I’ve ran into this issue a few times now so I’m assuming its becoming more and more of a trend. There are lots of blogs that talk about how to clean up token bloat and how to deal with SID history but very few address cleaning up unused groups and how to deal with groups that have been over nested.
This explains what could happen if a group is nested into many groups: Logging on as user account that is a member of more than 1,010 groups may fail on a Windows Server-based computer
What it Looks like when a user tries to log in with a large number of group memberships. Not Good!!
Private Cloud is implemented into Enterprises. when a VM is provisioned, The Cloud Admins have decided to provision a set of Active Directory (AD) objects to go along with each and every VM.
The idea is simple (However Not Recommended):
- Create AD Groups for different task required for a server, Nest the AD Group into a local group on the server.
- Create services accounts, the server’s application MAY need.
- Place Server Admins / Application Admins User accounts into the appropriate group when they need to perform task on the server. (“Just in Time”)
Usually the problem:
- No solution is in place to move Admin’s User Account in and out of AD Groups as needed.
- When server is decommissioned, nothing in place to clean up the AD Group or Service Account User Objects.
- Admin Staff gets lazy and starts nesting these groups in other groups to simplify their access.
What happens if Domain Users accidentally becomes a member of one of the many nested groups? (refer back to link provided above)?
Removal of Server not resulting in removal of groups
How to clean this up:
- Discovery, has the environment seen an increase of AD groups created over the last year. Usually the number is higher or has a pattern that will result in higher than previous years.
- Is there any groups that are members of a large number of groups or are nested in a large number of groups
- Has a stale group clean up process been implemented?
Discover Group Growth
This script will show the number of groups added to Active Directory over the history of the forest. Usually you will see a trend that groups are being created at a faster pace than previous years.
Results will look something like this:
This shows that this month had a huge amount of groups created and the location of a majority of the groups created over the last year was in a Private Cloud OU.
Discover Group “Over” Nesting
The next step will be to go out and determine if any groups are in a over nesting scenario. This is were the group is a member of several other groups. Small numbers aren’t the concern, we want to watch for groups that are over nested.
Demo Script can be found here: Github Link: ExpandADGroupMembership (this will take a while to run if a lot of group nesting exist)
The groups found in the results are over nested, and need to be evaluated. Work with the object owners to come up with a different solution. In this case adding the allserveradmin group directly to every server would have ended with the same results and wouldn’t have increased the admins group token count.
Implement Clean Up
All of these scripts use the group attribute msDS-ReplValueMetaData, which contains replication data around linked attributes. I could have easily combined the queries into one but wanted to allow granularity between possible ad group clean up task as I see them. Each script is a wrapper functions that leverage the Active Directory Module cmdlets.
- Retrieve groups that have never ever been used (member, memberof and msDS-ReplValueMetaData will be empty). Consider creating a process to discover and remove groups that have been created but never used after 6 months.
The idea of these scripts are to assist in helping identify the problem before it becomes a problem. Ideally a mapping of where all the groups are leveraged would be preferred, but auditing every resource and application is a big task. Microsoft Premier Customers can work with their Technical Account Manager on signing up for the ACLXRAY Delivery which does auditing of Active Directory Object using throughout a forest.
That is all for today
More Reading about msDS-ReplValueMetaData: