Solved

Best way to extract AD Structure using either LDIFDE, CSVDE, or Powershell

Posted on 2014-10-20
3
404 Views
Last Modified: 2014-12-09
I have attempted several different lines of syntax to export a particular OU with all of its nested sub OU.  For example

HomeBase
   >>Deleted Objects
       >> Beta Objects
            >> ETC
            >> ETC
 >>List
     >>
     >>
         >>
         >>
I believe you get my point now. It needs to includes all nested objects/containers, so I can reengineer AD.  Any assistance is greatly appreciated
0
Comment
Question by:cgooden01
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 

Author Comment

by:cgooden01
ID: 40394391
Suggestions are not outputting as offered in the question. Not looking for a third party temporary tool.  Looking to script this out or command line like below example


├───Contacts
├───Desktop
├───Downloads
│   └───Evernote Import
├───Dropbox
│   ├───Apps
│   │   └───iftttcom
│   │       └───getpocketpdf
│   ├───Backup
│   ├───Camera Uploads
│   ├───Development
0
 
LVL 15

Accepted Solution

by:
Rob Stone earned 500 total points
ID: 40477095
I've just done a restructure of AD and I used a combination of the Active Directory Topology Diagrammer and an excel export of the OUs.

The ADTP was used for GPO links.

For PowerShell something as simple as this was enough for me, no funky graphics like your picture though.
(Get-ADOrganizationalUnit -Filter * -Properties CanonicalName).CanonicalName

I then filtered the output in Excel.
0

Featured Post

Office 365 Training for IT Pros

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Suggested Courses

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question