Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

how do you remove a device from AD  NEED Answer ASAP

Posted on 2014-09-14
7
Medium Priority
?
66 Views
Last Modified: 2015-06-11
A device showed up today on our network.  I can see the name and the IP but I can't access it.  I need to remove it ASAP.  HOW?
0
Comment
Question by:J.R. Sitman
  • 4
  • 2
7 Comments
 
LVL 60

Expert Comment

by:Cliff Galiher
ID: 40322188
You can see the name and IP where?? DHCP? DNS? ADUC (which usually doesn't show IP addresses?) The question is vague and so far the goal isn't clear.
0
 

Author Comment

by:J.R. Sitman
ID: 40322195
Using WSPing.  see attached.  I don't see it in DHCP or DNS
dhcp3.png
0
 
LVL 60

Accepted Solution

by:
Cliff Galiher earned 2000 total points
ID: 40322203
Well, if it isn't in DHCP, DNS, or ADUC then it *probably* means someone simply plugged in a device on an unsecured port or on an unsecured AP. An IP scan doesn't mean the device is in AD. So removing said device can take anything from physically inspecting each switch and securing APs to using something like 802.1X or MAC filters to attempt to lock things down.
0
Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

 

Author Comment

by:J.R. Sitman
ID: 40322252
Thanks, Cliff.  You put me at ease.  I don't think there is an issue
0
 
LVL 16

Expert Comment

by:cantoris
ID: 40322748
You could inspect your switches' CAM Tables to find which switch port the device is on, look up which physical wall port that is, visit it and then give the person responsible a clip round the ear  :)
0
 

Author Comment

by:J.R. Sitman
ID: 40323107
We don't have smart switches.  Just basic
0
 

Author Closing Comment

by:J.R. Sitman
ID: 40825597
Thanks
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
High user turnover can cause old/redundant user data to consume valuable space. UserResourceCleanup was developed to address this by automatically deleting user folders when the user account is deleted.
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

824 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question