Discover Admin Accounts
Admin Discovery
There are two effective methods for discovered accounts with elevated rights in Active Directory. The first is the standard group enumeration method which identifies all members of the standard Active Directory admin groups:
Domain Admins
Administrators
Enterprise Admins
Getting a recursive group membership for the domain "Administrators" group will provide a list of all AD admins.
The second method involves identifying all accounts which have the attribute "AdminCount" set to 1. The caveat to this is that there may be accounts returned in this query which no longer have admin rights since this value isn't automatically reset once the account is removed from the admin groups.
Admin Discovery via AdminCount Attribute
Get-ADUser -filter {AdminCount -eq 1} -Properties Name,AdminCount,ServicePrincipalName,PasswordLastSet,LastLogonDate,MemberOfFind Admin Groups
Most organizations have custom admin groups which have different naming schemes, though most include the word "admin". Asking AD for all security groups with "admin" in the name is a quick way to get a list
Get-ADGroup -filter {GroupCategory -eq 'Security' -AND Name -like "*admin*"}Last updated