• Hi,

    I’m hoping this clever community can come to my rescue! 🙂


    I’m trying to list all Azure Backup Items for a subscription. It would be great you can do it for all subscriptions in a tenancy.

    This script has done the job thus far, but it only retrieves the items for Backup items in one subscription: https://gallery.technet.microsoft.com/scriptcenter/List-Azure-Backup-Items-454bee51

    It would also be great if you can retrieve the backup policy of the configured backup items in the same script?



  • Hi,


    I’m hoping this clever community can come to my rescue! 🙂


    I’m looking at a way to try and retrieve the Azure Site Recovery (ASR) Configuration (whether enabled, what the configuration is, the configured jobs ect…) in a subscription?

    It would be great if you can do it for all subscriptions in a tenancy…


  • Thanks or the feedback @luc, much appreciated. It’s a pity there is not a easy way to track this… one would have imagined it’s not that difficult, but turns out it is.. 🙁

    I’ll test you script and see the results, but ultimately it would have been great if there was a history associated moving users in and out of OU’s, as in my experience Event ID 5139 is not accurate, we write all security logs to SomoLogic and I’ can’t trace users moving in and out of a specific OU via Event ID 5139. Perhaps there is a better way for me to query or interrogate all security logs from all DC’s in our domain for event ID 5139, suggestions welcome.. 🙂

    We have a compliance issue where users only gain access to a system provided they are in a specific Active Directory OU, as users in this OU are automatically synced to an external application (in this case Atlasian bitbucket), we have queries regarding whom had access and when and basically need to prove that even though users are in bitbucket security groups, it’s not relevant as a user/s where not in the required OU to have system access.





  • Hi experts,


    I’m wondering if there is a easier way, other than tracing/auditing event ID 5139, to trace/audit the moving of a user account between different OU’s within active directory or establishing the moving of objects in and out of a specific OU?

    For a AD group you can get a history of when users where added or removed from a group: (repadmin /showobjmeta dcname “OU=group name,DC=name,DC=name” >c:temp123.csv)

    Is there somehow similar history you can extract for a specific OU (users or computer accounts moved in or out of the OU) or user account (added or removed from a specific OU’s)?





  • Deon became a registered member 4 years, 1 month ago

© 4sysops 2006 - 2023


Please ask IT administration questions in the forums. Any other messages are welcome.


Log in with your credentials


Forgot your details?

Create Account