Active Directory auditing framework for Windows environments (PowerShell).
Important
Use only in environments you are authorized to assess.
AD-Auditor helps gather security-relevant Active Directory information to support:
- internal security reviews
- hardening / baseline checks
- compliance-oriented audits
It currently includes modules such as:
- Microsoft Best Practices Analyzer (BPA) scans (based on installed Windows features)
- Domain Users policy checks (password/lockout policy, privileged users, etc.)
- Domain Computers checks (OS/version posture and patching-related reporting)
- Windows host with access to AD (domain joined or with connectivity to a DC)
- PowerShell 5.1+ (or PowerShell 7+)
- Admin rights recommended for some checks
- Modules / features used by the script:
BestPractices(BPA)- RSAT / AD cmdlets (e.g.,
Get-ADDomain,Get-ADRootDSE)
Clone the repo:
git clone https://github.com/vgg-dev/AD-Auditor.git
cd AD-AuditorDot-source the script to load Invoke-ADAudit, then run it:
. .\ADAuditor.ps1
Invoke-ADAudit -OutFile .\reports\ad-auditOptional:
# Attempt to install RSAT if needed (requires admin)
Invoke-ADAudit -OutFile .\reports\ad-audit -InstallRSATThe tool writes report files using the -OutFile prefix (for example ad-audit_...).
Tip: use a dedicated output folder and ignore it in git (e.g., reports/).
get-cvrf.ps1 can query Microsoft Security Update (MSRC) data. It expects an API key in an environment variable:
$env:MSRC_API_KEY = "..."
. .\get-cvrf.ps1- CI runs
PSScriptAnalyzerand a small Pester smoke test.
See LICENSE.