Skip to content

A PowerShell script to get the source machines of bad password from domain controllers and compare these source machines with Exchange servers.

Notifications You must be signed in to change notification settings

tkcg2k/Get-LockoutEvents

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Get-LockoutEvents

A PowerShell script to get the source machines of bad password from domain controllers and compare these source machines IP addresses with Exchange servers IP addresses.

If any Exchange servers included in the source machine list, It will collect IIS logs from them after your confirmation by accessing C$ share.

Usage

.\Get-BadPasswordSourceMachines.ps1 .

UserName: sAMAccountName of the user account. DomainName: NetBIOS or FQDN of any domain in the forest.

If you do not provide any parameters, the script will ask you to supply values for both parameters. If any value provided is not valid, it will throw an exception and notify which parameter is not correct.

The output will be saved as Report.csv in the same location you run the script. You may also provide an alternate path before running the event collection.

Example:

About

A PowerShell script to get the source machines of bad password from domain controllers and compare these source machines with Exchange servers.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • PowerShell 100.0%