Local administrator group audit across Windows endpoints
A read-only local administrator audit that records privileged group membership across Windows endpoints for review.
Good For
- privileged access review
- workstation audits
- server hardening
- incident scoping
- identity cleanup
How to Use It
- Start with a scoped server or workstation list so the audit does not become an unfocused domain crawl.
- Capture current local Administrators membership and preserve computer name, principal name, object type, and source.
- Compare results against approved break-glass, support, endpoint-management, and server-owner groups.
- If unexpected users or groups appear, validate through change history before requesting removal.
- Export results to CSV for identity owner review and exception tracking.
- Use the findings to create a remediation plan, not to automatically remove access during discovery.
Execution Modes
- local
- remote-single-host
- remote-host-list
- ad-filtered
Inputs and Outputs
Inputs
- computer name
- CSV or TXT endpoint list
- Active Directory computer scope
- approved admin group list
Outputs
- verbose-console
- csv
- future-html-report
Command Starter
Safe to run: read-only
$ComputerName = "server01"
Invoke-Command -ComputerName $ComputerName -ScriptBlock { Get-LocalGroupMember -Group "Administrators" | Select-Object @{Name="ComputerName";Expression={$env:COMPUTERNAME}}, Name, ObjectClass, PrincipalSource }Validation
- Every audited endpoint has a recorded local Administrators membership result or an access/error note.
- Unexpected principals are classified as approved, exception, unknown, or removal candidate.
- Any later removal work has separate approval and a rollback path through a known admin account or management tool.
Reporting
- export local administrator membership to CSV for identity review
- track unknown principals and exceptions in the ticket or audit worksheet
- promote repeated use into a privileged-access drift report
Safety Notes
- This audit is read-only and should not remove users or groups.
- Do not remediate privileged access without break-glass validation, owner approval, and rollback planning.