GPO script to find GPO issues, empty GPOs, etc.

Posted on 2015-02-03
Medium Priority
Last Modified: 2015-02-10
Hello, I am looking for a good GPO script to find GPO issues, empty GPOs, missing links, etc and generate a nice report.

Thank you very much.
Question by:creative555
LVL 53

Accepted Solution

Will Szymkowski earned 1000 total points
ID: 40587165
You can use Get-GPOReport to get all of the data you require. The link below provides the download of the script and also detailed syntax as well.

Get-GPOReport cmdlet

LVL 40

Assisted Solution

Mahesh earned 1000 total points
ID: 40587235
Use PowerShell script in below link to identify orphaned GPOs

Also you can use GPMC sample script from MS to identify other GPO details such as unlinked GPOs etc

Author Closing Comment

ID: 40602158
THAnk you!

Featured Post

Easily manage email signatures in Office 365

Managing email signatures in Office 365 can be a challenging task if you don't have the right tool. CodeTwo Email Signatures for Office 365 will help you implement a unified email signature look, no matter what email client is used by users. Test it for free!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

If you need to implement application level security in an Access database application or other VBA code, I strongly encourage you to take advantage of Active Directory groups.
In this article, we will discuss how you can secure Active Directory using free tools, and how you can choose a safe and secure Active Directory security auditing tool.
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

587 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question