?
Solved

Active Directory Query Question - Query Only Enabled Users

Posted on 2016-08-29
10
Medium Priority
?
126 Views
Last Modified: 2016-08-29
I am looking to find a way to be able to to either DSGET, DSQUERY a list of all of the enabled users in a particular OU. More specifically, if you are looking at my screenshot, I need a query of all of the enabled users in the 1575 OU and the disabled users to be excluded.
2016-08-29-09_32_48-NEWSECGXDC---Rem.png
0
Comment
Question by:Jonathan DiVincenzo
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 5
10 Comments
 
LVL 16

Accepted Solution

by:
FOX earned 2000 total points
ID: 41774758
Use powershell, right-click run as administrator
1st command     Import-Module ActiveDirectory
2nd command    Get-ADuser -filter "Enabled -eq 'True'" -searchbase "Ou=ouname,ou=ouname,dc=domain,dc-com" | ft samaccountname, DisplayName | out-file c:\temp\Enabledusers.csv


**To get the path to the OU in question Make sure your view in ActiveDirectory users and computers  has Advance Features checked and User, contacts, groups and computers as containters checked.
Right-click the OU in question, click properties, click the attribute tab, sroll down to distinguishedName, highlight it and click view then do a ctrl c for your copy and then paste after -searchbase in the command above. Make sure the OU path is in quotes " "
0
 

Author Comment

by:Jonathan DiVincenzo
ID: 41774918
Thanks Foxluv,

The commands provided did populate an entire list of all the Enabled users in our domain, but what I need for my client is a concentrated automated list of just the enabled users in 1575 Users OU.
0
 
LVL 16

Expert Comment

by:FOX
ID: 41774927
Did you read the bottom part of my instructions?  Get the OU from the distinguished name and put it in the -searchbase part of the command
0
Prepare for your VMware VCP6-DCV exam.

Josh Coen and Jason Langer have prepared the latest edition of VCP study guide. Both authors have been working in the IT field for more than a decade, and both hold VMware certifications. This 163-page guide covers all 10 of the exam blueprint sections.

 

Author Comment

by:Jonathan DiVincenzo
ID: 41774934
Ok wow, that was honestly not there when I was looking at that a little bit ago. But since I just reloaded the page, the bottom part appeared. I'll give it a try and see what happens. Thanks!
0
 

Author Comment

by:Jonathan DiVincenzo
ID: 41774965
Awesome, that looks great! Just one little problem. Even though the Display Name perimeter is filled out in AD, the final csv output does not display the Display Name. Any idea what that's all about? See screenshot if needed.
2016-08-29-11_44_29-Microsoft-Excel-.png
0
 
LVL 16

Assisted Solution

by:FOX
FOX earned 2000 total points
ID: 41774971
Try this one, make sure you add in your OU again.

Get-ADuser -filter "Enabled -eq 'True'" -searchbase "Ou=ouname,ou=ouname,dc=domain,dc-com" | ft samaccountname,GivenName,Surname,DisplayName | out-file c:\temp\Enabledusers.csv
0
 

Author Comment

by:Jonathan DiVincenzo
ID: 41775081
Foxluv, you definitely get to take the cake in this one! Thanks a lot!
0
 
LVL 16

Expert Comment

by:FOX
ID: 41775083
Good work
0
 

Author Closing Comment

by:Jonathan DiVincenzo
ID: 41775084
For whatever reason, Display Name was not working so I removed that value from my command. Otherwise, perfect solution!
0
 
LVL 16

Expert Comment

by:FOX
ID: 41775230
Jon,
Sorry about the displayname.  If you need it try this.  (put in your OU again)

Get-ADuser -properties * -filter "Enabled -eq 'True'" -searchbase "Ou=ouname,ou=ouname,dc=domain,dc-com" | ft samaccountname,GivenName,Surname,DisplayName | out-file c:\temp\Enabledusers.csv
0

Featured Post

Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article shows the method of using the Resultant Set of Policy Tool to locate Group Policy that applies a particular setting.
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Suggested Courses
Course of the Month12 days, 18 hours left to enroll

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question