by using Powershell, and an export of the impacted items to a CSV file.

As explained by : James ONeill (Windows Server 2008 Protection from Accidental Deletion)

“The functionality to prevent accidental deletion is not based on a new attribute in Active Directory. It is enabled by ticking a check box on the Object tab of the particular object you wish to protect. The Object tab is only visible when the Advanced Features option is selected from the View menu of Active Directory Users and Computers. When the tick box is checked the permissions on the object are changed. A “Deny” permission is created which stops deletion of the object. “

Overview

This script finds all AD objects protected from accidental deletions.

Credits

This script uses logic that has been developed by:

  • Ashley McGlone,Microsoft Premier Field Engineer, March 2013,
  • http://aka.ms/GoateePFE
  • Source: https://gallery.technet.microsoft.com/Active-Directory-OU-1d09f989
Source references

Active Directory OU Permissions Report: Free PowerShell Script Download

  • Ashley McGlone, March 25, 2013
  • https://blogs.technet.microsoft.com/ashleymcglone/2013/03/25/active-directory-ou-permissions-report-free-powershell-script-download/

Preventing Unwanted/Accidental deletions and Restore deleted objects in Active Directory

  • abizer_hazratJune 9, 2009
  • https://blogs.technet.microsoft.com/abizerh/2009/06/09/preventing-unwantedaccidental-deletions-and-restore-deleted-objects-in-active-directory/

Windows Server 2008 Protection from Accidental Deletion

  • James ONeill, October 31, 2007
  • https://blogs.technet.microsoft.com/industry_insiders/2007/10/31/windows-server-2008-protection-from-accidental-deletion/
Prerequisites

This script only runs if you can load the AD PS module eg. run the analysison a DC.

Downloads (Gallery)
  •  List Protect object from accidental deletion setting in AD (full version)
  •  List Protect object from accidental deletion setting in AD (light version)
Source Code

Full Version (with progress bar)

001002

003

004

005

006

007

008

009

010

011

012

013

014

015

016

017

018

019

020

021

022

023

024

025

026

027

028

029

030

031

032

033

034

035

036

037

038

039

040

041

042

043

044

045

046

047

048

049

050

051

052

053

054

055

056

057

058

059

060

061

062

063

064

065

066

067

068

069

070

071

072

073

074

075

076

077

078

079

080

081

082

083

084

085

086

087

088

089

090

091

092

093

094

095

096

097

098

099

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

<##############################################################################Author: Peter Geelen

Quest For Security

October 2016https://identityunderground.wordpress.com

This script finds all AD objects protected by accidental deletions.

Credits: This script uses logic that has been developed by:

– Ashley McGlone, Microsoft Premier Field Engineer, March 2013, http://aka.ms/GoateePFE

– Source: https://gallery.technet.microsoft.com/Active-Directory-OU-1d09f989

LEGAL DISCLAIMER

This Sample Code is provided for the purpose of illustration only and is not intended to be used in a production environment.

THIS SAMPLE CODE AND ANY RELATED INFORMATION ARE PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,

INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND/OR FITNESS FOR A PARTICULAR PURPOSE.

We grant You a nonexclusive, royalty-free right to use and modify the Sample Code and to reproduce and distribute the object code form of the Sample Code,

provided that You agree:

(i) to not use Our name, logo, or trademarks to market Your software product in which the Sample Code is embedded;

(ii) to include a valid copyright notice on Your software product in which the Sample Code is embedded;and

(iii) to indemnify, hold harmless, and defend Us and Our suppliers from and against any claims or lawsuits, including attorneys fees, that arise or result from the use or distribution of the Sample Code.

This posting is provided “AS IS” with no warranties, and confers no rights. Use of included script samples are subject to the terms specified at http://www.microsoft.com/info/cpyright.htm.

##############################################################################>

#—————————————————————————–

#Source references

#—————————————————————————–

#Preventing Unwanted/Accidental deletions and Restore deleted objects in Active Directory

#abizer_hazratJune 9, 2009

#https://blogs.technet.microsoft.com/abizerh/2009/06/09/preventing-unwantedaccidental-deletions-and-restore-deleted-objects-in-active-directory/

#Windows Server 2008 Protection from Accidental Deletion

#James ONeill, October 31, 2007

#https://blogs.technet.microsoft.com/industry_insiders/2007/10/31/windows-server-2008-protection-from-accidental-deletion/

#—————————————————————————–

#Prerequisites:

#this script only runs if you can load the AD PS module

#eg. run the analysis on a DC

#—————————————————————————–

cls

import-moduleactivedirectory

#—————————————————————————–

#initialisation

#—————————————————————————–

#the CSV file is saved in the same directory as the PS file

$csvFile=$MyInvocation.MyCommand.Definition -replace‘ps1’,‘csv’

$report= @()

#(*) Credits

$schemaIDGUID= @{}

### NEED TO RECONCILE THE CONFLICTS ###

$ErrorActionPreference=‘SilentlyContinue’

Get-ADObject-SearchBase (Get-ADRootDSE).schemaNamingContext -LDAPFilter‘(schemaIDGUID=*)’-Propertiesname,schemaIDGUID|

ForEach-Object {$schemaIDGUID.add([System.GUID]$_.schemaIDGUID,$_.name)}

Get-ADObject-SearchBase“CN=Extended-Rights,$((Get-ADRootDSE).configurationNamingContext)”-LDAPFilter‘(objectClass=controlAccessRight)’-Propertiesname,rightsGUID|

ForEach-Object {$schemaIDGUID.add([System.GUID]$_.rightsGUID,$_.name)}

$ErrorActionPreference=‘Continue’

#(*)

#—————————————————————————–

#Functions

#—————————————————————————–

functionCheckProtection

{

param($obj)

$path=“AD:\”+$obj

Get-Acl-Path$path|`

Select-Object-ExpandPropertyAccess|`

Where-Object {($_.ActiveDirectoryRights -like“*DeleteTree*”) -AND ($_.AccessControlType -eq“Deny”)} |`

#(*)

Select-Object @{name=‘Object’;expression={$obj}},`

@{name=‘objectTypeName’;expression={if ($_.objectType.ToString() -eq‘00000000-0000-0000-0000-000000000000’) {‘All’} Else {$schemaIDGUID.Item($_.objectType)}}},`

@{name=‘inheritedObjectTypeName’;expression={$schemaIDGUID.Item($_.inheritedObjectType)}},`

#(*)

ActiveDirectoryRights,

ObjectFlags,

AccessControlType,

IdentityReference,

IsInherited,

InheritanceFlags,

PropagationFlags

}

#—————————————————————————–

#MAIN

#—————————————————————————–

#add the top domain

$OUs= @(Get-ADDomain|Select-Object-ExpandPropertyDistinguishedName)

#add the OUs

$OUs+=Get-ADOrganizationalUnit-Filter*|Select-Object-ExpandPropertyDistinguishedName

#add other containers

$OUs+=Get-ADObject-SearchBase (Get-ADDomain).DistinguishedName -LDAPFilter‘(|(objectClass=container)(objectClass=builtinDomain))’|Select-Object-ExpandPropertyDistinguishedName

#if you don’t want to scan the builtin container use line below instead of line above

#$OUs += Get-ADObject -SearchBase (Get-ADDomain).DistinguishedName -LDAPFilter ‘(objectClass=container)’ | Select-Object -ExpandProperty DistinguishedName

#set the target objects types to investigate

#including users, groups, contacts, computers

$ldapfilter=‘(|(objectclass=user)(objectclass=group)(objectclass=contact)(objectclass=computer))’

#$ldapfilter = ‘(|(objectclass=user)(objectclass=group)(objectclass=contact)(objectclass=computer)(objectclass=Foreign-Security-Principal))’

#not included: Foreign-Security-Principal, msTPM-InformationObjectsContainer, msDS-QuotaContainer, lostAndFound,

$iSeqNo=0

$OUCount=$OUs.Count

ForEach ($OUin$OUs)

{

$iSeqNo++

$pct= ([int]($iSeqNo/$OUCount*100))

$activity=“Analyzing container: “+$OU

Write-Progress-activity$activity-status“Please wait”-percentcomplete$pct-currentoperation“now processing container $iSeqNo of $OUCount”-id1

#check the protection of the parent container

$isProtected=

$isProtected=CheckProtection$OU

if ($isProtected-ne$null) {$report+=$isProtected}

#Lookup the child target objects in the parent container

$objects=Get-ADObject-SearchBase$OU-SearchScopeOneLevel-LDAPFilter$ldapfilter|Select-Object-ExpandPropertyDistinguishedName

$iSubSeqNo=0

$ObjCount=$objects.Count

#check the protection of the child objects

ForEach ($objectin$objects)

{

$iSubSeqNo++

$iSubpct= ([int]($iSubSeqNo/$ObjCount*100))

$SubActivity=“Analyzing object: “+$object

Write-Progress-activity$SubActivity-status“Please wait”-percentcomplete$iSubpct-currentoperation“now processing object $iSubSeqNo of $ObjCount”-ParentId1-id2

$isProtected=

$isProtected=CheckProtection$object

if ($isProtected-ne$null) {$report+=$isProtected}

}

Write-Progress-activity“Analyzing object completed.”-status“Proceeding”-Completed-ParentId1-id2

}

$report|Format-Table-Wrap

$report|Export-Csv-Path$csvFile-NoTypeInformation

Light version (without progress bar)

001002

003

004

005

006

007

008

009

010

011

012

013

014

015

016

017

018

019

020

021

022

023

024

025

026

027

028

029

030

031

032

033

034

035

036

037

038

039

040

041

042

043

044

045

046

047

048

049

050

051

052

053

054

055

056

057

058

059

060

061

062

063

064

065

066

067

068

069

070

071

072

073

074

075

076

077

078

079

080

081

082

083

084

085

086

087

088

089

090

091

092

093

094

095

096

097

098

099

100

101

102

<##############################################################################Author: Peter Geelen Quest For Security October 2016

https://identityunderground.wordpress.com

This script finds all AD objects protected by accidental deletions.

Credits: This script uses logic that has been developed by:

– Ashley McGlone, Microsoft Premier Field Engineer, March 2013, http://aka.ms/GoateePFE

– Source: https://gallery.technet.microsoft.com/Active-Directory-OU-1d09f989

LEGAL DISCLAIMER

This Sample Code is provided for the purpose of illustration only and is not intended to be used in a production environment.

THIS SAMPLE CODE AND ANY RELATED INFORMATION ARE PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,

INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND/OR FITNESS FOR A PARTICULAR PURPOSE.

We grant You a nonexclusive, royalty-free right to use and modify the Sample Code and to reproduce and distribute the object code form of the Sample Code,

provided that You agree:

(i) to not use Our name, logo, or trademarks to market Your software product in which the Sample Code is embedded;

(ii) to include a valid copyright notice on Your software product in which the Sample Code is embedded;and

(iii) to indemnify, hold harmless, and defend Us and Our suppliers from and against any claims or lawsuits, including attorneys fees, that arise or result from the use or distribution of the Sample Code.

This posting is provided “AS IS” with no warranties, and confers no rights. Use of included script samples are subject to the terms specified at http://www.microsoft.com/info/cpyright.htm.

##############################################################################>

#—————————————————————————–

#Source references

#—————————————————————————–

#Preventing Unwanted/Accidental deletions and Restore deleted objects in Active Directory

#abizer_hazratJune 9, 2009

#https://blogs.technet.microsoft.com/abizerh/2009/06/09/preventing-unwantedaccidental-deletions-and-restore-deleted-objects-in-active-directory/

#Windows Server 2008 Protection from Accidental Deletion

#James ONeill, October 31, 2007

#https://blogs.technet.microsoft.com/industry_insiders/2007/10/31/windows-server-2008-protection-from-accidental-deletion/

#—————————————————————————–

#Prerequisites:

#this script only runs if you can load the AD PS module

#eg. run the analysis on a DC

#—————————————————————————–

cls

import-moduleactivedirectory

#—————————————————————————–

#initialisation

#—————————————————————————–

#the CSV file is saved in the same directory as the PS file

$csvFile=$MyInvocation.MyCommand.Definition -replace‘ps1’,‘csv’

$report= @()

#(*) Credits

$schemaIDGUID= @{}

### NEED TO RECONCILE THE CONFLICTS ###

$ErrorActionPreference=‘SilentlyContinue’

Get-ADObject-SearchBase (Get-ADRootDSE).schemaNamingContext -LDAPFilter‘(schemaIDGUID=*)’-Propertiesname,schemaIDGUID|

ForEach-Object {$schemaIDGUID.add([System.GUID]$_.schemaIDGUID,$_.name)}

Get-ADObject-SearchBase“CN=Extended-Rights,$((Get-ADRootDSE).configurationNamingContext)”-LDAPFilter‘(objectClass=controlAccessRight)’-Propertiesname,rightsGUID|

ForEach-Object {$schemaIDGUID.add([System.GUID]$_.rightsGUID,$_.name)}

$ErrorActionPreference=‘Continue’

#(*)

#—————————————————————————–

#Functions

#—————————————————————————–

functionCheckProtection

{

param($obj)

$path=“AD:\”+$obj

Get-Acl-Path$path|`

Select-Object-ExpandPropertyAccess|`

Where-Object {($_.ActiveDirectoryRights -like“*DeleteTree*”) -AND ($_.AccessControlType -eq“Deny”)} |`

#(*)

Select-Object @{name=‘Object’;expression={$obj}},`

@{name=‘objectTypeName’;expression={if ($_.objectType.ToString() -eq‘00000000-0000-0000-0000-000000000000’) {‘All’} Else {$schemaIDGUID.Item($_.objectType)}}},`

@{name=‘inheritedObjectTypeName’;expression={$schemaIDGUID.Item($_.inheritedObjectType)}},`

#(*)

ActiveDirectoryRights,

ObjectFlags,

AccessControlType,

IdentityReference,

IsInherited,

InheritanceFlags,

PropagationFlags

}

#—————————————————————————–

#MAIN

#—————————————————————————–

#add the top domain

$OUs= @(Get-ADDomain|Select-Object-ExpandPropertyDistinguishedName)

#add the OUs

$OUs+=Get-ADOrganizationalUnit-Filter*|Select-Object-ExpandPropertyDistinguishedName

#add other containers

$OUs+=Get-ADObject-SearchBase (Get-ADDomain).DistinguishedName -LDAPFilter‘(|(objectClass=container)(objectClass=builtinDomain))’|Select-Object-ExpandPropertyDistinguishedName

#if you don’t want to scan the builtin container use line below instead of line above

#$OUs += Get-ADObject -SearchBase (Get-ADDomain).DistinguishedName -LDAPFilter ‘(objectClass=container)’ | Select-Object -ExpandProperty DistinguishedName

#set the target objects types to investigate

#including users, groups, contacts, computers

$ldapfilter=‘(|(objectclass=user)(objectclass=group)(objectclass=contact)(objectclass=computer))’

#$ldapfilter = ‘(|(objectclass=user)(objectclass=group)(objectclass=contact)(objectclass=computer)(objectclass=Foreign-Security-Principal))’

#not included: Foreign-Security-Principal, msTPM-InformationObjectsContainer, msDS-QuotaContainer, lostAndFound,

ForEach ($OUin$OUs)

{

#check the protection of the parent container

$isProtected=

$isProtected=CheckProtection$OU

if ($isProtected-ne$null) {$report+=$isProtected}

#Lookup the child target objects in the parent container

$objects=Get-ADObject-SearchBase$OU-SearchScopeOneLevel-LDAPFilter$ldapfilter|Select-Object-ExpandPropertyDistinguishedName

#check the protection of the child objects

ForEach ($objectin$objects)

{

$isProtected=

$isProtected=CheckProtection$object

if ($isProtected-ne$null) {$report+=$isProtected}

}

}

$report|Format-Table-Wrap

$report|Export-Csv-Path$csvFile-NoTypeInformation

Disclaimer

LEGAL DISCLAIMER

This Sample Code is provided for the purpose of illustration only and is not intended to be used in a production environment.

THIS SAMPLE CODE AND ANY RELATED INFORMATION ARE PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,

INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND/OR FITNESS FOR A PARTICULAR PURPOSE.

We grant You a nonexclusive, royalty-free right to use and modify the Sample Code and to reproduce and distribute the object code form of the Sample Code, provided that You agree:

(i) to not use Our name, logo, or trademarks to market Your software product in which the Sample Code is embedded;

(ii) to include a valid copyright notice on Your software product in which the Sample Code is embedded; and

(iii) to indemnify, hold harmless, and defend Us and Our suppliers from and against any claims or lawsuits, including attorneys’ fees, that arise or result from the use or distribution of the Sample Code.

This posting is provided “AS IS” with no warranties, and confers no rights.

(Latest update: 2020-12-31)

Share this:

  • LinkedIn
  • X
  • Email
  • Facebook
Like Loading...

Tag » Active-directory-ou-1d09f989