Account Status Reports

26 Reports
About Account Status Reports

Account Status Reports provide critical visibility into the state and lifecycle of user accounts in your Active Directory. Track enabled/disabled accounts, locked users, expiration settings, security configurations, and account changes for comprehensive access management and security compliance.

Security Auditing

Monitor account security and access control

Lifecycle Management

Track account creation, changes, and expiration

Problem Detection

Identify locked and disabled accounts quickly

Example: Account Status Reports in AD Reports

AD Reports Account Status Reports

Available Reports

Enabled User Accounts

Lists all active user accounts that are neither disabled nor locked, representing users who currently have full access to network resources and can authenticate successfully.

Use Cases
  • Audit currently active user accounts
  • Verify user access permissions
  • Generate active user inventory
  • Baseline for security assessments
Key Information
  • User account names and UPNs
  • Account status (enabled/unlocked)
  • Last logon timestamps
  • Department and location
  • Account creation dates
Pro Tip: Use this as your baseline report for active users, then compare with logon reports to identify enabled accounts that aren't being used.
Enabled Including Locked User Accounts

Shows all enabled accounts including those that are temporarily locked out due to failed login attempts. Helps identify accounts that need attention but aren't permanently disabled.

Use Cases
  • Identify accounts needing unlock
  • Monitor account lockout patterns
  • Help desk support requests
  • Security incident investigation
Key Information
  • Enabled and locked accounts
  • Lockout timestamps
  • Bad password attempts
  • Lockout duration remaining
  • User contact information
Action Required: Review locked accounts regularly. Multiple lockouts may indicate security threats like brute force attacks or users needing password reset assistance.
Disabled User Accounts

Lists all user accounts that have been administratively disabled, preventing authentication and resource access. Typically used for terminated employees, suspended accounts, or temporary access restrictions.

Use Cases
  • Audit disabled accounts for cleanup
  • Verify terminated employee processing
  • Identify accounts for deletion
  • Compliance and security auditing
Key Information
  • Disabled account names
  • When account was disabled
  • Last logon before disable
  • Account age and history
  • Manager and department info
Pro Tip: Disabled accounts more than 90 days old are typically safe to delete after verifying with HR. Always follow your organization's retention policy.
Disabled and Locked User Accounts

Identifies accounts that are both administratively disabled AND locked out, representing accounts with maximum access restrictions. Often indicates security concerns or accounts pending deletion.

Use Cases
  • Identify accounts with dual restrictions
  • Security incident cleanup
  • Verify terminated user lockdown
  • Prioritize accounts for deletion
Key Information
  • Both disabled and locked status
  • Timeline of restrictions
  • Reason for disable (if documented)
  • Last activity before lockdown
  • Associated security events
Security Note: Accounts in this state often result from security incidents. Review the circumstances before deletion and document the rationale.
Disabled or Locked User Accounts

Comprehensive list of all accounts with any access restriction - either disabled, locked, or both. Provides complete visibility into non-functional accounts requiring attention.

Use Cases
  • Complete restricted accounts inventory
  • Help desk queue management
  • Access problem troubleshooting
  • Comprehensive security audit
Key Information
  • All non-functional accounts
  • Type of restriction (disabled/locked/both)
  • Restriction duration
  • Impact on users
  • Resolution priority
Pro Tip: Export this daily to track the number of restricted accounts. A sudden increase may indicate policy issues, security events, or system problems.
Locked User Accounts

Shows all accounts locked out due to failed authentication attempts, regardless of enabled/disabled status. Critical for help desk support and security monitoring of authentication failures.

Use Cases
  • Monitor authentication failures
  • Help desk unlock requests
  • Detect brute force attacks
  • User training opportunities
Key Information
  • Locked account names
  • Lockout timestamp
  • Number of failed attempts
  • Originating computer/IP
  • Auto-unlock timeframe
Security Note: Multiple lockouts from the same user or pattern of lockouts across accounts may indicate a security threat requiring immediate investigation.
Accounts Set to Expire

Lists all accounts configured with an expiration date, typically used for temporary workers, contractors, or time-limited access. Essential for managing temporary account lifecycles.

Use Cases
  • Track temporary account lifecycles
  • Contractor access management
  • Project-based access control
  • Compliance with time-limited access
Key Information
  • Account expiration dates
  • Days until expiration
  • Account type (contractor, temp, etc.)
  • Responsible manager
  • Renewal requirements
Pro Tip: Review this report weekly to proactively notify managers before contractor accounts expire, ensuring business continuity.
Accounts Expiring Within XX Days

Proactive report showing accounts expiring within a customizable timeframe. Allows you to plan renewals or terminations and notify stakeholders before access is automatically removed.

Use Cases
  • Proactive expiration notifications
  • Renewal processing workflow
  • Manager alerts for contractors
  • Access continuity planning
Key Information
  • Exact expiration date/time
  • Days remaining before expiration
  • User contact and manager
  • Account purpose/project
  • Renewal history
Best Practice: Set this to 30 days and run weekly to give adequate time for renewal approvals and processing.
Accounts Expiring Between Dates

Filter accounts expiring within a specific date range for targeted review and planning.

Use Cases
  • Quarterly expiration reviews
  • Project end-date planning
  • Fiscal year-end processing
  • Bulk renewal workflows
Key Information
  • Custom date range filtering
  • Expiration dates within range
  • Account details and managers
  • Business justification
  • Renewal status tracking
Pro Tip: Use this for end-of-quarter contractor reviews.
Accounts Never Expire

Lists permanent accounts configured to never expire.

Use Cases
  • Verify permanent employee accounts
  • Audit service account settings
  • Identify misconfigurations
  • Compliance policy validation
Key Information
  • Never-expire configured accounts
  • Account types (user, service, etc.)
  • Employment status verification
  • Last logon activity
  • Account age
Compliance Note: Some regulations require contractor accounts to have expiration dates.
Expired Accounts

Shows accounts that have already expired and can no longer authenticate.

Use Cases
  • Identify accounts for deletion
  • Process expired contractors
  • Clean up stale accounts
  • Security posture improvement
Key Information
  • Expiration dates (past)
  • Days since expiration
  • Last activity before expiration
  • Account owner/manager
  • Data retention requirements
Cleanup Required: Expired accounts more than 30 days old should typically be deleted.
Cannot Be Delegated

Lists sensitive accounts marked as "Account is sensitive and cannot be delegated" to prevent Kerberos delegation.

Use Cases
  • Audit privileged account protection
  • Security compliance verification
  • Prevent delegation attacks
  • Identify sensitive accounts
Key Information
  • Non-delegatable accounts
  • Account privilege levels
  • Group memberships
  • Security requirements
  • Delegation restrictions
Security Best Practice: All administrator accounts should be marked as "cannot be delegated".
Trusted for Kerberos Delegation

Shows accounts trusted for unconstrained Kerberos delegation, allowing them to impersonate users.

Use Cases
  • Audit delegation permissions
  • Security risk assessment
  • Service account validation
  • Reduce attack surface
Key Information
  • Accounts with delegation trust
  • Services using delegation
  • Security implications
  • Delegation type (unconstrained)
  • Risk assessment
High Security Risk: Unconstrained delegation is a major security risk.
Trusted to Authenticate for Delegation

Lists accounts configured for protocol transition.

Use Cases
  • Audit protocol transition settings
  • Service account security review
  • Application authentication analysis
  • Delegation compliance checking
Key Information
  • Protocol transition accounts
  • Allowed delegation targets
  • Application associations
  • Security configuration
  • Constrained delegation settings
Pro Tip: This setting is safer than unconstrained delegation.
Accounts with DES Encryption

Identifies accounts restricted to using weak DES encryption.

Use Cases
  • Identify weak encryption usage
  • Security vulnerability assessment
  • Legacy application identification
  • Upgrade planning for modern encryption
Key Information
  • Accounts using DES
  • Encryption type restrictions
  • Associated applications
  • Security risk level
  • Upgrade requirements
Critical Security Issue: DES encryption is deprecated and easily broken.
No Kerberos Preauthentication

Shows accounts vulnerable to AS-REP roasting attacks.

Use Cases
  • Identify AS-REP roasting vulnerabilities
  • Security hardening initiatives
  • Attack surface reduction
  • Compliance remediation
Key Information
  • Accounts without preauth
  • Attack vulnerability status
  • Reason for exception (if any)
  • Account privilege level
  • Remediation priority
Critical Vulnerability: Enable pre-authentication immediately.
Duplicate Accounts

Lists local user accounts whose primary account is registered in a different domain.

Use Cases
  • Identify local user accounts
  • Domain migration cleanup
  • Access boundary verification
  • Trust relationship auditing
Key Information
  • Local account names
  • Primary domain registration
  • Access scope limitations
  • Trust relationships
  • Account purpose
Pro Tip: Verify each account is intentional and still required.
Interdomain Trust Accounts

Shows accounts with permissions for complex multi-domain trust configurations.

Use Cases
  • Audit trust relationships
  • Multi-domain architecture review
  • Security boundary verification
  • Complex trust configurations
Key Information
  • Trust account names
  • Domain trust paths
  • Trust types and directions
  • Security implications
  • Trust validation status
Note: These accounts are system-generated for trust relationships.
Accounts Created During Last XX Days

Tracks recently created accounts within a customizable timeframe.

Use Cases
  • Monitor new account creation
  • Onboarding process verification
  • Detect unauthorized accounts
  • New hire tracking
Key Information
  • Creation date and time
  • Created by (administrator)
  • Account type and purpose
  • Initial group memberships
  • Manager and department
Best Practice: Review new accounts daily to catch unauthorized account creation quickly.
Accounts Created Between Specified Dates

Filter account creation by specific date range for historical analysis.

Use Cases
  • Historical account creation analysis
  • Audit period compliance
  • Hiring trend analysis
  • Security incident investigation
Key Information
  • Creation dates within range
  • Accounts created in period
  • Creation patterns and trends
  • Responsible administrators
  • Onboarding metrics
Pro Tip: Use this for quarterly audits or analyzing hiring patterns.
Accounts Changed During Last XX Days

Tracks accounts with modified attributes within a customizable timeframe.

Use Cases
  • Monitor unauthorized changes
  • Change management auditing
  • Troubleshoot account issues
  • Security event correlation
Key Information
  • Last modification timestamp
  • Modified by (administrator)
  • Account names changed
  • Change frequency
  • Attribute modifications
Important: The whenChanged attribute is not replicated. AD Reports scans all DCs.
Accounts Changed Between Specified Dates

Filter account modifications by specific date range.

Use Cases
  • Audit period change tracking
  • Security incident investigation
  • Change management compliance
  • Administrator activity review
Key Information
  • Change dates within range
  • Modification patterns
  • Administrator responsible
  • Change volume metrics
  • Impact assessment
Pro Tip: Use this after major incidents to understand what changes occurred.
Deleted User Accounts

Shows all deleted user accounts still in the tombstone or recycle bin state.

Use Cases
  • Recover accidentally deleted accounts
  • Audit account deletions
  • Track account lifecycle
  • Offboarding verification
Key Information
  • Deletion date and time
  • Deleted by (administrator)
  • Account name (if recoverable)
  • Days until permanent deletion
  • Recycle bin vs tombstone
Recovery Window: With AD Recycle Bin enabled, full recovery is possible.
Deleted User Accounts During Last XX Days

Tracks recently deleted accounts within a customizable timeframe.

Use Cases
  • Monitor recent deletions
  • Catch accidental deletions early
  • Offboarding compliance
  • Quick recovery operations
Key Information
  • Recent deletion timestamps
  • Responsible administrators
  • Account details before deletion
  • Recovery options available
  • Termination documentation
Pro Tip: Set this to 7 days and review daily for quick recovery.
Deleted User Accounts Between Specified Dates

Filter deleted accounts by specific date range for historical analysis.

Use Cases
  • Audit period deletion review
  • Offboarding metrics analysis
  • Historical data recovery
  • Compliance documentation
Key Information
  • Deletion dates within range
  • Number of accounts deleted
  • Deletion patterns and trends
  • Administrators responsible
  • Recovery feasibility
Pro Tip: Use this for quarterly audits to verify proper offboarding.
Service Accounts

Service accounts including delegation-trusted users, Managed Service Accounts (MSAs), and Group Managed Service Accounts (gMSAs). Provides a consolidated view of all accounts used to run services and automated processes.

Use Cases
  • Inventory all service accounts
  • Identify delegation-trusted accounts
  • Audit MSA and gMSA usage
  • Security review of privileged services
Key Information
  • Account name and type (user/MSA/gMSA)
  • Delegation trust settings
  • Account status (enabled/disabled)
  • Last logon and password change
Pro Tip: Migrate traditional service accounts to gMSAs where possible. gMSAs provide automatic password management and eliminate the risk of forgotten or compromised service account passwords.
See These Reports in Action

Try AD Reports free for 14 days — run any of these reports on your own Active Directory.

Download Free Trial View All Features