Overview#

Active Directory Configuration Related Searches are used to determine the configuration items for the AD DOMAIN or AD Forest

Active Directory Configuration Related Searchess might be part of the AD DOMAIN or Configuration Directory Partition from the AD Forest

Conf: serviceConnectionPoint#

ldapsearch -H ldaps://serverdc.example.com:636 -x -D "adminguy@example.com" -W -b "DC=example,DC=com" -s sub -a always -z 1000 "(objectClass=serviceConnectionPoint)" "serviceClassName" "serviceDNSName" "objectClass"

Conf: trusts established domain#

ldapsearch -H ldaps://serverdc.example.com:636 -x -D "adminguy@example.com" -W -b "DC=example,DC=com" -s sub -a always -z 1000 "(objectClass=trustedDomain)" "cn" "trustType" "trustDirection" "trustAuthIncoming" "trustAuthOutgoing" "trustPartner" "objectClass"

Conf: Domain Controllers that are Global Catalogs#

ldapsearch -H ldaps://serverdc.example.com:636 -x -D "adminguy@example.com" -W -b "CN=Configuration,DC=exampleroot,DC=com" -s sub -a always -z 1000 "(&(objectCategory=nTDSDSA)(options:1.2.840.113556.1.4.803:=1))" "objectClass"

Conf: Domain Controllers#

ldapsearch -H ldaps://serverdc.example.com:636 -x -D "adminguy@example.com" -W -b "DC=example,DC=com" -s sub -a always -z 1000 "(&(objectCategory=Computer)(userAccountControl:1.2.840.113556.1.4.803:=8192))" "dNSHostName" "objectClass"

Conf: AD DOMAIN Flexible Single Master Operation (FSMOs)#

ldapsearch -H ldaps://serverdc.example.com:636 -x -D "adminguy@example.com" -W -b "DC=example,DC=com" -s sub -a always -z 1000 "(|(ObjectClass=rIDManager)(ObjectClass=infrastructureUpdate)(ObjectClass=domainDNS))" "fSMORoleOwner" "objectClass"

Conf: AD Forest Flexible Single Master Operation (FSMO) Domain Naming Master FSMO Role#

ldapsearch -H ldaps://serverdc.example.com:636 -x -D "adminguy@example.com" -W -b "CN=Configuration,DC=exampleroot,DC=com" -s sub -a always -z 1000 "(ObjectClass=crossRefContainer)" "fSMORoleOwner" "objectClass

Conf: AD Forest Schema Master FSMO Role#

ldapsearch -H ldaps://serverdc.example.com:636 -x -D "adminguy@example.com" -W -b "CN=Schema,CN=Configuration,DC=exampleroot,DC=com" -s sub -a always -z 1000 "(ObjectClass=dMD)" "fSMORoleOwner" "objectClass"

Conf: Group Policy Objects#

ldapsearch -H ldaps://serverdc.example.com:636 -x -D "adminguy@example.com" -W -b "CN=Policies,CN=System,DC=example,DC=com" -s sub -a always -z 1000 "(objectClass=groupPolicyContainer)" "displayName" "objectClass"

Conf: Active Directory Sites#

ldapsearch -H ldaps://serverdc.example.com:636 -x -D "adminguy@example.com" -W -b "CN=Sites,CN=Configuration,DC=exampleroot,DC=com" -s sub -a always -z 1000 "(objectclass=site)" "cn" "siteObjectBL" "objectClass"

Conf: Active Directory Sites Sites-Servers#

ldapsearch -H ldaps://serverdc.example.com:636 -x -D "adminguy@example.com" -W -b "CN=Sites,CN=Configuration,DC=exampleroot,DC=com" -s sub -a always -z 1000 "(objectclass=server)" "cn" "distinguishedName" "objectClass"

Conf: Subnets Used for Active Directory Sites#

ldapsearch -H ldaps://serverdc.example.com:636 -x -D "adminguy@example.com" -W -b "CN=Subnets,CN=Sites,CN=Configuration,DC=exampleroot,DC=com" -s sub -a always -z 1000 "(cn=*)" "cn" "siteObject" "objectClass"

conf: INTERDOMAIN_TRUST_ACCOUNTs#

ldapsearch -H ldaps://serverdc.example.com:636 -x -D "adminguy@example.com" -W -b "DC=example,DC=com" -s sub -a always -z 1000 "(userAccountControl:1.2.840.113556.1.4.803:=2048)" "sAMAccountName" "pwdLastSet" "objectClass"

More Information#

There might be more information for this subject on one of the following: