Solved

Office 365 License Cleanup

Posted on 2016-10-18
2
38 Views
Last Modified: 2016-11-07
In Office 365, is there a way to run a power shell command against a get-content txt file containing UPNs, and report back accounts that's are NOT listed in the get-content txt file, and export the results to CSV?

Reason I ask, this company I am helping migrate to office 365 never did any AD cleanup of terminated employees. The AD accounts  weren't ever deleted/disabled, but just had passwords reset. So they have been migrating accounts/mailboxes to the cloud and wasting E3 licenses.

I want to reclaim those non-employed user licenses and delete them from AD/Exchange so I can use those licenses on current employees that still need to be migrated.

Thanks.
0
Comment
Question by:Christian Hans
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 15

Accepted Solution

by:
Todd Nelson earned 500 total points (awarded by participants)
ID: 41849455
Check this article out.  Not exactly what you specified but should be able to provide good guidance on how to script for a list of users...

https://oddytee.wordpress.com/2016/06/28/assign-subscription-licenses-and-license-options-to-office-365-users/

Combine with this article to remove the license...

https://technet.microsoft.com/en-us/library/dn771774.aspx
0
 
LVL 15

Expert Comment

by:Todd Nelson
ID: 41876857
Sufficient information to achieve resolution.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Windows 10 came with  a lot of built in applications, Some organisations leave them there, some will control them using GPO's. This Article is useful for those who do not want to have any applications in their image (example:me).
Previously, on our Nano Server Deployment series, we've created a new nano server image and deployed it on a physical server in part 2. Now we will go through configuration.
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an antispam), the admini…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question