AD stale computer cleanup report
A read-only Active Directory stale computer report for last logon, OU, operating system, enabled state, and cleanup planning.
Recent Writeups
Review the latest troubleshooting articles, Labs builds, and Toolchest guides without jumping between section landing pages.
Current Feed
A read-only Active Directory stale computer report for last logon, OU, operating system, enabled state, and cleanup planning.
Collect non-replicated lastLogon values from every writable domain controller, calculate the newest observed logon per account, and export evidence suitable for stale-user or stale-computer cleanup decisions without relying on replicated lastLogonTimestamp alone.
PowerShell scanner that checks fixed local drives on Windows servers for root ACL entries where Authenticated Users have broad access. Produces console and CSV evidence so admins can review exposure before any ACL changes.
Reusable starter for Azure Arc onboarding waves using a host CSV, dry-run expectations, per-host logging, and repeatable result tracking suitable for tickets, change records, and post-wave reporting.
Preflight checklist for onboarding Windows servers to Azure Arc. Confirms supported OS state, outbound connectivity, proxy/TLS behavior, local admin rights, target Azure placement, tagging, pilot scope, and rollback notes before any agent install.
Starter template for an Azure Workbook plus Resource Graph evidence pack that shows patch compliance, pending updates, unsupported coverage, and patch-group drift across Azure and Arc-enabled machines.
Operator-ready planning template for Azure Update Manager patch waves covering scope, maintenance windows, reboot tolerance, exclusions, soak periods, rollback contacts, and stop-go criteria before scheduled patching.
A read-only certificate inventory for finding expiring Windows certificate-store items and endpoint certificates before outages.
Use this when you need to choose the right file-migration path instead of defaulting blindly to Robocopy, PowerShell, rsync, or storage replication.
A read-only DHCP scope report that surfaces high utilization, exhausted ranges, and cleanup candidates.
A read-only disk pressure report that finds likely cleanup candidates without deleting logs, caches, dumps, or user data.
A diagnostic DNS and DHCP triage flow that captures evidence, follows decision branches, and explains what each result means before changing anything.
A read-only DNS audit that compares forward and reverse lookup results across host lists and expected DNS servers.
A read-only file share audit that records SMB share permissions, NTFS access, and ownership evidence for review.
A read-only IIS inventory for sites, app pools, bindings, host headers, ports, certificate thumbprints, and content paths.
Two-phase review checklist for identifying inactive AD user accounts, validating inactivity evidence, applying exclusions, capturing approval, and preparing rollback details before any disable action.
A read-only PowerShell inventory starter for collecting installed applications from local or remote Windows endpoints.
Operator checklist for launching an internal IIS-hosted site with evidence capture for IIS role presence, site folder layout, bindings, app pool identity, DNS readiness, browser validation, and rollback notes.
A read-only local administrator audit that records privileged group membership across Windows endpoints for review.
A read-only pending reboot check for Windows servers before patching, application installs, or maintenance-window closure.
A read-only connectivity triage script that separates DNS, ping, RDP, WinRM, and application-port failures before escalation.
Read-only PowerShell reporting script pattern to identify likely Microsoft NPS or other RADIUS-capable Windows servers using multiple evidence sources: NPS service presence, NPAS role/feature state, IAS/NPS event log activity, UDP 1812/1813 listener evidence, and registry indicators. Designed for migration discovery, audit support, and authentication troubleshooting.
A structured check for RDP failures before changing firewall rules, user rights, or server policy.
A read-only RDP triage script pattern for DNS, TCP 3389, listener state, firewall evidence, sessions, and event logs.
A read-only scheduled task inventory that highlights failed runs, missed runs, disabled tasks, and ownership gaps.
A read-only service account discovery pass for Windows services, scheduled tasks, and IIS application pools.
A practical Sysinternals first-response map for process, file handle, startup, network, login, and registry symptoms.
Use this when you need a validation model that proves a migrated target is ready before users, apps, or cutover steps depend on it.
Use this supporting Insight to gather Windows evidence before SFC, DISM, uninstalls, Safe Mode, or other repair commands change the system.
A read-only Windows Firewall audit that records enabled allow rules, ports, profiles, and address scopes.
A read-only Windows Server snapshot for uptime, disk pressure, memory, stopped automatic services, and recent critical events.